Fixing cubox and base services

This commit is contained in:
2025-03-23 17:41:42 -04:00
parent d94280256c
commit dc968384b5
15 changed files with 58 additions and 22 deletions

View File

@@ -8,7 +8,7 @@ cubox-m ansible_ssh_host=192.168.4.15
[ns] [ns]
;home ansible_ssh_host=192.168.4.11 ;home ansible_ssh_host=192.168.4.11
cubox-i ansible_ssh_host=192.168.4.12 cubox-i ansible_ssh_host=192.168.4.12
;cubox-m ansible_ssh_host=192.168.4.15 cubox-m ansible_ssh_host=192.168.4.15
[gfs] [gfs]
;home ansible_ssh_host=192.168.4.11 ;home ansible_ssh_host=192.168.4.11

View File

@@ -2,6 +2,7 @@
- name: bootstrap - name: bootstrap
hosts: managed hosts: managed
# remote_user: ansible # remote_user: ansible
# remote_user: root
gather_facts: false gather_facts: false
# become: true # become: true
@@ -24,6 +25,15 @@
- name: ping - name: ping
ansible.builtin.ping: ansible.builtin.ping:
- name: Ensure group "ssh" exists
become: true
ansible.builtin.group:
name: "{{item}}"
state: present
with_items:
- ssh
- _ssh
- name: Add the user 'ansible' - name: Add the user 'ansible'
become: true become: true
ansible.builtin.user: ansible.builtin.user:
@@ -35,6 +45,8 @@
# uid: "1001" # uid: "1001"
groups: groups:
- sudo - sudo
- ssh
- _ssh
- name: Add the authorized key for 'ansible' - name: Add the authorized key for 'ansible'
become: true become: true
@@ -80,6 +92,8 @@
# uid: "1000" # uid: "1000"
groups: groups:
- sudo - sudo
- ssh
- _ssh
- name: Add the authorized key for 'richard' - name: Add the authorized key for 'richard'
become: true become: true

View File

@@ -11,10 +11,10 @@
- name: update login screen - name: update login screen
include_tasks: motd.yml include_tasks: motd.yml
- name: fix usb #- name: fix usb
include_tasks: fix_usb.yml # include_tasks: fix_usb.yml
when: inventory_hostname == "cubox-m" # when: inventory_hostname == "cubox-m"
- name: update fstab #- name: update fstab
include_tasks: update_fstab.yml # include_tasks: update_fstab.yml

View File

@@ -5,7 +5,8 @@
# #
glusterd: glusterd:
version: 9.2-1 # version: 9.2-1
version: 9.6-ubuntu1~jammy2
unit: glusterd unit: glusterd
envfile: /etc/sysconfig/glusterd envfile: /etc/sysconfig/glusterd

View File

@@ -41,13 +41,16 @@ helm:
repo_url: https://cetic.github.io/helm-charts repo_url: https://cetic.github.io/helm-charts
apps: apps:
cert_manager:
enabled: true
stash: stash:
enabled: true enabled: true
state: present state: present
namespace: stashapp namespace: stashapp
mariadb: mariadb:
enabled: true enabled: false
namespace: mariadb namespace: mariadb
pvc: data-mariadb-0 pvc: data-mariadb-0
state: present state: present
@@ -85,12 +88,12 @@ apps:
chart_version: 4.5 # https://github.com/nextcloud/helm/releases?page=2 chart_version: 4.5 # https://github.com/nextcloud/helm/releases?page=2
hello_world: hello_world:
enabled: true enabled: false
namespace: default namespace: default
state: absent state: absent
funkwhale: funkwhale:
enabled: true enabled: false
namespace: funkwhale namespace: funkwhale
state: present state: present
@@ -106,6 +109,6 @@ apps:
image: image:
backstage: backstage:
enabled: true enabled: false
namespace: backstage namespace: backstage
state: present state: present

