Compare commits
2 commits
7297d48f13
...
2e7fefa7b9
| Author | SHA1 | Date | |
|---|---|---|---|
| 2e7fefa7b9 | |||
| 253cdf8ede |
21 changed files with 45 additions and 308 deletions
|
|
@ -1,8 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 jVljVA ILfVChFf5s9U6CODItB/TqS1tUaAEeoLAGiNKPbDclU
|
|
||||||
MCyVqjOPexZm+is5JWG5zfbS26nJj/Z4mk6SJDufBPM
|
|
||||||
-> R<DEa-grease +b`?*<b*
|
|
||||||
/5YP7TzDWxztiGzrMKkUYSBzX9wcz6HSR2mFNX0JmfaTVcnJFrl3KcqfJeNf/z1w
|
|
||||||
JIBgF+2wzeD5I7PCcNjmHGn0f+W9kAImbw8
|
|
||||||
--- LZwgwtMUkIk4l/juYhY0i7kNFurvMAgcjhrYX4PsSEE
|
|
||||||
7c5ÌñÀîÝ{¶>Œ¤Æ¥ãÕ<C3A3>“II¥9ôsÆç~³a–{³ê'¥æ<5›|±o;_§*T³'|yí¿sÇvt(ÊXŠ_J.ø`£ŠÈr`“"ÜÙ|ª*‘Æ[ê
|
|
||||||
Binary file not shown.
|
|
@ -0,0 +1,8 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 KTkZog 5sg/hpf/62ScHhTff9oK26rKUHOOIOkaEvz6azRbIFs
|
||||||
|
8YDQXQULAwfzazasdUqr+DhBMm0p4957vywLCmbsPOQ
|
||||||
|
-> ^)fem:-grease ,C tq3PQ#"
|
||||||
|
Dp5AeElkIQ9RTy0qPV91kur2jWvk2uJTgSRqk1gwoM8vUJM/BbpdqsimUCI0PFxG
|
||||||
|
Dd507GmCEWDrmovhpAIBS1lAqlY
|
||||||
|
--- +Xft4rCt53z0qwZsydGBaUanbAxv06yRHgJeDw6yUAI
|
||||||
|
<ÀBÝ98Ê@_ä—h8c>›$KãÇ‚K@<žaÿF(ñؾ¼<C2BE>áÉìÍæ=¬µeù-;ÀÒL˯¹R—=;M·È83Õ>öjø]lµf§¸ãÞÌNV*ƨjmôÛCm ÿ"Þ<>¦¾DêønTwõÜŸ[Ðÿ‡‚
|
||||||
|
|
@ -6,32 +6,25 @@
|
||||||
# Our user configuration and optional user units
|
# Our user configuration and optional user units
|
||||||
../common/users/sajenim
|
../common/users/sajenim
|
||||||
|
|
||||||
# Containers
|
|
||||||
./containers/jellyfin
|
|
||||||
./containers/jellyseerr
|
|
||||||
./containers/lidarr
|
|
||||||
./containers/mealie
|
|
||||||
./containers/microbin
|
|
||||||
./containers/prowlarr
|
|
||||||
./containers/qbittorrent
|
|
||||||
./containers/radarr
|
|
||||||
./containers/recyclarr
|
|
||||||
./containers/sonarr
|
|
||||||
|
|
||||||
# Services
|
# Services
|
||||||
./services/borgbackup
|
./services/borgbackup
|
||||||
./services/crowdsec
|
./services/crowdsec
|
||||||
./services/forgejo
|
./services/forgejo
|
||||||
./services/grafana
|
|
||||||
./services/immich
|
./services/immich
|
||||||
./services/lighttpd
|
./services/lighttpd
|
||||||
./services/minecraft
|
./services/minecraft
|
||||||
./services/mpd
|
./services/mpd
|
||||||
./services/mysql
|
|
||||||
./services/paperless-ngx
|
./services/paperless-ngx
|
||||||
./services/prometheus
|
|
||||||
./services/traefik
|
./services/traefik
|
||||||
|
|
||||||
|
# Multimedia
|
||||||
|
./multimedia/jellyfin
|
||||||
|
./multimedia/lidarr
|
||||||
|
./multimedia/prowlarr
|
||||||
|
./multimedia/qbittorrent
|
||||||
|
./multimedia/radarr
|
||||||
|
./multimedia/sonarr
|
||||||
|
|
||||||
# Setup our hardware
|
# Setup our hardware
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
];
|
];
|
||||||
|
|
|
||||||
|
|
@ -1,43 +0,0 @@
|
||||||
{...}: let
|
|
||||||
port = "5055";
|
|
||||||
in {
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
# Request management
|
|
||||||
jellyseerr = {
|
|
||||||
autoStart = true;
|
|
||||||
image = "ghcr.io/hotio/jellyseerr:release-1.9.2";
|
|
||||||
ports = [
|
|
||||||
"${port}:5055/tcp" # WebUI
|
|
||||||
];
|
|
||||||
volumes = [
|
|
||||||
"/srv/containers/jellyseerr:/config"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
PUID = "1000";
|
|
||||||
PGID = "100";
|
|
||||||
};
|
|
||||||
extraOptions = [
|
|
||||||
"--network=media-stack"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.routers = {
|
|
||||||
jellyseerr = {
|
|
||||||
rule = "Host(`jellyseerr.kanto.dev`)";
|
|
||||||
entryPoints = [
|
|
||||||
"websecure"
|
|
||||||
];
|
|
||||||
middlewares = [
|
|
||||||
"internal"
|
|
||||||
];
|
|
||||||
service = "jellyseerr";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.services = {
|
|
||||||
jellyseerr.loadBalancer.servers = [
|
|
||||||
{url = "http://127.0.0.1:${port}";}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -1,47 +0,0 @@
|
||||||
{...}: let
|
|
||||||
port = "9925";
|
|
||||||
in {
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
mealie = {
|
|
||||||
autoStart = true;
|
|
||||||
image = "ghcr.io/mealie-recipes/mealie:v1.11.0";
|
|
||||||
ports = [
|
|
||||||
"${port}:9000"
|
|
||||||
];
|
|
||||||
volumes = [
|
|
||||||
"/srv/containers/mealie:/app/data/"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
ALLOW_SIGNUP = "false";
|
|
||||||
PUID = "1000";
|
|
||||||
PGID = "100";
|
|
||||||
TZ = "Australia/Perth";
|
|
||||||
MAX_WORKERS = "1";
|
|
||||||
WEB_CONCURRENCY = "1";
|
|
||||||
BASE_URL = "https://mealie.kanto.dev";
|
|
||||||
SECURITY_MAX_LOGIN_ATTEMPTS = "3";
|
|
||||||
SECRURITY_USER_LOCKOUT_TIME = "72";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.routers = {
|
|
||||||
mealie = {
|
|
||||||
rule = "Host(`mealie.kanto.dev`)";
|
|
||||||
entryPoints = [
|
|
||||||
"websecure"
|
|
||||||
];
|
|
||||||
middlewares = [
|
|
||||||
"crowdsec"
|
|
||||||
"geoblock"
|
|
||||||
];
|
|
||||||
service = "mealie";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.services = {
|
|
||||||
mealie.loadBalancer.servers = [
|
|
||||||
{url = "http://127.0.0.1:${port}";}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -1,47 +0,0 @@
|
||||||
{config, ...}: let
|
|
||||||
port = "8181";
|
|
||||||
in {
|
|
||||||
age.secrets.microbin = {
|
|
||||||
# Environment variables for microbin
|
|
||||||
rekeyFile = ./environment.age;
|
|
||||||
owner = "sajenim";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
# Self-hosted, open-source pastbin
|
|
||||||
microbin = {
|
|
||||||
autoStart = true;
|
|
||||||
image = "danielszabo99/microbin:2.0.4";
|
|
||||||
ports = [
|
|
||||||
"${port}:8080/tcp" # WebUI
|
|
||||||
];
|
|
||||||
volumes = [
|
|
||||||
# Container data
|
|
||||||
"/srv/containers/microbin:/app/microbin_data:rw"
|
|
||||||
];
|
|
||||||
environmentFiles = [
|
|
||||||
config.age.secrets.microbin.path
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.routers = {
|
|
||||||
microbin = {
|
|
||||||
rule = "Host(`bin.kanto.dev`)";
|
|
||||||
entryPoints = [
|
|
||||||
"websecure"
|
|
||||||
];
|
|
||||||
middlewares = [
|
|
||||||
"internal"
|
|
||||||
];
|
|
||||||
service = "microbin";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.traefik.dynamicConfigOptions.http.services = {
|
|
||||||
microbin.loadBalancer.servers = [
|
|
||||||
{url = "http://127.0.0.1:${port}";}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
Binary file not shown.
|
|
@ -1,16 +0,0 @@
|
||||||
{...}: {
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
# Automatically synchronize recommended settings from the TRaSH guides to your Sonarr/Radarr instances
|
|
||||||
recyclarr = {
|
|
||||||
autoStart = true;
|
|
||||||
image = "ghcr.io/recyclarr/recyclarr:6.0.2";
|
|
||||||
volumes = [
|
|
||||||
"/srv/containers/recyclarr:/config"
|
|
||||||
];
|
|
||||||
extraOptions = [
|
|
||||||
"--network=media-stack"
|
|
||||||
];
|
|
||||||
user = "1000:100";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -3,9 +3,7 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
hostname = config.networking.hostName;
|
|
||||||
in {
|
|
||||||
imports = [
|
imports = [
|
||||||
# Our ephemeral system. Wipe root on reboot.
|
# Our ephemeral system. Wipe root on reboot.
|
||||||
../common/optional/ephemeral-btrfs.nix
|
../common/optional/ephemeral-btrfs.nix
|
||||||
|
|
@ -71,12 +69,6 @@ in {
|
||||||
options = ["subvol=services" "compress=zstd"];
|
options = ["subvol=services" "compress=zstd"];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/srv/backup" = {
|
|
||||||
device = "/dev/disk/by-label/data";
|
|
||||||
fsType = "btrfs";
|
|
||||||
options = ["subvol=backup" "compress=zstd"];
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/srv/shares" = {
|
fileSystems."/srv/shares" = {
|
||||||
device = "/dev/disk/by-label/data";
|
device = "/dev/disk/by-label/data";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
|
|
|
||||||
|
|
@ -1,33 +1,33 @@
|
||||||
{...}: {
|
{config, ...}: {
|
||||||
services.borgbackup.jobs = {
|
age.secrets.borgbackup = {
|
||||||
containers = {
|
rekeyFile = ./passphrase.age;
|
||||||
paths = [
|
|
||||||
"/srv/containers"
|
|
||||||
];
|
|
||||||
encryption.mode = "none";
|
|
||||||
repo = "/srv/backup/containers";
|
|
||||||
compression = "auto,zstd";
|
|
||||||
startAt = "daily";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services.borgbackup.jobs."borgbase" = {
|
||||||
paths = [
|
paths = [
|
||||||
"/srv/services"
|
# Shares
|
||||||
|
"/srv/shares/sajenim"
|
||||||
|
# Services
|
||||||
|
"/srv/services/forgejo"
|
||||||
|
"/srv/services/immich"
|
||||||
|
"/srv/services/minecraft"
|
||||||
|
"/srv/services/paperless-ngx"
|
||||||
|
# Containers
|
||||||
|
"/srv/containers/jellyfin"
|
||||||
|
"/srv/containers/lidarr"
|
||||||
|
"/srv/containers/prowlarr"
|
||||||
|
"/srv/containers/qbittorrent"
|
||||||
|
"/srv/containers/radarr"
|
||||||
|
"/srv/containers/sonarr"
|
||||||
];
|
];
|
||||||
encryption.mode = "none";
|
|
||||||
repo = "/srv/backup/services";
|
|
||||||
compression = "auto,zstd";
|
|
||||||
startAt = "daily";
|
|
||||||
};
|
|
||||||
|
|
||||||
shares = {
|
repo = "o93k24r6@o93k24r6.repo.borgbase.com:repo";
|
||||||
paths = [
|
encryption = {
|
||||||
"/srv/shares"
|
mode = "repokey-blake2";
|
||||||
];
|
passCommand = "cat ${config.age.secrets.traefik.path}";
|
||||||
encryption.mode = "none";
|
|
||||||
repo = "/srv/backup/shares";
|
|
||||||
compression = "auto,zstd";
|
|
||||||
startAt = "daily";
|
|
||||||
};
|
};
|
||||||
|
environment.BORG_RSH = "ssh -i /etc/ssh/ssh_host_ed25519_key";
|
||||||
|
compression = "auto,lzma";
|
||||||
|
startAt = "daily";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
BIN
nixos/viridian/services/borgbackup/passphrase.age
Normal file
BIN
nixos/viridian/services/borgbackup/passphrase.age
Normal file
Binary file not shown.
