2024-04-13 21:25:48 +00:00
|
|
|
{ myLib, ... }: {
|
2024-03-28 22:05:05 +00:00
|
|
|
kubernetes.resources = {
|
|
|
|
configMaps.pihole.data = {
|
|
|
|
TZ = "Europe/Amsterdam";
|
2024-04-13 11:23:12 +00:00
|
|
|
PIHOLE_DNS_ = "192.168.30.1";
|
2024-03-28 22:05:05 +00:00
|
|
|
};
|
|
|
|
|
2024-04-14 12:48:27 +00:00
|
|
|
secrets.pihole.stringData.webPassword = "ref+sops://secrets/sops.yaml#/pihole/password";
|
2024-03-28 22:05:05 +00:00
|
|
|
|
|
|
|
deployments.pihole = {
|
|
|
|
metadata.labels.app = "pihole";
|
|
|
|
|
|
|
|
spec = {
|
|
|
|
selector.matchLabels.app = "pihole";
|
|
|
|
|
|
|
|
template = {
|
|
|
|
metadata.labels.app = "pihole";
|
|
|
|
|
|
|
|
spec = {
|
|
|
|
containers.pihole = {
|
|
|
|
image = "pihole/pihole:latest";
|
|
|
|
envFrom = [{ configMapRef.name = "pihole"; }];
|
|
|
|
|
|
|
|
ports = [
|
|
|
|
{
|
|
|
|
containerPort = 80;
|
|
|
|
protocol = "TCP";
|
|
|
|
}
|
|
|
|
{
|
|
|
|
containerPort = 53;
|
|
|
|
protocol = "UDP";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
2024-04-14 19:00:15 +00:00
|
|
|
env.WEBPASSWORD.valueFrom.secretKeyRef = {
|
|
|
|
name = "pihole";
|
|
|
|
key = "webPassword";
|
|
|
|
};
|
2024-03-28 22:05:05 +00:00
|
|
|
|
|
|
|
volumeMounts = [
|
|
|
|
{
|
|
|
|
name = "data";
|
|
|
|
mountPath = "/etc/pihole";
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "dnsmasq";
|
|
|
|
mountPath = "/etc/dnsmasq.d";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2024-04-14 19:00:15 +00:00
|
|
|
volumes = {
|
|
|
|
data.persistentVolumeClaim.claimName = "pihole-data";
|
|
|
|
dnsmasq.persistentVolumeClaim.claimName = "pihole-dnsmasq";
|
|
|
|
};
|
2024-03-28 22:05:05 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
persistentVolumes = {
|
|
|
|
pihole-data.spec = {
|
|
|
|
capacity.storage = "1Mi";
|
|
|
|
accessModes = [ "ReadWriteMany" ];
|
|
|
|
|
|
|
|
nfs = {
|
2024-04-12 21:31:10 +00:00
|
|
|
server = "lewis.dmz";
|
2024-03-28 22:05:05 +00:00
|
|
|
path = "/mnt/data/nfs/pihole/data";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
pihole-dnsmasq.spec = {
|
|
|
|
capacity.storage = "1Mi";
|
|
|
|
accessModes = [ "ReadWriteMany" ];
|
|
|
|
|
|
|
|
nfs = {
|
2024-04-12 21:31:10 +00:00
|
|
|
server = "lewis.dmz";
|
2024-03-28 22:05:05 +00:00
|
|
|
path = "/mnt/data/nfs/pihole/dnsmasq";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
persistentVolumeClaims = {
|
|
|
|
pihole-data.spec = {
|
|
|
|
accessModes = [ "ReadWriteMany" ];
|
|
|
|
storageClassName = "";
|
|
|
|
resources.requests.storage = "1Mi";
|
|
|
|
volumeName = "pihole-data";
|
|
|
|
};
|
|
|
|
|
|
|
|
pihole-dnsmasq.spec = {
|
|
|
|
accessModes = [ "ReadWriteMany" ];
|
|
|
|
storageClassName = "";
|
|
|
|
resources.requests.storage = "1Mi";
|
|
|
|
volumeName = "pihole-dnsmasq";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services = {
|
|
|
|
pihole-web.spec = {
|
|
|
|
selector.app = "pihole";
|
|
|
|
|
|
|
|
ports = [{
|
|
|
|
protocol = "TCP";
|
|
|
|
port = 80;
|
|
|
|
targetPort = 80;
|
|
|
|
}];
|
|
|
|
};
|
|
|
|
|
|
|
|
pihole-dns.spec = {
|
|
|
|
type = "LoadBalancer";
|
2024-04-13 21:25:48 +00:00
|
|
|
loadBalancerIP = myLib.globals.piholeIPv4;
|
2024-03-28 22:05:05 +00:00
|
|
|
selector.app = "pihole";
|
|
|
|
|
|
|
|
ports = [{
|
|
|
|
protocol = "UDP";
|
|
|
|
port = 53;
|
|
|
|
targetPort = 53;
|
|
|
|
}];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-04-08 18:56:24 +00:00
|
|
|
ingresses.pihole-web = {
|
|
|
|
metadata.annotations = {
|
|
|
|
"cert-manager.io/cluster-issuer" = "letsencrypt";
|
|
|
|
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
|
|
|
|
};
|
|
|
|
|
|
|
|
spec = {
|
|
|
|
ingressClassName = "traefik";
|
|
|
|
|
|
|
|
rules = [{
|
|
|
|
host = "pihole.kun.is";
|
|
|
|
|
|
|
|
http.paths = [{
|
|
|
|
path = "/";
|
|
|
|
pathType = "Prefix";
|
|
|
|
|
|
|
|
backend.service = {
|
|
|
|
name = "pihole-web";
|
|
|
|
port.number = 80;
|
|
|
|
};
|
|
|
|
}];
|
|
|
|
}];
|
|
|
|
|
|
|
|
tls = [{
|
|
|
|
secretName = "pihole-tls";
|
|
|
|
hosts = [ "pihole.kun.is" ];
|
|
|
|
}];
|
|
|
|
};
|
|
|
|
};
|
2024-03-28 22:05:05 +00:00
|
|
|
};
|
|
|
|
}
|