move pihole to kubernetes
fix freshrss admin password secret
This commit is contained in:
parent
8d04504c40
commit
a7a3b1b722
5 changed files with 160 additions and 2 deletions
|
@ -6,7 +6,6 @@
|
|||
- {role: forgejo, tags: forgejo}
|
||||
- {role: hedgedoc, tags: hedgedoc}
|
||||
- {role: swarm_dashboard, tags: swarm_dashboard}
|
||||
- {role: pihole, tags: pihole}
|
||||
- {role: nextcloud, tags: nextcloud}
|
||||
- {role: kitchenowl, tags: kitchenowl}
|
||||
- {role: paperless-ngx, tags: paperless-ngx}
|
||||
|
|
|
@ -84,6 +84,12 @@ services:
|
|||
- traefik.http.routers.syncthing.rule=Host(`sync.kun.is`)
|
||||
- traefik.http.routers.syncthing.tls=true
|
||||
- traefik.http.routers.syncthing.tls.certresolver=letsencrypt
|
||||
|
||||
- traefik.http.routers.pihole.entrypoints=localsecure
|
||||
- traefik.http.routers.pihole.service=k3s@file
|
||||
- traefik.http.routers.pihole.rule=Host(`pihole.kun.is`)
|
||||
- traefik.http.routers.pihole.tls=true
|
||||
- traefik.http.routers.pihole.tls.certresolver=letsencrypt
|
||||
volumes:
|
||||
- type: bind
|
||||
source: /var/run/docker.sock
|
||||
|
|
|
@ -14,6 +14,7 @@
|
|||
./radicale.nix
|
||||
./syncthing.nix
|
||||
./nextcloud.nix
|
||||
./pihole.nix
|
||||
];
|
||||
kubernetes.kubeconfig = "~/.kube/config";
|
||||
kubenix.project = "home";
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
};
|
||||
|
||||
# TODO: encrypt this with sops and commit to git repo.
|
||||
secrets.freshrss.stringData.adminPassword = "ref+file:///home/pim/.config/home/vals.yaml";
|
||||
secrets.freshrss.stringData.adminPassword = "ref+file:///home/pim/.config/home/vals.yaml#/freshrss/password";
|
||||
|
||||
deployments.freshrss = {
|
||||
metadata.labels.app = "freshrss";
|
||||
|
|
152
nix/flake/kubenix/pihole.nix
Normal file
152
nix/flake/kubenix/pihole.nix
Normal file
|
@ -0,0 +1,152 @@
|
|||
{
|
||||
kubernetes.resources = {
|
||||
configMaps.pihole.data = {
|
||||
TZ = "Europe/Amsterdam";
|
||||
PIHOLE_DNS_ = "192.168.40.1";
|
||||
};
|
||||
|
||||
secrets.pihole.stringData.webPassword = "ref+file:///home/pim/.config/home/vals.yaml#/pihole/password";
|
||||
|
||||
deployments.pihole = {
|
||||
metadata.labels.app = "pihole";
|
||||
|
||||
spec = {
|
||||
selector.matchLabels.app = "pihole";
|
||||
|
||||
template = {
|
||||
metadata.labels.app = "pihole";
|
||||
|
||||
spec = {
|
||||
containers.pihole = {
|
||||
image = "pihole/pihole:latest";
|
||||
envFrom = [{ configMapRef.name = "pihole"; }];
|
||||
|
||||
ports = [
|
||||
{
|
||||
containerPort = 80;
|
||||
protocol = "TCP";
|
||||
}
|
||||
{
|
||||
containerPort = 53;
|
||||
protocol = "UDP";
|
||||
}
|
||||
];
|
||||
|
||||
env = [{
|
||||
# TODO: simplify this by using env.WEBPASSWORD?
|
||||
name = "WEBPASSWORD";
|
||||
|
||||
valueFrom.secretKeyRef = {
|
||||
name = "pihole";
|
||||
key = "webPassword";
|
||||
};
|
||||
}];
|
||||
|
||||
volumeMounts = [
|
||||
{
|
||||
name = "data";
|
||||
mountPath = "/etc/pihole";
|
||||
}
|
||||
{
|
||||
name = "dnsmasq";
|
||||
mountPath = "/etc/dnsmasq.d";
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
volumes = [
|
||||
{
|
||||
name = "data";
|
||||
persistentVolumeClaim.claimName = "pihole-data";
|
||||
}
|
||||
{
|
||||
name = "dnsmasq";
|
||||
persistentVolumeClaim.claimName = "pihole-dnsmasq";
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
persistentVolumes = {
|
||||
pihole-data.spec = {
|
||||
capacity.storage = "1Mi";
|
||||
accessModes = [ "ReadWriteMany" ];
|
||||
|
||||
nfs = {
|
||||
server = "lewis.hyp";
|
||||
path = "/mnt/data/nfs/pihole/data";
|
||||
};
|
||||
};
|
||||
|
||||
pihole-dnsmasq.spec = {
|
||||
capacity.storage = "1Mi";
|
||||
accessModes = [ "ReadWriteMany" ];
|
||||
|
||||
nfs = {
|
||||
server = "lewis.hyp";
|
||||
path = "/mnt/data/nfs/pihole/dnsmasq";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
persistentVolumeClaims = {
|
||||
pihole-data.spec = {
|
||||
accessModes = [ "ReadWriteMany" ];
|
||||
storageClassName = "";
|
||||
resources.requests.storage = "1Mi";
|
||||
volumeName = "pihole-data";
|
||||
};
|
||||
|
||||
pihole-dnsmasq.spec = {
|
||||
accessModes = [ "ReadWriteMany" ];
|
||||
storageClassName = "";
|
||||
resources.requests.storage = "1Mi";
|
||||
volumeName = "pihole-dnsmasq";
|
||||
};
|
||||
};
|
||||
|
||||
services = {
|
||||
pihole-web.spec = {
|
||||
selector.app = "pihole";
|
||||
|
||||
ports = [{
|
||||
protocol = "TCP";
|
||||
port = 80;
|
||||
targetPort = 80;
|
||||
}];
|
||||
};
|
||||
|
||||
pihole-dns.spec = {
|
||||
type = "LoadBalancer";
|
||||
loadBalancerIP = "192.168.30.131";
|
||||
selector.app = "pihole";
|
||||
|
||||
ports = [{
|
||||
protocol = "UDP";
|
||||
port = 53;
|
||||
targetPort = 53;
|
||||
}];
|
||||
};
|
||||
};
|
||||
|
||||
ingresses.pihole-web.spec = {
|
||||
ingressClassName = "traefik";
|
||||
|
||||
rules = [{
|
||||
host = "pihole.kun.is";
|
||||
|
||||
http.paths = [{
|
||||
path = "/";
|
||||
pathType = "Prefix";
|
||||
|
||||
backend.service = {
|
||||
name = "pihole-web";
|
||||
port.number = 80;
|
||||
};
|
||||
}];
|
||||
}];
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue