add servarr [ci skip]

This commit is contained in:
Viktor Barzin 2024-02-25 16:28:40 +00:00
parent 3426b962a7
commit b3bbe15c2c
7 changed files with 602 additions and 29 deletions

View file

@ -312,11 +312,6 @@ module "headscale" {
headscale_acl = var.headscale_acl
}
# module "metrics_api" {
# source = "./metrics_api"
# tls_secret_name = var.tls_secret_name
# }
module "dashy" {
source = "./dashy"
tls_secret_name = var.tls_secret_name
@ -450,3 +445,8 @@ module "jsoncrack" {
source = "./jsoncrack"
tls_secret_name = var.tls_secret_name
}
module "servarr" {
source = "./servarr"
tls_secret_name = var.tls_secret_name
}

View file

@ -1,24 +0,0 @@
variable "tls_secret_name" {}
# resource "kubernetes_namespace" "metrics" {
# metadata {
# name = "metrics"
# }
# }
module "tls_secret" {
source = "../setup_tls_secret"
namespace = "metrics"
tls_secret_name = var.tls_secret_name
}
resource "helm_release" "metrics_api" {
namespace = "metrics"
create_namespace = true
name = "metrics-server"
repository = "https://kubernetes-sigs.github.io/metrics-server/"
chart = "metrics-server"
# values = [templatefile("${path.module}/prometheus_chart_values.tpl", { alertmanager_mail_pass = var.alertmanager_account_password, alertmanager_slack_api_url = var.alertmanager_slack_api_url })]
}

View file

@ -0,0 +1,109 @@
variable "tls_secret_name" {}
resource "kubernetes_namespace" "flaresolverr" {
metadata {
name = "flaresolverr"
# labels = {
# "istio-injection" : "enabled"
# }
}
}
module "tls_secret" {
source = "../../setup_tls_secret"
namespace = "flaresolverr"
tls_secret_name = var.tls_secret_name
}
resource "kubernetes_deployment" "flaresolverr" {
metadata {
name = "flaresolverr"
namespace = "flaresolverr"
labels = {
app = "flaresolverr"
}
annotations = {
"reloader.stakater.com/search" = "true"
}
}
spec {
replicas = 1
selector {
match_labels = {
app = "flaresolverr"
}
}
template {
metadata {
labels = {
app = "flaresolverr"
}
}
spec {
container {
image = "ghcr.io/flaresolverr/flaresolverr:latest"
name = "flaresolverr"
port {
container_port = 8191
}
}
}
}
}
}
resource "kubernetes_service" "flaresolverr" {
metadata {
name = "flaresolverr"
namespace = "flaresolverr"
labels = {
app = "flaresolverr"
}
}
spec {
selector = {
app = "flaresolverr"
}
port {
name = "http"
port = 8191
}
}
}
resource "kubernetes_ingress_v1" "flaresolverr" {
metadata {
name = "flaresolverr"
namespace = "flaresolverr"
annotations = {
"kubernetes.io/ingress.class" = "nginx"
"nginx.ingress.kubernetes.io/auth-url" : "https://oauth2.viktorbarzin.me/oauth2/auth"
"nginx.ingress.kubernetes.io/auth-signin" : "https://oauth2.viktorbarzin.me/oauth2/start?rd=/redirect/$http_host$escaped_request_uri"
}
}
spec {
tls {
hosts = ["flaresolverr.viktorbarzin.me"]
secret_name = var.tls_secret_name
}
rule {
host = "flaresolverr.viktorbarzin.me"
http {
path {
path = "/"
backend {
service {
name = "flaresolverr"
port {
number = 8191
}
}
}
}
}
}
}
}

View file

@ -0,0 +1,21 @@
variable "tls_secret_name" {}
module "readarr" {
source = "./readarr"
tls_secret_name = var.tls_secret_name
}
module "prowlarr" {
source = "./prowlarr"
tls_secret_name = var.tls_secret_name
}
module "qbittorrent" {
source = "./qbittorrent"
tls_secret_name = var.tls_secret_name
}
module "flaresolverr" {
source = "./flaresolverr"
tls_secret_name = var.tls_secret_name
}

View file

@ -0,0 +1,140 @@
variable "tls_secret_name" {}
resource "kubernetes_namespace" "prowlarr" {
metadata {
name = "prowlarr"
# labels = {
# "istio-injection" : "enabled"
# }
}
}
module "tls_secret" {
source = "../../setup_tls_secret"
namespace = "prowlarr"
tls_secret_name = var.tls_secret_name
}
resource "kubernetes_deployment" "prowlarr" {
metadata {
name = "prowlarr"
namespace = "prowlarr"
labels = {
app = "prowlarr"
}
annotations = {
"reloader.stakater.com/search" = "true"
}
}
spec {
replicas = 1
selector {
match_labels = {
app = "prowlarr"
}
}
template {
metadata {
labels = {
app = "prowlarr"
}
}
spec {
container {
image = "lscr.io/linuxserver/prowlarr:latest"
name = "prowlarr"
port {
container_port = 9696
}
env {
name = "PUID"
value = 1000
}
env {
name = "PGID"
value = 1000
}
env {
name = "TZ"
value = "Etc/UTC"
}
volume_mount {
name = "data"
mount_path = "/config"
}
volume_mount {
name = "data"
mount_path = "/books"
}
volume_mount {
name = "data"
mount_path = "/downloads"
}
}
volume {
name = "data"
nfs {
path = "/mnt/main/servarr/prowlarr"
server = "10.0.10.15"
}
}
}
}
}
}
resource "kubernetes_service" "prowlarr" {
metadata {
name = "prowlarr"
namespace = "prowlarr"
labels = {
app = "prowlarr"
}
}
spec {
selector = {
app = "prowlarr"
}
port {
name = "http"
port = 9696
}
}
}
resource "kubernetes_ingress_v1" "prowlarr" {
metadata {
name = "prowlarr"
namespace = "prowlarr"
annotations = {
"kubernetes.io/ingress.class" = "nginx"
"nginx.ingress.kubernetes.io/auth-url" : "https://oauth2.viktorbarzin.me/oauth2/auth"
"nginx.ingress.kubernetes.io/auth-signin" : "https://oauth2.viktorbarzin.me/oauth2/start?rd=/redirect/$http_host$escaped_request_uri"
}
}
spec {
tls {
hosts = ["prowlarr.viktorbarzin.me"]
secret_name = var.tls_secret_name
}
rule {
host = "prowlarr.viktorbarzin.me"
http {
path {
path = "/"
backend {
service {
name = "prowlarr"
port {
number = 9696
}
}
}
}
}
}
}
}

View file

@ -0,0 +1,175 @@
variable "tls_secret_name" {}
resource "kubernetes_namespace" "qbittorrent" {
metadata {
name = "qbittorrent"
# labels = {
# "istio-injection" : "enabled"
# }
}
}
module "tls_secret" {
source = "../../setup_tls_secret"
namespace = "qbittorrent"
tls_secret_name = var.tls_secret_name
}
resource "kubernetes_deployment" "qbittorrent" {
metadata {
name = "qbittorrent"
namespace = "qbittorrent"
labels = {
app = "qbittorrent"
}
annotations = {
"reloader.stakater.com/search" = "true"
}
}
spec {
replicas = 1
selector {
match_labels = {
app = "qbittorrent"
}
}
template {
metadata {
labels = {
app = "qbittorrent"
}
}
spec {
container {
image = "lscr.io/linuxserver/qbittorrent:latest"
name = "qbittorrent"
port {
container_port = 8787
}
env {
name = "PUID"
value = 1000
}
env {
name = "PGID"
value = 1000
}
env {
name = "WEBUI_PORT"
value = 8080
}
env {
name = "TORRENTING_PORT"
value = 6881
}
volume_mount {
name = "data"
mount_path = "/config"
}
volume_mount {
name = "data"
mount_path = "/downloads"
}
}
volume {
name = "data"
nfs {
path = "/mnt/main/servarr/qbittorrent"
server = "10.0.10.15"
}
}
}
}
}
}
resource "kubernetes_service" "qbittorrent" {
metadata {
name = "qbittorrent"
namespace = "qbittorrent"
labels = {
app = "qbittorrent"
}
}
spec {
selector = {
app = "qbittorrent"
}
port {
name = "http"
port = 8080
target_port = 8080
}
}
}
resource "kubernetes_service" "qbittorrent-torrenting" {
metadata {
name = "qbittorrent-torrenting"
namespace = "qbittorrent"
labels = {
app = "qbittorrent-torrenting"
}
annotations = {
"metallb.universe.tf/allow-shared-ip" = "shared"
}
}
spec {
type = "LoadBalancer"
external_traffic_policy = "Cluster"
selector = {
app = "qbittorrent"
}
port {
name = "torrenting"
port = 6881
target_port = 6881
}
port {
name = "torrenting-udp"
port = 6881
protocol = "UDP"
target_port = 6881
}
}
}
resource "kubernetes_ingress_v1" "qbittorrent" {
metadata {
name = "qbittorrent"
namespace = "qbittorrent"
annotations = {
"kubernetes.io/ingress.class" = "nginx"
"nginx.ingress.kubernetes.io/auth-url" : "https://oauth2.viktorbarzin.me/oauth2/auth"
"nginx.ingress.kubernetes.io/auth-signin" : "https://oauth2.viktorbarzin.me/oauth2/start?rd=/redirect/$http_host$escaped_request_uri"
"nginx.ingress.kubernetes.io/proxy-body-size" : "100000m" // allow uploading .torrent files
}
}
spec {
tls {
hosts = ["qbittorrent.viktorbarzin.me"]
secret_name = var.tls_secret_name
}
rule {
host = "qbittorrent.viktorbarzin.me"
http {
path {
path = "/"
backend {
service {
name = "qbittorrent"
port {
number = 8080
}
}
}
}
}
}
}
}