|
|
@ -1,56 +0,0 @@
|
||||||
{config, ...}: {
|
|
||||||
# Setup grafana our grafana instance.
|
|
||||||
services.grafana = {
|
|
||||||
enable = true;
|
|
||||||
dataDir = "/srv/services/grafana";
|
|
||||||
settings = {
|
|
||||||
server = {
|
|
||||||
http_addr = "127.0.0.1";
|
|
||||||
http_port = 3400;
|
|
||||||
domain = "kanto.dev";
|
|
||||||
root_url = "https://kanto.dev/grafana/";
|
|
||||||
serve_from_sub_path = true;
|
|
||||||
};
|
|
||||||
database = {
|
|
||||||
type = "mysql";
|
|
||||||
name = "grafana";
|
|
||||||
user = "grafana";
|
|
||||||
host = "/var/run/mysqld/mysqld.sock";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Setup our database for grafana.
|
|
||||||
services.mysql = {
|
|
||||||
ensureUsers = [
|
|
||||||
{
|
|
||||||
name = "grafana";
|
|
||||||
ensurePermissions = {
|
|
||||||
"grafana.*" = "ALL PRIVILEGES";
|
|
||||||
};
|
|
||||||
}
|
|
||||||
];
|
|
||||||
ensureDatabases = ["grafana"];
|
|
||||||
};
|
|
||||||
|
|
||||||
# Setup our traefik router.
|
|
||||||
services.traefik.dynamicConfigOptions.http.routers = {
|
|
||||||
grafana = {
|
|
||||||
rule = "Host(`kanto.dev`)";
|
|
||||||
entryPoints = [
|
|
||||||
"websecure"
|
|
||||||
];
|
|
||||||
middlewares = [
|
|
||||||
"internal"
|
|
||||||
];
|
|
||||||
service = "grafana";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Setup our traefik service.
|
|
||||||
services.traefik.dynamicConfigOptions.http.services = {
|
|
||||||
grafana.loadBalancer.servers = [
|
|
||||||
{url = "http://127.0.0.1:${toString config.services.grafana.settings.server.http_port}";}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -1,7 +0,0 @@
|
||||||
{pkgs, ...}: {
|
|
||||||
services.mysql = {
|
|
||||||
enable = true;
|
|
||||||
package = pkgs.mariadb;
|
|
||||||
dataDir = "/srv/services/mysql";
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -1,32 +0,0 @@
|
||||||
{config, ...}: {
|
|
||||||
services.prometheus = {
|
|
||||||
enable = true;
|
|
||||||
port = 9001; # Port to listen on.
|
|
||||||
|
|
||||||
# Valid in all configuration contexts, defaults for other configuration sections.
|
|
||||||
globalConfig = {
|
|
||||||
scrape_interval = "15s";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Collect specific metrics, format them, and expose them through HTTP endpoints for prometheus to scrape.
|
|
||||||
exporters = {
|
|
||||||
node = {
|
|
||||||
enable = true;
|
|
||||||
enabledCollectors = ["systemd" "processes"];
|
|
||||||
port = 9100;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Specify a set of targets and parameters describing how to scrape them.
|
|
||||||
scrapeConfigs = [
|
|
||||||
{
|
|
||||||
job_name = "node";
|
|
||||||
static_configs = [
|
|
||||||
{
|
|
||||||
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.node.port}"];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue