Compare commits
63 Commits
ad08678553
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| dde45742e1 | |||
| 0b93862185 | |||
| d5e8a573ad | |||
| 36b949d9c7 | |||
| 5a495cb8ee | |||
| 3e30c33fbe | |||
| b0a4f23cad | |||
| d02148af76 | |||
| a150527d95 | |||
| b8a5345d68 | |||
| 3a6bfa0854 | |||
| cb73a13e48 | |||
| 08ebe28456 | |||
| 6c2dd888bb | |||
| bc097a98de | |||
| 18c04db9bb | |||
| 8dfe1a8310 | |||
| f649d4dcb7 | |||
| 26fcb257d5 | |||
| 6a47ec2ed6 | |||
| 08a1882232 | |||
| f5bccb9f3b | |||
| 05e0febeb4 | |||
| 0055e31123 | |||
| 76cdb88226 | |||
| 51edbebf28 | |||
| 1a75b85508 | |||
| ecbb8d0da4 | |||
| 8b634466b2 | |||
| a22e1307ae | |||
| 72ffc356b4 | |||
| f44d53cab9 | |||
| 1e6132437f | |||
| d4ce82d48d | |||
| 2c050791db | |||
| 77c33e6217 | |||
| 22b321ae74 | |||
| af38c71fb0 | |||
| 1d3a67a56c | |||
| d1e9ca973b | |||
| cec2cb6742 | |||
| 8595c769b0 | |||
| 8e5d39ebae | |||
| 4dfbbea537 | |||
| 2c6c89a2af | |||
| 601773bc39 | |||
| ea0de92f0f | |||
| 3207c27617 | |||
| 04297fa8dd | |||
| 195cbafcf7 | |||
| d16905c71a | |||
| eee375d07b | |||
| 8cba1e7fd3 | |||
| 0f75fbf226 | |||
| 95c867bf69 | |||
| 7f24735ead | |||
| e2060a70ec | |||
| 6a9d38f91c | |||
| 00bb5748a2 | |||
| 91220941b3 | |||
| cebd955b3d | |||
| ea7a373bc4 | |||
| 3871e30abd |
43
.gitea/workflows/deploy.yml
Normal file
43
.gitea/workflows/deploy.yml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
name: Deploy All Stacks to Swarm
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
deploy:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
|
- name: Deploy remaining stacks
|
||||||
|
run: |
|
||||||
|
for stack_file in *-stack.yml; do
|
||||||
|
stack_name="${stack_file%-stack.yml}"
|
||||||
|
# Skip traefik, git-runner (deploy those manually)
|
||||||
|
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||||
|
echo "🚀 Deploying ${stack_name}..."
|
||||||
|
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
- name: Deploy remaining stacks
|
||||||
|
run: |
|
||||||
|
for stack_file in *-stack.yml; do
|
||||||
|
stack_name="${stack_file%-stack.yml}"
|
||||||
|
# Skip if already deployed
|
||||||
|
if [[ "$stack_name" != "traefik" && "$stack_name" != "git-runner" ]]; then
|
||||||
|
echo "🚀 Deploying ${stack_name}..."
