15 Commits

Author SHA1 Message Date
04bdc8077a move website to laylotta for good 2026-03-19 23:35:25 -07:00
c23c72de63 more monitoting stuff 2026-03-19 23:20:20 -07:00
5165c9212c Merge pull request 'rtm website move: rename server resisttechmonopolies.online to sootie.resisttechmonopolies.online' (#9) from ok/rtm-rename-sootie into main
Reviewed-on: #9
Reviewed-by: ammaratef45 <ammaratef45@proton.me>
2026-03-20 01:35:14 +00:00
8aff62e4ef remove auth entry from sootie; that was a bad rebase artifact 2026-03-12 21:18:44 -07:00
7fcdc1ab4b rtm website move: rename server resisttechmonopolies.online to sootie.resisttechmonopolies.online 2026-03-12 21:02:07 -07:00
1ad9ef3804 move auth from sootie to laylotta 2026-03-02 20:04:45 -08:00
978c10a361 deploy monitoring-ng recipe to laylotta 2026-02-23 20:42:48 -08:00
1c419f5eba update loomio version 2026-02-19 20:31:56 -08:00
2113e9fcdf deploy backup-bot-two to mango 2026-02-20 04:23:20 +00:00
d8bbb6623b Merge pull request 'move loomio from sootie to laylotta' (#3) from move_loomio into main
Reviewed-on: #3
2026-02-20 04:21:48 +00:00
06a3bfba17 move loomio from sootie to laylotta 2026-02-19 20:20:10 -08:00
6d59a4a00e deploy swarm-cronjob on laylotta 2026-01-21 00:25:31 -08:00
9416b318e3 deploy swarm-cronjob on sootie 2026-01-21 00:24:10 -08:00
705f48f076 Merge pull request 'update smtp env values' (#1) from loomio-mail-issue into main
Reviewed-on: #1
2026-01-21 07:58:53 +00:00
3ce8928ea7 update smtp env values 2026-01-19 22:17:30 -08:00
18 changed files with 157 additions and 52 deletions

5
.gitignore vendored
View File

@ -1 +1,4 @@
.*~
*~
abra/catalogue
abra/recipes
abra/logs

View File

@ -1,4 +1,4 @@
TYPE=loomio:5.1.2+v3.0.0
TYPE=loomio:5.1.3+v3.0.0
COMPOSE_FILE="compose.yml"
DOMAIN=loomio.resisttechmonopolies.online
@ -10,13 +10,13 @@ LETS_ENCRYPT_ENV=production
COMPOSE_FILE="$COMPOSE_FILE:compose.smtp.yml"
SUPPORT_EMAIL=besties@resisttechmonopolies.online
SMTP_AUTH=plain
SMTP_DOMAIN=smtp.protonmail.ch
SMTP_SERVER=smtp.protonmail.ch
SMTP_PORT=587
SMTP_DOMAIN=mail.resisttechmonopolies.online
SMTP_SERVER=mail.resisttechmonopolies.online
SMTP_PORT=465
SMTP_USERNAME=besties@resisttechmonopolies.online
# SMTP_USE_SSL=1
SMTP_USE_SSL=1
# to disable SSL comment out line rather than changing to 0
SECRET_SMTP_PASSWORD_VERSION=v2
SECRET_SMTP_PASSWORD_VERSION=v4
# From field for notification e-mails
@ -104,4 +104,4 @@ OAUTH_ATTR_UID=email
OAUTH_ATTR_NAME=name
OAUTH_ATTR_EMAIL=email
OAUTH_LOGIN_PROVIDER_NAME="loomio SSO"
SECRET_OAUTH_APP_SECRET_VERSION=v2
SECRET_OAUTH_APP_SECRET_VERSION=v2

