using kustomization for deploy

This commit is contained in:
2025-12-31 20:27:59 +00:00
parent 3e5ba0ccfa
commit 84111b37ce
14 changed files with 55 additions and 156 deletions

1
deploy/helm/.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
**.local**.yaml

191
deploy/helm/values.yaml Normal file
View File

@@ -0,0 +1,191 @@
image:
repository: nextcloud
flavor: apache
tag:
pullPolicy: Always
replicaCount: 1
internalDatabase:
enabled: false
externalDatabase:
enabled: type
type: mysql
mariadb:
enabled: true
architecture: standalone
primary:
persistence:
enabled: true
existingClaim: ""
storageClass: ""
accessMode: ReadWriteOnce
size: 8Gi
service:
type: ClusterIP
port: 8080
loadBalancerIP: ""
nodePort:
persistence:
enabled: true
accessMode: ReadWriteOnce
size: 8Gi
nextcloudData:
enabled: true
subPath:
annotations: {}
accessMode: ReadWriteOnce
size: 8Gi
resources:
limits:
cpu: "1"
memory: 3000Mi
requests:
cpu: "0.5"
memory: 512Mi
## Cronjob to execute Nextcloud background tasks
## ref: https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/background_jobs_configuration.html#cron
##
cronjob:
enabled: true
## Cronjob sidecar resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
##
resources: {}
# Allow configuration of lifecycle hooks
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/
lifecycle: {}
# postStartCommand: []
# preStopCommand: []
# Set securityContext parameters. For example, you may need to define runAsNonRoot directive
securityContext: {}
# runAsUser: 33
# runAsGroup: 33
# runAsNonRoot: true
# readOnlyRootFilesystem: true
# The command the cronjob container executes.
command:
- /cron.sh
nextcloud:
extraVolumes:
- name: mf-documents
persistentVolumeClaim:
claimName: mf-documents-storage-limbosolutions-com
- name: mf-photos
persistentVolumeClaim:
claimName: mf-photos-storage-limbosolutions-com
- name: media-gaming
persistentVolumeClaim:
claimName: media-gaming-storage-limbosolutions-com
- name: media-music
persistentVolumeClaim:
claimName: media-music-storage-limbosolutions-com
- name: media-videos
persistentVolumeClaim:
claimName: media-videos-storage-limbosolutions-com
- name: it-storage
persistentVolumeClaim:
claimName: itstorage-storage-limbosolutions-com
- name: mf-nexcloud
persistentVolumeClaim:
claimName: mf-nexcloud-storage-limbosolutions-com
extraVolumeMounts:
- name: mf-nexcloud
mountPath: /var/www/html/data/marcio.fernandes/files
- name: mf-documents
mountPath: /var/www/html/data/marcio.fernandes/files/Documents
- name: mf-photos
mountPath: /var/www/html/data/marcio.fernandes/files/Photos
- name: media-gaming
mountPath: /var/www/html/data/marcio.fernandes/files/Gaming
- name: media-music
mountPath: /var/www/html/data/marcio.fernandes/files/Music
- name: media-videos
mountPath: /var/www/html/data/marcio.fernandes/files/Videos
- name: it-storage
mountPath: /var/www/html/data/marcio.fernandes/files/NeirdStorage
configs:
https.config.php: |-
<?php
$CONFIG = array (
'overwritehost' => 'cloud.limbosolutions.com',
'overwrite.cli.url' => 'https://cloud.limbosolutions.com',
'overwriteprotocol' => 'https',
'trusted_proxies' => array ( 0 => '127.0.0.1', 1 => '::1', 2 => '10.0.0.0'),
);
# A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC:
# https://docs.nextcloud.com/server/30/admin_manual/configuration_server/background_jobs_configuration.html
maintenance.config.php: |-
<?php
$CONFIG = array (
'maintenance_window_start' => 1,
);
# nextcloud:
# configs:
# logging.config.php: |-
# <?php
# $CONFIG = array (
# 'log_type' => 'file',
# 'logfile' => 'nextcloud.log',
# 'loglevel' => 0,
# 'logdateformat' => 'F d, Y H:i:s'
# );
ingress:
enabled: true
className: traefik
annotations:
kubernetes.io/ingress.class: traefik
cert-manager.io/cluster-issuer: "letsencrypt-prod"
traefik.ingress.kubernetes.io/router.entrypoints: websecure,public-https
# traefik.public-https.redirect.permanent: 'true'
# traefik.public-https.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
# traefik.public-https.redirect.replacement: 'https://$$1/remote.php/dav'
# traefik.public-https.headers.STSPreload: 'true'
# traefik.public-https.headers.STSSeconds: '15552000'
# traefik.public-https.routers.nextcloud.middlewares: 'nextcloudHeader'
# traefik.web-secure.routers.nextcloud.middlewares: 'nextcloudHeader'
# traefik.websecure.headers.STSPreload: 'true'
# traefik.websecure.headers.STSSeconds: '15552000'
# traefik.websecure.redirect.permanent: 'true'
# traefik.websecure.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
# traefik.websecure.redirect.replacement: 'https://$$1/remote.php/dav'
# hosts:
# - host: cloud.limbosolutions.com
# paths:
# - path: /
# pathType: Prefix
tls:
- secretName: cloud-limbosolutions-com-secret-tls
hosts:
- "cloud.limbosolutions.com"