|
||||||
|
docker stack deploy -c "$stack_file" "$stack_name" --prune --with-registry-auth
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
- name: List deployed stacks
|
||||||
|
run: |
|
||||||
|
echo ""
|
||||||
|
echo "📋 All deployed stacks:"
|
||||||
|
docker stack ls
|
||||||
32
.vscode/setting.json
vendored
32
.vscode/setting.json
vendored
@@ -1,32 +0,0 @@
|
|||||||
{
|
|
||||||
"files.associations": {
|
|
||||||
"*.yml": "yaml",
|
|
||||||
"*.yaml": "yaml",
|
|
||||||
"docker-compose*.yml": "yaml",
|
|
||||||
"stack.yml": "yaml"
|
|
||||||
},
|
|
||||||
"yaml.schemas": {
|
|
||||||
"https://raw.githubusercontent.com/compose-spec/compose-spec/master/schema/compose-spec.json": [
|
|
||||||
"docker-compose*.yml",
|
|
||||||
"**/stacks/**/stack.yml"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"yaml.format.enable": true,
|
|
||||||
"yaml.validate": true,
|
|
||||||
"editor.formatOnSave": true,
|
|
||||||
"editor.rulers": [80, 120],
|
|
||||||
"files.trimTrailingWhitespace": true,
|
|
||||||
"files.insertFinalNewline": true,
|
|
||||||
"git.autofetch": true,
|
|
||||||
"git.confirmSync": false,
|
|
||||||
"terminal.integrated.defaultProfile.windows": "PowerShell",
|
|
||||||
"[yaml]": {
|
|
||||||
"editor.insertSpaces": true,
|
|
||||||
"editor.tabSize": 2,
|
|
||||||
"editor.autoIndent": "advanced",
|
|
||||||
"editor.defaultFormatter": "redhat.vscode-yaml"
|
|
||||||
},
|
|
||||||
"[markdown]": {
|
|
||||||
"editor.defaultFormatter": "yzhang.markdown-all-in-one"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -30,4 +30,4 @@ services:
|
|||||||
- traefik.http.services.adminer.loadbalancer.server.port=8080
|
- traefik.http.services.adminer.loadbalancer.server.port=8080
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
@@ -1,43 +1,49 @@
|
|||||||
# Traefik Dynamic Configuration for External Services
|
# Traefik Dynamic Configuration for External Services
|
||||||
# This file handles routing to services NOT managed by Docker Swarm
|
# This file handles routing to services NOT managed by Docker Swarm
|
||||||
http:
|
http:
|
||||||
#-----------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------
|
||||||
# EXTERNAL SERVICES SECTION
|
# EXTERNAL SERVICES SECTION
|
||||||
#-----------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------
|
||||||
services:
|
services:
|
||||||
unraid:
|
unraid:
|
||||||
loadBalancer:
|
loadBalancer:
|
||||||
servers:
|
servers:
|
||||||
- url: "http://10.0.4.10:80"
|
- url: "http://10.0.4.10:80"
|
||||||
# emby:
|
# emby:
|
||||||
|
# loadBalancer:
|
||||||
|
# servers:
|
||||||
|
# - url: "http://10.0.4.10:8096"
|
||||||
|
# peertube:
|
||||||
# loadBalancer:
|
# loadBalancer:
|
||||||
# servers:
|
# servers:
|
||||||
# - url: "http://10.0.4.10:8096"
|
# - url: "http://10.0.4.10:9000"
|
||||||
|
#-----------------------------------------------------------------------------------
|
||||||
#-----------------------------------------------------------------------------------
|
|
||||||
# ROUTERS SECTION
|
# ROUTERS SECTION
|
||||||
#-----------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------
|
||||||
routers:
|
routers:
|
||||||
# Local VPN-only services (*.swarm.home)
|
# Local VPN-only services (*.swarm.home)
|
||||||
unraid-local:
|
unraid:
|
||||||
rule: "Host(`unraid.swarm.home`)"
|
rule: "Host(`unraid.frostlabs.me`)"
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- web
|
|
||||||
- websecure
|
- websecure
|
||||||
service: unraid
|
service: unraid
|
||||||
tls: {}
|
middlewares:
|
||||||
# emby:
|
- authentik
|
||||||
# rule: "Host(`movies.swarm.home`)"
|
tls:
|
||||||
# entryPoints:
|
certResolver: cloudflare
|
||||||
# - web
|
|
||||||
# - websecure
|
|
||||||
# service: emby
|
|
||||||
# tls: {}
|
|
||||||
|
|
||||||
