Skip to main content

Changelog

Changelog

3.3.0 (2025-06-24)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.2.0...v3.3.0

3.2.0 (2025-06-19)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.1.0...v3.2.0

3.1.0 (2025-06-15)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v3.0.0...v3.1.0

3.0.0 (2025-06-14)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.10.0...v3.0.0

2.10.0 (2025-06-12)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.9.0...v2.10.0

2.9.0 (2025-06-11)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.8.0...v2.9.0

2.8.0 (2025-06-09)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.7.0...v2.8.0

2.7.0 (2025-06-04)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.3...v2.7.0

2.6.3 (2025-05-31)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.2...v2.6.3

2.6.2 (2025-05-30)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.1...v2.6.2

2.6.1 (2025-05-28)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.6.0...v2.6.1

2.6.0 (2025-05-22)

What's Changed

Full Changelog: https://github.com/theepicsaxguy/homelab/compare/v2.5.0...v2.6.0

2.5.0 (2025-05-13)

Features

  • k8s: add whisperasr deployment and service configuration (#616) (bafe4a9)
  • k8s: update frigate HTTPRoute and add Authentik Outpost configuration (#623) (81de4f2)
  • website: enhance homepage with new sections and styling (#643) (56bbe20)

Bug Fixes

  • k8s: correct HTTPRoute name and backend reference for frigate (#625) (1ad965c)
  • k8s: update OIDC issuer URL for authentik configuration (#612) (db644ee)

2.4.0 (2025-05-05)

Features

  • k8s: add automation and MQTT configurations (#587) (7ad437e)
  • k8s: add HTTPRoute for argocd webhook (#579) (1e29074)

Bug Fixes

  • k8s: add missing DNS entry for cilium-gateway-external (#578) (29562ff)
  • k8s: increase memory limit for controller to 2Gi (#577) (95ab6ef)
  • k8s: update argocd webhook hostname in cloudflared config (#581) (258fd82)
  • k8s: update cert-manager CRD version in kustomization.yaml (#575) (8126055)
  • k8s: update kubechecks role permissions in values.yaml (#580) (3bf02bb)

2.3.0 (2025-05-03)

Features

  • k8s: add Bazarr deployment and service configuration (#552) (6d3315e)
  • k8s: add configMapGenerator for AdGuard configuration (#567) (8c4e733)
  • k8s: add Omada controller deployment and related resources (#565) (857e81c)
  • k8s: enhance rollout configuration with health checks and analysis (#561) (8f889e1)
  • k8s: implement blue-green deployment strategy for applications (#571) (527f372)
  • k8s: update AdGuard deployment with persistent volume claim (#560) (7a9b432)
  • k8s: update Bazarr deployment to use new configMap reference (#554) (58af7ab)
  • k8s: update resource requests and limits for open-webui deployment (#572) (c45a067)
  • networking: implement AdGuard deployment with init containers (#566) (bc715c1)

Bug Fixes

  • k8s: update Bazarr security context to allow read-write filesystem (#556) (2eed9d9)

2.2.0 (2025-05-01)

Features

  • k8s: add deployment, service, and external secret for pedro-bot (#498) (b394df2)
  • k8s: add HTTPS route for omada service (#502) (9675e13)
  • k8s: add karakeep application resources (#515) (5d3d62f)
  • k8s: add omada certificate and update references (#505) (25752ad)
  • k8s: add sabnzbd deployment and associated resources (#547) (d7c3e64)
  • k8s: implement TLS passthrough and certificate management for omada (#546) (77f342e)
  • k8s: update jellyseerr service configuration (#517) (929626e)
  • networking: add HTTPRoute and Namespace for omada service (#480) (0ec0f84)
  • networking: add TLS route and certificate for omada (#499) (cfeed5b)

Bug Fixes

  • k8s: update jellyfin hostname and timezone configuration (#516) (ce5888f)
  • k8s: update jellyseerr and omada configurations for port changes (#533) (1e5f43b)
  • k8s: update jellyseerr service port and remove unused PVC (#532) (b0fb271)
  • k8s: update meilisearch deployment init container and security context (#527) (af500f6)

Performance Improvements

  • k8s: increase CPU resource requests and limits for open-webui (#528) (95acdfa)
  • k8s: increase resource limits for omada-controller deployment (#545) (287ffc2)

2.1.0 (2025-04-17)

Features

  • k8s: add external application management resources (#377) (a77461a)
  • k8s: add HTTPRoute for hoarder-web and remove Ingress sample (#380) (e1416fb)

2.0.0 (2025-04-13)

⚠ BREAKING CHANGES

  • network-policy: Changed API responses from 'hostname' to 'dnsNames' in the gateway specification.

