migrate nextcloud and matrix-terranix backup to syncoid

This commit is contained in:
Ingolf Wagner 2024-05-19 01:17:45 +02:00
parent ab4a870d0f
commit fda2ea3119
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
7 changed files with 25 additions and 12 deletions

View file

@ -38,7 +38,6 @@
./telemetry/loki.nix ./telemetry/loki.nix
./sync-rbackup.nix ./sync-rbackup.nix
./sync-script.nix
./sync-syncoid.nix ./sync-syncoid.nix
./service-atuin.nix ./service-atuin.nix

View file

@ -2,13 +2,8 @@
{ {
sops.secrets.rsync_private_key = { }; sops.secrets.rsync_private_key = { };
# todo : replace all of them with syncoid
rbackup.plans = { rbackup.plans = {
# todo : syncoid
nextcloud = {
sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@orbi:/var/lib/nixos-containers/nextcloud";
dst = "/mirror/nextcloud";
};
git = { git = {
sshKeyPath = config.sops.secrets.rsync_private_key.path; sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@orbi:/var/lib/forgejo/"; src = "root@orbi:/var/lib/forgejo/";
@ -24,11 +19,6 @@
src = "root@orbi:/var/lib/bitwarden_rs/"; src = "root@orbi:/var/lib/bitwarden_rs/";
dst = "/mirror/vaultwarden"; dst = "/mirror/vaultwarden";
}; };
matrix-terranix = {
sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@orbi:/var/lib/nixos-containers/matrix-terranix";
dst = "/mirror/matrix-terranix";
};
radarr = { radarr = {
sshKeyPath = config.sops.secrets.rsync_private_key.path; sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@orbi:/media/arr/radarr"; src = "root@orbi:/media/arr/radarr";

View file

@ -24,6 +24,16 @@
}; };
# remote # remote
commands.matrix-terranix = {
sshKey = config.sops.secrets.syncoid_private_key.path;
source = "root@orbi:zroot/matrix-terranix";
target = "zraid/mirror/matrix-terranix"; # should not be created up front!
};
commands.nextcloud = {
sshKey = config.sops.secrets.syncoid_private_key.path;
source = "root@orbi:zroot/nextcloud";
target = "zraid/mirror/nextcloud"; # should not be created up front!
};
commands.photoprism = { commands.photoprism = {
sshKey = config.sops.secrets.syncoid_private_key.path; sshKey = config.sops.secrets.syncoid_private_key.path;
source = "root@orbi:zmedia/photoprism"; source = "root@orbi:zmedia/photoprism";

View file

@ -112,6 +112,18 @@ in
#"com.sun:auto-snapshot:monthly" = false; #"com.sun:auto-snapshot:monthly" = false;
}; };
}; };
"matrix-terranix" = {
type = "zfs_fs";
mountpoint = "/var/lib/nixos-containers/matrix-terranix";
options = {
mountpoint = "legacy";
compression = "lz4";
"com.sun:auto-snapshot:hourly" = toString true;
"com.sun:auto-snapshot:daily" = toString true;
#"com.sun:auto-snapshot:weekly" = false;
#"com.sun:auto-snapshot:monthly" = false;
};
};
}; };
}; };

View file

@ -92,6 +92,7 @@ in
imports = [ ../../components/monitor/container.nix ]; imports = [ ../../components/monitor/container.nix ];
components.monitor.container.promtail.port = 3502; components.monitor.container.promtail.port = 3502;
system.stateVersion = "23.11"; system.stateVersion = "23.11";
services.journald.extraConfig = "SystemMaxUse=1G";
# Configuring nameservers for containers is currently broken. # Configuring nameservers for containers is currently broken.
# Therefore in some cases internet connectivity can be broken inside the containers. # Therefore in some cases internet connectivity can be broken inside the containers.

View file

@ -18,6 +18,7 @@ in
imports = [ ../../components/monitor/container.nix ]; imports = [ ../../components/monitor/container.nix ];
components.monitor.container.promtail.port = 3503; components.monitor.container.promtail.port = 3503;
system.stateVersion = "23.11"; system.stateVersion = "23.11";
services.journald.extraConfig = "SystemMaxUse=1G";
# Photoprism # Photoprism
# ---------- # ----------