Enable configurable memory. Mops up #253

This commit is contained in:
David Stephens 2021-02-23 15:16:29 +00:00 committed by GitHub
parent 6bf518c9ad
commit a645bd809f
65 changed files with 128 additions and 33 deletions

View file

@ -10,3 +10,6 @@ airsonic_podcasts_directory: "{{ podcasts_root }}"
# network # network
airsonic_port: "4040" airsonic_port: "4040"
airsonic_hostname: "airsonic" airsonic_hostname: "airsonic"
# specs
airsonic_memory: 1g

View file

@ -21,7 +21,7 @@
ports: ports:
- "{{ airsonic_port }}:4040" - "{{ airsonic_port }}:4040"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ airsonic_memory }}"
labels: labels:
traefik.enable: "{{ airsonic_available_externally }}" traefik.enable: "{{ airsonic_available_externally }}"
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ bazarr_group_id: "0"
# network # network
bazarr_port: "6767" bazarr_port: "6767"
bazarr_hostname: "bazarr" bazarr_hostname: "bazarr"
# specs
bazarr_memory: 1g

View file

@ -22,7 +22,7 @@
PUID: "{{ bazarr_user_id }}" PUID: "{{ bazarr_user_id }}"
PGID: "{{ bazarr_group_id }}" PGID: "{{ bazarr_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ bazarr_memory }}"
labels: labels:
traefik.enable: "{{ bazarr_available_externally }}" traefik.enable: "{{ bazarr_available_externally }}"
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,7 @@ bitwarden_admin_token: qwertyuiop1234567890poiuytrewq0987654321
# Once you have created your user, set to "false" and run one more time. # Once you have created your user, set to "false" and run one more time.
# Target just Bitwarden by running: ansible-playbook -i inventory nas.yml -b -K -t bitwarden # Target just Bitwarden by running: ansible-playbook -i inventory nas.yml -b -K -t bitwarden
bitwarden_allow_signups: false bitwarden_allow_signups: false
# specs
bitwarden_memory: 1g
bitwarden_backup_memory: 1g

View file

@ -28,6 +28,7 @@
traefik.hub.frontend.rule: "Host:bitwarden.{{ ansible_nas_domain }};Path:/notifications/hub" traefik.hub.frontend.rule: "Host:bitwarden.{{ ansible_nas_domain }};Path:/notifications/hub"
traefik.hub.port: "bitwarden_port_b" traefik.hub.port: "bitwarden_port_b"
traefik.hub.protocol: "ws" traefik.hub.protocol: "ws"
memory: "{{ bitwarden_memory }}"
restart_policy: unless-stopped restart_policy: unless-stopped
- name: Bitwarden Backup Container - name: Bitwarden Backup Container
@ -37,4 +38,4 @@
pull: true pull: true
restart_policy: unless-stopped restart_policy: unless-stopped
volumes_from: bitwarden volumes_from: bitwarden
memory: 1g memory: "{{ bitwarden_backup_memory }}"

View file

@ -21,3 +21,6 @@ cloudflare_proxy: false
# Set to AAAA to use set IPv6 records instead of IPv4 records. # Set to AAAA to use set IPv6 records instead of IPv4 records.
cloudflare_type: "A" cloudflare_type: "A"
# specs
cloudflare_memory: 512MB

View file

@ -24,5 +24,5 @@
volumes: volumes:
- "{{ cloudflare_data_directory }}/config.yml:/app/config.yaml" - "{{ cloudflare_data_directory }}/config.yml:/app/config.yaml"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 512MB memory: "{{ cloudflare_memory }}"
recreate: "{{ template_files_result is changed }}" recreate: "{{ template_files_result is changed }}"

View file

@ -14,3 +14,6 @@ couchpotato_group_id: "0"
# network # network
couchpotato_port: "5050" couchpotato_port: "5050"
# specs
couchpotato_memory: 1g

