mirror of
https://github.com/davestephens/ansible-nas
synced 2024-12-25 11:03:07 +00:00
Enable configurable memory. Mops up #253
This commit is contained in:
parent
6bf518c9ad
commit
a645bd809f
65 changed files with 128 additions and 33 deletions
|
@ -10,3 +10,6 @@ airsonic_podcasts_directory: "{{ podcasts_root }}"
|
||||||
# network
|
# network
|
||||||
airsonic_port: "4040"
|
airsonic_port: "4040"
|
||||||
airsonic_hostname: "airsonic"
|
airsonic_hostname: "airsonic"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
airsonic_memory: 1g
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
ports:
|
ports:
|
||||||
- "{{ airsonic_port }}:4040"
|
- "{{ airsonic_port }}:4040"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ airsonic_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ airsonic_available_externally }}"
|
traefik.enable: "{{ airsonic_available_externally }}"
|
||||||
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ bazarr_group_id: "0"
|
||||||
# network
|
# network
|
||||||
bazarr_port: "6767"
|
bazarr_port: "6767"
|
||||||
bazarr_hostname: "bazarr"
|
bazarr_hostname: "bazarr"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
bazarr_memory: 1g
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
PUID: "{{ bazarr_user_id }}"
|
PUID: "{{ bazarr_user_id }}"
|
||||||
PGID: "{{ bazarr_group_id }}"
|
PGID: "{{ bazarr_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ bazarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ bazarr_available_externally }}"
|
traefik.enable: "{{ bazarr_available_externally }}"
|
||||||
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,7 @@ bitwarden_admin_token: qwertyuiop1234567890poiuytrewq0987654321
|
||||||
# Once you have created your user, set to "false" and run one more time.
|
# Once you have created your user, set to "false" and run one more time.
|
||||||
# Target just Bitwarden by running: ansible-playbook -i inventory nas.yml -b -K -t bitwarden
|
# Target just Bitwarden by running: ansible-playbook -i inventory nas.yml -b -K -t bitwarden
|
||||||
bitwarden_allow_signups: false
|
bitwarden_allow_signups: false
|
||||||
|
|
||||||
|
# specs
|
||||||
|
bitwarden_memory: 1g
|
||||||
|
bitwarden_backup_memory: 1g
|
||||||
|
|
|
@ -28,6 +28,7 @@
|
||||||
traefik.hub.frontend.rule: "Host:bitwarden.{{ ansible_nas_domain }};Path:/notifications/hub"
|
traefik.hub.frontend.rule: "Host:bitwarden.{{ ansible_nas_domain }};Path:/notifications/hub"
|
||||||
traefik.hub.port: "bitwarden_port_b"
|
traefik.hub.port: "bitwarden_port_b"
|
||||||
traefik.hub.protocol: "ws"
|
traefik.hub.protocol: "ws"
|
||||||
|
memory: "{{ bitwarden_memory }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
|
|
||||||
- name: Bitwarden Backup Container
|
- name: Bitwarden Backup Container
|
||||||
|
@ -37,4 +38,4 @@
|
||||||
pull: true
|
pull: true
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
volumes_from: bitwarden
|
volumes_from: bitwarden
|
||||||
memory: 1g
|
memory: "{{ bitwarden_backup_memory }}"
|
||||||
|
|
|
@ -21,3 +21,6 @@ cloudflare_proxy: false
|
||||||
|
|
||||||
# Set to AAAA to use set IPv6 records instead of IPv4 records.
|
# Set to AAAA to use set IPv6 records instead of IPv4 records.
|
||||||
cloudflare_type: "A"
|
cloudflare_type: "A"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
cloudflare_memory: 512MB
|
||||||
|
|
|
@ -24,5 +24,5 @@
|
||||||
volumes:
|
volumes:
|
||||||
- "{{ cloudflare_data_directory }}/config.yml:/app/config.yaml"
|
- "{{ cloudflare_data_directory }}/config.yml:/app/config.yaml"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 512MB
|
memory: "{{ cloudflare_memory }}"
|
||||||
recreate: "{{ template_files_result is changed }}"
|
recreate: "{{ template_files_result is changed }}"
|
||||||
|
|
|
@ -14,3 +14,6 @@ couchpotato_group_id: "0"
|
||||||
|
|
||||||
# network
|
# network
|
||||||
couchpotato_port: "5050"
|
couchpotato_port: "5050"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
couchpotato_memory: 1g
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
PUID: "{{ couchpotato_user_id }}"
|
PUID: "{{ couchpotato_user_id }}"
|
||||||
PGID: "{{ couchpotato_group_id }}"
|
PGID: "{{ couchpotato_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ couchpotato_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ couchpotato_available_externally }}"
|
traefik.enable: "{{ couchpotato_available_externally }}"
|
||||||
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -19,3 +19,6 @@ deluge_port: "8112"
|
||||||
deluge_hostname: "deluge"
|
deluge_hostname: "deluge"
|
||||||
|
|
||||||
deluge_timezone: "{{ ansible_nas_timezone }}"
|
deluge_timezone: "{{ ansible_nas_timezone }}"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
deluge_memory: 1g
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
PUID: "{{ deluge_user_id }}"
|
PUID: "{{ deluge_user_id }}"
|
||||||
PGID: "{{ deluge_group_id }}"
|
PGID: "{{ deluge_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ deluge_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ deluge_available_externally }}"
|
traefik.enable: "{{ deluge_available_externally }}"
|
||||||
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,3 +15,5 @@ duplicati_group_id: "0"
|
||||||
# network
|
# network
|
||||||
duplicati_port: "8200"
|
duplicati_port: "8200"
|
||||||
duplicati_hostname: "duplicati"
|
duplicati_hostname: "duplicati"
|
||||||
|
|
||||||
|
duplicati_memory: 1g
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
PUID: "{{ duplicati_user_id }}"
|
PUID: "{{ duplicati_user_id }}"
|
||||||
PGID: "{{ duplicati_group_id }}"
|
PGID: "{{ duplicati_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ duplicati_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ duplicati_available_externally }}"
|
traefik.enable: "{{ duplicati_available_externally }}"
|
||||||
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -21,3 +21,6 @@ emby_group_id: "0"
|
||||||
emby_port_http: "8096"
|
emby_port_http: "8096"
|
||||||
emby_port_https: "8920"
|
emby_port_https: "8920"
|
||||||
emby_hostname: "emby"
|
emby_hostname: "emby"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
emby_memory: 1g
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
PUID: "{{ emby_user_id }}"
|
PUID: "{{ emby_user_id }}"
|
||||||
PGID: "{{ emby_group_id }}"
|
PGID: "{{ emby_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ emby_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ emby_available_externally }}"
|
traefik.enable: "{{ emby_available_externally }}"
|
||||||
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -12,3 +12,4 @@ firefly_port: "8066"
|
||||||
|
|
||||||
# specs
|
# specs
|
||||||
firefly_memory: "1g"
|
firefly_memory: "1g"
|
||||||
|
firefly_mysql_memory: "1g"
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
MYSQL_PASSWORD: "firefly"
|
MYSQL_PASSWORD: "firefly"
|
||||||
MYSQL_ROOT_PASSWORD: "firefly"
|
MYSQL_ROOT_PASSWORD: "firefly"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ firefly_mysql_memory }}"
|
||||||
|
|
||||||
- name: Wait for MySQL to init
|
- name: Wait for MySQL to init
|
||||||
pause:
|
pause:
|
||||||
|
|
|
@ -9,3 +9,7 @@ gitea_data_directory: "{{ docker_home }}/gitea"
|
||||||
gitea_hostname: "gitea"
|
gitea_hostname: "gitea"
|
||||||
gitea_port_http: "3001"
|
gitea_port_http: "3001"
|
||||||
gitea_port_ssh: "222"
|
gitea_port_ssh: "222"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
gitea_memory: 1g
|
||||||
|
gitea_mysql_memory: 1g
|
||||||
|
|
|
@ -39,7 +39,7 @@
|
||||||
MYSQL_PASSWORD: "gitea"
|
MYSQL_PASSWORD: "gitea"
|
||||||
MYSQL_ROOT_PASSWORD: "gitea"
|
MYSQL_ROOT_PASSWORD: "gitea"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ gitea_mysql_memory }}"
|
||||||
|
|
||||||
- name: Create Gitea container
|
- name: Create Gitea container
|
||||||
docker_container:
|
docker_container:
|
||||||
|
@ -66,7 +66,7 @@
|
||||||
USER_UID: "1309"
|
USER_UID: "1309"
|
||||||
USER_GID: "1309"
|
USER_GID: "1309"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ gitea_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ gitea_available_externally }}"
|
traefik.enable: "{{ gitea_available_externally }}"
|
||||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -7,3 +7,6 @@ glances_available_externally: "false"
|
||||||
glances_hostname: "glances"
|
glances_hostname: "glances"
|
||||||
glances_port_one: "61208"
|
glances_port_one: "61208"
|
||||||
glances_port_two: "61209"
|
glances_port_two: "61209"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
glances_memory: 1g
|
||||||
|
|
|
@ -14,6 +14,7 @@
|
||||||
env:
|
env:
|
||||||
GLANCES_OPT: "-w"
|
GLANCES_OPT: "-w"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
|
memory: "{{ glances_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ glances_available_externally }}"
|
traefik.enable: "{{ glances_available_externally }}"
|
||||||
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,3 +15,6 @@ gotify_hostname: "gotify"
|
||||||
# user to run container with
|
# user to run container with
|
||||||
gotify_user_id: "0"
|
gotify_user_id: "0"
|
||||||
gotify_group_id: "0"
|
gotify_group_id: "0"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
gotify_memory: 200m
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
PUID: "{{ gotify_user_id }}"
|
PUID: "{{ gotify_user_id }}"
|
||||||
PGID: "{{ gotify_group_id }}"
|
PGID: "{{ gotify_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 200m
|
memory: "{{ gotify_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ gotify_available_externally }}"
|
traefik.enable: "{{ gotify_available_externally }}"
|
||||||
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ heimdall_hostname: heimdall
|
||||||
# uid / gid
|
# uid / gid
|
||||||
heimdall_user_id: "1310"
|
heimdall_user_id: "1310"
|
||||||
heimdall_group_id: "1310"
|
heimdall_group_id: "1310"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
heimdall_memory: 1g
|
||||||
|
|
|
@ -39,7 +39,7 @@
|
||||||
- "{{ heimdall_port_http }}:80"
|
- "{{ heimdall_port_http }}:80"
|
||||||
- "{{ heimdall_port_https }}:443"
|
- "{{ heimdall_port_https }}:443"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ heimdall_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ heimdall_available_externally }}"
|
traefik.enable: "{{ heimdall_available_externally }}"
|
||||||
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -8,3 +8,6 @@ homeassistant_data_directory: "{{ docker_home }}/homeassistant"
|
||||||
# network
|
# network
|
||||||
homeassistant_port: "8123"
|
homeassistant_port: "8123"
|
||||||
homeassistant_hostname: "homeassistant"
|
homeassistant_hostname: "homeassistant"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
homeassistant_memory: 1g
|
||||||
|
|
|
@ -24,4 +24,4 @@
|
||||||
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
traefik.http.routers.homeassistant.tls.domains[0].sans: "*.{{ ansible_nas_domain }}"
|
traefik.http.routers.homeassistant.tls.domains[0].sans: "*.{{ ansible_nas_domain }}"
|
||||||
traefik.http.services.homeassistant.loadbalancer.server.port: "8123"
|
traefik.http.services.homeassistant.loadbalancer.server.port: "8123"
|
||||||
memory: 1g
|
memory: "{{ homeassistant_memory }}"
|
||||||
|
|
|
@ -19,6 +19,7 @@
|
||||||
env:
|
env:
|
||||||
TZ: "{{ ansible_nas_timezone }}"
|
TZ: "{{ ansible_nas_timezone }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
|
memory: "{{ jackett_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ jackett_available_externally }}"
|
traefik.enable: "{{ jackett_available_externally }}"
|
||||||
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ lidarr_group_id: "0"
|
||||||
# network
|
# network
|
||||||
lidarr_port: "8686"
|
lidarr_port: "8686"
|
||||||
lidarr_hostname: "lidarr"
|
lidarr_hostname: "lidarr"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
lidarr_memory: 1g
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
PUID: "{{ lidarr_user_id }}"
|
PUID: "{{ lidarr_user_id }}"
|
||||||
PGID: "{{ lidarr_group_id }}"
|
PGID: "{{ lidarr_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ lidarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ lidarr_available_externally }}"
|
traefik.enable: "{{ lidarr_available_externally }}"
|
||||||
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -17,3 +17,4 @@ miniflux_port: "8070"
|
||||||
|
|
||||||
# specs
|
# specs
|
||||||
miniflux_memory: "1g"
|
miniflux_memory: "1g"
|
||||||
|
miniflux_postgres_memory: "1g"
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
POSTGRES_USER: "miniflux"
|
POSTGRES_USER: "miniflux"
|
||||||
POSTGRES_PASSWORD: "supersecure"
|
POSTGRES_PASSWORD: "supersecure"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ miniflux_postgres_memory }}"
|
||||||
|
|
||||||
- name: Create Miniflux Docker Container
|
- name: Create Miniflux Docker Container
|
||||||
docker_container:
|
docker_container:
|
||||||
|
|
|
@ -13,3 +13,6 @@ n8n_data_directory: "{{ docker_home }}/n8n"
|
||||||
# Security
|
# Security
|
||||||
n8n_basic_auth_user: "n8n_user"
|
n8n_basic_auth_user: "n8n_user"
|
||||||
n8n_basic_auth_password: "n8n_change_me"
|
n8n_basic_auth_password: "n8n_change_me"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
n8n_memory: 1g
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
- "{{ n8n_data_directory }}:/home/node/.n8n:rw"
|
- "{{ n8n_data_directory }}:/home/node/.n8n:rw"
|
||||||
- "/etc/timezone:/etc/timezone:ro"
|
- "/etc/timezone:/etc/timezone:ro"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ n8n_memory }}"
|
||||||
env:
|
env:
|
||||||
N8N_BASIC_AUTH_ACTIVE: "true"
|
N8N_BASIC_AUTH_ACTIVE: "true"
|
||||||
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
|
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
|
||||||
|
|
|
@ -5,3 +5,6 @@ netdata_available_externally: "false"
|
||||||
# network
|
# network
|
||||||
netdata_hostname: "netdata"
|
netdata_hostname: "netdata"
|
||||||
netdata_port: "19999"
|
netdata_port: "19999"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
netdata_memory: 1g
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
security_opts:
|
security_opts:
|
||||||
- apparmor:unconfined
|
- apparmor:unconfined
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ netdata_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ netdata_available_externally }}"
|
traefik.enable: "{{ netdata_available_externally }}"
|
||||||
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -13,3 +13,7 @@ nextcloud_hostname: "nextcloud"
|
||||||
nextcloud_sql_user: "nextcloud-user"
|
nextcloud_sql_user: "nextcloud-user"
|
||||||
nextcloud_sql_password: "nextcloud-pass"
|
nextcloud_sql_password: "nextcloud-pass"
|
||||||
nextcloud_sql_root_password: "nextcloud-secret"
|
nextcloud_sql_root_password: "nextcloud-secret"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
nextcloud_memory: 1g
|
||||||
|
nextcloud_mysql_memory: 1g
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
|
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
|
||||||
MYSQL_ROOT_PASSWORD: "{{ nextcloud_sql_root_password }}"
|
MYSQL_ROOT_PASSWORD: "{{ nextcloud_sql_root_password }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ nextcloud_mysql_memory }}"
|
||||||
|
|
||||||
- name: Nextcloud Docker Container
|
- name: Nextcloud Docker Container
|
||||||
docker_container:
|
docker_container:
|
||||||
|
@ -40,7 +40,7 @@
|
||||||
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
|
MYSQL_PASSWORD: "{{ nextcloud_sql_password }}"
|
||||||
NEXTCLOUD_TRUSTED_DOMAINS: "{{ nextcloud_hostname }}.{{ ansible_nas_domain }}"
|
NEXTCLOUD_TRUSTED_DOMAINS: "{{ nextcloud_hostname }}.{{ ansible_nas_domain }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ nextcloud_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ nextcloud_available_externally }}"
|
traefik.enable: "{{ nextcloud_available_externally }}"
|
||||||
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,4 +15,4 @@ nzbget_port: "6789"
|
||||||
nzbget_hostname: "nzbget"
|
nzbget_hostname: "nzbget"
|
||||||
|
|
||||||
# specs
|
# specs
|
||||||
nzbget_app_memory: "1g"
|
nzbget_memory: "1g"
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
PUID: "{{ nzbget_user_id }}"
|
PUID: "{{ nzbget_user_id }}"
|
||||||
PGID: "{{ nzbget_group_id }}"
|
PGID: "{{ nzbget_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ nzbget_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ nzbget_available_externally }}"
|
traefik.enable: "{{ nzbget_available_externally }}"
|
||||||
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -12,3 +12,6 @@ ombi_hostname: "ombi"
|
||||||
# uid / gid
|
# uid / gid
|
||||||
ombi_user_id: "0"
|
ombi_user_id: "0"
|
||||||
ombi_group_id: "0"
|
ombi_group_id: "0"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
ombi_memory: 1g
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
PUID: "{{ ombi_user_id }}"
|
PUID: "{{ ombi_user_id }}"
|
||||||
PGID: "{{ ombi_group_id }}"
|
PGID: "{{ ombi_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ ombi_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ ombi_available_externally }}"
|
traefik.enable: "{{ ombi_available_externally }}"
|
||||||
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -13,3 +13,6 @@ organizr_hostname: "organizr"
|
||||||
# uid / gid
|
# uid / gid
|
||||||
organizr_user_id: "1000"
|
organizr_user_id: "1000"
|
||||||
organizr_group_id: "1000"
|
organizr_group_id: "1000"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
organizr_memory: 1g
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
- "{{ organizr_port_http }}:80"
|
- "{{ organizr_port_http }}:80"
|
||||||
- "{{ organizr_port_https }}:443"
|
- "{{ organizr_port_https }}:443"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ organizr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ organizr_available_externally }}"
|
traefik.enable: "{{ organizr_available_externally }}"
|
||||||
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -8,3 +8,6 @@ portainer_data_directory: "{{ docker_home }}/portainer/config"
|
||||||
# network
|
# network
|
||||||
portainer_port: "9000"
|
portainer_port: "9000"
|
||||||
portainer_hostname: "portainer"
|
portainer_hostname: "portainer"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
portainer_memory: 1g
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
ports:
|
ports:
|
||||||
- "{{ portainer_port }}:9000"
|
- "{{ portainer_port }}:9000"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ portainer_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ portainer_available_externally }}"
|
traefik.enable: "{{ portainer_available_externally }}"
|
||||||
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ radarr_group_id: "0"
|
||||||
# network
|
# network
|
||||||
radarr_port: "7878"
|
radarr_port: "7878"
|
||||||
radarr_hostname: "radarr"
|
radarr_hostname: "radarr"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
pyload_memory: 1g
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
PUID: "{{ radarr_user_id }}"
|
PUID: "{{ radarr_user_id }}"
|
||||||
PGID: "{{ radarr_group_id }}"
|
PGID: "{{ radarr_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ pyload_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ radarr_available_externally }}"
|
traefik.enable: "{{ radarr_available_externally }}"
|
||||||
traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ sickchill_group_id: "0"
|
||||||
# network
|
# network
|
||||||
sickchill_port: "8081"
|
sickchill_port: "8081"
|
||||||
sickchill_hostname: "sickchill"
|
sickchill_hostname: "sickchill"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
sickchill_memory: 1g
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
PUID: "{{ sickchill_user_id }}"
|
PUID: "{{ sickchill_user_id }}"
|
||||||
PGID: "{{ sickchill_group_id }}"
|
PGID: "{{ sickchill_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ sickchill_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ sickchill_available_externally }}"
|
traefik.enable: "{{ sickchill_available_externally }}"
|
||||||
traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -14,3 +14,6 @@ sonarr_group_id: "0"
|
||||||
# network
|
# network
|
||||||
sonarr_port: "8989"
|
sonarr_port: "8989"
|
||||||
sonarr_hostname: "sonarr"
|
sonarr_hostname: "sonarr"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
sonarr_memory: 1g
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
PUID: "{{ sonarr_user_id }}"
|
PUID: "{{ sonarr_user_id }}"
|
||||||
PGID: "{{ sonarr_group_id }}"
|
PGID: "{{ sonarr_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ sonarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ sonarr_available_externally }}"
|
traefik.enable: "{{ sonarr_available_externally }}"
|
||||||
traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,3 +15,6 @@ syncthing_volumes:
|
||||||
# network
|
# network
|
||||||
syncthing_port: 8384
|
syncthing_port: 8384
|
||||||
syncthing_hostname: syncthing
|
syncthing_hostname: syncthing
|
||||||
|
|
||||||
|
# specs
|
||||||
|
syncthing_memory: 1g
|
||||||
|
|
|
@ -14,6 +14,7 @@
|
||||||
network_mode: host
|
network_mode: host
|
||||||
volumes: "{{ syncthing_volumes }}"
|
volumes: "{{ syncthing_volumes }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
|
memory: "{{ syncthing_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ syncthing_available_externally }}"
|
traefik.enable: "{{ syncthing_available_externally }}"
|
||||||
traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -27,3 +27,6 @@ traefik_environment_variables:
