Skip to main content

Changelog

Changelog

5.0.0 (2025-12-30)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v4.1.0...v5.0.0

4.1.0 (2025-12-28)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v4.0.0...v4.1.0

4.0.0 (2025-12-17)

What's Changed

Add enable_lb feature flag to control load balancer deployment. This prevents tofu plan from prompting for lb-related variables when load balancer is not needed.

Changes:

  • Add enable_lb variable (defaults to false)
  • Make lb_nodes, auth_pass, and lb_store optional with sensible defaults
  • Use count in lb module to conditionally deploy based on enable_lb flag

To enable load balancer deployment, set enable_lb = true in your .tfvars file.

🤖 Generated with Claude Code

Co-Authored-By: Claude <[email protected]> by @theepicsaxguy in https://github.com/theepicsaxguy/homelab/pull/1794

Add cpu_units configuration with default value of 1024 to prevent Proxmox from changing CPU units to 100 during VM updates. This ensures consistent CPU scheduling across control plane and worker nodes.

Changes:

  • Add cpu_units field to defaults_worker and defaults_controlplane with default 1024
  • Add cpu_units to nodes_config variable type for per-node override capability
  • Update virtual-machines.tf cpu block to use cpu_units with fallback to 1024

🤖 Generated with Claude Code

Co-Authored-By: Claude <[email protected]> by @theepicsaxguy in https://github.com/theepicsaxguy/homelab/pull/1795

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.10.0...v4.0.0

3.10.0 (2025-11-20)

What's Changed

New Contributors

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.9.0...v3.10.0

3.9.0 (2025-10-21)

What's Changed

New Contributors

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.8.0...v3.9.0

3.8.0 (2025-09-15)

What's Changed

New Contributors

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.7.0...v3.8.0

3.7.0 (2025-08-08)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.6.0...v3.7.0

3.6.0 (2025-07-30)

What's Changed

  • Introduced db-secrets.yaml for database credentials
  • Updated externalsecret.yaml to use new naming convention
  • Added secretstore.yaml for external secrets management
  • Created serviceaccount.yaml for RBAC permissions
  • Modified statefulset.yaml to reference new secrets by @theepicsaxguy in https://github.com/theepicsaxguy/homelab/pull/1227

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.5.0...v3.6.0

3.5.0 (2025-07-13)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.4.0...v3.5.0

3.4.0 (2025-06-30)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.3.0...v3.4.0

3.3.0 (2025-06-24)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.2.0...v3.3.0

3.2.0 (2025-06-19)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.1.0...v3.2.0

3.1.0 (2025-06-15)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.0.0...v3.1.0

3.0.0 (2025-06-14)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.10.0...v3.0.0

2.10.0 (2025-06-12)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.9.0...v2.10.0

2.9.0 (2025-06-11)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.8.0...v2.9.0

2.8.0 (2025-06-09)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.7.0...v2.8.0

2.7.0 (2025-06-04)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.3...v2.7.0

2.6.3 (2025-05-31)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.2...v2.6.3

2.6.2 (2025-05-30)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.1...v2.6.2

2.6.1 (2025-05-28)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.0...v2.6.1

2.6.0 (2025-05-22)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.5.0...v2.6.0

2.5.0 (2025-05-13)

Features

  • k8s: add whisperasr deployment and service configuration (#616) (bafe4a9)
  • k8s: update frigate HTTPRoute and add Authentik Outpost configuration (#623) (81de4f2)
  • website: enhance homepage with new sections and styling (#643) (56bbe20)

Bug Fixes

  • k8s: correct HTTPRoute name and backend reference for frigate (#625) (1ad965c)
  • k8s: update OIDC issuer URL for authentik configuration (#612) (db644ee)

2.4.0 (2025-05-05)

Features

  • k8s: add automation and MQTT configurations (#587) (7ad437e)
  • k8s: add HTTPRoute for argocd webhook (#579) (1e29074)

Bug Fixes

  • k8s: add missing DNS entry for cilium-gateway-external (#578) (29562ff)
  • k8s: increase memory limit for controller to 2Gi (#577) (95ab6ef)
  • k8s: update argocd webhook hostname in cloudflared config (#581) (258fd82)
  • k8s: update cert-manager CRD version in kustomization.yaml (#575) (8126055)
  • k8s: update kubechecks role permissions in values.yaml (#580) (3bf02bb)

2.3.0 (2025-05-03)

Features

  • k8s: add Bazarr deployment and service configuration (#552) (6d3315e)
  • k8s: add configMapGenerator for AdGuard configuration (#567) (8c4e733)
  • k8s: add Omada controller deployment and related resources (#565) (857e81c)
  • k8s: enhance rollout configuration with health checks and analysis (#561) (8f889e1)
  • k8s: implement blue-green deployment strategy for applications (#571) (527f372)
  • k8s: update AdGuard deployment with persistent volume claim (#560) (7a9b432)
  • k8s: update Bazarr deployment to use new configMap reference (#554) (58af7ab)
  • k8s: update resource requests and limits for open-webui deployment (#572) (c45a067)
  • networking: implement AdGuard deployment with init containers (#566) (bc715c1)

Bug Fixes

  • k8s: update Bazarr security context to allow read-write filesystem (#556) (2eed9d9)

2.2.0 (2025-05-01)

Features

  • k8s: add deployment, service, and external secret for pedro-bot (#498) (b394df2)
  • k8s: add HTTPS route for omada service (#502) (9675e13)
  • k8s: add karakeep application resources (#515) (5d3d62f)
  • k8s: add omada certificate and update references (#505) (25752ad)
  • k8s: add sabnzbd deployment and associated resources (#547) (d7c3e64)
  • k8s: implement TLS passthrough and certificate management for omada (#546) (77f342e)
  • k8s: update jellyseerr service configuration (#517) (929626e)
  • networking: add HTTPRoute and Namespace for omada service (#480) (0ec0f84)
  • networking: add TLS route and certificate for omada (#499) (cfeed5b)

Bug Fixes

  • k8s: update jellyfin hostname and timezone configuration (#516) (ce5888f)
  • k8s: update jellyseerr and omada configurations for port changes (#533) (1e5f43b)
  • k8s: update jellyseerr service port and remove unused PVC (#532) (b0fb271)
  • k8s: update meilisearch deployment init container and security context (#527) (af500f6)

Performance Improvements

  • k8s: increase CPU resource requests and limits for open-webui (#528) (95acdfa)
  • k8s: increase resource limits for omada-controller deployment (#545) (287ffc2)

2.1.0 (2025-04-17)

Features

  • k8s: add external application management resources (#377) (a77461a)
  • k8s: add HTTPRoute for hoarder-web and remove Ingress sample (#380) (e1416fb)

2.0.0 (2025-04-13)

⚠ BREAKING CHANGES

  • network-policy: Changed API responses from 'hostname' to 'dnsNames' in the gateway specification.

Features

  • k8s: add Hoarder application deployment and configuration (#307) (0cf58a4)
  • k8s: add HTTPRoute configuration for it-tools (#358) (1e90d98)
  • k8s: add HTTPRoute configurations for Argo Rollouts and Longhorn (#352) (57cbe3c)
  • k8s: add KUBECHECKS_ARGOCD_API_INSECURE environment variable (#351) (7a3e130)
  • k8s: add monitoring stack with Prometheus and Grafana (#313) (2a75469)
  • k8s: implement kubechecks deployment with external secrets (#356) (550dd90)
  • k8s: update HTTPRoute hostnames and kustomization configurations (#348) (32e089b)
  • tofu: add extra mounts and kernel modules to machine config (#310) (66425f3)

Code Refactoring

1.17.0 (2025-03-23)

Features

  • cert-manager: add Bitwarden issuer and certificate configurations (#301) (12e6d26)
  • external-secrets: add ClusterRole and ClusterRoleBinding for clusterpushsecret (#290) (910c14f)
  • k8s: add Cilium network policies for cert-manager and external-secrets (#264) (2083501)
  • k8s: add CoreDNS deployment and update configurations (#253) (622d4ee)
  • k8s: add namespaces for various components (#238) (9ba98e0)
  • k8s: allowlist specific namespaces for resource management (#225) (b80662f)
  • k8s: change ArgoCD service type to LoadBalancer (#242) (3082725)
  • k8s: enhance ArgoCD and cert-manager network policies (#303) (736c5c1)
  • k8s: enhance namespace management and add webhook policies (#232) (72cbdea)
  • k8s: enhance namespace management with dynamic allowlist updates (#224) (c0e4ce9)
  • k8s: enhance network policies and configurations for ArgoCD and Open WebUI (#262) (9301f98)
  • k8s: implement ArgoCD network policy and update configurations (#237) (bcb48f4)
  • k8s: implement dynamic resource scaling for improved efficiency (#227) (f10a63a)
  • k8s: introduce service accounts and services for cert-manager (#265) (d99bba0)
  • k8s: reorganize application configurations and add new resources (#222) (ddd6148)
  • k8s: update ArgoCD and Cilium configurations (#239) (d2795a0)
  • k8s: update Bitwarden configurations for external secrets (#302) (1d4d464)
  • k8s: update CoreDNS values.yaml configuration (#257) (0c461cd)
  • k8s: update kustomization files to include additional resources (#226) (cc50dd2)
  • networking: update CoreDNS configuration and add service definition (#298) (7c1df8c)
  • tofu: update Talos configuration for Kubernetes version 1.32.0 (#292) (e9900f1)

Bug Fixes

  • networking: update Cilium network policy for ArgoCD and remove Authelia configurations (#291) (1614f12)

1.16.0 (2025-03-09)

Features

  • k8s: add ApplicationSet and kubechecks for cluster management (#208) (2004ae4)
  • k8s: add kustomization for external secrets management (#183) (723533e)
  • k8s: add new namespaces and configuration files (#212) (eb7de23)
  • k8s: implement dynamic namespace management in ArgoCD (#220) (e9c0df8)
  • k8s: integrate Bitwarden Secrets Manager with External Secrets Operator (#193) (364105b)
  • k8s: modularize Kustomize overlays and enhance namespace management (#216) (c8a28d3)

1.15.0 (2025-03-04)

Features

  • k8s: add sm-operator network policy and update RBAC rules (#173) (a5ea082)
  • k8s: enhance Cilium configuration and add DNS policy (#175) (71b5f5b)
  • k8s: enhance Cilium configuration and management (#156) (67cc113)
  • k8s: enhance infrastructure configuration and security policies (#150) (56198ed)
  • k8s: implement sm-operator resources and remove kubechecks (#160) (c46cafa)
  • k8s: implement Unbound DNS configuration with new deployment (#164) (37abf5b)
  • k8s: integrate external secrets management for multiple components (#178) (566fe21)
  • k8s: update AdGuardHome configuration and add new HTTP routes (#143) (7b9c233)
  • security, networking: enhance Cilium security and update Gateway API documentation (#152) (7297ed8)

Bug Fixes

  • k8s: correct DNS configuration and improve deployment security (#163) (4c6987e)
  • k8s: update bootstrap DNS configuration for AdGuardHome (#166) (74a5f87)

1.14.0 (2025-02-26)

Features

  • k8s: update AdGuardHome and gateway configurations (#140) (2ad2e25)

1.13.0 (2025-02-26)

Features

  • k8s: enhance AdGuardHome and Cilium configurations with troubleshooting documentation (#135) (5ded39a)

1.12.0 (2025-02-26)

Features

  • k8s: enhance validation script and ApplicationSet configurations (#131) (ddf1fb7)
  • k8s: integrate and enhance Kubechecks for GitOps workflow (#133) (ad73e6f)

1.11.0 (2025-02-24)

Features

  • k8s: update Kustomization and ApplicationSet configurations (#115) (ba2851d)

1.10.0 (2025-02-23)

Features

  • security: add Bitwarden Secrets Manager bootstrap documentation (#111) (f0bcb07)

1.9.0 (2025-02-23)

Features

  • k8s: enhance infrastructure project configuration with sync windows (#104) (609fd5c)
  • k8s: enhance rollout and analysis configurations for infrastructure (#110) (35301ee)

1.8.0 (2025-02-23)

Features

  • k8s: add Argo Rollouts configuration and resource limits (#102) (d604013)

1.7.1 (2025-02-23)

Bug Fixes

  • k8s: correct allowEmpty syntax in ApplicationSet configurations (#100) (2ff9d0b)

1.7.0 (2025-02-23)

Features

  • k8s: enhance ApplicationSet configuration and add PR preview support (#97) (4662fbd)

1.6.0 (2025-02-22)

Features

  • k8s: enhance secret management with Bitwarden integration (#93) (03365f0)
  • k8s: update Bitwarden API version and enhance project configuration (#94) (39061cb)

Bug Fixes

  • k8s: correct DHCP service name and enhance AdGuard secret management (#91) (3965795)

1.5.0 (2025-02-22)

Features

  • k8s: enhance kustomization and service configurations (#88) (857bb35)

1.4.2 (2025-02-21)

Bug Fixes

1.4.1 (2025-02-21)

Bug Fixes

1.4.0 (2025-02-20)

Features

  • ci: Add workflows to standardize commit messages and pull request titles (#67) (b2f184d)

1.3.0 (2025-02-20)

Features

  • argocd: enable Redis authentication and specify chart version for compatibility (#65) (f447b02)

1.2.0 (2025-02-18)

Features

  • update common labels from dev.pctips to dev.peekoff across k8s configurations (#32) (d73b8a5)

1.1.0 (2025-02-17)

Features

  • add Bitwarden ESO provider configuration and namespace (#29) (82b2ae0)

1.0.0 (2025-02-16)

Features

  • access: Extra admins in the cluster (17a07d4)
  • add Cert-manager (fe368b9)
  • add crossplane.io (76ab7a7)
  • add extra admin user (4dd769f)
  • add Gateway API and Gateways (805ab61)
  • add node-feature-discovery and intel-device-plugins (ac16aed)
  • adguard: mount config-file for declarative configuration (872f33c)
  • app: Adding Deltahouse application (37370e0)
  • applications: Use a single ApplicationSet instead of individual Application manifests (726886c)
  • apps: Added Home Assistant application (98d20d2)
  • apps: Starting to use Terraform and adding applications (c450934)
  • Argo CD: Switch to Helm chart (398b98c)
  • argocd: Add an extra layer of security on ArgoCD interface (a23fe82)
  • argocd: Adding ArgoCD (7a9f9e2)
  • argocd: Copying necessary binaries from main ArgoCD image for use in kustomize-with-helm plugin (8cead34)
  • argocd: Creating AppProjects for ArgoCD (a1a7d5c)
  • argocd: Creating kustomize build with helm plugin (f5da0ac)
  • argocd: Deploying Plex and HAss using ArgoCD (6140fc8)
  • argocd: Letting ArgoCD manage itself (b4c0097)
  • arr: Deploying arr-suite with ArgoCD (24e0284)
  • arr: implement arr stack (bd7ae1f)
  • arr: Use Kustomize Helm charts for the arr-suite (cbbb6d8)
  • auth: add Authelia for OIDC (ba69146)
  • auth: add keycloak for auth (628bdb5)
  • auth: add Keycloak for auth (884fe3b)
  • auth: Added Google auth for remark42 blog comments (606e9fe)
  • auth: Adding traefik-forward-auth (954ff94)
  • auth: Deploying traefik-forward-auth with Helm chart (9d5a579)
  • authelia: add "optional" secrets in config (0c19b80)
  • authelia: add Argo CD client (86395ed)
  • authelia: add ES256 jwk (d077f4b)
  • authelia: add ES256 jwk and use it (6d13790)
  • authelia: add kubectl oidc account (e48986a)
  • authelia: add smtp integration (7a949af)
  • authelia: enable 2FA (9a92b48)
  • authelia: harden oidc clients (d816953)
  • authelia: make cert-manager generate jwks (403d32b)
  • authelia: use a cnpg managed db (ce5fc25)
  • authelia: use ldaps with lldap (a7ea946)
  • auth: enable kubectl oidc auth (2674d91)
  • blog: Adding blog from GitLab (94a2970)
  • blog: Adding Remark42 for blog commenting (e3aa992)
  • cert-manager: Installing and configuring cert-manager (ca44a52)
  • cert-manager: Use Cert-manager Helm Chart instead of static manifest (819a2b9)
  • certs: Configuring certs through Cloudlfare using Cert Manager with Traefik (1b66227)
  • chart: Adding an additionalVolumes value to chart (312e620)
  • cilium: enable maglev loadBalancer (c524a6a)
  • cilium: Installing cilium with ArgoCD (2b840e6)
  • cleanup of remodelling (207b189)
  • cloud-init: Kubeadm cluster (e343d41)
  • cloudflared: Configuring tunnel locally/declaratively instead of ClickOps through Dashboard (e18d379)
  • cloudflare: Enabling Cloudflare TLS (3338fb4)
  • cni: Using Terraform to provide Cilium as a CNI using Helm (18f8d9e)
  • cni: Using Terraform to provide Cilium as a CNI using Helm (f808257)
  • cnpg: configure test-database for external connection (1d0ae6d)
  • config: Config changes after switching to Debian (e3423cd)
  • configure keycloak using crossplane provider (4cb40d3)
  • configure renovate (be08e10)
  • config: Using configMaps instead of env-variables for traefik-forward-auth (8eb09c3)
  • coturn: use plain manifests instead of helm chart (a535a76)
  • crossplane: try to organise crossplane crds (bff7417)
  • cuda: Running a CUDA sample pod (8667f83)
  • dashboard: Deploying and exposing the Kubernetes Dashboard (90e7ddd)
  • dashboard: Deploying k8s dashboard with ArgoCD (4e717aa)
  • database: add cnpg for database management (d3338da)
  • db: Adding Zalando Postgres-operator (7c6d24a)
  • dns: use Unbound and AdGuardHome for DNS (9dec025)
  • env: Fetching common env from a ConfigMap (fd605aa)
  • gateway: Enabled and configured Cilium as a GatewayClass (b066e54)
  • gateway: Switch public sites over to Gateway instead of Traefik IngressRoute (6a3fffb)
  • gpu: Adding Nvidia GPU-Oparator (c7c145d)
  • gpu: Change from nvidia-gpu-operator to nvidia-device-plugin (cac81f3)
  • haos: Proxy HAOS through k8s for certificate (3c33225)
  • hass: Move Home Assistant config to own repo (52a3f87)
  • helm-traefik: Setting up Traefik using Helm-chart (107f1fc)
  • helm: Add labels and annotations to helm chart (ad7ecb8)
  • helm: Introducing Helm Charts for templating (67049f2)
  • helm: Modifying chart template to allow a stand-alone auth deployment (ea712fe)
  • helm: Trying to use a local Helm chart (1c6e0c6)
  • homepage: add homepage and blog (731a16b)
  • homepage: Adding a simple landing page (91c7238)
  • hubble: Enabling and exposing Hubble (d5f5e23)
  • infra: Use a single ApplicationSet instead of multiple Application manifests for infrastructure applications (ad74c53)
  • ingress: Provision Traefik as an ingress controller (c8561e7)
  • init: Initial commit (b277649)
  • install Netbird as a VPN solution (69d56e8)
  • jellyfin: Adding Jellyfin (5886c83)
  • jf: Proxy Jellyfin from Euclid instead of Plex (7d79db7)
  • k8s: multi-node Talos cluster (fbdccd7)
  • kube-proxy: Trying to use cilium's kube-proxy (3f3f1ee)
  • kustomize: Simple implementation of Kustomize for apps (eab8320)
  • lb: Replace MetalLB with Cilium LB IPAM + BGP Control Plane (8d4bb60)
  • ldap: add lldap as ldap server (2a3f017)
  • lgtm: Adding LGTM Helm chart (cabdc65)
  • lidarr: Deploying Lidarr using Helm Chart (f906558)
  • lldap: add a test user (baa30f0)
  • lldap: add cnpg database for persistence (5563a63)
  • lldap: add smtp integration (8da8d82)
  • lldap: bootstrap lldap users with script (ddb7f0f)
  • lldap: create and use own authelia user (c884036)
  • LoadBalancer: Adding MetalLB (5a71638)
  • media: add media players (3edf326)
  • metallb: Installing MetalLB using ArgoCD (d81b83c)
  • monitoring: add http-routes for prometheus and alertmanager (53b332c)
  • monitoring: Configure kube-prometheus-stack (91998ec)
  • monitoring: install kube-prometheus-stack (f1797c9)
  • monitoring: Installing kube-prometheus-stack from prometheus-community Helm chart (3c5e337)
  • mTLS: Enable Cilium mTLS (059e8ab)
  • net-aux: Adding Unbound as a recursive DNS resolver for Pi-Hole (20d365b)
  • netbird: add netbird router agent (5c0c336)
  • netbird: add relay service (aa1a078)
  • netbird: change oidc provider to authelia (c483d0f)
  • netbird: configuring oidc-clients using new XOidcClient composition (15adc6f)
  • netbird: remove idp-integration (037fc29)
  • netbird: replace backend helm chart with plain manifests (56d2a42)
  • netbird: replace dashboard helm chart with plain manifests (0149a02)
  • netbird: use built-in mechanism for jwk sign key refresh (0195f99)
  • net: Rewriting main Pi-Hole to use Unbound as well (b033608)
  • network: add cloudflared (127290d)
  • network: Creating an auxiliary deployment of network tools (d0986d5)
  • patches: Trying to patch an extra volume mount (31c3ae0)
  • pi-hole: Adding Pi-Hole (dbbcda1)
  • pi-hole: Configured Pi-Hole to proxy public domain to local Traefik svc in order for Cloudflared tunnel to work (93fde77)
  • pi-hole: Configuring Pi-Hole lists (c87f167)
  • plex: Proxy Euclid Plex (ba5ec8a)
  • prowlarr: Deploying Prowlarr with Helm chart (e84bea5)
  • proxmox: Proxy Euclid Proxmox through Gateway (9eeae42)
  • qbit: Deploying qBittorrent with Helm chart (748092d)
  • radarr: Deploying Radarr with Helm chart (e6cad43)
  • renovate: group related containers for fewer renovate PRs (f1a1166)
  • renovate: rebase stale PRs (1d3f025)
  • routes to cluster external services (aa6af35)
  • secrets: Adding sealed secrets controller (4814a31)
  • secrets: Committing sealed secrets for traefik-auth (2c29f0f)
  • secrets: Moved sealed secrets to their respective folders (f1eeac2)
  • sets: Moved ApplicationSets out into their own folder (9832d5f)
  • sonarr: Deploying Sonarr with Helm chart (34796f4)
  • talos: add ArgoCD ApplicationSet for homelab and update Talos configuration for improved endpoint management (1db4773)
  • talos: add ArgoCD bootstrap configuration and enhance Talos machine setup (7ca0509)
  • talos: add configuration for DNS settings and update output commands in setup documentation (cfd9447)
  • talos: Bootstrap Cilium from ConfigMap (8c5389c)
  • talos: generate schematic id on-the-fly and add possibility of changing image (29f5ce8)
  • talos: implement health check for Talos cluster using local-exec provisioner (c221c07)
  • talos: update image version to v1.9.4 and refine download file resource (68fefd6)
  • test: Rename test deployment to not collide with whoami (555c751)
  • test: Use a different issuer for a test-app (885e454)
  • tofu: split into multiple configurations (daaafc8)
  • tofu: updated kubernetes setup (c4ba712)
  • tofu: use new talos_image_factory_schematic resource (140fbc2)
  • traefik: Adding Traefik using ArgoCD (d265a4d)
  • traefik: Clean up Traefik config after certs are handled by Cert-manager (cdec125)
  • traefik: Exposing Traefik Dashboard (5a5869f)
  • traefik: Using Kustomize with Helm to deploy Traefik using ArgoCD (a13e7f7)
  • traefik: Working PoC using single node Kubernetes cluster with Cilium, MetalLB and Traefik (482f35c)
  • unrar: add an image for unrar tool (e5b3cd9)
  • vm: Start to use Proxmox (d035bec)
  • volumes: Persistent storage for Traefik certs (b33d362)
  • volumes: provision volumes using tofu (7a946e3)
  • vpn: split gateway into external and internal services (9a7894a)
  • vuetorrent: use git-sync to fetch vuetorrent theme (1602202)
  • whoami: add simple whoami-app for testing (653d3e9)
  • whoami: Adding simple service to test Traefik (7a50d59)
  • whoami: Deploying whoami with ArgoCD and secret delivery (600a704)