View file

@ -24,7 +24,7 @@
PUID: "{{ couchpotato_user_id }}" PUID: "{{ couchpotato_user_id }}"
PGID: "{{ couchpotato_group_id }}" PGID: "{{ couchpotato_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ couchpotato_memory }}"
labels: labels:
traefik.enable: "{{ couchpotato_available_externally }}" traefik.enable: "{{ couchpotato_available_externally }}"
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)" traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"

View file

@ -19,3 +19,6 @@ deluge_port: "8112"
deluge_hostname: "deluge" deluge_hostname: "deluge"
deluge_timezone: "{{ ansible_nas_timezone }}" deluge_timezone: "{{ ansible_nas_timezone }}"
# specs
deluge_memory: 1g

View file

@ -23,7 +23,7 @@
PUID: "{{ deluge_user_id }}" PUID: "{{ deluge_user_id }}"
PGID: "{{ deluge_group_id }}" PGID: "{{ deluge_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ deluge_memory }}"
labels: labels:
traefik.enable: "{{ deluge_available_externally }}" traefik.enable: "{{ deluge_available_externally }}"
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,3 +15,5 @@ duplicati_group_id: "0"
# network # network
duplicati_port: "8200" duplicati_port: "8200"
duplicati_hostname: "duplicati" duplicati_hostname: "duplicati"
duplicati_memory: 1g

View file

@ -23,7 +23,7 @@
PUID: "{{ duplicati_user_id }}" PUID: "{{ duplicati_user_id }}"
PGID: "{{ duplicati_group_id }}" PGID: "{{ duplicati_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ duplicati_memory }}"
labels: labels:
traefik.enable: "{{ duplicati_available_externally }}" traefik.enable: "{{ duplicati_available_externally }}"
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -21,3 +21,6 @@ emby_group_id: "0"
emby_port_http: "8096" emby_port_http: "8096"
emby_port_https: "8920" emby_port_https: "8920"
emby_hostname: "emby" emby_hostname: "emby"
# specs
emby_memory: 1g

View file

@ -23,7 +23,7 @@
PUID: "{{ emby_user_id }}" PUID: "{{ emby_user_id }}"
PGID: "{{ emby_group_id }}" PGID: "{{ emby_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ emby_memory }}"
labels: labels:
traefik.enable: "{{ emby_available_externally }}" traefik.enable: "{{ emby_available_externally }}"
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -12,3 +12,4 @@ firefly_port: "8066"
# specs # specs
firefly_memory: "1g" firefly_memory: "1g"
firefly_mysql_memory: "1g"

View file

@ -22,7 +22,7 @@
MYSQL_PASSWORD: "firefly" MYSQL_PASSWORD: "firefly"
MYSQL_ROOT_PASSWORD: "firefly" MYSQL_ROOT_PASSWORD: "firefly"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ firefly_mysql_memory }}"
- name: Wait for MySQL to init - name: Wait for MySQL to init
pause: pause:

View file

@ -9,3 +9,7 @@ gitea_data_directory: "{{ docker_home }}/gitea"
gitea_hostname: "gitea" gitea_hostname: "gitea"
gitea_port_http: "3001" gitea_port_http: "3001"
gitea_port_ssh: "222" gitea_port_ssh: "222"
# specs
gitea_memory: 1g
gitea_mysql_memory: 1g

View file

@ -39,7 +39,7 @@
MYSQL_PASSWORD: "gitea" MYSQL_PASSWORD: "gitea"
MYSQL_ROOT_PASSWORD: "gitea" MYSQL_ROOT_PASSWORD: "gitea"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ gitea_mysql_memory }}"
- name: Create Gitea container - name: Create Gitea container
docker_container: docker_container:
@ -66,7 +66,7 @@
USER_UID: "1309" USER_UID: "1309"
USER_GID: "1309" USER_GID: "1309"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ gitea_memory }}"
labels: labels:
traefik.enable: "{{ gitea_available_externally }}" traefik.enable: "{{ gitea_available_externally }}"
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -7,3 +7,6 @@ glances_available_externally: "false"
glances_hostname: "glances" glances_hostname: "glances"
glances_port_one: "61208" glances_port_one: "61208"
glances_port_two: "61209" glances_port_two: "61209"
# specs
glances_memory: 1g