Features

  • k8s: add Hoarder application deployment and configuration (#307) (0cf58a4)
  • k8s: add HTTPRoute configuration for it-tools (#358) (1e90d98)
  • k8s: add HTTPRoute configurations for Argo Rollouts and Longhorn (#352) (57cbe3c)
  • k8s: add KUBECHECKS_ARGOCD_API_INSECURE environment variable (#351) (7a3e130)
  • k8s: add monitoring stack with Prometheus and Grafana (#313) (2a75469)
  • k8s: implement kubechecks deployment with external secrets (#356) (550dd90)
  • k8s: update HTTPRoute hostnames and kustomization configurations (#348) (32e089b)
  • tofu: add extra mounts and kernel modules to machine config (#310) (66425f3)

Code Refactoring

1.17.0 (2025-03-23)

Features

  • cert-manager: add Bitwarden issuer and certificate configurations (#301) (12e6d26)
  • external-secrets: add ClusterRole and ClusterRoleBinding for clusterpushsecret (#290) (910c14f)
  • k8s: add Cilium network policies for cert-manager and external-secrets (#264) (2083501)
  • k8s: add CoreDNS deployment and update configurations (#253) (622d4ee)
  • k8s: add namespaces for various components (#238) (9ba98e0)
  • k8s: allowlist specific namespaces for resource management (#225) (b80662f)
  • k8s: change ArgoCD service type to LoadBalancer (#242) (3082725)
  • k8s: enhance ArgoCD and cert-manager network policies (#303) (736c5c1)
  • k8s: enhance namespace management and add webhook policies (#232) (72cbdea)
  • k8s: enhance namespace management with dynamic allowlist updates (#224) (c0e4ce9)
  • k8s: enhance network policies and configurations for ArgoCD and Open Web UI (#262) (9301f98)
  • k8s: implement ArgoCD network policy and update configurations (#237) (bcb48f4)
  • k8s: implement dynamic resource scaling for improved efficiency (#227) (f10a63a)
  • k8s: introduce service accounts and services for cert-manager (#265) (d99bba0)
  • k8s: reorganize application configurations and add new resources (#222) (ddd6148)
  • k8s: update ArgoCD and Cilium configurations (#239) (d2795a0)
  • k8s: update Bitwarden configurations for external secrets (#302) (1d4d464)
  • k8s: update CoreDNS values.yaml configuration (#257) (0c461cd)
  • k8s: update kustomization files to include additional resources (#226) (cc50dd2)
  • networking: update CoreDNS configuration and add service definition (#298) (7c1df8c)
  • tofu: update Talos configuration for Kubernetes version 1.32.0 (#292) (e9900f1)

Bug Fixes

  • networking: update Cilium network policy for ArgoCD and remove Authelia configurations (#291) (1614f12)

1.16.0 (2025-03-09)

Features

  • k8s: add ApplicationSet and kubechecks for cluster management (#208) (2004ae4)
  • k8s: add kustomization for external secrets management (#183) (723533e)
  • k8s: add new namespaces and configuration files (#212) (eb7de23)
  • k8s: implement dynamic namespace management in ArgoCD (#220) (e9c0df8)
  • k8s: integrate Bitwarden Secrets Manager with External Secrets Operator (#193) (364105b)
  • k8s: modularize Kustomize overlays and enhance namespace management (#216) (c8a28d3)

1.15.0 (2025-03-04)

Features

  • k8s: add sm-operator network policy and update RBAC rules (#173) (a5ea082)
  • k8s: enhance Cilium configuration and add DNS policy (#175) (71b5f5b)
  • k8s: enhance Cilium configuration and management (#156) (67cc113)
  • k8s: enhance infrastructure configuration and security policies (#150) (56198ed)
  • k8s: implement sm-operator resources and remove kubechecks (#160) (c46cafa)
  • k8s: implement Unbound DNS configuration with new deployment (#164) (37abf5b)
  • k8s: integrate external secrets management for multiple components (#178) (566fe21)
  • k8s: update AdGuardHome configuration and add new HTTP routes (#143) (7b9c233)
  • security, networking: enhance Cilium security and update Gateway API documentation (#152) (7297ed8)