#-----------------------------------------------------------------------------------
|
# peertube:
|
||||||
|
# rule: "Host(`videos.frostlabs.me`)"
|
||||||
|
# entryPoints:
|
||||||
|
# - websecure
|
||||||
|
# service: peertube
|
||||||
|
# tls:
|
||||||
|
# certResolver: cloudflare
|
||||||
|
#-----------------------------------------------------------------------------------
|
||||||
# MIDDLEWARES SECTION
|
# MIDDLEWARES SECTION
|
||||||
#-----------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------
|
||||||
middlewares:
|
middlewares:
|
||||||
|
# Authentik forward auth for protecting services
|
||||||
authentik:
|
authentik:
|
||||||
forwardAuth:
|
forwardAuth:
|
||||||
address: "http://authentik_server:9000/outpost.goauthentik.io/auth/traefik"
|
address: "http://authentik_server:9000/outpost.goauthentik.io/auth/traefik"
|
||||||
@@ -48,3 +54,22 @@ http:
|
|||||||
- X-authentik-email
|
- X-authentik-email
|
||||||
- X-authentik-name
|
- X-authentik-name
|
||||||
- X-authentik-uid
|
- X-authentik-uid
|
||||||
|
|
||||||
|
# Security headers for public-facing services
|
||||||
|
security-headers:
|
||||||
|
headers:
|
||||||
|
frameDeny: true
|
||||||
|
browserXssFilter: true
|
||||||
|
contentTypeNosniff: true
|
||||||
|
sslRedirect: true
|
||||||
|
forceSTSHeader: true
|
||||||
|
stsSeconds: 31536000
|
||||||
|
stsIncludeSubdomains: true
|
||||||
|
stsPreload: true
|
||||||
|
|
||||||
|
# Rate limiting for public services
|
||||||
|
rate-limit:
|
||||||
|
rateLimit:
|
||||||
|
average: 100
|
||||||
|
period: 1s
|
||||||
|
burst: 50
|
||||||
|
|||||||
@@ -41,14 +41,16 @@ providers:
|
|||||||
watch: true
|
watch: true
|
||||||
|
|
||||||
# Certificate resolvers
|
# Certificate resolvers
|
||||||
tls:
|
certificatesResolvers:
|
||||||
certificatesResolvers:
|
cloudflare:
|
||||||
cloudflare:
|
acme:
|
||||||
acme:
|
email: john.allisonwin@outlook.com
|
||||||
email: john.allisonwin@outlook.com
|
storage: /certificates/acme.json
|
||||||
storage: /certificates/acme.json
|
dnsChallenge:
|
||||||
dnsChallenge:
|
provider: cloudflare
|
||||||
provider: cloudflare
|
resolvers:
|
||||||
|
- 1.1.1.1:53
|
||||||
|
- 8.8.8.8:53
|
||||||
|
|
||||||
# Logging
|
# Logging
|
||||||
log:
|
log:
|
||||||
|
|||||||
33
emby-stack.yml
Normal file
33
emby-stack.yml
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
services:
|
||||||
|
emby:
|
||||||
|
image: lscr.io/linuxserver/emby:latest
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Etc/UTC
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/emby:/config
|
||||||
|
- /home/doc/projects/data/media/tv:/data/tvshows
|
||||||
|
- /home/doc/projects/data/media/movies:/data/movies
|
||||||
|
ports:
|
||||||
|
- 8096:8096
|
||||||
|
healthcheck:
|
||||||
|
test: [ "CMD", "curl", "-f", "http://localhost:8096/web/index.html" ]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 5
|
||||||
|
start_period: 120s
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.http.routers.emby.rule=Host(`movies.frostlabs.me`)
|
||||||
|
- traefik.http.routers.emby.entrypoints=websecure
|
||||||
|
- traefik.http.routers.emby.tls=true
|
||||||
|
- traefik.http.routers.emby.tls.certresolver=cloudflare
|
||||||
|
- traefik.http.services.emby.loadbalancer.server.port=8096
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
27
git-runner-stack.yml
Normal file
27
git-runner-stack.yml
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
services:
|
||||||
|
gitea-runner:
|
||||||
|
image: gitea/act_runner:latest
|
||||||
|
hostname: "{{.Node.Hostname}}-runner"
|
||||||
|
environment:
|
||||||
|
- GITEA_INSTANCE_URL=https://git.frostlabs.me
|
||||||
|
- GITEA_RUNNER_REGISTRATION_TOKEN=hF9V6IIV4lj1cZVgNaZAXuXOcdVBiAQuoZdTU5Pp
|
||||||
|
- GITEA_RUNNER_NAME=swarm-runner-{{.Node.Hostname}}
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- gitea-runner-data:/data
|
||||||
|
networks:
|
||||||
|
- homelab # Adjust to match your Gitea network
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
restart_policy:
|
||||||
|
condition: on-failure
|
||||||
|
delay: 5s
|
||||||
|
max_attempts: 3
|
||||||
|
volumes:
|
||||||
|
gitea-runner-data:
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
@@ -32,7 +32,14 @@ services:
|
|||||||
memory: 2G
|
memory: 2G
|
||||||
reservations:
|
reservations:
|
||||||
memory: 512M
|
memory: 512M
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.http.routers.n8n.rule=Host(`n8n.bitfrost.me`)
|
||||||
|
- traefik.http.routers.n8n.entrypoints=websecure
|
||||||
|
- traefik.http.routers.n8n.tls=true
|
||||||
|
- traefik.http.routers.n8n.tls.certresolver=cloudflare
|
||||||
|
- traefik.http.services.n8n.loadbalancer.server.port=5678
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
external: true
|
external: true
|
||||||
21
notifiarr-stack.yml
Normal file
21
notifiarr-stack.yml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
services:
|
||||||
|
notifiarr:
|
||||||
|
image: golift/notifiarr:latest
|
||||||
|
hostname: notifiarr
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
ports:
|
||||||
|
- "5454:5454"
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/Notifiarr:/config
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
environment:
|
||||||
|
- TZ=America/New_York
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
@@ -40,9 +40,11 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.swarm.network=homelab"
|
- "traefik.swarm.network=homelab"
|
||||||
- "traefik.http.routers.outline.rule=Host(`flow.swarm.home`)"
|
# Public-facing domain with Let's Encrypt certificate
|
||||||
|
- "traefik.http.routers.outline.rule=Host(`flow.frostlabs.me`)"
|
||||||
- "traefik.http.routers.outline.entrypoints=websecure"
|
- "traefik.http.routers.outline.entrypoints=websecure"
|
||||||
- "traefik.http.routers.outline.tls=true"
|
- "traefik.http.routers.outline.tls=true"
|
||||||
|
- "traefik.http.routers.outline.tls.certresolver=cloudflare"
|
||||||
- "traefik.http.services.outline.loadbalancer.server.port=3000"
|
- "traefik.http.services.outline.loadbalancer.server.port=3000"
|
||||||
depends_on:
|
depends_on:
|
||||||
- redis
|
- redis
|
||||||
@@ -77,4 +79,4 @@ networks:
|
|||||||
external: true
|
external: true
|
||||||
outline_internal:
|
outline_internal:
|
||||||
driver: overlay
|
driver: overlay
|
||||||
attachable: true
|
attachable: true
|
||||||
@@ -79,4 +79,4 @@ secrets:
|
|||||||
paperless-secret-key:
|
paperless-secret-key:
|
||||||
external: true
|
external: true
|
||||||
postgres-master:
|
postgres-master:
|
||||||
external: true
|
external: true
|
||||||
108
peertube-stack.yml
Normal file
108
peertube-stack.yml
Normal file
@@ -0,0 +1,108 @@
|
|||||||
|
services:
|
||||||
|
peertube:
|
||||||
|
image: chocobozzz/peertube:production-bookworm
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
environment:
|
||||||
|
# Database configuration - connecting to existing Postgres
|
||||||
|
- POSTGRES_USER=admin
|
||||||
|
- POSTGRES_PASSWORD=AllOfTheStars+1
|
||||||
|
- POSTGRES_DB=peertube
|
||||||
|
- POSTGRES_HOSTNAME=postgres
|
||||||
|
- POSTGRES_PORT=5432
|
||||||
|
- PEERTUBE_DB_HOSTNAME=postgres
|
||||||
|
- PEERTUBE_DB_PORT=5432
|
||||||
|
- PEERTUBE_DB_USERNAME=admin
|
||||||
|
- PEERTUBE_DB_PASSWORD=AllOfTheStars+1
|
||||||
|
- PEERTUBE_DB_NAME=peertube
|
||||||
|
# Redis configuration
|
||||||
|
- REDIS_HOSTNAME=redis
|
||||||
|
- PEERTUBE_REDIS_HOSTNAME=redis
|
||||||
|
# PeerTube configuration
|
||||||
|
- PEERTUBE_WEBSERVER_HOSTNAME=videos.frostlabs.me
|
||||||
|
- PEERTUBE_WEBSERVER_PORT=443
|