Bug Fixes

  • argo cd: disable dex (38542b6)
  • argocd: Cleaning up Application entry for Traefik (888e0de)
  • argocd: Enabling selfHeal and prune on Applications (95e6f9b)
  • argocd: Migrating from argocd-cm plugins (d3f6691)
  • argocd: Pin the version of ArgoCD to 2.7.11 (fafdac7)
  • argocd: turn on server-side diff (af79c5b)
  • argo: Trying to ease deployment restictions (450117a)
  • authelia: add access_control policy rule (8d8e0ca)
  • authelia: clean up values-file (3c2c08b)
  • authelia: disable html emails (d523d12)
  • authelia: increase db disk size (edd0a15)
  • bind prometheus operator to same node with volume (e2e30a9)
  • cert-manager: remove deprecated flag (1a46529)
  • cert-manager: Trying to configure a service to use cert-manager (3190aef)
  • cert-manager: update API token (cbf1210)
  • cert: ask for cert for both *.pctips.dev and pctips.dev (25f9771)
  • cert: Changing certs from Let's Encrypt to Cloudflare (17c7900)
  • cert: Fixing Cloudflare cert tls secret not properly configured (b73671c)
  • certs: Cleaning up Traefik with cert-manager and Cloudflare DNS (681aded)
  • chart: Fixed missing image-tag in application chart (6f2d19d)
  • cilium-identity: Excluding CiliumIdentity to avoid ArogCD reporting OutOfSync (ee15bb9)
  • cilium: Announce ARP on all interfaces (0b1011d)
  • cilium: use legacy host routing (063b5da)
  • Cleaning Gateway/HTTPRoute naming (54dc229)
  • cloudflared: Configure cloudflared services to point directly at FQDN Traefik service instead of using DNS routing to IP (7dcb094)
  • cloudflared: correct routing to homepage (bca0889)
  • cloudflared: Disable cloudflared (25692fd)
  • cloudflared: Use Pi-Hole as DNS for cloudflared pods (03bab47)
  • cnpg: rename db volumes (24743bf)
  • configure gateway (d7f90f3)
  • conflicting svc name (5abde08)
  • coturn: only use tls-port (b090a54)
  • crossed-wires in Plex and Jellyfin (0a265cb)
  • cuda: Set correct namespace for CUDA-test (edb30a6)
  • dns: Don't route non-denfined to Traefik (eae119a)
  • dns: Pinning DNS IPs and cleaning up related services (4c435eb)
  • dns: Trying with both UDP and TCP on the same Service again (e819f3f)
  • dns: tweak dns settingss after update (eb74b5b)
  • dns: tweak unbound setting again (e4fbd93)
  • euclid: Delay qemu-guest-agent startup (32d9755)
  • gateway: Create a separate Gateway for Proxmox TLS passthrough (da61e34)
  • gateway: Creating a TLS Passthrough listener (fe9ab18)
  • gateway: Pinpointed difficulties to be with wildcard (ba03da7)
  • gateway: Regressing to IngressRoutes to get sites working again (8e7a87c)
  • gateway: Removed non-traefik-forward-auth protected Ingresses in favour of HTTPRoutes (d1ae9a1)
  • gpu: Adding time-slicing config for GPU (c61af77)
  • gpu: Disabling toolkit in Nvidia gpu-operator Helm chart (ebddae1)
  • hass: Creating PV and PVC for Home Assistant (d43f968)
  • hass: Removing traefik-forward-auth for Home Assistant (e8dc6dc)
  • helm: Correctly set auth host (44456d4)
  • helm: renamed helm directory to charts (01625b3)
  • hubble: Move Hubble to it's own folder (563b8e7)
  • imagePullPolicy: Change imagePullPolicy to 'Always' to keep apps updated (b5312f4)
  • increase cpu and mem limits for Argo CD and cloudflared (605e5ef)
