Created
January 3, 2021 10:18
-
-
Save maxaudron/83b054522918e0b04c62aa5fc0cda9b4 to your computer and use it in GitHub Desktop.
Totally Legal Media Procurement on K8s
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
repositories: | |
- name: cocainefarm | |
url: https://kube.cat/chartrepo/cocainefarm | |
templates: | |
default: &default | |
chart: cocainefarm/{{`{{ .Release.Name }}`}} | |
namespace: tlmp | |
releases: | |
- name: jellyfin | |
<<: *default | |
version: 1.2.4 | |
values: | |
- podSecurityContext: | |
runAsUser: 911 | |
runAsGroup: 911 | |
fsGroup: 2000 | |
resources: | |
limits: | |
gpu.intel.com/i915: 1 | |
ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
hosts: | |
- host: media.example.com | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- media.example.com | |
storage: | |
config: | |
class: ssd | |
existingClaim: jellyfin-config | |
transcode: | |
size: 50Gi | |
existingClaim: jellyfin-transcode | |
class: ssd | |
media: | |
- name: media | |
existingClaim: "media" | |
class: hdd | |
size: 6Ti | |
mountPath: "/media" | |
accessModes: | |
- ReadWriteMany | |
- name: rtorrent | |
<<: *default | |
version: 1.2.17 | |
values: | |
- podSecurityContext: | |
fsGroup: 2000 | |
nameserver: | |
- 1.1.1.1 | |
- 1.0.0.1 | |
ingress: | |
enabled: true | |
annotations: | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "torrent.media.example.com" | |
paths: | |
- /RPC2 | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "torrent.media.example.com" | |
readinessProbe: | |
enabled: false | |
livenessProbe: | |
enabled: false | |
scgiProxy: | |
enabled: true | |
type: ClusterIP | |
port: 80 | |
loadBalancerIP: | |
externalIPs: [] | |
config: | |
OPENVPN: "false" | |
WAIT_NORDVPN: "true" | |
storage: | |
data: | |
existingClaim: transmission | |
- name: rtorrent-flood | |
<<: *default | |
version: 1.0.1 | |
values: | |
- ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "torrent.media.example.com" | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "torrent.media.example.com" | |
storage: | |
data: | |
class: hdd | |
existingClaim: rtorrent-flood-data | |
accessModes: | |
- ReadWriteMany | |
- name: sonarr | |
<<: *default | |
version: 1.1.1 | |
values: | |
- podSecurityContext: | |
fsGroup: 2000 | |
ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "sonarr.media.example.com" | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "sonarr.media.example.com" | |
readinessProbe: | |
enabled: false | |
livenessProbe: | |
enabled: false | |
storage: | |
config: | |
class: ssd | |
existingClaim: sonarr-config | |
volumes: | |
- name: media | |
mountPath: "/media" | |
- name: transmission | |
mountPath: "/downloads" | |
- name: radarr | |
<<: *default | |
version: 1.0.1 | |
values: | |
- podSecurityContext: | |
fsGroup: 2000 | |
ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "radarr.media.example.com" | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "radarr.media.example.com" | |
storage: | |
config: | |
class: ssd | |
existingClaim: radarr-config | |
volumes: | |
- name: media | |
mountPath: "/media" | |
- name: transmission | |
mountPath: "/downloads" | |
- name: lidarr | |
<<: *default | |
version: 1.0.1 | |
values: | |
- podSecurityContext: | |
fsGroup: 2000 | |
ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "lidarr.media.example.com" | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "lidarr.media.example.com" | |
storage: | |
config: | |
class: ssd | |
existingClaim: lidarr-config | |
volumes: | |
- name: media | |
mountPath: "/media" | |
- name: transmission | |
mountPath: "/downloads" | |
- name: jackett | |
<<: *default | |
version: 1.0.1 | |
values: | |
- podSecurityContext: | |
fsGroup: 2000 | |
ingress: | |
enabled: true | |
annotations: | |
kubernetes.io/ingress.class: nginx | |
nginx.ingress.kubernetes.io/ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | |
nginx.ingress.kubernetes.io/auth-url: http://nginx-ldap-auth.ingress.svc.cluster.example.com:5555 | |
hosts: | |
- host: "jackett.media.example.com" | |
paths: | |
- / | |
tls: | |
- secretName: example.com-tls | |
hosts: | |
- "jackett.media.example.com" | |
storage: | |
config: | |
class: ssd | |
existingClaim: jackett-config |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment