Compare commits

...

2 commits

Author SHA1 Message Date
♥ Minnie ♥ 2e7fefa7b9
migrate backups to borgbase 2024-10-15 06:46:10 +08:00
♥ Minnie ♥ 253cdf8ede
remove some unused services/refactor 2024-10-15 06:27:48 +08:00
21 changed files with 45 additions and 308 deletions

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 jVljVA ILfVChFf5s9U6CODItB/TqS1tUaAEeoLAGiNKPbDclU
MCyVqjOPexZm+is5JWG5zfbS26nJj/Z4mk6SJDufBPM
-> R<DEa-grease +b`?*<b*
/5YP7TzDWxztiGzrMKkUYSBzX9wcz6HSR2mFNX0JmfaTVcnJFrl3KcqfJeNf/z1w
JIBgF+2wzeD5I7PCcNjmHGn0f+W9kAImbw8
--- LZwgwtMUkIk4l/juYhY0i7kNFurvMAgcjhrYX4PsSEE
7c5ÌñÀîÝ{¶>Œ¤Æ¥ãÕ<C3A3>“II¥9ôsÆç~³a{³ê'¥æ<5o;_§*T³'|yí¿sÇvt(ÊXŠ_J.ø`£ŠÈr`“"ÜÙ|ª*‘Æ[ê

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 KTkZog 5sg/hpf/62ScHhTff9oK26rKUHOOIOkaEvz6azRbIFs
8YDQXQULAwfzazasdUqr+DhBMm0p4957vywLCmbsPOQ
-> ^)fem:-grease ,C tq3PQ#"
Dp5AeElkIQ9RTy0qPV91kur2jWvk2uJTgSRqk1gwoM8vUJM/BbpdqsimUCI0PFxG
Dd507GmCEWDrmovhpAIBS1lAqlY
--- +Xft4rCt53z0qwZsydGBaUanbAxv06yRHgJeDw6yUAI
<ÀBÝ98Ê @_ä—h8c>$KãÇK@<žaÿF(ñؾ¼<C2BE>áÉìÍæ=¬µeù-;ÀÒ¯¹R—=;M·È83Õ>öjø]lµf§¸ãÞÌNV*Æ ¨jmôÛCm ÿ"Þ<>¦¾DêønTwõÜŸ[Ðÿ‡‚

View file

@ -6,32 +6,25 @@
# Our user configuration and optional user units
../common/users/sajenim
# Containers
./containers/jellyfin
./containers/jellyseerr
./containers/lidarr
./containers/mealie
./containers/microbin
./containers/prowlarr
./containers/qbittorrent
./containers/radarr
./containers/recyclarr
./containers/sonarr
# Services
./services/borgbackup
./services/crowdsec
./services/forgejo
./services/grafana
./services/immich
./services/lighttpd
./services/minecraft
./services/mpd
./services/mysql
./services/paperless-ngx
./services/prometheus
./services/traefik
# Multimedia
./multimedia/jellyfin
./multimedia/lidarr
./multimedia/prowlarr
./multimedia/qbittorrent
./multimedia/radarr
./multimedia/sonarr
# Setup our hardware
./hardware-configuration.nix
];

View file

@ -1,43 +0,0 @@
{...}: let
port = "5055";
in {
virtualisation.oci-containers.containers = {
# Request management
jellyseerr = {
autoStart = true;
image = "ghcr.io/hotio/jellyseerr:release-1.9.2";
ports = [
"${port}:5055/tcp" # WebUI
];
volumes = [
"/srv/containers/jellyseerr:/config"
];
environment = {
PUID = "1000";
PGID = "100";
};
extraOptions = [
"--network=media-stack"
];
};
};
services.traefik.dynamicConfigOptions.http.routers = {
jellyseerr = {
rule = "Host(`jellyseerr.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "jellyseerr";
};
};
services.traefik.dynamicConfigOptions.http.services = {
jellyseerr.loadBalancer.servers = [
{url = "http://127.0.0.1:${port}";}
];
};
}

View file

@ -1,47 +0,0 @@
{...}: let
port = "9925";
in {
virtualisation.oci-containers.containers = {
mealie = {
autoStart = true;
image = "ghcr.io/mealie-recipes/mealie:v1.11.0";
ports = [
"${port}:9000"
];
volumes = [
"/srv/containers/mealie:/app/data/"
];
environment = {
ALLOW_SIGNUP = "false";
PUID = "1000";
PGID = "100";
TZ = "Australia/Perth";
MAX_WORKERS = "1";
WEB_CONCURRENCY = "1";
BASE_URL = "https://mealie.kanto.dev";
SECURITY_MAX_LOGIN_ATTEMPTS = "3";
SECRURITY_USER_LOCKOUT_TIME = "72";
};
};
};
services.traefik.dynamicConfigOptions.http.routers = {
mealie = {
rule = "Host(`mealie.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"crowdsec"
"geoblock"
];
service = "mealie";
};
};
services.traefik.dynamicConfigOptions.http.services = {
mealie.loadBalancer.servers = [
{url = "http://127.0.0.1:${port}";}
];
};
}

View file

@ -1,47 +0,0 @@
{config, ...}: let
port = "8181";
in {
age.secrets.microbin = {
# Environment variables for microbin
rekeyFile = ./environment.age;
owner = "sajenim";
group = "users";
};
virtualisation.oci-containers.containers = {
# Self-hosted, open-source pastbin
microbin = {
autoStart = true;
image = "danielszabo99/microbin:2.0.4";
ports = [
"${port}:8080/tcp" # WebUI
];
volumes = [
# Container data
"/srv/containers/microbin:/app/microbin_data:rw"
];
environmentFiles = [
config.age.secrets.microbin.path
];
};
};
services.traefik.dynamicConfigOptions.http.routers = {
microbin = {
rule = "Host(`bin.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "microbin";
};
};
services.traefik.dynamicConfigOptions.http.services = {
microbin.loadBalancer.servers = [
{url = "http://127.0.0.1:${port}";}
];
};
}

View file

@ -1,16 +0,0 @@
{...}: {
virtualisation.oci-containers.containers = {
# Automatically synchronize recommended settings from the TRaSH guides to your Sonarr/Radarr instances
recyclarr = {
autoStart = true;
image = "ghcr.io/recyclarr/recyclarr:6.0.2";
volumes = [
"/srv/containers/recyclarr:/config"
];
extraOptions = [
"--network=media-stack"
];
user = "1000:100";
};
};
}

View file

@ -3,9 +3,7 @@
lib,
pkgs,
...
}: let
hostname = config.networking.hostName;
in {
}: {
imports = [
# Our ephemeral system. Wipe root on reboot.
../common/optional/ephemeral-btrfs.nix
@ -71,12 +69,6 @@ in {
options = ["subvol=services" "compress=zstd"];
};
fileSystems."/srv/backup" = {
device = "/dev/disk/by-label/data";
fsType = "btrfs";
options = ["subvol=backup" "compress=zstd"];
};
fileSystems."/srv/shares" = {
device = "/dev/disk/by-label/data";
fsType = "btrfs";

View file

@ -1,33 +1,33 @@
{...}: {
services.borgbackup.jobs = {
containers = {
paths = [
"/srv/containers"
];
encryption.mode = "none";
repo = "/srv/backup/containers";
compression = "auto,zstd";
startAt = "daily";
};
{config, ...}: {
age.secrets.borgbackup = {
rekeyFile = ./passphrase.age;
};
services = {
paths = [
"/srv/services"
];
encryption.mode = "none";
repo = "/srv/backup/services";
compression = "auto,zstd";
startAt = "daily";
};
services.borgbackup.jobs."borgbase" = {
paths = [
# Shares
"/srv/shares/sajenim"
# Services
"/srv/services/forgejo"
"/srv/services/immich"
"/srv/services/minecraft"
"/srv/services/paperless-ngx"
# Containers
"/srv/containers/jellyfin"
"/srv/containers/lidarr"
"/srv/containers/prowlarr"
"/srv/containers/qbittorrent"
"/srv/containers/radarr"
"/srv/containers/sonarr"
];
shares = {
paths = [
"/srv/shares"
];
encryption.mode = "none";
repo = "/srv/backup/shares";
compression = "auto,zstd";
startAt = "daily";
repo = "o93k24r6@o93k24r6.repo.borgbase.com:repo";
encryption = {
mode = "repokey-blake2";
passCommand = "cat ${config.age.secrets.traefik.path}";
};
environment.BORG_RSH = "ssh -i /etc/ssh/ssh_host_ed25519_key";
compression = "auto,lzma";
startAt = "daily";
};
}

Binary file not shown.

View file

@ -1,56 +0,0 @@
{config, ...}: {
# Setup grafana our grafana instance.
services.grafana = {
enable = true;
dataDir = "/srv/services/grafana";
settings = {
server = {
http_addr = "127.0.0.1";
http_port = 3400;
domain = "kanto.dev";
root_url = "https://kanto.dev/grafana/";
serve_from_sub_path = true;
};
database = {
type = "mysql";
name = "grafana";
user = "grafana";
host = "/var/run/mysqld/mysqld.sock";
};
};
};
# Setup our database for grafana.
services.mysql = {
ensureUsers = [
{
name = "grafana";
ensurePermissions = {
"grafana.*" = "ALL PRIVILEGES";
};
}
];
ensureDatabases = ["grafana"];
};
# Setup our traefik router.
services.traefik.dynamicConfigOptions.http.routers = {
grafana = {
rule = "Host(`kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "grafana";
};
};
# Setup our traefik service.
services.traefik.dynamicConfigOptions.http.services = {
grafana.loadBalancer.servers = [
{url = "http://127.0.0.1:${toString config.services.grafana.settings.server.http_port}";}
];
};
}

View file

@ -1,7 +0,0 @@
{pkgs, ...}: {
services.mysql = {
enable = true;
package = pkgs.mariadb;
dataDir = "/srv/services/mysql";
};
}

View file

@ -1,32 +0,0 @@
{config, ...}: {
services.prometheus = {
enable = true;
port = 9001; # Port to listen on.
# Valid in all configuration contexts, defaults for other configuration sections.
globalConfig = {
scrape_interval = "15s";
};
# Collect specific metrics, format them, and expose them through HTTP endpoints for prometheus to scrape.
exporters = {
node = {
enable = true;
enabledCollectors = ["systemd" "processes"];
port = 9100;
};
};
# Specify a set of targets and parameters describing how to scrape them.
scrapeConfigs = [
{
job_name = "node";
static_configs = [
{
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.node.port}"];
}
];
}
];
};
}