diff --git a/roles/airsonic/defaults/main.yml b/roles/airsonic/defaults/main.yml index a5d4016d..1c0a5e96 100644 --- a/roles/airsonic/defaults/main.yml +++ b/roles/airsonic/defaults/main.yml @@ -10,3 +10,6 @@ airsonic_podcasts_directory: "{{ podcasts_root }}" # network airsonic_port: "4040" airsonic_hostname: "airsonic" + +# specs +airsonic_memory: 1g diff --git a/roles/airsonic/tasks/main.yml b/roles/airsonic/tasks/main.yml index 54bdedbf..f540f9f8 100644 --- a/roles/airsonic/tasks/main.yml +++ b/roles/airsonic/tasks/main.yml @@ -21,7 +21,7 @@ ports: - "{{ airsonic_port }}:4040" restart_policy: unless-stopped - memory: 1g + memory: "{{ airsonic_memory }}" labels: traefik.enable: "{{ airsonic_available_externally }}" traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/bazarr/defaults/main.yml b/roles/bazarr/defaults/main.yml index c06ddbe8..609a23b3 100644 --- a/roles/bazarr/defaults/main.yml +++ b/roles/bazarr/defaults/main.yml @@ -14,3 +14,6 @@ bazarr_group_id: "0" # network bazarr_port: "6767" bazarr_hostname: "bazarr" + +# specs +bazarr_memory: 1g diff --git a/roles/bazarr/tasks/main.yml b/roles/bazarr/tasks/main.yml index f39329c4..8e7f5044 100644 --- a/roles/bazarr/tasks/main.yml +++ b/roles/bazarr/tasks/main.yml @@ -22,7 +22,7 @@ PUID: "{{ bazarr_user_id }}" PGID: "{{ bazarr_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ bazarr_memory }}" labels: traefik.enable: "{{ bazarr_available_externally }}" traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/bitwarden/defaults/main.yml b/roles/bitwarden/defaults/main.yml index 13c38b7c..b9c5e1db 100644 --- a/roles/bitwarden/defaults/main.yml +++ b/roles/bitwarden/defaults/main.yml @@ -14,3 +14,7 @@ bitwarden_admin_token: qwertyuiop1234567890poiuytrewq0987654321 # Once you have created your user, set to "false" and run one more time. # Target just Bitwarden by running: ansible-playbook -i inventory nas.yml -b -K -t bitwarden bitwarden_allow_signups: false + +# specs +bitwarden_memory: 1g +bitwarden_backup_memory: 1g diff --git a/roles/bitwarden/tasks/main.yml b/roles/bitwarden/tasks/main.yml index 133e0aae..b831f6c0 100644 --- a/roles/bitwarden/tasks/main.yml +++ b/roles/bitwarden/tasks/main.yml @@ -28,6 +28,7 @@ traefik.hub.frontend.rule: "Host:bitwarden.{{ ansible_nas_domain }};Path:/notifications/hub" traefik.hub.port: "bitwarden_port_b" traefik.hub.protocol: "ws" + memory: "{{ bitwarden_memory }}" restart_policy: unless-stopped - name: Bitwarden Backup Container @@ -37,4 +38,4 @@ pull: true restart_policy: unless-stopped volumes_from: bitwarden - memory: 1g + memory: "{{ bitwarden_backup_memory }}" diff --git a/roles/cloudflare_ddns/defaults/main.yml b/roles/cloudflare_ddns/defaults/main.yml index 3b10e547..21d0f517 100644 --- a/roles/cloudflare_ddns/defaults/main.yml +++ b/roles/cloudflare_ddns/defaults/main.yml @@ -21,3 +21,6 @@ cloudflare_proxy: false # Set to AAAA to use set IPv6 records instead of IPv4 records. cloudflare_type: "A" + +# specs +cloudflare_memory: 512MB diff --git a/roles/cloudflare_ddns/tasks/main.yml b/roles/cloudflare_ddns/tasks/main.yml index 647c8560..42b648a0 100644 --- a/roles/cloudflare_ddns/tasks/main.yml +++ b/roles/cloudflare_ddns/tasks/main.yml @@ -24,5 +24,5 @@ volumes: - "{{ cloudflare_data_directory }}/config.yml:/app/config.yaml" restart_policy: unless-stopped - memory: 512MB + memory: "{{ cloudflare_memory }}" recreate: "{{ template_files_result is changed }}" diff --git a/roles/couchpotato/defaults/main.yml b/roles/couchpotato/defaults/main.yml index 6b1d4c0b..df200f25 100644 --- a/roles/couchpotato/defaults/main.yml +++ b/roles/couchpotato/defaults/main.yml @@ -14,3 +14,6 @@ couchpotato_group_id: "0" # network couchpotato_port: "5050" + +# specs +couchpotato_memory: 1g diff --git a/roles/couchpotato/tasks/main.yml b/roles/couchpotato/tasks/main.yml index 320d6c6d..c71730b3 100644 --- a/roles/couchpotato/tasks/main.yml +++ b/roles/couchpotato/tasks/main.yml @@ -24,7 +24,7 @@ PUID: "{{ couchpotato_user_id }}" PGID: "{{ couchpotato_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ couchpotato_memory }}" labels: traefik.enable: "{{ couchpotato_available_externally }}" traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)" diff --git a/roles/deluge/defaults/main.yml b/roles/deluge/defaults/main.yml index aef7ab9f..723a731b 100644 --- a/roles/deluge/defaults/main.yml +++ b/roles/deluge/defaults/main.yml @@ -19,3 +19,6 @@ deluge_port: "8112" deluge_hostname: "deluge" deluge_timezone: "{{ ansible_nas_timezone }}" + +# specs +deluge_memory: 1g diff --git a/roles/deluge/tasks/main.yml b/roles/deluge/tasks/main.yml index 1bf57d87..00feeb6c 100644 --- a/roles/deluge/tasks/main.yml +++ b/roles/deluge/tasks/main.yml @@ -23,7 +23,7 @@ PUID: "{{ deluge_user_id }}" PGID: "{{ deluge_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ deluge_memory }}" labels: traefik.enable: "{{ deluge_available_externally }}" traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/duplicati/defaults/main.yml b/roles/duplicati/defaults/main.yml index 17ba4a8c..785d61a3 100644 --- a/roles/duplicati/defaults/main.yml +++ b/roles/duplicati/defaults/main.yml @@ -15,3 +15,5 @@ duplicati_group_id: "0" # network duplicati_port: "8200" duplicati_hostname: "duplicati" + +duplicati_memory: 1g diff --git a/roles/duplicati/tasks/main.yml b/roles/duplicati/tasks/main.yml index 01de0ff3..0a77ef8e 100644 --- a/roles/duplicati/tasks/main.yml +++ b/roles/duplicati/tasks/main.yml @@ -23,7 +23,7 @@ PUID: "{{ duplicati_user_id }}" PGID: "{{ duplicati_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ duplicati_memory }}" labels: traefik.enable: "{{ duplicati_available_externally }}" traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/emby/defaults/main.yml b/roles/emby/defaults/main.yml index 34016270..51474155 100644 --- a/roles/emby/defaults/main.yml +++ b/roles/emby/defaults/main.yml @@ -21,3 +21,6 @@ emby_group_id: "0" emby_port_http: "8096" emby_port_https: "8920" emby_hostname: "emby" + +# specs +emby_memory: 1g diff --git a/roles/emby/tasks/main.yml b/roles/emby/tasks/main.yml index 3d1dce66..7922d8d1 100644 --- a/roles/emby/tasks/main.yml +++ b/roles/emby/tasks/main.yml @@ -23,7 +23,7 @@ PUID: "{{ emby_user_id }}" PGID: "{{ emby_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ emby_memory }}" labels: traefik.enable: "{{ emby_available_externally }}" traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/firefly/defaults/main.yml b/roles/firefly/defaults/main.yml index 