Bug Fixes

  • k8s: correct DNS configuration and improve deployment security (#163) (4c6987e)
  • k8s: update bootstrap DNS configuration for AdGuardHome (#166) (74a5f87)

1.14.0 (2025-02-26)

Features

  • k8s: update AdGuardHome and gateway configurations (#140) (2ad2e25)

1.13.0 (2025-02-26)

Features

  • k8s: enhance AdGuardHome and Cilium configurations with troubleshooting documentation (#135) (5ded39a)

1.12.0 (2025-02-26)

Features

  • k8s: enhance validation script and ApplicationSet configurations (#131) (ddf1fb7)
  • k8s: integrate and enhance Kubechecks for GitOps workflow (#133) (ad73e6f)

1.11.0 (2025-02-24)

Features

  • k8s: update Kustomization and ApplicationSet configurations (#115) (ba2851d)

1.10.0 (2025-02-23)

Features

  • security: add Bitwarden Secrets Manager bootstrap documentation (#111) (f0bcb07)

1.9.0 (2025-02-23)

Features

  • k8s: enhance infrastructure project configuration with sync windows (#104) (609fd5c)
  • k8s: enhance rollout and analysis configurations for infrastructure (#110) (35301ee)

1.8.0 (2025-02-23)

Features

  • k8s: add Argo Rollouts configuration and resource limits (#102) (d604013)

1.7.1 (2025-02-23)

Bug Fixes

  • k8s: correct allowEmpty syntax in ApplicationSet configurations (#100) (2ff9d0b)

1.7.0 (2025-02-23)

Features

  • k8s: enhance ApplicationSet configuration and add PR preview support (#97) (4662fbd)

1.6.0 (2025-02-22)

Features

  • k8s: enhance secret management with Bitwarden integration (#93) (03365f0)
  • k8s: update Bitwarden API version and enhance project configuration (#94) (39061cb)

Bug Fixes

  • k8s: correct DHCP service name and enhance AdGuard secret management (#91) (3965795)

1.5.0 (2025-02-22)

Features

  • k8s: enhance kustomization and service configurations (#88) (857bb35)

1.4.2 (2025-02-21)

Bug Fixes

1.4.1 (2025-02-21)

Bug Fixes

1.4.0 (2025-02-20)

Features

  • ci: Add workflows to standardize commit messages and pull request titles (#67) (b2f184d)

1.3.0 (2025-02-20)

Features

  • argocd: enable Redis authentication and specify chart version for compatibility (#65) (f447b02)

1.2.0 (2025-02-18)

Features

  • update common labels from dev.pctips to dev.pc-tips across k8s configurations (#32) (d73b8a5)

1.1.0 (2025-02-17)

Features

  • add Bitwarden ESO provider configuration and namespace (#29) (82b2ae0)

1.0.0 (2025-02-16)

