187 lines
5.1 KiB
YAML
187 lines
5.1 KiB
YAML
image:
|
|
repository: nextcloud
|
|
flavor: apache
|
|
tag:
|
|
pullPolicy: Always
|
|
|
|
replicaCount: 1
|
|
|
|
|
|
internalDatabase:
|
|
enabled: false
|
|
|
|
externalDatabase:
|
|
enabled: true
|
|
type: mysql
|
|
host: nextcloud-mariadb.cloud-limbosolutions-com.svc.cluster.local
|
|
user: "???"
|
|
password: "???"
|
|
database: "???"
|
|
port: 3306
|
|
|
|
|
|
mariadb:
|
|
enabled: false
|
|
|
|
service:
|
|
type: ClusterIP
|
|
port: 8080
|
|
loadBalancerIP: ""
|
|
nodePort:
|
|
|
|
persistence:
|
|
enabled: true
|
|
accessMode: ReadWriteOnce
|
|
size: 8Gi
|
|
|
|
nextcloudData:
|
|
enabled: true
|
|
subPath:
|
|
annotations: {}
|
|
accessMode: ReadWriteOnce
|
|
size: 8Gi
|
|
resources:
|
|
limits:
|
|
cpu: "1"
|
|
memory: 3000Mi
|
|
requests:
|
|
cpu: "0.5"
|
|
memory: 512Mi
|
|
|
|
|
|
## Cronjob to execute Nextcloud background tasks
|
|
## ref: https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/background_jobs_configuration.html#cron
|
|
##
|
|
cronjob:
|
|
enabled: true
|
|
|
|
## Cronjob sidecar resource requests and limits
|
|
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
|
##
|
|
resources: {}
|
|
|
|
# Allow configuration of lifecycle hooks
|
|
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/
|
|
lifecycle: {}
|
|
# postStartCommand: []
|
|
# preStopCommand: []
|
|
# Set securityContext parameters. For example, you may need to define runAsNonRoot directive
|
|
securityContext: {}
|
|
# runAsUser: 33
|
|
# runAsGroup: 33
|
|
# runAsNonRoot: true
|
|
# readOnlyRootFilesystem: true
|
|
|
|
# The command the cronjob container executes.
|
|
command:
|
|
- /cron.sh
|
|
|
|
nextcloud:
|
|
extraVolumes:
|
|
- name: mf-documents
|
|
persistentVolumeClaim:
|
|
claimName: mf-documents-storage-limbosolutions-com
|
|
- name: mf-photos
|
|
persistentVolumeClaim:
|
|
claimName: mf-photos-storage-limbosolutions-com
|
|
- name: media-gaming
|
|
persistentVolumeClaim:
|
|
claimName: media-gaming-storage-limbosolutions-com
|
|
- name: media-music
|
|
persistentVolumeClaim:
|
|
claimName: media-music-storage-limbosolutions-com
|
|
- name: media-videos
|
|
persistentVolumeClaim:
|
|
claimName: media-videos-storage-limbosolutions-com
|
|
- name: it-storage
|
|
persistentVolumeClaim:
|
|
claimName: itstorage-storage-limbosolutions-com
|
|
- name: mf-nexcloud
|
|
persistentVolumeClaim:
|
|
claimName: mf-nexcloud-storage-limbosolutions-com
|
|
|
|
|
|
extraVolumeMounts:
|
|
- name: mf-nexcloud
|
|
mountPath: /var/www/html/data/marcio.fernandes/files
|
|
|
|
- name: mf-documents
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/Documents
|
|
|
|
- name: mf-photos
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/Photos
|
|
|
|
- name: media-gaming
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/Gaming
|
|
|
|
- name: media-music
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/Music
|
|
|
|
- name: media-videos
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/Videos
|
|
|
|
- name: it-storage
|
|
mountPath: /var/www/html/data/marcio.fernandes/files/NeirdStorage
|
|
configs:
|
|
https.config.php: |-
|
|
<?php
|
|
$CONFIG = array (
|
|
'overwritehost' => 'cloud.limbosolutions.com',
|
|
'overwrite.cli.url' => 'https://cloud.limbosolutions.com',
|
|
'overwriteprotocol' => 'https',
|
|
'trusted_proxies' => array ( 0 => '127.0.0.1', 1 => '::1', 2 => '10.0.0.0'),
|
|
);
|
|
|
|
# A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC:
|
|
# https://docs.nextcloud.com/server/30/admin_manual/configuration_server/background_jobs_configuration.html
|
|
maintenance.config.php: |-
|
|
<?php
|
|
$CONFIG = array (
|
|
'maintenance_window_start' => 1,
|
|
);
|
|
# nextcloud:
|
|
# configs:
|
|
# logging.config.php: |-
|
|
# <?php
|
|
# $CONFIG = array (
|
|
# 'log_type' => 'file',
|
|
# 'logfile' => 'nextcloud.log',
|
|
# 'loglevel' => 0,
|
|
# 'logdateformat' => 'F d, Y H:i:s'
|
|
# );
|
|
|
|
|
|
ingress:
|
|
enabled: true
|
|
className: traefik
|
|
annotations:
|
|
kubernetes.io/ingress.class: traefik
|
|
cert-manager.io/cluster-issuer: "letsencrypt-prod"
|
|
traefik.ingress.kubernetes.io/router.entrypoints: websecure,public-https
|
|
|
|
# traefik.public-https.redirect.permanent: 'true'
|
|
# traefik.public-https.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
|
|
# traefik.public-https.redirect.replacement: 'https://$$1/remote.php/dav'
|
|
# traefik.public-https.headers.STSPreload: 'true'
|
|
# traefik.public-https.headers.STSSeconds: '15552000'
|
|
# traefik.public-https.routers.nextcloud.middlewares: 'nextcloudHeader'
|
|
|
|
# traefik.web-secure.routers.nextcloud.middlewares: 'nextcloudHeader'
|
|
# traefik.websecure.headers.STSPreload: 'true'
|
|
# traefik.websecure.headers.STSSeconds: '15552000'
|
|
# traefik.websecure.redirect.permanent: 'true'
|
|
# traefik.websecure.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
|
|
# traefik.websecure.redirect.replacement: 'https://$$1/remote.php/dav'
|
|
# hosts:
|
|
# - host: cloud.limbosolutions.com
|
|
# paths:
|
|
# - path: /
|
|
# pathType: Prefix
|
|
tls:
|
|
- secretName: cloud-limbosolutions-com-secret-tls
|
|
hosts:
|
|
- "cloud.limbosolutions.com"
|
|
|
|
|
|
|