CHORE(immich): remove immich application

- Delete immich folder (argocd.yaml, helm-values.yaml, manifests/)
- Remove from kustomization.yaml
- Application no longer in use
This commit is contained in:
2026-01-08 18:09:55 +09:00
parent 449f8411e0
commit 7b884711d7
6 changed files with 0 additions and 218 deletions

View File

@@ -1,44 +0,0 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: immich
namespace: argocd
finalizers:
- resources-finalizer.argocd.argoproj.io
spec:
project: default
sources:
- repoURL: ghcr.io/immich-app/immich-charts
chart: immich
targetRevision: 0.10.3
helm:
valueFiles:
- $values/immich/helm-values.yaml
- repoURL: https://github.com/K3S-HOME/applications.git
targetRevision: main
ref: values
- repoURL: https://github.com/K3S-HOME/applications.git
targetRevision: main
path: immich
destination:
server: https://kubernetes.default.svc
namespace: immich
syncPolicy:
automated:
prune: true
selfHeal: true
allowEmpty: false
syncOptions:
- CreateNamespace=true
- PrunePropagationPolicy=foreground
- PruneLast=true
retry:
limit: 5
backoff:
duration: 5s
factor: 2
maxDuration: 3m
managedNamespaceMetadata:
labels:
goldilocks.fairwinds.com/enabled: 'true'
revisionHistoryLimit: 10

View File

@@ -1,117 +0,0 @@
# Immich Helm Values
# Chart: https://github.com/immich-app/immich-charts (v0.10.x)
# Self-hosted photo and video management solution
# Shared configuration for all components
controllers:
main:
containers:
main:
env:
# External PostgreSQL connection
DB_HOSTNAME: postgresql-rw.postgresql.svc.cluster.local
DB_PORT: "5432"
DB_DATABASE_NAME: immich
DB_USERNAME: bluemayne
DB_PASSWORD:
valueFrom:
secretKeyRef:
name: immich-postgres-password
key: password
# OAuth/OIDC configuration
OAUTH_ENABLED: "true"
OAUTH_ISSUER_URL: https://auth0213.kro.kr
OAUTH_CLIENT_ID: immich
OAUTH_CLIENT_SECRET:
valueFrom:
secretKeyRef:
name: immich-oidc
key: OAUTH_CLIENT_SECRET
OAUTH_SCOPE: "openid profile email"
OAUTH_AUTO_REGISTER: "true"
OAUTH_BUTTON_TEXT: "Login with Authelia"
OAUTH_AUTO_LAUNCH: "true"
# Immich configuration
immich:
persistence:
library:
existingClaim: immich-library
# Valkey for job queue
valkey:
enabled: true
controllers:
main:
containers:
main:
image:
repository: docker.io/valkey/valkey
tag: 9.0-alpine
# Server component
server:
enabled: true
controllers:
main:
containers:
main:
resources:
requests:
cpu: 15m
memory: 512Mi
limits:
memory: 768Mi
probes:
startup:
enabled: true
custom: true
spec:
httpGet:
path: /api/server-info/ping
port: 2283
periodSeconds: 10
failureThreshold: 30
ingress:
main:
enabled: true
className: traefik
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: immich0213.kro.kr
paths:
- path: /
service:
identifier: main
tls:
- secretName: immich-tls
hosts:
- immich0213.kro.kr
# Machine Learning component
machine-learning:
enabled: true
controllers:
main:
containers:
main:
resources:
requests:
cpu: 15m
memory: 1Gi
limits:
memory: 1536Mi
probes:
startup:
enabled: true
custom: true
spec:
httpGet:
path: /ping
port: 3003
periodSeconds: 10
failureThreshold: 30
persistence:
cache:
enabled: false

View File

@@ -1,6 +0,0 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- manifests/pvc.yaml
- manifests/secret.yaml
namespace: immich

View File

@@ -1,12 +0,0 @@
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: immich-library
namespace: immich
spec:
accessModes:
- ReadWriteOnce
storageClassName: local-path-retain
resources:
requests:
storage: 5Gi

View File

@@ -1,38 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: immich-postgres-password
namespace: immich
spec:
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: vault-backend
target:
name: immich-postgres-password
creationPolicy: Owner
data:
- secretKey: password
remoteRef:
key: postgresql
property: PASSWORD
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: immich-oidc
namespace: immich
spec:
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: vault-backend
target:
name: immich-oidc
creationPolicy: Owner
data:
- secretKey: OAUTH_CLIENT_SECRET
remoteRef:
key: authelia
property: IMMICH_CLIENT_SECRET

View File

@@ -9,5 +9,4 @@ resources:
- code-server/argocd.yaml
- umami/argocd.yaml
- headlamp/argocd.yaml
- immich/argocd.yaml
- mas/argocd.yaml