Features

  • access: Extra admins in the cluster (17a07d4)
  • add Cert-manager (fe368b9)
  • add crossplane.io (76ab7a7)
  • add extra admin user (4dd769f)
  • add Gateway API and Gateways (805ab61)
  • add node-feature-discovery and intel-device-plugins (ac16aed)
  • adguard: mount config-file for declarative configuration (872f33c)
  • app: Adding Deltahouse application (37370e0)
  • applications: Use a single ApplicationSet instead of individual Application manifests (726886c)
  • apps: Added Home Assistant application (98d20d2)
  • apps: Starting to use Terraform and adding applications (c450934)
  • Argo CD: Switch to Helm chart (398b98c)
  • argocd: Add an extra layer of security on ArgoCD interface (a23fe82)
  • argocd: Adding ArgoCD (7a9f9e2)
  • argocd: Copying necessary binaries from main ArgoCD image for use in kustomize-with-helm plugin (8cead34)
  • argocd: Creating AppProjects for ArgoCD (a1a7d5c)
  • argocd: Creating kustomize build with helm plugin (f5da0ac)
  • argocd: Deploying Plex and HAss using ArgoCD (6140fc8)
  • argocd: Letting ArgoCD manage itself (b4c0097)
  • arr: Deploying arr-suite with ArgoCD (24e0284)
  • arr: implement arr stack (bd7ae1f)
  • arr: Use Kustomize Helm charts for the arr-suite (cbbb6d8)
  • auth: add Authelia for OIDC (ba69146)
  • auth: add keycloak for auth (628bdb5)
  • auth: add Keycloak for auth (884fe3b)
  • auth: Added Google auth for remark42 blog comments (606e9fe)
  • auth: Adding traefik-forward-auth (954ff94)
  • auth: Deploying traefik-forward-auth with Helm chart (9d5a579)
  • authelia: add "optional" secrets in config (0c19b80)
  • authelia: add Argo CD client (86395ed)
  • authelia: add ES256 jwk (d077f4b)
  • authelia: add ES256 jwk and use it (6d13790)
  • authelia: add kubectl oidc account (e48986a)
  • authelia: add smtp integration (7a949af)
  • authelia: enable 2FA (9a92b48)
  • authelia: harden oidc clients (d816953)
  • authelia: make cert-manager generate jwks (403d32b)
  • authelia: use a cnpg managed db (ce5fc25)
  • authelia: use ldaps with lldap (a7ea946)
  • auth: enable kubectl oidc auth (2674d91)
  • blog: Adding blog from GitLab (94a2970)
  • blog: Adding Remark42 for blog commenting (e3aa992)
  • cert-manager: Installing and configuring cert-manager (ca44a52)
  • cert-manager: Use Cert-manager Helm Chart instead of static manifest (819a2b9)
  • certs: Configuring certs through Cloudlfare using Cert Manager with Traefik (1b66227)
  • chart: Adding an additionalVolumes value to chart (312e620)
  • cilium: enable maglev loadBalancer (c524a6a)
  • cilium: Installing cilium with ArgoCD (2b840e6)
  • cleanup of remodelling (207b189)
  • cloud-init: Kubeadm cluster (e343d41)
  • cloudflared: Configuring tunnel locally/declaratively instead of ClickOps through Dashboard (e18d379)
  • cloudflare: Enabling Cloudflare TLS (3338fb4)
  • cni: Using Terraform to provide Cilium as a CNI using Helm (18f8d9e)
  • cni: Using Terraform to provide Cilium as a CNI using Helm (f808257)
  • cnpg: configure test-database for external connection (1d0ae6d)
  • config: Config changes after switching to Debian (e3423cd)
  • configure keycloak using crossplane provider (4cb40d3)
  • configure renovate (be08e10)
  • config: Using configMaps instead of env-variables for traefik-forward-auth (8eb09c3)
  • coturn: use plain manifests instead of helm chart (a535a76)
  • crossplane: try to organise crossplane crds (bff7417)
  • cuda: Running a CUDA sample pod (8667f83)
  • dashboard: Deploying and exposing the Kubernetes Dashboard (90e7ddd)
  • dashboard: Deploying k8s dashboard with ArgoCD (4e717aa)
  • database: add cnpg for database management (d3338da)
  • db: Adding Zalando Postgres-operator (7c6d24a)
  • dns: use Unbound and AdGuardHome for DNS (9dec025)
  • env: Fetching common env from a ConfigMap (fd605aa)
  • gateway: Enabled and configured Cilium as a GatewayClass (b066e54)
  • gateway: Switch public sites over to Gateway instead of Traefik IngressRoute (6a3fffb)
  • gpu: Adding Nvidia GPU-Oparator (c7c145d)
  • gpu: Change from nvidia-gpu-operator to nvidia-device-plugin (cac81f3)
  • haos: Proxy HAOS through k8s for certificate (3c33225)
  • hass: Move Home Assistant config to own repo (52a3f87)
  • helm-traefik: Setting up Traefik using Helm-chart (107f1fc)
  • helm: Add labels and annotations to helm chart (ad7ecb8)
  • helm: Introducing Helm Charts for templating (67049f2)
  • helm: Modifying chart template to allow a stand-alone auth deployment (ea712fe)
  • helm: Trying to use a local Helm chart (1c6e0c6)
  • homepage: add homepage and blog (731a16b)
  • homepage: Adding a simple landing page (91c7238)
  • hubble: Enabling and exposing Hubble (d5f5e23)
  • infra: Use a single ApplicationSet instead of multiple Application manifests for infrastructure applications (ad74c53)
  • ingress: Provision Traefik as an ingress controller (c8561e7)
