titan-iac/services/pegasus/deployment.yaml

124 lines
4.2 KiB
YAML
Raw Normal View History

# services/pegasus/deployment.yaml
2025-09-07 13:20:49 -05:00
apiVersion: apps/v1
kind: Deployment
metadata:
name: pegasus
namespace: jellyfin
spec:
2025-10-09 23:23:41 -05:00
replicas: 1
revisionHistoryLimit: 3
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 0
maxUnavailable: 1
2025-09-07 13:20:49 -05:00
selector: { matchLabels: { app: pegasus } }
template:
metadata:
labels: { app: pegasus }
annotations:
vault.hashicorp.com/agent-inject: "true"
vault.hashicorp.com/role: "pegasus"
vault.hashicorp.com/agent-inject-secret-pegasus-env: "kv/data/atlas/pegasus/pegasus-secrets"
vault.hashicorp.com/agent-inject-template-pegasus-env: |
{{- with secret "kv/data/atlas/pegasus/pegasus-secrets" -}}
export PEGASUS_SESSION_KEY="{{ .Data.data.PEGASUS_SESSION_KEY }}"
export JELLYFIN_URL="{{ .Data.data.JELLYFIN_URL }}"
export JELLYFIN_API_KEY="{{ .Data.data.JELLYFIN_API_KEY }}"
{{- end -}}
2025-09-07 13:20:49 -05:00
spec:
2025-09-15 12:32:52 -05:00
nodeSelector:
2025-12-18 02:02:21 -03:00
kubernetes.io/arch: arm64
node-role.kubernetes.io/worker: "true"
serviceAccountName: pegasus-vault-sync
2026-01-14 10:07:31 -03:00
imagePullSecrets:
- name: harbor-regcred
2025-09-07 13:20:49 -05:00
securityContext:
runAsNonRoot: true
2025-09-16 20:08:50 -05:00
runAsUser: 65532
runAsGroup: 65532
fsGroup: 65532
2025-09-07 13:20:49 -05:00
fsGroupChangePolicy: "OnRootMismatch"
2025-09-16 22:45:15 -05:00
initContainers:
- name: fix-perms
image: alpine:3.20
command:
- sh
- -lc
- |
set -eux
# Scratch area for tus uploads (always writable)
mkdir -p /media/.pegasus-tus
chmod 0777 /media/.pegasus-tus
# Make each top-level library dir group-writable and setgid,
# and try to set its group to 65532 (so the app can write).
for d in /media/*; do
[ -d "$d" ] || continue
base="$(basename "$d")"
[ "$base" = ".pegasus-tus" ] && continue
# chgrp can fail on some backends; don't block the pod if it does.
chgrp 65532 "$d" || true
chmod 2775 "$d" || true
done
securityContext:
runAsUser: 0
runAsGroup: 0
runAsNonRoot: false
allowPrivilegeEscalation: false
volumeMounts:
- { name: media, mountPath: /media }
2025-09-07 13:20:49 -05:00
containers:
2025-09-16 22:45:15 -05:00
- name: pegasus
image: registry.bstein.dev/streaming/pegasus-vault:1.2.32 # {"$imagepolicy": "jellyfin:pegasus"}
2025-09-16 22:45:15 -05:00
imagePullPolicy: Always
env:
- name: PEGASUS_MEDIA_ROOT
valueFrom: { configMapKeyRef: { name: pegasus-config, key: PEGASUS_MEDIA_ROOT } }
- name: PEGASUS_BIND
valueFrom: { configMapKeyRef: { name: pegasus-config, key: PEGASUS_BIND } }
- name: PEGASUS_USER_MAP_FILE
value: "/config/user-map.yaml"
- name: VAULT_ENV_FILE
value: /vault/secrets/pegasus-env
2025-09-16 22:45:15 -05:00
- name: PEGASUS_DEBUG
value: "1"
- name: PEGASUS_DRY_RUN
value: "0"
ports: [{ name: http, containerPort: 8080 }]
readinessProbe:
httpGet: { path: /healthz, port: http }
initialDelaySeconds: 2
periodSeconds: 5
timeoutSeconds: 1
livenessProbe:
httpGet: { path: /healthz, port: http }
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 2
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
capabilities: { drop: ["ALL"] }
resources:
requests: { cpu: 100m, memory: 256Mi }
limits: { cpu: 1000m, memory: 1Gi }
volumeMounts:
- name: media
mountPath: /media
- name: config
mountPath: /config
readOnly: true
- name: tmp
mountPath: /tmp
2025-09-07 13:20:49 -05:00
volumes:
- name: media
persistentVolumeClaim:
claimName: jellyfin-media-asteria-new
2025-09-07 13:20:49 -05:00
- name: config
configMap: { name: pegasus-user-map }
- name: tmp
2025-09-15 02:45:22 -05:00
emptyDir: {}