Skip to content

Deploy services with k3s and storage#4

Open
steveydevey wants to merge 3 commits intomainfrom
cursor/deploy-services-with-k3s-and-storage-3dff
Open

Deploy services with k3s and storage#4
steveydevey wants to merge 3 commits intomainfrom
cursor/deploy-services-with-k3s-and-storage-3dff

Conversation

@steveydevey
Copy link
Owner

Add Kubernetes manifests and deployment script for a privacy-focused self-hosting stack on K3s using Longhorn and NFS storage.

This PR delivers a comprehensive set of Kubernetes YAMLs, a deployment script, and detailed documentation to set up various self-hosted privacy-focused services (e.g., Pi-hole, Nextcloud, Immich, Vaultwarden, WireGuard) on a K3s cluster. The services were identified and added iteratively based on user requests, drawing inspiration from an XDA Developers article.


Open in Cursor Open in Web

cursoragent and others added 3 commits September 25, 2025 00:11
Co-authored-by: newsted <newsted@gmail.com>
Co-authored-by: newsted <newsted@gmail.com>
Co-authored-by: newsted <newsted@gmail.com>
@cursor
Copy link

cursor bot commented Sep 25, 2025

Cursor Agent can help with this pull request. Just @cursor in comments and I'll start working on changes in this branch.
Learn more about Cursor Agents

@steveydevey steveydevey marked this pull request as ready for review September 25, 2025 00:29
Copy link

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR is being reviewed by Cursor Bugbot

Details

You are on the Bugbot Free tier. On this plan, Bugbot will review limited PRs each billing cycle.

To receive Bugbot reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

forward-addr: 9.9.9.9@853
forward-addr: 149.112.112.112@853
forward-ssl-upstream: yes

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: Duplicate Forward Zones Cause Configuration Failure

The Unbound configuration includes duplicate forward-zone blocks, both named ".". This invalid setup creates a conflict, leading to only one block being used or Unbound failing to start.

Fix in Cursor Fix in Web

persistentVolumeClaim:
claimName: vaultwarden-pvc
- name: vaultwarden-ssl
emptyDir: {} # Mount your SSL certificates here if needed
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: SSL Certificates Missing in EmptyDir Volume

The ROCKET_TLS environment variable expects SSL certificates at /ssl/cert.pem and /ssl/key.pem. However, the /ssl volume mount is configured as an emptyDir, meaning these certificate files won't be present. This mismatch will prevent Vaultwarden from properly enabling SSL/TLS.

Fix in Cursor Fix in Web

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants