Newer
Older
---
apiVersion: v1
kind: ConfigMap
metadata:
name: stackspin-nextcloud-values
data:
values.yaml: |
nextcloud:
nextcloud:
host: "files.${domain}"
password: "${nextcloud_password}"
mail:
enabled: ${outgoing_mail_enabled}
fromAddress: "${outgoing_mail_from_local_part}"
domain: "${outgoing_mail_domain}"
smtp:
host: "${outgoing_mail_smtp_host}"
secure: "tls"
port: "${outgoing_mail_smtp_port}"
name: "${outgoing_mail_smtp_user}"
password: "${outgoing_mail_smtp_password}"
authtype: "${outgoing_mail_smtp_authtype}"

Maarten de Waard
committed
# Cronjob by default requests the same as nextcloud app, but that's not
# necessary
cronjob:
resources:

Maarten de Waard
committed
cpu: 100m
memory: 128Mi
ingress:
enabled: true
annotations:
# Tell cert-manager to automatically get a TLS certificate
kubernetes.io/tls-acme: "true"
# Set max body size high to allow big NextCloud uploads
nginx.ingress.kubernetes.io/proxy-body-size: 1G
nginx.ingress.kubernetes.io/server-snippet: |-
server_tokens off;
proxy_hide_header X-Powered-By;
rewrite ^/.well-known/webfinger /public.php?service=webfinger last;
rewrite ^/.well-known/host-meta /public.php?service=host-meta last;
rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json;
hosts:
- "files.${domain}"
tls:
- hosts:
- "files.${domain}"
secretName: stackspin-nextcloud-files
# Use 2 GB of storage for NC storage (maybe make configurable later?)
persistence:
enabled: true
existingClaim: "nextcloud-files"
podAnnotations:
# Let the backup system include nextcloud data.
backup.velero.io/backup-volumes: "nextcloud-data"
# Explicitly disable use of internal database
internalDatabase:
enabled: false
startupProbe:
enabled: true
failureThreshold: 60
resources:
limits:
cpu: 700m
# Enable and configure MariaDB chart
mariadb:
password: "${nextcloud_mariadb_password}"
rootPassword: "${nextcloud_mariadb_root_password}"
architecture: standalone
primary:
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
annotations:
# Let the backup system include nextcloud database data.
backup.velero.io/backup-volumes: "data"
persistence:
## Enable PostgreSQL persistence using Persistent Volume Claims.
enabled: true
existingClaim: "nextcloud-mariadb"
resources:
limits:
cpu: 200m
memory: 512Mi
requests:
cpu: 100m
memory: 256Mi
apps:
- name: sociallogin
enabled: true
- name: onlyoffice
enabled: true
- name: calendar
enabled: true
- name: passwords
enabled: true
setupApps:
backoffLimit: 20
onlyoffice:
resources:
limits:
cpu: 800m
memory: 2Gi
requests:
cpu: 200m
memory: 1Gi
server_name: "office.${domain}"
ingress:
enabled: true
annotations:
# Tell cert-manager to automatically get a TLS certificate
kubernetes.io/tls-acme: "true"
paths:
- "/"
hosts:
- "office.${domain}"
tls:
- hosts:
- "office.${domain}"
secretName: stackspin-nextcloud-office
jwtSecret: "${onlyoffice_jwt_secret}"
persistence:
enabled: true
existingClaim: "nextcloud-onlyoffice-data"
postgresql:
postgresqlPassword: "${onlyoffice_postgresql_password}"
resources:
limits:
cpu: 400m
memory: 256Mi
requests:
cpu: 200m
memory: 128Mi
persistence:
enabled: true
existingClaim: "nextcloud-postgresql"
rabbitmq:
password: "${onlyoffice_rabbitmq_password}"
persistence:
enabled: false
resources:
limits:
cpu: 500m
memory: 512Mi
requests:
cpu: 200m
memory: 256Mi
livenessProbe:
initialDelaySeconds: 180
failureThreshold: 10
redis:
architecture: standalone
master:
persistence:
enabled: false
resources:
limits:
cpu: 100m
memory: 64Mi
requests:
cpu: 50m
memory: 32Mi
commonConfiguration: |-
# Disable appendonly type persistence, because we don't need any
appendonly no
# Disable RDB persistence, for the same reason.
save ""
authorizeUrl: "https://sso.${domain}/oauth2/auth"
tokenUrl: "https://sso.${domain}/oauth2/token"
userInfoUrl: "https://sso.${domain}/userinfo"
clientSecret: "${nextcloud_oauth_client_secret}"
groupsClaim: "stackspin_roles"
scope: "openid profile email stackspin_roles"