View file

@ -14,6 +14,7 @@
env: env:
GLANCES_OPT: "-w" GLANCES_OPT: "-w"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ glances_memory }}"
labels: labels:
traefik.enable: "{{ glances_available_externally }}" traefik.enable: "{{ glances_available_externally }}"
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,3 +15,6 @@ gotify_hostname: "gotify"
# user to run container with # user to run container with
gotify_user_id: "0" gotify_user_id: "0"
gotify_group_id: "0" gotify_group_id: "0"
# specs
gotify_memory: 200m

View file

@ -21,7 +21,7 @@
PUID: "{{ gotify_user_id }}" PUID: "{{ gotify_user_id }}"
PGID: "{{ gotify_group_id }}" PGID: "{{ gotify_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 200m memory: "{{ gotify_memory }}"
labels: labels:
traefik.enable: "{{ gotify_available_externally }}" traefik.enable: "{{ gotify_available_externally }}"
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ heimdall_hostname: heimdall
# uid / gid # uid / gid
heimdall_user_id: "1310" heimdall_user_id: "1310"
heimdall_group_id: "1310" heimdall_group_id: "1310"
# specs
heimdall_memory: 1g

View file

@ -39,7 +39,7 @@
- "{{ heimdall_port_http }}:80" - "{{ heimdall_port_http }}:80"
- "{{ heimdall_port_https }}:443" - "{{ heimdall_port_https }}:443"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ heimdall_memory }}"
labels: labels:
traefik.enable: "{{ heimdall_available_externally }}" traefik.enable: "{{ heimdall_available_externally }}"
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -8,3 +8,6 @@ homeassistant_data_directory: "{{ docker_home }}/homeassistant"
# network # network
homeassistant_port: "8123" homeassistant_port: "8123"
homeassistant_hostname: "homeassistant" homeassistant_hostname: "homeassistant"
# specs
homeassistant_memory: 1g

View file

@ -24,4 +24,4 @@
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
traefik.http.routers.homeassistant.tls.domains[0].sans: "*.{{ ansible_nas_domain }}" traefik.http.routers.homeassistant.tls.domains[0].sans: "*.{{ ansible_nas_domain }}"
traefik.http.services.homeassistant.loadbalancer.server.port: "8123" traefik.http.services.homeassistant.loadbalancer.server.port: "8123"
memory: 1g memory: "{{ homeassistant_memory }}"

View file

@ -19,6 +19,7 @@
env: env:
TZ: "{{ ansible_nas_timezone }}" TZ: "{{ ansible_nas_timezone }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ jackett_memory }}"
labels: labels:
traefik.enable: "{{ jackett_available_externally }}" traefik.enable: "{{ jackett_available_externally }}"
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ lidarr_group_id: "0"
# network # network
lidarr_port: "8686" lidarr_port: "8686"
lidarr_hostname: "lidarr" lidarr_hostname: "lidarr"
# specs
lidarr_memory: 1g

View file

@ -20,7 +20,7 @@
PUID: "{{ lidarr_user_id }}" PUID: "{{ lidarr_user_id }}"
PGID: "{{ lidarr_group_id }}" PGID: "{{ lidarr_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ lidarr_memory }}"
labels: labels:
traefik.enable: "{{ lidarr_available_externally }}" traefik.enable: "{{ lidarr_available_externally }}"
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -17,3 +17,4 @@ miniflux_port: "8070"
# specs # specs
miniflux_memory: "1g" miniflux_memory: "1g"
miniflux_postgres_memory: "1g"

View file

@ -17,7 +17,7 @@
POSTGRES_USER: "miniflux" POSTGRES_USER: "miniflux"
POSTGRES_PASSWORD: "supersecure" POSTGRES_PASSWORD: "supersecure"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ miniflux_postgres_memory }}"
- name: Create Miniflux Docker Container - name: Create Miniflux Docker Container
docker_container: docker_container:

View file

@ -13,3 +13,6 @@ n8n_data_directory: "{{ docker_home }}/n8n"
# Security # Security
n8n_basic_auth_user: "n8n_user" n8n_basic_auth_user: "n8n_user"
n8n_basic_auth_password: "n8n_change_me" n8n_basic_auth_password: "n8n_change_me"
# specs
n8n_memory: 1g

View file

@ -17,7 +17,7 @@
- "{{ n8n_data_directory }}:/home/node/.n8n:rw" - "{{ n8n_data_directory }}:/home/node/.n8n:rw"
- "/etc/timezone:/etc/timezone:ro" - "/etc/timezone:/etc/timezone:ro"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ n8n_memory }}"
env: env:
N8N_BASIC_AUTH_ACTIVE: "true" N8N_BASIC_AUTH_ACTIVE: "true"
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}" N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"

View file

@ -5,3 +5,6 @@ netdata_available_externally: "false"
# network # network
netdata_hostname: "netdata" netdata_hostname: "netdata"
netdata_port: "19999" netdata_port: "19999"
# specs
netdata_memory: 1g

View file

@ -24,7 +24,7 @@
security_opts: security_opts:
- apparmor:unconfined - apparmor:unconfined
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ netdata_memory }}"
labels: labels:
traefik.enable: "{{ netdata_available_externally }}" traefik.enable: "{{ netdata_available_externally }}"
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -13,3 +13,7 @@ nextcloud_hostname: "nextcloud"
nextcloud_sql_user: "nextcloud-user" nextcloud_sql_user: "nextcloud-user"
nextcloud_sql_password: "nextcloud-pass" nextcloud_sql_password: "nextcloud-pass"
nextcloud_sql_root_password: "nextcloud-secret" nextcloud_sql_root_password: "nextcloud-secret"
# specs
nextcloud_memory: 1g
nextcloud_mysql_memory: 1g

View file

@ -20,7 +20,7 @@
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}" MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
MYSQL_ROOT_PASSWORD: "{{ nextcloud_sql_root_password }}" MYSQL_ROOT_PASSWORD: "{{ nextcloud_sql_root_password }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ nextcloud_mysql_memory }}"
- name: Nextcloud Docker Container - name: Nextcloud Docker Container
docker_container: docker_container:
@ -40,7 +40,7 @@
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}" MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
NEXTCLOUD_TRUSTED_DOMAINS: "{{ nextcloud_hostname }}.{{ ansible_nas_domain }}" NEXTCLOUD_TRUSTED_DOMAINS: "{{ nextcloud_hostname }}.{{ ansible_nas_domain }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ nextcloud_memory }}"
labels: labels:
traefik.enable: "{{ nextcloud_available_externally }}" traefik.enable: "{{ nextcloud_available_externally }}"
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,4 +15,4 @@ nzbget_port: "6789"
nzbget_hostname: "nzbget" nzbget_hostname: "nzbget"
# specs # specs
nzbget_app_memory: "1g" nzbget_memory: "1g"

View file

@ -21,7 +21,7 @@
PUID: "{{ nzbget_user_id }}" PUID: "{{ nzbget_user_id }}"
PGID: "{{ nzbget_group_id }}" PGID: "{{ nzbget_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ nzbget_memory }}"
labels: labels:
traefik.enable: "{{ nzbget_available_externally }}" traefik.enable: "{{ nzbget_available_externally }}"
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -12,3 +12,6 @@ ombi_hostname: "ombi"
# uid / gid # uid / gid
ombi_user_id: "0" ombi_user_id: "0"
ombi_group_id: "0" ombi_group_id: "0"
# specs
ombi_memory: 1g

