diff --git a/README.md b/README.md index a4d7a86..b956a45 100644 --- a/README.md +++ b/README.md @@ -5,9 +5,17 @@ ## Purpose -c4k-jitsi provides a k8s deployment for jitsi containing: -* jitsi +c4k-jitsi provides a k8s deployment for jitsi containing [see also Jitsi Architecture](https://jitsi.github.io/handbook/docs/architecture/) +* jitsi-web +* jvb +* jicofo +* prosody +* etherpad for shared documents +* excalidraw for whiteboards +* coturn as stun server +* moderator-election as tool for electing the next moderator * ingress having a letsencrypt managed certificate +* monitoring connected to grafana cloud The package aims to a low load sceanrio. diff --git a/doc/SetupOnHetzner.md b/doc/SetupOnHetzner.md index 1164415..76092e4 100644 --- a/doc/SetupOnHetzner.md +++ b/doc/SetupOnHetzner.md @@ -17,10 +17,10 @@ resource "aws_s3_bucket" "backup" { } } -resource "hcloud_server" "jitsi_09_2021" { +resource "hcloud_server" "jitsi_2025_02" { name = "the name" - image = "ubuntu-20.04" - server_type = "cx31" + image = "ubuntu-24.04" + server_type = "cx32" location = "fsn1" ssh_keys = ... @@ -29,16 +29,17 @@ resource "hcloud_server" "jitsi_09_2021" { } } -resource "aws_route53_record" "v4_neu" { +resource "aws_route53_record" "v4" { + for_each ["jitsi", "stun.jitsi", "excalidraw.jitsi", "etherpad.jitsi"] zone_id = the_dns_zone - name = "jitsi-neu" + name = each.key type = "A" ttl = "300" - records = [hcloud_server.jitsi_09_2021.ipv4_address] + records = [hcloud_server.jitsi_2025_01.ipv4_address] } output "ipv4" { - value = hcloud_server.jitsi_09_2021.ipv4_address + value = hcloud_server.jitsi_2025_01.ipv4_address } ``` @@ -49,11 +50,9 @@ For k8s installation we use our [provs](https://repo.prod.meissa.de/meissa/provs ``` -{:user :k8s - :k8s {:external-ip "ip-from-above"} - :cert-manager :letsencrypt-prod-issuer - :persistent-dirs ["postgres"] - } +{:fqdn "fqdn-from-above" + :node {:ipv4 "ip-from-above"} + :certmanager {:email "admin-email" :letsencryptEndpoint "prod}} ``` ## kubectl apply c4k-jitsi @@ -67,7 +66,6 @@ c4k-jitsi config.edn auth.edn | kubectl apply -f - with the following config.edn: ``` -{:fqdn "the-fqdn-from aws_route53_record.v4_neu" - :postgres-data-volume-path "/var/postgres" ;; Volume was configured at dda-k8s-crate, results in a PersistentVolume definition. +{:fqdn "fqdn-from-above" :issuer "prod" } ```