TrueNAS VM 9000 at 10.0.10.15 was operationally decommissioned 2026-04-13.
The subagent-driven doc sweep in 5a0b24f5 covered the prose. This commit
removes the remaining in-code references:
- reverse-proxy: drop truenas Traefik ingress + Cloudflare record
(truenas.viktorbarzin.me was 502-ing since the VM stopped), drop
truenas_homepage_token variable.
- config.tfvars: drop deprecated `truenas IN A 10.0.10.15`, `iscsi CNAME
truenas`, and the commented-out `iscsi`/`zabbix` A records.
- dashy/conf.yml: remove Truenas dashboard entry (&ref_28).
- monitoring/loki.yaml: change storageClass from the decommissioned
`iscsi-truenas` to `proxmox-lvm` so a future re-enable has a valid SC
(Loki is currently disabled).
- actualbudget/main.tf + freedify/main.tf: update new-deployment
docstrings to cite Proxmox host NFS instead of TrueNAS.
- nfs-csi: add an explanatory comment to the `nfs-truenas` StorageClass
noting the name is historical — 48 bound PVs reference it, SC names
are immutable on PVs, rename not worth the churn.
Also cleaned out-of-band:
- Technitium DNS: deleted `truenas.viktorbarzin.lan` A and
`iscsi.viktorbarzin.lan` CNAME records.
- Vault: `secret/viktor` → removed `truenas_api_key` and
`truenas_ssh_private_key`; `secret/platform.homepage_credentials.reverse_proxy.truenas_token` removed.
- Terraform-applied: `scripts/tg apply -target=module.reverse-proxy.module.truenas`
destroyed the 3 K8s/Cloudflare resources cleanly.
Deferred:
- VM 9000 is still stopped on PVE. Deletion (destructive) awaits explicit
user go-ahead.
- `nfs-truenas` StorageClass name retained (see nfs-csi comment above).
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
121 lines
4 KiB
HCL
121 lines
4 KiB
HCL
variable "tls_secret_name" {
|
|
type = string
|
|
sensitive = true
|
|
}
|
|
resource "kubernetes_manifest" "external_secret" {
|
|
manifest = {
|
|
apiVersion = "external-secrets.io/v1beta1"
|
|
kind = "ExternalSecret"
|
|
metadata = {
|
|
name = "freedify-secrets"
|
|
namespace = "freedify"
|
|
}
|
|
spec = {
|
|
refreshInterval = "15m"
|
|
secretStoreRef = {
|
|
name = "vault-kv"
|
|
kind = "ClusterSecretStore"
|
|
}
|
|
target = {
|
|
name = "freedify-secrets"
|
|
}
|
|
dataFrom = [{
|
|
extract = {
|
|
key = "freedify"
|
|
}
|
|
}]
|
|
}
|
|
}
|
|
depends_on = [kubernetes_namespace.freedify]
|
|
}
|
|
|
|
data "kubernetes_secret" "eso_secrets" {
|
|
metadata {
|
|
name = "freedify-secrets"
|
|
namespace = kubernetes_namespace.freedify.metadata[0].name
|
|
}
|
|
depends_on = [kubernetes_manifest.external_secret]
|
|
}
|
|
|
|
locals {
|
|
credentials = jsondecode(data.kubernetes_secret.eso_secrets.data["credentials"])
|
|
}
|
|
|
|
|
|
# To create a new deployment:
|
|
/**
|
|
1. Create a subdirectory {name} under /srv/nfs/freedify on the Proxmox host (192.168.1.127)
|
|
2. Add {name} as proxied cloudflare route (tfvars)
|
|
3. Add module here
|
|
*/
|
|
|
|
resource "kubernetes_namespace" "freedify" {
|
|
metadata {
|
|
name = "freedify"
|
|
labels = {
|
|
"istio-injection" : "disabled"
|
|
tier = local.tiers.aux
|
|
}
|
|
}
|
|
lifecycle {
|
|
# KYVERNO_LIFECYCLE_V1: goldilocks-vpa-auto-mode ClusterPolicy stamps this label on every namespace
|
|
ignore_changes = [metadata[0].labels["goldilocks.fairwinds.com/vpa-update-mode"]]
|
|
}
|
|
}
|
|
|
|
module "tls_secret" {
|
|
source = "../../modules/kubernetes/setup_tls_secret"
|
|
namespace = kubernetes_namespace.freedify.metadata[0].name
|
|
tls_secret_name = var.tls_secret_name
|
|
}
|
|
|
|
# https://music-viktor.viktorbarzin.me/
|
|
module "viktor" {
|
|
source = "./factory"
|
|
name = "viktor"
|
|
tag = "latest"
|
|
tls_secret_name = var.tls_secret_name
|
|
depends_on = [kubernetes_namespace.freedify]
|
|
tier = local.tiers.aux
|
|
protected = true
|
|
listenbrainz_token = lookup(local.credentials["viktor"], "listenbrainz_token", null)
|
|
genius_token = lookup(local.credentials["viktor"], "genius_token", null)
|
|
dab_session = lookup(local.credentials["viktor"], "dab_session", null)
|
|
dab_visitor_id = lookup(local.credentials["viktor"], "dab_visitor_id", null)
|
|
gemini_api_key = lookup(local.credentials["viktor"], "gemini_api_key", null)
|
|
navidrome_scan_url = data.kubernetes_secret.eso_secrets.data["navidrome_scan_url"]
|
|
ha_sofia_url = lookup(data.kubernetes_secret.eso_secrets.data, "ha_sofia_url", "")
|
|
ha_sofia_token = lookup(data.kubernetes_secret.eso_secrets.data, "ha_sofia_token", "")
|
|
extra_annotations = {
|
|
"gethomepage.dev/enabled" = "true"
|
|
"gethomepage.dev/name" = "Freedify (Viktor)"
|
|
"gethomepage.dev/description" = "Music streaming"
|
|
"gethomepage.dev/icon" = "navidrome.png"
|
|
"gethomepage.dev/group" = "Media & Entertainment"
|
|
"gethomepage.dev/pod-selector" = ""
|
|
}
|
|
}
|
|
|
|
# https://music-emo.viktorbarzin.me/
|
|
module "emo" {
|
|
source = "./factory"
|
|
name = "emo"
|
|
tag = "latest"
|
|
tls_secret_name = var.tls_secret_name
|
|
depends_on = [kubernetes_namespace.freedify]
|
|
tier = local.tiers.aux
|
|
protected = true
|
|
genius_token = lookup(local.credentials["emo"], "genius_token", null)
|
|
gemini_api_key = lookup(local.credentials["emo"], "gemini_api_key", null)
|
|
navidrome_scan_url = data.kubernetes_secret.eso_secrets.data["navidrome_scan_url"]
|
|
ha_sofia_url = lookup(data.kubernetes_secret.eso_secrets.data, "ha_sofia_url", "")
|
|
ha_sofia_token = lookup(data.kubernetes_secret.eso_secrets.data, "ha_sofia_token", "")
|
|
extra_annotations = {
|
|
"gethomepage.dev/enabled" = "true"
|
|
"gethomepage.dev/name" = "Freedify (Emo)"
|
|
"gethomepage.dev/description" = "Music streaming"
|
|
"gethomepage.dev/icon" = "navidrome.png"
|
|
"gethomepage.dev/group" = "Media & Entertainment"
|
|
"gethomepage.dev/pod-selector" = ""
|
|
}
|
|
}
|