View file

@ -18,7 +18,7 @@
PUID: "{{ ombi_user_id }}" PUID: "{{ ombi_user_id }}"
PGID: "{{ ombi_group_id }}" PGID: "{{ ombi_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ ombi_memory }}"
labels: labels:
traefik.enable: "{{ ombi_available_externally }}" traefik.enable: "{{ ombi_available_externally }}"
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -13,3 +13,6 @@ organizr_hostname: "organizr"
# uid / gid # uid / gid
organizr_user_id: "1000" organizr_user_id: "1000"
organizr_group_id: "1000" organizr_group_id: "1000"
# specs
organizr_memory: 1g

View file

@ -21,7 +21,7 @@
- "{{ organizr_port_http }}:80" - "{{ organizr_port_http }}:80"
- "{{ organizr_port_https }}:443" - "{{ organizr_port_https }}:443"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ organizr_memory }}"
labels: labels:
traefik.enable: "{{ organizr_available_externally }}" traefik.enable: "{{ organizr_available_externally }}"
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -8,3 +8,6 @@ portainer_data_directory: "{{ docker_home }}/portainer/config"
# network # network
portainer_port: "9000" portainer_port: "9000"
portainer_hostname: "portainer" portainer_hostname: "portainer"
# specs
portainer_memory: 1g

View file

@ -18,7 +18,7 @@
ports: ports:
- "{{ portainer_port }}:9000" - "{{ portainer_port }}:9000"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ portainer_memory }}"
labels: labels:
traefik.enable: "{{ portainer_available_externally }}" traefik.enable: "{{ portainer_available_externally }}"
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ radarr_group_id: "0"
# network # network
radarr_port: "7878" radarr_port: "7878"
radarr_hostname: "radarr" radarr_hostname: "radarr"
# specs
pyload_memory: 1g

View file

@ -22,7 +22,7 @@
PUID: "{{ radarr_user_id }}" PUID: "{{ radarr_user_id }}"
PGID: "{{ radarr_group_id }}" PGID: "{{ radarr_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ pyload_memory }}"
labels: labels:
traefik.enable: "{{ radarr_available_externally }}" traefik.enable: "{{ radarr_available_externally }}"
traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ sickchill_group_id: "0"
# network # network
sickchill_port: "8081" sickchill_port: "8081"
sickchill_hostname: "sickchill" sickchill_hostname: "sickchill"
# specs
sickchill_memory: 1g

View file

@ -23,7 +23,7 @@
PUID: "{{ sickchill_user_id }}" PUID: "{{ sickchill_user_id }}"
PGID: "{{ sickchill_group_id }}" PGID: "{{ sickchill_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ sickchill_memory }}"
labels: labels:
traefik.enable: "{{ sickchill_available_externally }}" traefik.enable: "{{ sickchill_available_externally }}"
traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -14,3 +14,6 @@ sonarr_group_id: "0"
# network # network
sonarr_port: "8989" sonarr_port: "8989"
sonarr_hostname: "sonarr" sonarr_hostname: "sonarr"
# specs
sonarr_memory: 1g

View file

@ -22,7 +22,7 @@
PUID: "{{ sonarr_user_id }}" PUID: "{{ sonarr_user_id }}"
PGID: "{{ sonarr_group_id }}" PGID: "{{ sonarr_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ sonarr_memory }}"
labels: labels:
traefik.enable: "{{ sonarr_available_externally }}" traefik.enable: "{{ sonarr_available_externally }}"
traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,3 +15,6 @@ syncthing_volumes:
# network # network
syncthing_port: 8384 syncthing_port: 8384
syncthing_hostname: syncthing syncthing_hostname: syncthing
# specs
syncthing_memory: 1g

