migrate nextcloud to kubernetes

This commit is contained in:
Pim Kunis 2024-03-29 12:04:16 +01:00
parent c6a4814bdf
commit 903a5f4cec
3 changed files with 85 additions and 1 deletions

View file

@ -5,7 +5,6 @@
- {role: traefik, tags: traefik} - {role: traefik, tags: traefik}
- {role: forgejo, tags: forgejo} - {role: forgejo, tags: forgejo}
- {role: swarm_dashboard, tags: swarm_dashboard} - {role: swarm_dashboard, tags: swarm_dashboard}
- {role: nextcloud, tags: nextcloud}
- {role: kitchenowl, tags: kitchenowl} - {role: kitchenowl, tags: kitchenowl}
- {role: paperless-ngx, tags: paperless-ngx} - {role: paperless-ngx, tags: paperless-ngx}
- {role: media, tags: media} - {role: media, tags: media}

View file

@ -96,6 +96,12 @@ services:
- traefik.http.routers.hedgedoc.rule=Host(`md.kun.is`) - traefik.http.routers.hedgedoc.rule=Host(`md.kun.is`)
- traefik.http.routers.hedgedoc.tls=true - traefik.http.routers.hedgedoc.tls=true
- traefik.http.routers.hedgedoc.tls.certresolver=letsencrypt - traefik.http.routers.hedgedoc.tls.certresolver=letsencrypt
- traefik.http.routers.nextcloud.entrypoints=websecure
- traefik.http.routers.nextcloud.service=k3s@file
- traefik.http.routers.nextcloud.rule=Host(`cloud.kun.is`)
- traefik.http.routers.nextcloud.tls=true
- traefik.http.routers.nextcloud.tls.certresolver=letsencrypt
volumes: volumes:
- type: bind - type: bind
source: /var/run/docker.sock source: /var/run/docker.sock

View file

@ -1,5 +1,56 @@
{ {
kubernetes.resources = { kubernetes.resources = {
configMaps.nextcloud.data = {
POSTGRES_USER = "nextcloud";
POSTGRES_DB = "nextcloud";
POSTGRES_HOST = "lewis.dmz";
};
secrets.nextcloud.stringData.databasePassword = "ref+file:///home/pim/.config/home/vals.yaml#/nextcloud/databasePassword";
deployments.nextcloud = {
metadata.labels.app = "nextcloud";
spec = {
selector.matchLabels.app = "nextcloud";
template = {
metadata.labels.app = "nextcloud";
spec = {
containers.nextcloud = {
image = "nextcloud:27";
envFrom = [{ configMapRef.name = "nextcloud"; }];
ports = [{
containerPort = 80;
protocol = "TCP";
}];
env = [{
name = "POSTGRES_PASSWORD";
valueFrom.secretKeyRef = {
name = "nextcloud";
key = "databasePassword";
};
}];
volumeMounts = [{
name = "data";
mountPath = "/var/www/html";
}];
};
volumes = [{
name = "data";
persistentVolumeClaim.claimName = "nextcloud";
}];
};
};
};
};
persistentVolumes.nextcloud.spec = { persistentVolumes.nextcloud.spec = {
capacity.storage = "1Mi"; capacity.storage = "1Mi";
accessModes = [ "ReadWriteMany" ]; accessModes = [ "ReadWriteMany" ];
@ -16,5 +67,33 @@
resources.requests.storage = "1Mi"; resources.requests.storage = "1Mi";
volumeName = "nextcloud"; volumeName = "nextcloud";
}; };
services.nextcloud.spec = {
selector.app = "nextcloud";
ports = [{
protocol = "TCP";
port = 80;
targetPort = 80;
}];
};
ingresses.nextcloud.spec = {
ingressClassName = "traefik";
rules = [{
host = "cloud.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "nextcloud";
port.number = 80;
};
}];
}];
};
}; };
} }