View File

@ -0,0 +1,84 @@
TYPE=monitoring-ng:423b9bcf+U
LETS_ENCRYPT_ENV=production
COMPOSE_FILE=compose.yml
DOMAIN=m.laylotta.resisttechmonopolies.online
TIMEOUT=120
ENABLE_BACKUPS=true
## Enable this secret for Promtail / Prometheus
SECRET_BASIC_AUTH_VERSION=v1
## Promtail (Gathering Logs)
COMPOSE_FILE="$COMPOSE_FILE:compose.promtail.yml"
LOKI_PUSH_URL=https://loki.${DOMAIN}/loki/api/v1/push
## Expose node and cadvisor ports instead of traefik
COMPOSE_FILE="$COMPOSE_FILE:compose.expose-ports.yml"
# Monitoring Server
#
## Prometheus
COMPOSE_FILE="$COMPOSE_FILE:compose.prometheus.yml"
PROMETHEUS_RETENTION_TIME=1y
## Prometheus Pushgateway
COMPOSE_FILE="$COMPOSE_FILE:compose.pushgateway.yml"
## Loki
# Loki Server
COMPOSE_FILE="$COMPOSE_FILE:compose.loki.yml"
# Set to 0 to disable retention
LOKI_RETENTION_PERIOD=744h
LOKI_STORAGE_FILESYSTEM=1
## S3 Storage
# LOKI_STORAGE_S3=1
# LOKI_AWS_ENDPOINT=https://minio.autonomic.zone
# LOKI_AWS_REGION=eu-west-1
# LOKI_ACCESS_KEY_ID=bush-debrief-approval-robust-scraggly-molecule
# LOKI_BUCKET_NAMES=loki
# SECRET_LOKI_AWS_SECRET_ACCESS_KEY_VERSION=v1
#
## Grafana
#
# COMPOSE_FILE="$COMPOSE_FILE:compose.grafana.yml"
# GF_SERVER_ROOT_URL=https://monitoring.example.com
# SECRET_GRAFANA_ADMIN_PASSWORD_VERSION=v1
## Seperate domain for Grafana
#GRAFANA_DOMAIN=grafana.example.com
#
## Single-Sign-On with OIDC
# OIDC_ENABLED=1
# SECRET_GRAFANA_OIDC_CLIENT_SECRET_VERSION=v1
# OIDC_CLIENT_ID=grafana
# OIDC_AUTH_URL="https://authentik.example.com/application/o/authorize/"
# OIDC_API_URL="https://authentik.example.com/application/o/userinfo/"
# OIDC_TOKEN_URL="https://authentik.example.com/application/o/token/"
#
## Additional grafana settings (unlikely to require editing)
# GF_SECURITY_ALLOW_EMBEDDING=1
# GF_INSTALL_PLUGINS=grafana-piechart-panel
#
## grafana SMTP configuration (optional)
# GF_SMTP_HOST=changeme
# GF_SMTP_USER=changme
# GF_SMTP_ENABLED=true
# GF_SMTP_FROM_ADDRESS=grafana@example.com
# GF_SMTP_SKIP_VERIFY=false
# SECRET_GRAFANA_SMTP_PASSWORD_VERSION=v1
#
## Grafana Matrix Contact Point (optional)
#COMPOSE_FILE="$COMPOSE_FILE:compose.matrix-alertmanager-receiver.yml"
#SECRET_MATRIX_ACCESS_TOKEN_VERSION=v1
#GF_MATRIX_USER_ID="<user-id>"
#GF_MATRIX_ROOM_ID="<room-id>"
#GF_MATRIX_HOMESERVER_URL="<homeserver-url>"
# ALerts
#ALERT_BACKUP_FAILED_ENABLED=true
#ALERT_BACKUP_MISSING_ENABLED=true
#ALERT_BACKUP_NOT_SUCCESSFULL_ENABLED=true
#ALERT_NODE_DISK_SPACE_ENABLED=true
#ALERT_NODE_MEMORY_USAGE_ENABLED=true

View File

@ -0,0 +1,6 @@
# https://git.coopcloud.tech/coop-cloud/monitoring-ng/src/branch/main/scrape-config.example.yml
# https://prometheus.io/docs/prometheus/latest/getting_started/#configure-prometheus-to-monitor-the-sample-targets
- targets
- 'm.laylotta.resisttechmonopolies.online:8082'
- 'node.m.laylotta.resisttechmonopolies.online'
- 'cadvisor.m.laylotta.resisttechmonopolies.online'

View File

@ -0,0 +1,9 @@
TYPE=rtm-astro-recipe:6e6418fb
DOMAIN=resisttechmonopolies.online
## Domain aliases
#EXTRA_DOMAINS=', `www.website.resisttechmonopolies.online`'
LETS_ENCRYPT_ENV=production
VERSION=0.0.21