View file

@ -14,6 +14,7 @@
network_mode: host network_mode: host
volumes: "{{ syncthing_volumes }}" volumes: "{{ syncthing_volumes }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ syncthing_memory }}"
labels: labels:
traefik.enable: "{{ syncthing_available_externally }}" traefik.enable: "{{ syncthing_available_externally }}"
traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -27,3 +27,6 @@ traefik_environment_variables:
# the "{{ docker_home }}/traefik" after changing this setting. # the "{{ docker_home }}/traefik" after changing this setting.
# traefik_acme_server: "https://acme-staging-v02.api.letsencrypt.org/directory" # staging # traefik_acme_server: "https://acme-staging-v02.api.letsencrypt.org/directory" # staging
traefik_acme_server: "https://acme-v02.api.letsencrypt.org/directory" # production traefik_acme_server: "https://acme-v02.api.letsencrypt.org/directory" # production
# specs
traefik_memory: 1g

View file

@ -25,5 +25,5 @@
- "/var/run/docker.sock:/var/run/docker.sock:ro" - "/var/run/docker.sock:/var/run/docker.sock:ro"
env: "{{ traefik_environment_variables }}" env: "{{ traefik_environment_variables }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ traefik_memory }}"
recreate: "{{ template_config is changed }}" recreate: "{{ template_config is changed }}"

View file

@ -29,3 +29,6 @@ openvpn_username: leisure-suit-larry
openvpn_password: secretpassword openvpn_password: secretpassword
openvpn_provider: AWESOMEVPNPROVIDER openvpn_provider: AWESOMEVPNPROVIDER
openvpn_config: United-Kingdom openvpn_config: United-Kingdom
# specs
transmission_openvpn_memory: 1g

View file

@ -47,7 +47,7 @@
capabilities: capabilities:
- NET_ADMIN - NET_ADMIN
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ transmission_openvpn_memory }}"
labels: labels:
traefik.enable: "{{ transmission_openvpn_available_externally }}" traefik.enable: "{{ transmission_openvpn_available_externally }}"
traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -17,3 +17,6 @@ transmission_external_port: "51414"
transmission_hostname: "transmission" transmission_hostname: "transmission"
transmission_timezone: "{{ ansible_nas_timezone }}" transmission_timezone: "{{ ansible_nas_timezone }}"
# specs
transmission_memory: 1g

View file

@ -27,7 +27,7 @@
PUID: "{{ transmission_user_id }}" PUID: "{{ transmission_user_id }}"
PGID: "{{ transmission_group_id }}" PGID: "{{ transmission_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ transmission_memory }}"
labels: labels:
traefik.enable: "{{ transmission_available_externally }}" traefik.enable: "{{ transmission_available_externally }}"
traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,3 +15,6 @@ utorrent_group_id: "0"
utorrent_port_http: "8111" utorrent_port_http: "8111"
utorrent_port_bt: "6881" utorrent_port_bt: "6881"
utorrent_hostname: "utorrent" utorrent_hostname: "utorrent"
# specs
utorrent_memory: 1g

View file

@ -29,7 +29,7 @@
dir_active: "/data/.incomplete" dir_active: "/data/.incomplete"
dir_completed: "/data" dir_completed: "/data"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ utorrent_memory }}"
labels: labels:
traefik.enable: "{{ utorrent_available_externally }}" traefik.enable: "{{ utorrent_available_externally }}"
traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)"

View file

@ -15,3 +15,6 @@ watchtower_command: "--schedule '{{ watchtower_cron_schedule }}'"
# Slack notifications # Slack notifications
# watchtower_command: "--schedule '{{ watchtower_cron_schedule }}' --notifications 'slack' --notification-slack-hook-url 'https://hooks.slack.com/services/xxx/yyyyyyyyyyyyyyy' --notification-slack-identifier 'ansible-nas'" # watchtower_command: "--schedule '{{ watchtower_cron_schedule }}' --notifications 'slack' --notification-slack-hook-url 'https://hooks.slack.com/services/xxx/yyyyyyyyyyyyyyy' --notification-slack-identifier 'ansible-nas'"
# specs
memory: "{{ watchtower_memory }}"

View file

@ -10,4 +10,4 @@
TZ: "{{ ansible_nas_timezone }}" TZ: "{{ ansible_nas_timezone }}"
command: "{{ watchtower_command }}" command: "{{ watchtower_command }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: "{{ watchtower_memory }}"