  • jellyfin: Enabling GPU-support (d23f71b)
  • jellyfin: use Memory for /cache to avoid NodeDiskPressure (38f118f)
  • keycloak: move crossplane-keycloak-credentials to keycloak from crossplane namespace (5ecf061)
  • keycloak: new postgres volume (ffa1701)
  • keycloak: update crossplane keycloak-provider (253e65a)
  • lldap: add hash seed (5ae1a6d)
  • lldap: add tmp-volume for bootstrapping (ee74146)
  • lldap: correct avatar url (668f052)
  • media player services (2c1e894)
  • monitoring: Add a dedicated traefik-forward-auth for monitoring (bfd062a)
  • monitoring: add renavate rule for updating chart (ab473a5)
  • monitoring: Change the way kube-prometheus-stack is applied (b233ef4)
  • monitoring: disable nodeExporter (4c9dc0f)
  • netbird-agent: allow read root fs and add sysctl (c9ffd69)
  • netbird-dashboard: harden security (1c585e2)
  • netbird-management: harden security (a99b4c6)
  • netbird-relay: harden security (c35ba49)
  • netbird-signal: harden security (3cbc35a)
  • netbird: allow required endpoint from keycloak (91e389d)
  • netbird: change dashboard redirect URLs (2ec6244)
  • netbird: change oidc clientId (fee02d4)
  • netbird: change user_id claim (e658857)
  • netbird: clean up configuration (ae355bb)
  • netbird: expose netbird dashboard (944f4a9)
  • netbird: new agent setup key (31c6b25)
  • netbird: update oidc client (b07b728)
  • netbird: use internal dns to resolve auth admin-endpoint to internal gateway (505a18c)
  • network: Conflicting port-names in DNS-deployment (563c2ed)
  • oidc: add 'basic' scope to netbird client and update keycloak (0e0a356)
  • oidc: conceal argo cd client secret (53855a6)
  • oidc: conceal jwks signing key (e0ce01c)
  • plex: switch back to ingressroute for troubleshooting (1738a24)
  • plex: Tidying deployment and adding GPU-support (5a34100)
  • plex: Use Ingress instead of Gateway (c6e1aad)
  • projects: Moving definition of AppProjects (bf4ea4a)
  • proxmox-csi-plugin configuration (f65eb23)
  • proxmox-csi-plugin: fetch from Helm chart (4d2fe61)
  • proxmox: TLS Passthrough GW for again (4eac6c1)
  • proxmox: Using Proxmox Service directly (3197f45)
  • qBit: Change registry for qBit (83b0c98)
  • remark42: correct url (935a130)
  • renovate: explicitly set versioning scheme for plex (89c0a27)
  • route plex and jellyfin through gateway for tls-termination (5d69e82)
  • pctips routing (482c036)
  • storage: change storage identifier from local-zfs to rpool3 across configurations (a5513fa)
  • svc: EndpointSlices should have the same name as the svc (4b63ad0)
  • talos: update MAC addresses and disable iGPU for control plane nodes (d89db15)
  • talos: upgrading now actually works without destroying the cluster (f39dc98)
  • traefik-argocd: Ingress stuck in 'Progressing' status (1f0136a)
  • traefik: Changing ns for Traefik to traefik from traefik-system (075a60f)
  • traefik: Harcode internal DNS in Traefik (bf94161)
  • update domain names from pctips.dev to peekoff.com across various configurations (2e5c35f)
  • update renovate syntax (694d56b)
  • users: Add kustomization.yaml in users-folder (4efe769)
  • vpn: remove read only root fs for netbird agent (02eb0a6)
  • vpn: remove security context for agent (48b6fc3)