||||||
|
- PEERTUBE_WEBSERVER_HTTPS=true
|
||||||
|
- PEERTUBE_TRUST_PROXY=["127.0.0.1", "loopback", "10.0.1.0/24"]
|
||||||
|
# SMTP configuration - Gmail
|
||||||
|
- PEERTUBE_SMTP_HOSTNAME=smtp.gmail.com
|
||||||
|
- PEERTUBE_SMTP_PORT=587
|
||||||
|
- PEERTUBE_SMTP_USERNAME=frostlabs25@gmail.com
|
||||||
|
- PEERTUBE_SMTP_PASSWORD=tewo awqe ffhw rtun
|
||||||
|
- PEERTUBE_SMTP_FROM=frostlabs25@gmail.com
|
||||||
|
- PEERTUBE_SMTP_TLS=true
|
||||||
|
- PEERTUBE_SMTP_DISABLE_STARTTLS=false
|
||||||
|
- PEERTUBE_ADMIN_EMAIL=frostlabs25@gmail.com
|
||||||
|
# Secrets - loaded from Docker secrets as files
|
||||||
|
- PEERTUBE_SECRET=dfd1cad851c1a5b795131fd2033d46ef80c809b5ac30a3ce8e69b049587138a2
|
||||||
|
# secrets:
|
||||||
|
# - postgres-master
|
||||||
|
# - peertube-key
|
||||||
|
# - gmail-app-password
|
||||||
|
# ports:
|
||||||
|
# - target: 9000
|
||||||
|
# published: 9000
|
||||||
|
# mode: host
|
||||||
|
# - target: 1935
|
||||||
|
# published: 1935
|
||||||
|
# mode: host
|
||||||
|
volumes:
|
||||||
|
# - /home/doc/projects/swarm-data/appdata/peertube/assets:/app/client/dist
|
||||||
|
- /home/doc/projects/swarm-data/appdata/peertube/data:/data
|
||||||
|
# healthcheck:
|
||||||
|
# test: [ "CMD", "wget", "--quiet", "--tries=1", "--spider", "http://localhost:9000/api/v1/config" ]
|
||||||
|
# interval: 30s
|
||||||
|
# timeout: 10s
|
||||||
|
# retries: 3
|
||||||
|
# start_period: 60s
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.http.routers.peertube.rule=Host(`videos.frostlabs.me`)
|
||||||
|
- traefik.http.routers.peertube.entrypoints=websecure
|
||||||
|
- traefik.http.routers.peertube.tls=true
|
||||||
|
- traefik.http.routers.peertube.tls.certresolver=cloudflare
|
||||||
|
- traefik.http.services.peertube.loadbalancer.server.port=9000
|
||||||
|
|
||||||
|
redis:
|
||||||
|
image: redis:7-alpine
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/peertube/redis:/data
|
||||||
|
healthcheck:
|
||||||
|
test: [ "CMD", "redis-cli", "ping" ]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 3
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
postgres:
|
||||||
|
image: postgres:17-alpine
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
environment:
|
||||||
|
- POSTGRES_USER=admin
|
||||||
|
- POSTGRES_PASSWORD=AllOfTheStars+1
|
||||||
|
- POSTGRES_DB=peertube
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/peertube/postgres:/var/lib/postgresql/data
|
||||||
|
ports:
|
||||||
|
- 5432:5432
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
# secrets:
|
||||||
|
# postgres-master:
|
||||||
|
# external: true
|
||||||
|
# peertube-key:
|
||||||
|
# external: true
|
||||||
|
# gmail-app-password:
|
||||||
|
# external: true
|
||||||
25
prowlarr-stack.yml
Normal file
25
prowlarr-stack.yml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
services:
|
||||||
|
prowlarr:
|
||||||
|
image: lscr.io/linuxserver/prowlarr:latest
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
ports:
|
||||||
|
- 9696:9696
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Etc/UTC
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/prowlarr:/config
|
||||||
|
healthcheck:
|
||||||
|
test: [ "CMD", "curl", "-f", "http://localhost:9696/ping" ]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 3
|
||||||
|
start_period: 60s
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
0
pulse-stack.yml
Normal file
0
pulse-stack.yml
Normal file
26
radarr-stack.yml
Normal file
26
radarr-stack.yml
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
services:
|
||||||
|
radarr:
|
||||||
|
image: lscr.io/linuxserver/radarr:latest
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
ports:
|
||||||
|
- 7878:7878
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Etc/UTC
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/radarr:/config
|
||||||
|
- /home/doc/projects/data:/data
|
||||||
|
healthcheck:
|
||||||
|
test: [ "CMD", "curl", "-f", "http://localhost:7878/ping" ]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 3
|
||||||
|
start_period: 60s
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
26
sab-stack.yml
Normal file
26
sab-stack.yml
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
services:
|
||||||
|
sabnzbd:
|
||||||
|
image: lscr.io/linuxserver/sabnzbd:latest
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
ports:
|
||||||
|
- 8080:8080
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Etc/UTC
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/sabnzbd:/config
|
||||||
|
- /home/doc/projects/data/usenet:/data/usenet
|
||||||
|
healthcheck:
|
||||||
|
test: [ "CMD", "curl", "-f", "http://localhost:8080/api?mode=version" ]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 3
|
||||||
|
start_period: 60s
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
20
sonarr-stack.yml
Normal file
20
sonarr-stack.yml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
services:
|
||||||
|
sonarr:
|
||||||
|
image: lscr.io/linuxserver/sonarr:latest
|
||||||
|
networks:
|
||||||
|
- homelab
|
||||||
|
ports:
|
||||||
|
- 8989:8989
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Etc/UTC
|
||||||
|
volumes:
|
||||||
|
- /home/doc/projects/swarm-data/appdata/sonarr:/config
|
||||||
|
- /home/doc/projects/data:/data
|
||||||
|
deploy:
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
networks:
|
||||||
|
homelab:
|
||||||
|
external: true
|
||||||
@@ -1,112 +0,0 @@
|
|||||||
services:
|
|
||||||
redis:
|
|
||||||
image: redis:alpine
|
|
||||||
command: --save 60 1 --loglevel warning
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/redis:/data
|
|
||||||
ports:
|
|
||||||
- 6379:6379
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "redis-cli", "ping" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 3
|
|
||||||
start_period: 10s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 512M
|
|
||||||
reservations:
|
|
||||||
memory: 128M
|
|
||||||
|
|
||||||
authentik_server:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: server
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD-SHELL", "ak healthcheck" ]
|
|
||||||
interval: 30s
|
|
||||||
timeout: 10s
|
|
||||||
retries: 3
|
|
||||||
start_period: 90s
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
- "traefik.http.routers.authentik.rule=Host(`auth.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.authentik.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.authentik.tls=certificatesResolvers=cloudflare"
|
|
||||||
- "traefik.http.services.authentik.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
authentik_worker:
|
|
||||||
image: ghcr.io/goauthentik/server:2025.10.0
|
|
||||||
command: worker
|
|
||||||
environment:
|
|
||||||
AUTHENTIK_SECRET_KEY: "file:///run/secrets/auth-key"
|
|
||||||
AUTHENTIK_REDIS__HOST: "redis"
|
|
||||||
AUTHENTIK_POSTGRESQL__HOST: "10.0.4.10"
|
|
||||||
AUTHENTIK_POSTGRESQL__PORT: "5432"
|
|
||||||
AUTHENTIK_POSTGRESQL__USER: "admin"
|
|
||||||
AUTHENTIK_POSTGRESQL__NAME: "authentik"
|
|
||||||
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/postgres-master"
|
|
||||||
# Optional: Set error reporting (set to false for privacy)
|
|
||||||
AUTHENTIK_ERROR_REPORTING__ENABLED: "false"
|
|
||||||
secrets:
|
|
||||||
- auth-key
|
|
||||||
- postgres-master
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/media:/media
|
|
||||||
- /home/doc/projects/swarm-data/appdata/authentik/templates:/templates
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 1G
|
|
||||||
cpus: '1.0'
|
|
||||||
reservations:
|
|
||||||