  • init: Initial commit (b277649)
  • install Netbird as a VPN solution (69d56e8)
  • jellyfin: Adding Jellyfin (5886c83)
  • jf: Proxy Jellyfin from Euclid instead of Plex (7d79db7)
  • k8s: multi-node Talos cluster (fbdccd7)
  • kube-proxy: Trying to use cilium's kube-proxy (3f3f1ee)
  • kustomize: Simple implementation of Kustomize for apps (eab8320)
  • lb: Replace MetalLB with Cilium LB IPAM + BGP Control Plane (8d4bb60)
  • ldap: add lldap as ldap server (2a3f017)
  • lgtm: Adding LGTM Helm chart (cabdc65)
  • lidarr: Deploying Lidarr using Helm Chart (f906558)
  • lldap: add a test user (baa30f0)
  • lldap: add cnpg database for persistence (5563a63)
  • lldap: add smtp integration (8da8d82)
  • lldap: bootstrap lldap users with script (ddb7f0f)
  • lldap: create and use own authelia user (c884036)
  • LoadBalancer: Adding MetalLB (5a71638)
  • media: add media players (3edf326)
  • metallb: Installing MetalLB using ArgoCD (d81b83c)
  • monitoring: add http-routes for prometheus and alertmanager (53b332c)
  • monitoring: Configure kube-prometheus-stack (91998ec)
  • monitoring: install kube-prometheus-stack (f1797c9)
  • monitoring: Installing kube-prometheus-stack from prometheus-community Helm chart (3c5e337)
  • mTLS: Enable Cilium mTLS (059e8ab)
  • net-aux: Adding Unbound as a recursive DNS resolver for Pi-Hole (20d365b)
  • netbird: add netbird router agent (5c0c336)
  • netbird: add relay service (aa1a078)
  • netbird: change oidc provider to authelia (c483d0f)
  • netbird: configuring oidc-clients using new XOidcClient composition (15adc6f)
  • netbird: remove idp-integration (037fc29)
  • netbird: replace backend helm chart with plain manifests (56d2a42)
  • netbird: replace dashboard helm chart with plain manifests (0149a02)
  • netbird: use built-in mechanism for jwk sign key refresh (0195f99)
  • net: Rewriting main Pi-Hole to use Unbound as well (b033608)
  • network: add cloudflared (127290d)
  • network: Creating an auxiliary deployment of network tools (d0986d5)
  • patches: Trying to patch an extra volume mount (31c3ae0)
  • pi-hole: Adding Pi-Hole (dbbcda1)
  • pi-hole: Configured Pi-Hole to proxy public domain to local Traefik svc in order for Cloudflared tunnel to work (93fde77)
  • pi-hole: Configuring Pi-Hole lists (c87f167)
  • plex: Proxy Euclid Plex (ba5ec8a)
  • prowlarr: Deploying Prowlarr with Helm chart (e84bea5)
  • proxmox: Proxy Euclid Proxmox through Gateway (9eeae42)
  • qbit: Deploying qBittorrent with Helm chart (748092d)
  • radarr: Deploying Radarr with Helm chart (e6cad43)
  • renovate: group related containers for fewer renovate PRs (f1a1166)
  • renovate: rebase stale PRs (1d3f025)
  • routes to cluster external services (aa6af35)
  • secrets: Adding sealed secrets controller (4814a31)
  • secrets: Committing sealed secrets for traefik-auth (2c29f0f)
  • secrets: Moved sealed secrets to their respective folders (f1eeac2)
  • sets: Moved ApplicationSets out into their own folder (9832d5f)
  • sonarr: Deploying Sonarr with Helm chart (34796f4)
  • talos: add ArgoCD ApplicationSet for homelab and update Talos configuration for improved endpoint management (1db4773)
  • talos: add ArgoCD bootstrap configuration and enhance Talos machine setup (7ca0509)
  • talos: add configuration for DNS settings and update output commands in setup documentation (cfd9447)
  • talos: Bootstrap Cilium from ConfigMap (8c5389c)
  • talos: generate schematic id on-the-fly and add possibility of changing image (29f5ce8)
  • talos: implement health check for Talos cluster using local-exec provisioner (c221c07)
  • talos: update image version to v1.9.4 and refine download file resource (68fefd6)
  • test: Rename test deployment to not collide with whoami (555c751)
  • test: Use a different issuer for a test-app (885e454)
  • tofu: split into multiple configurations (daaafc8)
  • tofu: updated kubernetes setup (c4ba712)
  • tofu: use new talos_image_factory_schematic resource (140fbc2)
  • traefik: Adding Traefik using ArgoCD (d265a4d)
  • traefik: Clean up Traefik config after certs are handled by Cert-manager (cdec125)
  • traefik: Exposing Traefik Dashboard (5a5869f)
  • traefik: Using Kustomize with Helm to deploy Traefik using ArgoCD (a13e7f7)
  • traefik: Working PoC using single node Kubernetes cluster with Cilium, MetalLB and Traefik (482f35c)
  • unrar: add an image for unrar tool (e5b3cd9)
  • vm: Start to use Proxmox (d035bec)
  • volumes: Persistent storage for Traefik certs (b33d362)
  • volumes: provision volumes using tofu (7a946e3)
  • vpn: split gateway into external and internal services (9a7894a)
  • vuetorrent: use git-sync to fetch vuetorrent theme (1602202)
  • whoami: add simple whoami-app for testing (653d3e9)
  • whoami: Adding simple service to test Traefik (7a50d59)
  • whoami: Deploying whoami with ArgoCD and secret delivery (600a704)