4722d2e7..241e0fc2 100644 --- a/roles/firefly/defaults/main.yml +++ b/roles/firefly/defaults/main.yml @@ -12,3 +12,4 @@ firefly_port: "8066" # specs firefly_memory: "1g" +firefly_mysql_memory: "1g" diff --git a/roles/firefly/tasks/main.yml b/roles/firefly/tasks/main.yml index fb9f4843..32d735a9 100644 --- a/roles/firefly/tasks/main.yml +++ b/roles/firefly/tasks/main.yml @@ -22,7 +22,7 @@ MYSQL_PASSWORD: "firefly" MYSQL_ROOT_PASSWORD: "firefly" restart_policy: unless-stopped - memory: 1g + memory: "{{ firefly_mysql_memory }}" - name: Wait for MySQL to init pause: diff --git a/roles/gitea/defaults/main.yml b/roles/gitea/defaults/main.yml index 170069d5..22989eef 100644 --- a/roles/gitea/defaults/main.yml +++ b/roles/gitea/defaults/main.yml @@ -9,3 +9,7 @@ gitea_data_directory: "{{ docker_home }}/gitea" gitea_hostname: "gitea" gitea_port_http: "3001" gitea_port_ssh: "222" + +# specs +gitea_memory: 1g +gitea_mysql_memory: 1g diff --git a/roles/gitea/tasks/main.yml b/roles/gitea/tasks/main.yml index 3506a1a6..580fba58 100644 --- a/roles/gitea/tasks/main.yml +++ b/roles/gitea/tasks/main.yml @@ -39,7 +39,7 @@ MYSQL_PASSWORD: "gitea" MYSQL_ROOT_PASSWORD: "gitea" restart_policy: unless-stopped - memory: 1g + memory: "{{ gitea_mysql_memory }}" - name: Create Gitea container docker_container: @@ -66,7 +66,7 @@ USER_UID: "1309" USER_GID: "1309" restart_policy: unless-stopped - memory: 1g + memory: "{{ gitea_memory }}" labels: traefik.enable: "{{ gitea_available_externally }}" traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/glances/defaults/main.yml b/roles/glances/defaults/main.yml index 2b5fd678..fc7ae9cd 100644 --- a/roles/glances/defaults/main.yml +++ b/roles/glances/defaults/main.yml @@ -7,3 +7,6 @@ glances_available_externally: "false" glances_hostname: "glances" glances_port_one: "61208" glances_port_two: "61209" + +# specs +glances_memory: 1g diff --git a/roles/glances/tasks/main.yml b/roles/glances/tasks/main.yml index 2c657fac..9d96e1f0 100644 --- a/roles/glances/tasks/main.yml +++ b/roles/glances/tasks/main.yml @@ -14,6 +14,7 @@ env: GLANCES_OPT: "-w" restart_policy: unless-stopped + memory: "{{ glances_memory }}" labels: traefik.enable: "{{ glances_available_externally }}" traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/gotify/defaults/main.yml b/roles/gotify/defaults/main.yml index e63223a9..b9bc9e49 100644 --- a/roles/gotify/defaults/main.yml +++ b/roles/gotify/defaults/main.yml @@ -15,3 +15,6 @@ gotify_hostname: "gotify" # user to run container with gotify_user_id: "0" gotify_group_id: "0" + +# specs +gotify_memory: 200m diff --git a/roles/gotify/tasks/main.yml b/roles/gotify/tasks/main.yml index aa4f1cf2..f3a0fbd6 100644 --- a/roles/gotify/tasks/main.yml +++ b/roles/gotify/tasks/main.yml @@ -21,7 +21,7 @@ PUID: "{{ gotify_user_id }}" PGID: "{{ gotify_group_id }}" restart_policy: unless-stopped - memory: 200m + memory: "{{ gotify_memory }}" labels: traefik.enable: "{{ gotify_available_externally }}" traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/heimdall/defaults/main.yml b/roles/heimdall/defaults/main.yml index 7f9084c3..31c4ce8e 100644 --- a/roles/heimdall/defaults/main.yml +++ b/roles/heimdall/defaults/main.yml @@ -14,3 +14,6 @@ heimdall_hostname: heimdall # uid / gid heimdall_user_id: "1310" heimdall_group_id: "1310" + +# specs +heimdall_memory: 1g diff --git a/roles/heimdall/tasks/main.yml b/roles/heimdall/tasks/main.yml index dcbbc581..3be7ac2c 100644 --- a/roles/heimdall/tasks/main.yml +++ b/roles/heimdall/tasks/main.yml @@ -39,7 +39,7 @@ - "{{ heimdall_port_http }}:80" - "{{ heimdall_port_https }}:443" restart_policy: unless-stopped - memory: 1g + memory: "{{ heimdall_memory }}" labels: traefik.enable: "{{ heimdall_available_externally }}" traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/homeassistant/defaults/main.yml b/roles/homeassistant/defaults/main.yml index 37e53cb9..fc54f0b0 100644 --- a/roles/homeassistant/defaults/main.yml +++ b/roles/homeassistant/defaults/main.yml @@ -8,3 +8,6 @@ homeassistant_data_directory: "{{ docker_home }}/homeassistant" # network homeassistant_port: "8123" homeassistant_hostname: "homeassistant" + +# specs +homeassistant_memory: 1g diff --git a/roles/homeassistant/tasks/main.yml b/roles/homeassistant/tasks/main.yml index 96727cad..8ef3c46d 100644 --- a/roles/homeassistant/tasks/main.yml +++ b/roles/homeassistant/tasks/main.yml @@ -24,4 +24,4 @@ traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.homeassistant.tls.domains[0].sans: "*.{{ ansible_nas_domain }}" traefik.http.services.homeassistant.loadbalancer.server.port: "8123" - memory: 1g + memory: "{{ homeassistant_memory }}" diff --git a/roles/jackett/tasks/main.yml b/roles/jackett/tasks/main.yml index f3ae4ae3..c40b917e 100644 --- a/roles/jackett/tasks/main.yml +++ b/roles/jackett/tasks/main.yml @@ -19,6 +19,7 @@ env: TZ: "{{ ansible_nas_timezone }}" restart_policy: unless-stopped + memory: "{{ jackett_memory }}" labels: traefik.enable: "{{ jackett_available_externally }}" traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/lidarr/defaults/main.yml b/roles/lidarr/defaults/main.yml index ecd533f6..7b7f5f52 100644 --- a/roles/lidarr/defaults/main.yml +++ b/roles/lidarr/defaults/main.yml @@ -14,3 +14,6 @@ lidarr_group_id: "0" # network lidarr_port: "8686" lidarr_hostname: "lidarr" + +# specs +lidarr_memory: 1g diff --git a/roles/lidarr/tasks/main.yml b/roles/lidarr/tasks/main.yml index 9a2497e7..6291cde8 100644 --- a/roles/lidarr/tasks/main.yml +++ b/roles/lidarr/tasks/main.yml @@ -20,7 +20,7 @@ PUID: "{{ lidarr_user_id }}" PGID: "{{ lidarr_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ lidarr_memory }}" labels: traefik.enable: "{{ lidarr_available_externally }}" traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/miniflux/defaults/main.yml b/roles/miniflux/defaults/main.yml index 0880b4f4..76f90f22 100644 --- a/roles/miniflux/defaults/main.yml +++ b/roles/miniflux/defaults/main.yml @@ -17,3 +17,4 @@ miniflux_port: "8070" # specs miniflux_memory: "1g" +miniflux_postgres_memory: "1g" diff --git a/roles/miniflux/tasks/main.yml b/roles/miniflux/tasks/main.yml index 9c595c7a..587806f8 100644 --- a/roles/miniflux/tasks/main.yml +++ b/roles/miniflux/tasks/main.yml @@ -17,7 +17,7 @@ POSTGRES_USER: "miniflux" POSTGRES_PASSWORD: "supersecure" restart_policy: unless-stopped - memory: 1g + memory: "{{ miniflux_postgres_memory }}" - name: Create Miniflux Docker Container docker_container: diff --git a/roles/n8n/defaults/main.yml