clean up old kubernetes manifests

This commit is contained in:
Pim Kunis 2024-03-27 21:23:12 +01:00
parent 709e4b25d7
commit 9c14a774d4
3 changed files with 1 additions and 162 deletions

View file

@ -1,88 +0,0 @@
# We can use k3s's local storage provider for the persistent volume.
# https://docs.k3s.io/storage
---
apiVersion: v1
kind: ConfigMap
metadata:
name: freshrss-env
data:
TZ: Europe/Amsterdam
CRON_MIN: '2,32'
ADMIN_EMAIL: 'pim@kunis.nl'
ADMIN_PASSWORD: foo
ADMIN_API_PASSWORD: foo
PUBLISHED_PORT: '443'
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: freshrss-data
spec:
accessModes:
- ReadWriteOnce
storageClassName: local-path
resources:
requests:
storage: 1Mi
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: freshrss
labels:
app: freshrss
spec:
replicas: 1
selector:
matchLabels:
app: freshrss
template:
metadata:
labels:
app: freshrss
spec:
containers:
- name: freshrss
image: freshrss/freshrss:edge
ports:
- containerPort: 80
envFrom:
- configMapRef:
name: freshrss-env
volumeMounts:
- name: freshrss-data
mountPath: /var/www/FreshRSS/data
volumes:
- name: freshrss-data
persistentVolumeClaim:
claimName: freshrss-data
---
apiVersion: v1
kind: Service
metadata:
name: freshrss
spec:
selector:
app: freshrss
ports:
- protocol: TCP
port: 80
targetPort: 80
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: freshrss
spec:
ingressClassName: traefik
rules:
- host: freshrss.k3s.kun.is
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: freshrss
port:
number: 80

View file

@ -1,55 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: fedoratest
name: fedoratest
spec:
replicas: 2
selector:
matchLabels:
app: fedoratest
template:
metadata:
labels:
app: fedoratest
spec:
containers:
- image: registry.fedoraproject.org/fedora:35
name: fedora
command: ["/bin/bash", "-c", "--"]
args: ["while true; do sleep 30; done;"]
volumeMounts:
# name must match the volume name below
- name: media
mountPath: "/mnt/media"
volumes:
- name: media
persistentVolumeClaim:
claimName: media
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: media
spec:
capacity:
storage: 1Mi
accessModes:
- ReadWriteMany
nfs:
server: lewis.hyp
path: "/mnt/data/nfs/media"
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: media
spec:
accessModes:
- ReadWriteMany
storageClassName: ""
resources:
requests:
storage: 1Mi
volumeName: media

View file

@ -14,8 +14,6 @@
kubenix.project = "home"; kubenix.project = "home";
kubernetes = { kubernetes = {
# namespace = "kubenix";
customTypes = { customTypes = {
# HACK: These are dummy custom types. # HACK: These are dummy custom types.
# This is needed, because the CRDs imported as a chart are not available as Nix modules. # This is needed, because the CRDs imported as a chart are not available as Nix modules.
@ -37,28 +35,12 @@
}; };
resources = { resources = {
# namespaces = { ipAddressPools.main.spec.addresses = [ "192.168.30.128-192.168.30.200" ];
# kubenix = { };
# metallb-system.metadata.labels = {
# "pod-security.kubernetes.io/enforce" = "privileged";
# "pod-security.kubernetes.io/audit" = "privileged";
# "pod-security.kubernetes.io/warn" = "privileged";
# };
# };
ipAddressPools.main = {
# metadata.namespace = "metallb-system";
spec.addresses = [ "192.168.30.128-192.168.30.200" ];
};
# l2Advertisements.main.metadata.namespace = "metallb-system";
l2Advertisements.main.metadata = { }; l2Advertisements.main.metadata = { };
}; };
helm.releases.metallb = { helm.releases.metallb = {
chart = nixhelm.chartsDerivations.${system}.metallb.metallb; chart = nixhelm.chartsDerivations.${system}.metallb.metallb;
# namespace = "metallb-system";
includeCRDs = true; includeCRDs = true;
}; };
}; };