Add redis

This commit is contained in:
Tyler Perkins 2024-11-11 19:53:25 -05:00
parent 3f1b6263ba
commit 967cb6d719
Signed by: tyler
GPG Key ID: 03B27509E17EFDC8
7 changed files with 1954 additions and 2 deletions

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,6 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: redis
namespace: redis-system

View File

@ -0,0 +1,15 @@
apiVersion: bitnami.com/v1alpha1
kind: SealedSecret
metadata:
creationTimestamp: null
name: redis-key
namespace: redis-system
spec:
encryptedData:
password: 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
template:
metadata:
creationTimestamp: null
name: redis-key
namespace: redis-system
type: Opaque

View File

@ -0,0 +1,5 @@
# Navidrome
Navidrome just needs a little sqlite database, hosted on longhorn for redundancy.
Navidrome NFS mounts to media directory. Not in a namespace, due to being a "user level" application.

3
docs/technical/redis.md Normal file
View File

@ -0,0 +1,3 @@
# Redis
Located in redis-system namespace. Configured with sealed-secret credentials

View File

@ -19,12 +19,16 @@ data:
username: ""
```
> [!NOTE]
>
> Those values in the above manifest should be base64 encoded
## Seal the secret
Make sure you have kubseal installed. This is working with kubseal `0.23.0`.
```bash
kubeseal --controller-namespace sealed-secret \
kubeseal --controller-namespace sealed-secrets \
--controller-name sealed-secrets \
--format yaml < secret.yaml > sealed-secret.yaml
```

View File

@ -30,7 +30,9 @@ nav:
- Tier 1 (Dependencies):
- Postgresql: technical/postgresql.md
- PGAdmin: technical/pgadmin.md
#- Tier 2 (User Apps):
- Reids: technical/redis.md
- Tier 2 (User Apps):
- Navidrome (Music): technical/navidrome.md
- Misc:
- NFS: technical/nfs-storage.md
- Seal-a-secret: technical/seal-a-secret.md