b/roles/n8n/defaults/main.yml index b58cb74c..d66481d0 100644 --- a/roles/n8n/defaults/main.yml +++ b/roles/n8n/defaults/main.yml @@ -13,3 +13,6 @@ n8n_data_directory: "{{ docker_home }}/n8n" # Security n8n_basic_auth_user: "n8n_user" n8n_basic_auth_password: "n8n_change_me" + +# specs +n8n_memory: 1g diff --git a/roles/n8n/tasks/main.yml b/roles/n8n/tasks/main.yml index cc9d85b9..9a22f639 100644 --- a/roles/n8n/tasks/main.yml +++ b/roles/n8n/tasks/main.yml @@ -17,7 +17,7 @@ - "{{ n8n_data_directory }}:/home/node/.n8n:rw" - "/etc/timezone:/etc/timezone:ro" restart_policy: unless-stopped - memory: 1g + memory: "{{ n8n_memory }}" env: N8N_BASIC_AUTH_ACTIVE: "true" N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}" diff --git a/roles/netdata/defaults/main.yml b/roles/netdata/defaults/main.yml index 8ee929f9..1a8fec4d 100644 --- a/roles/netdata/defaults/main.yml +++ b/roles/netdata/defaults/main.yml @@ -5,3 +5,6 @@ netdata_available_externally: "false" # network netdata_hostname: "netdata" netdata_port: "19999" + +# specs +netdata_memory: 1g diff --git a/roles/netdata/tasks/main.yml b/roles/netdata/tasks/main.yml index 61b4ab61..c0e3aebd 100644 --- a/roles/netdata/tasks/main.yml +++ b/roles/netdata/tasks/main.yml @@ -24,7 +24,7 @@ security_opts: - apparmor:unconfined restart_policy: unless-stopped - memory: 1g + memory: "{{ netdata_memory }}" labels: traefik.enable: "{{ netdata_available_externally }}" traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/nextcloud/defaults/main.yml b/roles/nextcloud/defaults/main.yml index 1c9ef7fc..22565d0e 100644 --- a/roles/nextcloud/defaults/main.yml +++ b/roles/nextcloud/defaults/main.yml @@ -13,3 +13,7 @@ nextcloud_hostname: "nextcloud" nextcloud_sql_user: "nextcloud-user" nextcloud_sql_password: "nextcloud-pass" nextcloud_sql_root_password: "nextcloud-secret" + +# specs +nextcloud_memory: 1g +nextcloud_mysql_memory: 1g diff --git a/roles/nextcloud/tasks/main.yml b/roles/nextcloud/tasks/main.yml index e97495b0..e36dc997 100644 --- a/roles/nextcloud/tasks/main.yml +++ b/roles/nextcloud/tasks/main.yml @@ -20,7 +20,7 @@ MYSQL_PASSWORD: "{{ nextcloud_sql_password }}" MYSQL_ROOT_PASSWORD: "{{ nextcloud_sql_root_password }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ nextcloud_mysql_memory }}" - name: Nextcloud Docker Container docker_container: @@ -40,7 +40,7 @@ MYSQL_PASSWORD: "{{ nextcloud_sql_password }}" NEXTCLOUD_TRUSTED_DOMAINS: "{{ nextcloud_hostname }}.{{ ansible_nas_domain }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ nextcloud_memory }}" labels: traefik.enable: "{{ nextcloud_available_externally }}" traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/nzbget/defaults/main.yml b/roles/nzbget/defaults/main.yml index 4ba6dc2d..3e82a41a 100644 --- a/roles/nzbget/defaults/main.yml +++ b/roles/nzbget/defaults/main.yml @@ -15,4 +15,4 @@ nzbget_port: "6789" nzbget_hostname: "nzbget" # specs -nzbget_app_memory: "1g" +nzbget_memory: "1g" diff --git a/roles/nzbget/tasks/main.yml b/roles/nzbget/tasks/main.yml index ca748292..9157b923 100644 --- a/roles/nzbget/tasks/main.yml +++ b/roles/nzbget/tasks/main.yml @@ -21,7 +21,7 @@ PUID: "{{ nzbget_user_id }}" PGID: "{{ nzbget_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ nzbget_memory }}" labels: traefik.enable: "{{ nzbget_available_externally }}" traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/ombi/defaults/main.yml b/roles/ombi/defaults/main.yml index d4fe121e..e47c347b 100644 --- a/roles/ombi/defaults/main.yml +++ b/roles/ombi/defaults/main.yml @@ -12,3 +12,6 @@ ombi_hostname: "ombi" # uid / gid ombi_user_id: "0" ombi_group_id: "0" + +# specs +ombi_memory: 1g diff --git a/roles/ombi/tasks/main.yml b/roles/ombi/tasks/main.yml index 2fd9abbd..d368f8e6 100644 --- a/roles/ombi/tasks/main.yml +++ b/roles/ombi/tasks/main.yml @@ -18,7 +18,7 @@ PUID: "{{ ombi_user_id }}" PGID: "{{ ombi_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ ombi_memory }}" labels: traefik.enable: "{{ ombi_available_externally }}" traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/organizr/defaults/main.yml b/roles/organizr/defaults/main.yml index 7609056a..c5d2c1ab 100644 --- a/roles/organizr/defaults/main.yml +++ b/roles/organizr/defaults/main.yml @@ -13,3 +13,6 @@ organizr_hostname: "organizr" # uid / gid organizr_user_id: "1000" organizr_group_id: "1000" + +# specs +organizr_memory: 1g diff --git a/roles/organizr/tasks/main.yml b/roles/organizr/tasks/main.yml index 3b92f276..3b0d7ce6 100644 --- a/roles/organizr/tasks/main.yml +++ b/roles/organizr/tasks/main.yml @@ -21,7 +21,7 @@ - "{{ organizr_port_http }}:80" - "{{ organizr_port_https }}:443" restart_policy: unless-stopped - memory: 1g + memory: "{{ organizr_memory }}" labels: traefik.enable: "{{ organizr_available_externally }}" traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/portainer/defaults/main.yml b/roles/portainer/defaults/main.yml index af335e5c..447265d6 100644 --- a/roles/portainer/defaults/main.yml +++ b/roles/portainer/defaults/main.yml @@ -8,3 +8,6 @@ portainer_data_directory: "{{ docker_home }}/portainer/config" # network portainer_port: "9000" portainer_hostname: "portainer" + +# specs +portainer_memory: 1g diff --git a/roles/portainer/tasks/main.yml b/roles/portainer/tasks/main.yml index b45ddc49..1642bd0c 100644 --- a/roles/portainer/tasks/main.yml +++ b/roles/portainer/tasks/main.yml @@ -18,7 +18,7 @@ ports: - "{{ portainer_port }}:9000" restart_policy: unless-stopped - memory: 1g + memory: "{{ portainer_memory }}" labels: traefik.enable: "{{ portainer_available_externally }}" traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/radarr/defaults/main.yml b/roles/radarr/defaults/main.yml index daadf17e..d51b77bd 100644 --- a/roles/radarr/defaults/main.yml +++ b/roles/radarr/defaults/main.yml @@ -14,3 +14,6 @@ radarr_group_id: "0" # network radarr_port: "7878" radarr_hostname: "radarr" + +# specs +pyload_memory: 1g diff --git a/roles/radarr/tasks/main.yml b/roles/radarr/tasks/main.yml index 40fdbc8f..3f2c8cc3 100644 --- a/roles/radarr/tasks/main.yml +++ b/roles/radarr/tasks/main.yml @@ -22,7 +22,7 @@ PUID: "{{ radarr_user_id }}" PGID: "{{ radarr_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ pyload_memory }}" labels: traefik.enable: "{{ radarr_available_externally }}" traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/sickchill/defaults/main.yml b/roles/sickchill/defaults/main.yml index f49b3116..ef12f413 100644 --- a/roles/sickchill/defaults/main.yml +++ b/roles/sickchill/defaults/main.yml @@ -14,3 +14,6 @@ sickchill_group_id: "0" # network sickchill_port: "8081" sickchill_hostname: "sickchill" + +# specs +sickchill_memory: 1g diff --git a/roles/sickchill/tasks/main.yml b/roles/sickchill/tasks/main.yml index c037e447..0444badf 100644 --- a/roles/sickchill/tasks/main.yml +++ b/roles/sickchill/tasks/main.yml @@ -23,7 +23,7 @@ PUID: "{{ sickchill_user_id }}" PGID: "{{ sickchill_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ sickchill_memory }}" labels: traefik.enable: "{{ sickchill_available_externally }}" traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/sonarr/defaults/main.yml b/roles/sonarr/defaults/main.yml index ee928182..bcf7fb96 100644 --- a/roles/sonarr/defaults/main.yml +++ b/roles/sonarr/defaults/main.yml @@ -14,3 +14,6 @@ sonarr_group_id: "0" # network sonarr_port: "8989" sonarr_hostname: "sonarr" + +# specs +sonarr_memory: 1g diff --git a/roles/sonarr/tasks/main.yml b/roles/sonarr/tasks/main.yml index d04d64c0..286cb224 100644 --- a/roles/sonarr/tasks/main.yml +++ b/roles/sonarr/tasks/main.yml @@ -22,7 +22,7 @@ PUID: "{{ sonarr_user_id }}" PGID: "{{ sonarr_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ sonarr_memory }}" labels: traefik.enable: "{{ sonarr_available_externally }}" traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/syncthing/defaults/main.yml b/roles/syncthing/defaults/main.yml index 20723bbf..3c88839d 100644 --- a/roles/syncthing/defaults/main.yml +++ b/roles/syncthing/defaults/main.yml @@ -15,3 +15,6 @@ syncthing_volumes: # network syncthing_port: 8384 syncthing_hostname: syncthing + +# specs +syncthing_memory: 1g diff --git a/roles/syncthing/tasks/main.yml b/roles/syncthing/tasks/main.yml index 4804db45..dfe14fe6 100644 --- a/roles/syncthing/tasks/main.yml +++ b/roles/syncthing/tasks/main.yml @@ -14,6 +14,7 @@ network_mode: host volumes: "{{ syncthing_volumes }}" restart_policy: unless-stopped + memory: "{{ syncthing_memory }}" labels: traefik.enable: "{{ syncthing_available_externally }}" traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/traefik/defaults/main.yml b/roles/traefik/defaults/main.yml index 1a0eda9c..0f6a659e 100644 --- a/roles/traefik/defaults/main.yml +++ b/roles/traefik/defaults/main.yml @@ -27,3 +27,6 @@ traefik_environment_variables: # the "{{ docker_home }}/traefik" after changing this setting. # traefik_acme_server: "https://acme-staging-v02.api.letsencrypt.org/directory" # staging traefik_acme_server: "https://acme-v02.api.letsencrypt.org/directory" # production + +# specs +traefik_memory: 1g diff --git a/roles/traefik/tasks/main.yml b/roles/traefik/tasks/main.yml index 85f2f691..451112e4 100644 --- a/roles/traefik/tasks/main.yml +++ b/roles/traefik/tasks/main.yml @@ -25,5 +25,5 @@ - "/var/run/docker.sock:/var/run/docker.sock:ro" env: "{{ traefik_environment_variables }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ traefik_memory }}" recreate: "{{ template_config is changed }}" diff --git a/roles/transmission-with-openvpn/defaults/main.yml b/roles/transmission-with-openvpn/defaults/main.yml index 206f0ee8..fce6be0d 100644 --- a/roles/transmission-with-openvpn/defaults/main.yml +++ b/roles/transmission-with-openvpn/defaults/main.yml @@ -29,3 +29,6 @@ openvpn_username: leisure-suit-larry openvpn_password: secretpassword openvpn_provider: AWESOMEVPNPROVIDER openvpn_config: United-Kingdom + +# specs +transmission_openvpn_memory: 1g diff --git a/roles/transmission-with-openvpn/tasks/main.yml b/roles/transmission-with-openvpn/tasks/main.yml index 3374ab8b..341c8e45 100644 --- a/roles/transmission-with-openvpn/tasks/main.yml +++ b/roles/transmission-with-openvpn/tasks/main.yml @@ -47,7 +47,7 @@ capabilities: - NET_ADMIN restart_policy: unless-stopped - memory: 1g + memory: "{{ transmission_openvpn_memory }}" labels: traefik.enable: "{{ transmission_openvpn_available_externally }}" traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/transmission/defaults/main.yml b/roles/transmission/defaults/main.yml index 2f9d87ac..da0b5270 100644 --- a/roles/transmission/defaults/main.yml +++ b/roles/transmission/defaults/main.yml @@ -17,3 +17,6 @@ transmission_external_port: "51414" transmission_hostname: "transmission" transmission_timezone: "{{ ansible_nas_timezone }}" + +# specs +transmission_memory: 1g diff --git a/roles/transmission/tasks/main.yml b/roles/transmission/tasks/main.yml index b1c8b447..93a33085 100644 --- a/roles/transmission/tasks/main.yml +++ b/roles/transmission/tasks/main.yml @@ -27,7 +27,7 @@ PUID: "{{ transmission_user_id }}" PGID: "{{ transmission_group_id }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ transmission_memory }}" labels: traefik.enable: "{{ transmission_available_externally }}" traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/utorrent/defaults/main.yml b/roles/utorrent/defaults/main.yml index 0c03ae6b..1859f131 100644 --- a/roles/utorrent/defaults/main.yml +++ b/roles/utorrent/defaults/main.yml @@ -15,3 +15,6 @@ utorrent_group_id: "0" utorrent_port_http: "8111" utorrent_port_bt: "6881" utorrent_hostname: "utorrent" + +# specs +utorrent_memory: 1g diff --git a/roles/utorrent/tasks/main.yml b/roles/utorrent/tasks/main.yml index 7eb7377e..623e1b0f 100644 --- a/roles/utorrent/tasks/main.yml +++ b/roles/utorrent/tasks/main.yml @@ -29,7 +29,7 @@ dir_active: "/data/.incomplete" dir_completed: "/data" restart_policy: unless-stopped - memory: 1g + memory: "{{ utorrent_memory }}" labels: traefik.enable: "{{ utorrent_available_externally }}" traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)" diff --git a/roles/watchtower/defaults/main.yml b/roles/watchtower/defaults/main.yml index 84b766ce..57773794 100644 --- a/roles/watchtower/defaults/main.yml +++ b/roles/watchtower/defaults/main.yml @@ -15,3 +15,6 @@ watchtower_command: "--schedule '{{ watchtower_cron_schedule }}'" # Slack notifications # watchtower_command: "--schedule '{{ watchtower_cron_schedule }}' --notifications 'slack' --notification-slack-hook-url 'https://hooks.slack.com/services/xxx/yyyyyyyyyyyyyyy' --notification-slack-identifier 'ansible-nas'" + +# specs +memory: "{{ watchtower_memory }}" diff --git a/roles/watchtower/tasks/main.yml b/roles/watchtower/tasks/main.yml index 10cd77b3..7b8f1a16 100644 --- a/roles/watchtower/tasks/main.yml +++ b/roles/watchtower/tasks/main.yml @@ -10,4 +10,4 @@ TZ: "{{ ansible_nas_timezone }}" command: "{{ watchtower_command }}" restart_policy: unless-stopped - memory: 1g + memory: "{{ watchtower_memory }}"