Bug Fixes

  • argo cd: disable dex (38542b6)
  • argocd: Cleaning up Application entry for Traefik (888e0de)
  • argocd: Enabling selfHeal and prune on Applications (95e6f9b)
  • argocd: Migrating from argocd-cm plugins (d3f6691)
  • argocd: Pin the version of ArgoCD to 2.7.11 (fafdac7)
  • argocd: turn on server-side diff (af79c5b)
  • argo: Trying to ease deployment restictions (450117a)
  • authelia: add access_control policy rule (8d8e0ca)
  • authelia: clean up values-file (3c2c08b)
  • authelia: disable html emails (d523d12)
  • authelia: increase db disk size (edd0a15)
  • bind prometheus operator to same node with volume (e2e30a9)
  • cert-manager: remove deprecated flag (1a46529)
  • cert-manager: Trying to configure a service to use cert-manager (3190aef)
  • cert-manager: update API token (cbf1210)
  • cert: ask for cert for both *.pctips.dev and pctips.dev (25f9771)
  • cert: Changing certs from Let's Encrypt to Cloudflare (17c7900)
  • cert: Fixing Cloudflare cert tls secret not properly configured (b73671c)
  • certs: Cleaning up Traefik with cert-manager and Cloudflare DNS (681aded)
  • chart: Fixed missing image-tag in application chart (6f2d19d)
  • cilium-identity: Excluding CiliumIdentity to avoid ArogCD reporting OutOfSync (ee15bb9)
  • cilium: Announce ARP on all interfaces (0b1011d)
  • cilium: use legacy host routing (063b5da)
  • Cleaning Gateway/HTTPRoute naming (54dc229)
  • cloudflared: Configure cloudflared services to point directly at FQDN Traefik service instead of using DNS routing to IP (7dcb094)
  • cloudflared: correct routing to homepage (bca0889)
  • cloudflared: Disable cloudflared (25692fd)
  • cloudflared: Use Pi-Hole as DNS for cloudflared pods (03bab47)
  • cnpg: rename db volumes (24743bf)
  • configure gateway (d7f90f3)
  • conflicting svc name (5abde08)
  • coturn: only use tls-port (b090a54)
  • crossed-wires in Plex and Jellyfin (0a265cb)
  • cuda: Set correct namespace for CUDA-test (edb30a6)
  • dns: Don't route non-denfined to Traefik (eae119a)
  • dns: Pinning DNS IPs and cleaning up related services (4c435eb)
  • dns: Trying with both UDP and TCP on the same Service again (e819f3f)
  • dns: tweak dns settingss after update (eb74b5b)
  • dns: tweak unbound setting again (e4fbd93)
  • euclid: Delay qemu-guest-agent startup (32d9755)
  • gateway: Create a separate Gateway for Proxmox TLS passthrough (da61e34)
  • gateway: Creating a TLS Passthrough listener (fe9ab18)
  • gateway: Pinpointed difficulties to be with wildcard (ba03da7)
  • gateway: Regressing to IngressRoutes to get sites working again (8e7a87c)
  • gateway: Removed non-traefik-forward-auth protected Ingresses in favour of HTTPRoutes (d1ae9a1)
  • gpu: Adding time-slicing config for GPU (c61af77)
  • gpu: Disabling toolkit in Nvidia gpu-operator Helm chart (ebddae1)
  • hass: Creating PV and PVC for Home Assistant (d43f968)
  • hass: Removing traefik-forward-auth for Home Assistant (e8dc6dc)
  • helm: Correctly set auth host (44456d4)
  • helm: renamed helm directory to charts (01625b3)
  • hubble: Move Hubble to it's own folder (563b8e7)
  • imagePullPolicy: Change imagePullPolicy to 'Always' to keep apps updated (b5312f4)
  • increase cpu and mem limits for Argo CD and cloudflared (605e5ef)
