Done with arr stack (for now)

This commit is contained in:
pazpi 2024-10-07 22:02:52 +02:00
parent 89ededb7f0
commit abfd06a50d
3 changed files with 55 additions and 21 deletions

View file

@ -8,12 +8,6 @@
my = { my = {
utils.commons.enable = true; utils.commons.enable = true;
networking.tailscale = {
enable = false;
exitNode = "vps.neon-dory.ts.net";
# authKeyFile = builtins.toFile "authKey" ''${parameters.tailscaleAuthKey}'';
};
services.media-mgr = { services.media-mgr = {
programs.enable = true; programs.enable = true;
}; };

View file

@ -18,21 +18,12 @@ in
services.media-mgr = { services.media-mgr = {
exportMetrics.enable = true; exportMetrics.enable = true;
# proxy = {
# enable = true;
# domain = "tegola.pro";
# host = "arr.internal";
# };
}; };
monitoring = { monitoring = {
prometheus = { grafana.enable = true;
enable = true; prometheus.enable = true;
# proxy = { loki.enable = true;
# domain = "tegola.pro";
# host = "metrics.internal";
# };
};
}; };
networking = { networking = {
@ -42,7 +33,6 @@ in
authKeyFile = config.age.secrets.tailscale-authKey.path; authKeyFile = config.age.secrets.tailscale-authKey.path;
}; };
# caddy.enable = true;
}; };
virtualisation = { virtualisation = {
@ -81,7 +71,5 @@ in
}; };
}; };
# networking.nameservers = [ "192.168.1.2" ];
system.stateVersion = "24.05"; system.stateVersion = "24.05";
} }

View file

@ -103,6 +103,19 @@ in
openFirewall = true; openFirewall = true;
}; };
# Subtitles
bazarr = {
enable = true;
openFirewall = true;
};
# Request management and media discovery tool for the Plex ecosystem
jellyseerr = {
enable = true;
port = 5055;
openFirewall = true;
};
}; };
my.virtualisation.podmanPods = { my.virtualisation.podmanPods = {
@ -140,6 +153,14 @@ in
reverse_proxy http://${host}:8787 reverse_proxy http://${host}:8787
import cloudflare import cloudflare
''; '';
virtualHosts."bazarr.${domain}".extraConfig = ''
reverse_proxy http://${host}:6767
import cloudflare
'';
virtualHosts."jellyseerr.${domain}".extraConfig = ''
reverse_proxy http://${host}:5055
import cloudflare
'';
}; };
}) })
@ -192,6 +213,29 @@ in
mode = "770"; mode = "770";
}; };
}; };
age.secrets = {
bazarr-apiKey = {
file = ../../secrets/bazarr-apiKey.age;
owner = "exportarr";
group = "exportarr";
mode = "770";
};
};
systemd.services = {
prometheus-exportarr-prowlarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.prowlarr-apiKey.path;
prometheus-exportarr-radarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.radarr-apiKey.path;
prometheus-exportarr-sonarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.sonarr-apiKey.path;
prometheus-exportarr-lidarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.lidarr-apiKey.path;
prometheus-exportarr-readarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.readarr-apiKey.path;
prometheus-exportarr-bazarr-exporter.serviceConfig.EnvironmentFile =
config.age.secrets.bazarr-apiKey.path;
};
services.prometheus.exporters = { services.prometheus.exporters = {
exportarr-prowlarr = { exportarr-prowlarr = {
@ -234,6 +278,14 @@ in
group = "exportarr"; group = "exportarr";
apiKeyFile = config.age.secrets.readarr-apiKey.path; apiKeyFile = config.age.secrets.readarr-apiKey.path;
}; };
exportarr-bazarr = {
enable = true;
url = "http://arr.internal:6767";
port = 9706;
user = "exportarr";
group = "exportarr";
apiKeyFile = config.age.secrets.bazarr-apiKey.path;
};
}; };
}) })