|
||||||
# the "{{ docker_home }}/traefik" after changing this setting.
|
# the "{{ docker_home }}/traefik" after changing this setting.
|
||||||
# traefik_acme_server: "https://acme-staging-v02.api.letsencrypt.org/directory" # staging
|
# traefik_acme_server: "https://acme-staging-v02.api.letsencrypt.org/directory" # staging
|
||||||
traefik_acme_server: "https://acme-v02.api.letsencrypt.org/directory" # production
|
traefik_acme_server: "https://acme-v02.api.letsencrypt.org/directory" # production
|
||||||
|
|
||||||
|
# specs
|
||||||
|
traefik_memory: 1g
|
||||||
|
|
|
@ -25,5 +25,5 @@
|
||||||
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
env: "{{ traefik_environment_variables }}"
|
env: "{{ traefik_environment_variables }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ traefik_memory }}"
|
||||||
recreate: "{{ template_config is changed }}"
|
recreate: "{{ template_config is changed }}"
|
||||||
|
|
|
@ -29,3 +29,6 @@ openvpn_username: leisure-suit-larry
|
||||||
openvpn_password: secretpassword
|
openvpn_password: secretpassword
|
||||||
openvpn_provider: AWESOMEVPNPROVIDER
|
openvpn_provider: AWESOMEVPNPROVIDER
|
||||||
openvpn_config: United-Kingdom
|
openvpn_config: United-Kingdom
|
||||||
|
|
||||||
|
# specs
|
||||||
|
transmission_openvpn_memory: 1g
|
||||||
|
|
|
@ -47,7 +47,7 @@
|
||||||
capabilities:
|
capabilities:
|
||||||
- NET_ADMIN
|
- NET_ADMIN
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ transmission_openvpn_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ transmission_openvpn_available_externally }}"
|
traefik.enable: "{{ transmission_openvpn_available_externally }}"
|
||||||
traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -17,3 +17,6 @@ transmission_external_port: "51414"
|
||||||
transmission_hostname: "transmission"
|
transmission_hostname: "transmission"
|
||||||
|
|
||||||
transmission_timezone: "{{ ansible_nas_timezone }}"
|
transmission_timezone: "{{ ansible_nas_timezone }}"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
transmission_memory: 1g
|
||||||
|
|
|
@ -27,7 +27,7 @@
|
||||||
PUID: "{{ transmission_user_id }}"
|
PUID: "{{ transmission_user_id }}"
|
||||||
PGID: "{{ transmission_group_id }}"
|
PGID: "{{ transmission_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ transmission_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ transmission_available_externally }}"
|
traefik.enable: "{{ transmission_available_externally }}"
|
||||||
traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,3 +15,6 @@ utorrent_group_id: "0"
|
||||||
utorrent_port_http: "8111"
|
utorrent_port_http: "8111"
|
||||||
utorrent_port_bt: "6881"
|
utorrent_port_bt: "6881"
|
||||||
utorrent_hostname: "utorrent"
|
utorrent_hostname: "utorrent"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
utorrent_memory: 1g
|
||||||
|
|
|
@ -29,7 +29,7 @@
|
||||||
dir_active: "/data/.incomplete"
|
dir_active: "/data/.incomplete"
|
||||||
dir_completed: "/data"
|
dir_completed: "/data"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ utorrent_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ utorrent_available_externally }}"
|
traefik.enable: "{{ utorrent_available_externally }}"
|
||||||
traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
|
|
|
@ -15,3 +15,6 @@ watchtower_command: "--schedule '{{ watchtower_cron_schedule }}'"
|
||||||
|
|
||||||
# Slack notifications
|
# Slack notifications
|
||||||
# watchtower_command: "--schedule '{{ watchtower_cron_schedule }}' --notifications 'slack' --notification-slack-hook-url 'https://hooks.slack.com/services/xxx/yyyyyyyyyyyyyyy' --notification-slack-identifier 'ansible-nas'"
|
# watchtower_command: "--schedule '{{ watchtower_cron_schedule }}' --notifications 'slack' --notification-slack-hook-url 'https://hooks.slack.com/services/xxx/yyyyyyyyyyyyyyy' --notification-slack-identifier 'ansible-nas'"
|
||||||
|
|
||||||
|
# specs
|
||||||
|
memory: "{{ watchtower_memory }}"
|
||||||
|
|
|
@ -10,4 +10,4 @@
|
||||||
TZ: "{{ ansible_nas_timezone }}"
|
TZ: "{{ ansible_nas_timezone }}"
|
||||||
command: "{{ watchtower_command }}"
|
command: "{{ watchtower_command }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: "{{ watchtower_memory }}"
|
||||||
|
|
Loading…
Reference in a new issue