  • jellyfin: Enabling GPU-support (d23f71b)
  • jellyfin: use Memory for /cache to avoid NodeDiskPressure (38f118f)
  • keycloak: move crossplane-keycloak-credentials to keycloak from crossplane namespace (5ecf061)
  • keycloak: new postgres volume (ffa1701)
  • keycloak: update crossplane keycloak-provider (253e65a)
  • lldap: add hash seed (5ae1a6d)
  • lldap: add tmp-volume for bootstrapping (ee74146)
  • lldap: correct avatar url (668f052)
  • media player services (2c1e894)
  • monitoring: Add a dedicated traefik-forward-auth for monitoring (bfd062a)
  • monitoring: add renavate rule for updating chart (ab473a5)
  • monitoring: Change the way kube-prometheus-stack is applied (b233ef4)
  • monitoring: disable nodeExporter (4c9dc0f)
  • netbird-agent: allow read root fs and add sysctl (c9ffd69)
  • netbird-dashboard: harden security (1c585e2)
  • netbird-management: harden security (a99b4c6)
  • netbird-relay: harden security (c35ba49)
  • netbird-signal: harden security (3cbc35a)
  • netbird: allow required endpoint from keycloak (91e389d)
  • netbird: change dashboard redirect URLs (2ec6244)
  • netbird: change oidc clientId (fee02d4)
  • netbird: change user_id claim (e658857)
  • netbird: clean up configuration (ae355bb)
  • netbird: expose netbird dashboard (944f4a9)
  • netbird: new agent setup key (31c6b25)
  • netbird: update oidc client (b07b728)
  • netbird: use internal dns to resolve auth admin-endpoint to internal gateway (505a18c)
  • network: Conflicting port-names in DNS-deployment (563c2ed)
  • oidc: add 'basic' scope to netbird client and update keycloak (0e0a356)
  • oidc: conceal argo cd client secret (53855a6)
  • oidc: conceal jwks signing key (e0ce01c)
  • plex: switch back to ingressroute for troubleshooting (1738a24)
  • plex: Tidying deployment and adding GPU-support (5a34100)
  • plex: Use Ingress instead of Gateway (c6e1aad)
  • projects: Moving definition of AppProjects (bf4ea4a)
  • proxmox-csi-plugin configuration (f65eb23)
  • proxmox-csi-plugin: fetch from Helm chart (4d2fe61)
  • proxmox: TLS Passthrough GW for again (4eac6c1)
  • proxmox: Using Proxmox Service directly (3197f45)
  • qBit: Change registry for qBit (83b0c98)
  • remark42: correct url (935a130)
  • renovate: explicitly set versioning scheme for plex (89c0a27)
  • route plex and jellyfin through gateway for tls-termination (5d69e82)
  • pctips routing (482c036)
  • storage: change storage identifier from local-zfs to rpool3 across configurations (a5513fa)
  • svc: EndpointSlices should have the same name as the svc (4b63ad0)
  • talos: update MAC addresses and disable iGPU for control plane nodes (d89db15)
  • talos: upgrading now actually works without destroying the cluster (f39dc98)
  • traefik-argocd: Ingress stuck in 'Progressing' status (1f0136a)
  • traefik: Changing ns for Traefik to traefik from traefik-system (075a60f)
  • traefik: Harcode internal DNS in Traefik (bf94161)
  • update domain names from pctips.dev to pc-tips.se across various configurations (2e5c35f)
  • update renovate syntax (694d56b)
  • users: Add kustomization.yaml in users-folder (4efe769)
  • vpn: remove read only root fs for netbird agent (02eb0a6)
  • vpn: remove security context for agent (48b6fc3)