View file

@ -0,0 +1,152 @@
variable "tls_secret_name" {}
resource "kubernetes_namespace" "readarr" {
metadata {
name = "readarr"
# labels = {
# "istio-injection" : "enabled"
# }
}
}
module "tls_secret" {
source = "../../setup_tls_secret"
namespace = "readarr"
tls_secret_name = var.tls_secret_name
}
resource "kubernetes_deployment" "readarr" {
metadata {
name = "readarr"
namespace = "readarr"
labels = {
app = "readarr"
}
annotations = {
"reloader.stakater.com/search" = "true"
}
}
spec {
replicas = 1
selector {
match_labels = {
app = "readarr"
}
}
template {
metadata {
labels = {
app = "readarr"
}
}
spec {
container {
image = "lscr.io/linuxserver/readarr:develop"
name = "readarr"
port {
container_port = 8787
}
env {
name = "PUID"
value = 1000
}
env {
name = "PGID"
value = 1000
}
env {
name = "TZ"
value = "Etc/UTC"
}
volume_mount {
name = "data"
mount_path = "/config"
}
volume_mount {
name = "data"
mount_path = "/books"
}
volume_mount {
name = "data"
mount_path = "/downloads"
}
volume_mount {
name = "qbittorrent"
mount_path = "/mnt"
read_only = true
}
}
volume {
name = "data"
nfs {
path = "/mnt/main/servarr/readarr"
server = "10.0.10.15"
}
}
volume {
name = "qbittorrent"
nfs {
path = "/mnt/main/servarr/qbittorrent"
server = "10.0.10.15"
}
}
}
}
}
}
resource "kubernetes_service" "readarr" {
metadata {
name = "readarr"
namespace = "readarr"
labels = {
app = "readarr"
}
}
spec {
selector = {
app = "readarr"
}
port {
name = "http"
port = 8787
}
}
}
resource "kubernetes_ingress_v1" "readarr" {
metadata {
name = "readarr"
namespace = "readarr"
annotations = {
"kubernetes.io/ingress.class" = "nginx"
"nginx.ingress.kubernetes.io/auth-url" : "https://oauth2.viktorbarzin.me/oauth2/auth"
"nginx.ingress.kubernetes.io/auth-signin" : "https://oauth2.viktorbarzin.me/oauth2/start?rd=/redirect/$http_host$escaped_request_uri"
}
}
spec {
tls {
hosts = ["readarr.viktorbarzin.me"]
secret_name = var.tls_secret_name
}
rule {
host = "readarr.viktorbarzin.me"
http {
path {
path = "/"
backend {
service {
name = "readarr"
port {
number = 8787
}
}
}
}
}
}
}
}