View File

@@ -14,15 +14,15 @@ spec:
dnsNames: dnsNames:
- xai-corp.net - xai-corp.net
- git.xai-corp.net - git.xai-corp.net
- tunedb.xai-corp.net # - tunedb.xai-corp.net
- www.xai-corp.net - www.xai-corp.net
- xaibox.xai-corp.net - xaibox.xai-corp.net
- sql.xai-corp.net - sql.xai-corp.net
- cik.xai-corp.net # - cik.xai-corp.net
- stash.xai-corp.net - stash.xai-corp.net
- dkregistry.xai-corp.net - dkregistry.xai-corp.net
- funkwhale.xai-corp.net - funkwhale.xai-corp.net
- backstage.xai-corp.net # - backstage.xai-corp.net
acme: acme:
config: config:
- http01: - http01:

View File

@@ -0,0 +1,17 @@
---
# persistent volume
apiVersion: v1
kind: PersistentVolume
metadata:
name: plex-pv-local-03
labels:
type: local
spec:
storageClassName: manual
capacity:
storage: 300Gi
accessModes:
- ReadWriteOnce
hostPath:
path: "/opt/data/T2/secure/app"

View File

@@ -5,7 +5,7 @@
image: image:
repository: stashapp/stash repository: stashapp/stash
tag: v0.26.2 tag: v0.27.2
ingress: ingress:
main: main:

View File

@@ -18,7 +18,7 @@
state: present state: present
definition: "{{ lookup('file', item) | from_yaml }}" definition: "{{ lookup('file', item) | from_yaml }}"
loop: loop:
- stash/pv02.yaml - stash/pv03.yaml
- stash/pv-claim.yaml - stash/pv-claim.yaml
# - stash/pv-media.yaml # - stash/pv-media.yaml
# - stash/pv-media-claim.yaml # - stash/pv-media-claim.yaml

View File

@@ -2,7 +2,7 @@
# provisioning services in k3s cluster # provisioning services in k3s cluster
# mount gluster # mount gluster
- include_tasks: gluster.fstab.yml #- include_tasks: gluster.fstab.yml
# #
## add helm repositories ## add helm repositories
#- include_tasks: add_repos.yml #- include_tasks: add_repos.yml
@@ -13,6 +13,7 @@
- name: deploy cert_manager - name: deploy cert_manager
include_tasks: cert_manager.yml include_tasks: cert_manager.yml
when: apps.cert_manager.enabled
- name: deploy stash - name: deploy stash
include_tasks: deployments/stash.yaml include_tasks: deployments/stash.yaml

View File

@@ -13,5 +13,5 @@ spec:
accessModes: accessModes:
- ReadWriteOnce - ReadWriteOnce
hostPath: hostPath:
path: "/opt/data/shared/dkregistry/auth" path: "/opt/data/T2/shared/dkregistry/auth"

View File

@@ -13,5 +13,5 @@ spec:
accessModes: accessModes:
- ReadWriteOnce - ReadWriteOnce
hostPath: hostPath:
path: "/opt/data/shared/dkregistry/data" path: "/opt/data/T2/shared/dkregistry/data"

View File

@@ -13,5 +13,5 @@ spec:
accessModes: accessModes:
- ReadWriteOnce - ReadWriteOnce
hostPath: hostPath:
path: "/opt/data/gitea" path: "/opt/data/T2/gitea/gitea"

View File

@@ -13,5 +13,5 @@ spec:
accessModes: accessModes:
- ReadWriteOnce - ReadWriteOnce
hostPath: hostPath:
path: "/opt/data/db/mariadb-10.9" path: "/opt/data/T2/db/db/mariadb-10.9"

View File

@@ -13,5 +13,5 @@ spec:
accessModes: accessModes:
- ReadWriteOnce - ReadWriteOnce
hostPath: hostPath:
path: "/opt/data/db/postgres-15.1" path: "/opt/data/T2/db/db/postgres-15.1"