memory: 512M
|
|
||||||
depends_on:
|
|
||||||
- redis
|
|
||||||
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
secrets:
|
|
||||||
postgres-master:
|
|
||||||
external: true
|
|
||||||
auth-key:
|
|
||||||
external: true
|
|
||||||
@@ -1,34 +0,0 @@
|
|||||||
services:
|
|
||||||
portainer:
|
|
||||||
image: portainer/portainer-ce:latest
|
|
||||||
command: -H tcp://tasks.agent:9001 --tlsskipverify
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata/portainer:/data
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
ports:
|
|
||||||
- 9000:9000
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.swarm.network=homelab"
|
|
||||||
- "traefik.http.routers.portainer.rule=Host(`portainer.frostlabs.me`)"
|
|
||||||
- "traefik.http.routers.portainer.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.portainer.tls.certificatesResolvers=cloudflare"
|
|
||||||
- "traefik.http.services.portainer.loadbalancer.server.port=9000"
|
|
||||||
|
|
||||||
agent:
|
|
||||||
image: portainer/agent:latest
|
|
||||||
volumes:
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
deploy:
|
|
||||||
mode: global
|
|
||||||
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
services:
|
|
||||||
rsync:
|
|
||||||
image: alpine:latest
|
|
||||||
user: "0:0"
|
|
||||||
command: >
|
|
||||||
sh -c " apk add --no-cache rsync && echo '0 2 * * * rsync -av --no-perms --no-owner --no-group --exclude-from=/excludes.txt /source/ /destination/ && echo \"Sync completed at $$(date)\"' | crontab - && echo 'Backup sync started. Daily sync at 2 AM.' && crond -f -l 2"
|
|
||||||
deploy:
|
|
||||||
replicas: 1
|
|
||||||
restart_policy:
|
|
||||||
condition: on-failure
|
|
||||||
delay: 30s
|
|
||||||
volumes:
|
|
||||||
- /home/doc/projects/swarm-data/appdata:/source:ro
|
|
||||||
- /home/doc/projects/backups:/destination
|
|
||||||
- /home/doc/projects/swarm/conf/rsync-conf/excludes.txt:/excludes.txt:ro
|
|
||||||
networks:
|
|
||||||
- homelab
|
|
||||||
networks:
|
|
||||||
homelab:
|
|
||||||
external: true
|
|
||||||
@@ -5,14 +5,24 @@ services:
|
|||||||
ports:
|
ports:
|
||||||
- 80:80
|
- 80:80
|
||||||
- 443:443
|
- 443:443
|
||||||
- 8080:8080
|
- 8082:8080
|
||||||
environment:
|
environment:
|
||||||
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
- CF_DNS_API_TOKEN_FILE=/run/secrets/cloudflare_api_token
|
||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
- type: bind
|
||||||
#
|
source: /var/run/docker.sock
|
||||||
- /home/doc/projects/swarm/conf/traefik-conf/static.yml:/etc/traefik/traefik.yml:ro
|
target: /var/run/docker.sock
|
||||||
- /home/doc/projects/swarm/conf/traefik-conf/dynamic.yml:/etc/traefik/dynamic/dynamic.yml:rw
|
read_only: true
|
||||||
|
- type: bind
|
||||||
|
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/static.yml
|
||||||
|
target: /etc/traefik/traefik.yml
|
||||||
|
read_only: true
|
||||||
|
- type: bind
|
||||||
|
source: /home/doc/projects/swarm-data/swarm-production/conf/traefik-conf/dynamic.yml
|
||||||
|
target: /etc/traefik/dynamic/dynamic.yml
|
||||||
|
- type: bind
|
||||||
|
source: /home/doc/projects/swarm-data/appdata/traefik/certificates/acme.json
|
||||||
|
target: /certificates/acme.json
|
||||||
secrets:
|
secrets:
|
||||||
- cloudflare_api_token
|
- cloudflare_api_token
|
||||||
networks:
|
networks:
|
||||||
@@ -28,7 +38,7 @@ services:
|
|||||||
replicas: 1
|
replicas: 1
|
||||||
placement:
|
placement:
|
||||||
constraints:
|
constraints:
|
||||||
- node.hostname == p0
|
- node.hostname == p0
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
@@ -36,4 +46,4 @@ networks:
|
|||||||
|
|
||||||
secrets:
|
secrets:
|
||||||
cloudflare_api_token:
|
cloudflare_api_token:
|
||||||
external: true
|
external: true
|
||||||
Reference in New Issue
Block a user