View File

@ -0,0 +1,5 @@
RECIPE=swarm-cronjob:1.11.0+1.15.0
TZ=UTC
LOG_LEVEL=info
LOG_JSON=false

View File

@ -96,9 +96,9 @@ COMPOSE_FILE="compose.yml"
## BASIC_AUTH
## Use httpasswd to generate the secret
#COMPOSE_FILE="$COMPOSE_FILE:compose.basicauth.yml"
#BASIC_AUTH=1
#SECRET_USERSFILE_VERSION=v1
COMPOSE_FILE="$COMPOSE_FILE:compose.basicauth.yml"
BASIC_AUTH=1
SECRET_USERSFILE_VERSION=v1
#####################################################################
# Prometheus metrics #

View File

@ -0,0 +1,34 @@
TYPE=backup-bot-two:2.3.0+2.3.0-beta
SECRET_RESTIC_PASSWORD_VERSION=v1
COMPOSE_FILE=compose.yml
RESTIC_REPOSITORY=/backups/restic
CRON_SCHEDULE='30 3 * * *'
# Push Notifiactions
#PUSH_URL_START=https://status.example.com/api/push/xxxxxxxxxx?status=up&msg=start
#PUSH_URL_SUCCESS=https://status.example.com/api/push/xxxxxxxxxx?status=up&msg=OK
#PUSH_URL_FAIL=https://status.example.com/api/push/xxxxxxxxxx?status=down&msg=fail
# swarm-cronjob, instead of built-in cron
#COMPOSE_FILE="$COMPOSE_FILE:compose.swarm-cronjob.yml"
# SSH storage
#SECRET_SSH_KEY_VERSION=v1
#SSH_HOST_KEY="hostname ssh-rsa AAAAB3...
#COMPOSE_FILE="$COMPOSE_FILE:compose.ssh.yml"
# S3 storage
#SECRET_AWS_SECRET_ACCESS_KEY_VERSION=v1
#AWS_ACCESS_KEY_ID=something-secret
#COMPOSE_FILE="$COMPOSE_FILE:compose.s3.yml"
# Secret restic repository
# use a secret to store the RESTIC_REPOSITORY if the repository location contains a secret value
# i.E rest:https://user:SECRET_PASSWORD@host:8000/
# it overwrites the RESTIC_REPOSITORY variable
SECRET_RESTIC_REPO_VERSION=v2
COMPOSE_FILE="$COMPOSE_FILE:compose.secret.yml"

View File

@ -1,31 +0,0 @@
TYPE=draupnir:785815dd+U
DOMAIN=draupnir.resisttechmonopolies.online
## Domain aliases
#EXTRA_DOMAINS=', `www.draupnir.resisttechmonopolies.online`'
LETS_ENCRYPT_ENV=production
HOME_SERVER_URL="https://matrix.resisttechmonopolies.online"
RAW_HOMESERVER_URL="https://matrix.resisttechmonopolies.online"
DRAUPNIR_LOG_LEVEL="DEBUG"
# The room ID (or room alias) of the management room, anyone in this room can issue commands to Draupnir.
#
# Draupnir has no more granular access controls other than this, be sure you trust everyone in this room - secure it!
#
# This should be a room alias or room ID - not a matrix.to URL.
#
# Note: By default, Draupnir is fairly verbose - expect a lot of messages in this room.
# (see verboseLogging to adjust this a bit.)
MANAGEMENT_ROOM="!KTOGIJKnLqziezPzuO:matrix.org"
# If true (the default), Draupnir will only accept invites from users present in managementRoom.
AUTO_JOIN_ONLY_IF_MANAGER=true
# If `autojoinOnlyIfManager` is false, only the members in this space can invite
# the bot to new rooms.
# ACCEPT_INVITES_FROM_SPACE="!example:example.org"
ACCESS_TOKEN_VERSION=v1

View File

@ -1,10 +0,0 @@
TYPE=rtm-astro-recipe:6e6418f
DOMAIN=resisttechmonopolies.online
## Domain aliases
#EXTRA_DOMAINS=', `www.resisttechmonopolies.online`'
LETS_ENCRYPT_ENV=production
VERSION=0.0.10

View File

@ -0,0 +1,5 @@
RECIPE=swarm-cronjob:1.11.0+1.15.0
TZ=UTC
LOG_LEVEL=info
LOG_JSON=false