fix: add kubectl, update charts
This commit is contained in:
14
nix/homelab/flake.lock
generated
14
nix/homelab/flake.lock
generated
@@ -7,11 +7,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1743598667,
|
||||
"narHash": "sha256-ViE7NoFWytYO2uJONTAX35eGsvTYXNHjWALeHAg8OQY=",
|
||||
"lastModified": 1766150702,
|
||||
"narHash": "sha256-P0kM+5o+DKnB6raXgFEk3azw8Wqg5FL6wyl9jD+G5a4=",
|
||||
"owner": "nix-community",
|
||||
"repo": "disko",
|
||||
"rev": "329d3d7e8bc63dd30c39e14e6076db590a6eabe6",
|
||||
"rev": "916506443ecd0d0b4a0f4cf9d40a3c22ce39b378",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -22,16 +22,16 @@
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1743964447,
|
||||
"narHash": "sha256-nEo1t3Q0F+0jQ36HJfbJtiRU4OI+/0jX/iITURKe3EE=",
|
||||
"lastModified": 1766201043,
|
||||
"narHash": "sha256-eplAP+rorKKd0gNjV3rA6+0WMzb1X1i16F5m5pASnjA=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "063dece00c5a77e4a0ea24e5e5a5bd75232806f8",
|
||||
"rev": "b3aad468604d3e488d627c0b43984eb60e75e782",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nixos",
|
||||
"ref": "nixos-unstable",
|
||||
"ref": "nixos-25.11",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
|
||||
@@ -11,6 +11,7 @@
|
||||
inputs@{
|
||||
nixpkgs,
|
||||
disko,
|
||||
...
|
||||
}:
|
||||
let
|
||||
nodes = [
|
||||
@@ -33,11 +34,17 @@
|
||||
inherit inputs;
|
||||
};
|
||||
modules = [
|
||||
{
|
||||
networking.firewall.enable = false;
|
||||
nix.settings.experimental-features = [
|
||||
"nix-command"
|
||||
"flakes"
|
||||
];
|
||||
}
|
||||
disko.nixosModules.disko
|
||||
../modules/keys.nix
|
||||
./nodes/${node.name}/configuration.nix
|
||||
./nodes/${node.name}/hardware-configuration.nix
|
||||
./nodes/${node.name}/disk-config.nix
|
||||
];
|
||||
};
|
||||
}) nodes
|
||||
|
||||
@@ -5,15 +5,9 @@ repositories:
|
||||
url: https://jellyfin.github.io/jellyfin-helm
|
||||
|
||||
releases:
|
||||
- name: longhorn
|
||||
namespace: longhorn-system
|
||||
chart: longhorn/longhorn
|
||||
version: 1.8.1
|
||||
values:
|
||||
- values/longhorn-values.yaml
|
||||
- name: jellyfin
|
||||
namespace: media
|
||||
chart: jellyfin/jellyfin
|
||||
version: 2.3.0
|
||||
version: 2.7.0
|
||||
values:
|
||||
- values/jellyfin.yaml
|
||||
|
||||
@@ -1,13 +1,5 @@
|
||||
ingress:
|
||||
enabled: true
|
||||
anontations:
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: web
|
||||
hosts:
|
||||
- host: jellyfin.local
|
||||
paths:
|
||||
- path: /
|
||||
pathType: ImplementationSpecific
|
||||
|
||||
persistence:
|
||||
config:
|
||||
size: 5gi
|
||||
media:
|
||||
size: 10Gi
|
||||
size: 5Gi
|
||||
|
||||
@@ -1,6 +0,0 @@
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "web"
|
||||
host: longhorn.local
|
||||
path: /
|
||||
@@ -8,13 +8,14 @@
|
||||
|
||||
{
|
||||
imports = [
|
||||
./disk-config.nix
|
||||
];
|
||||
|
||||
boot.loader.grub = {
|
||||
enable = true;
|
||||
efiSupport = true;
|
||||
efiInstallAsRemovable = true;
|
||||
device = "/dev/nvme0n1";
|
||||
device = "/dev/vda";
|
||||
};
|
||||
|
||||
networking.hostName = meta.hostname;
|
||||
@@ -31,10 +32,10 @@
|
||||
role = "server";
|
||||
tokenFile = /var/lib/rancher/k3s/server/token;
|
||||
clusterInit = true;
|
||||
extraFlags = toString ([
|
||||
extraFlags = toString [
|
||||
"--write-kubeconfig-mode \"0644\""
|
||||
"--disable local-storage"
|
||||
]);
|
||||
# "--disable local-storage"
|
||||
];
|
||||
};
|
||||
|
||||
services.openiscsi = {
|
||||
|
||||
@@ -2,11 +2,15 @@
|
||||
disko.devices = {
|
||||
disk = {
|
||||
disk1 = {
|
||||
device = "/dev/nvme0n1";
|
||||
device = "/dev/vda";
|
||||
type = "disk";
|
||||
content = {
|
||||
type = "gpt";
|
||||
partitions = {
|
||||
boot = {
|
||||
type = "EF02";
|
||||
size = "1M";
|
||||
};
|
||||
ESP = {
|
||||
type = "EF00";
|
||||
size = "1G";
|
||||
|
||||
@@ -1,34 +1,17 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports = [ ];
|
||||
imports =
|
||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [
|
||||
"ata_piix"
|
||||
"uhci_hcd"
|
||||
"ehci_pci"
|
||||
"nvme"
|
||||
"sr_mod"
|
||||
];
|
||||
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.ens33.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user