The inventory system offers a centralized approach to customizing roles, allowing manipulation of variables without directly editing the roles themselves. This ensures persistent configurations while avoiding conflicts during git merge operations.
To obtain a shm_size variable for Plex, simply prepend plex_docker_ to the parameter name:
plex_docker_shm_size
For use cases involving Docker parameters beyond those exposed in the role files, it is still possible to construct usable Saltbox variables. The following resources provide the required syntax elements:
A common use for overrides will be specifying the version of the Docker image to be used. Let's see how that's done by looking into /srv/git/saltbox/roles/sonarr/defaults/main.yml around line 89:
Variables suffixed with _default and variables predefined with non-empty values (specifically, not followed by a blank, an empty string "", list [] or dictionary {}) fall under this category. Using the Inventory to define one of these variables is therefore considered an override, as it will cause the value(s) originally stored in it to be discarded.
Note: sonarr_docker_image_tag: "release".
By default, Saltbox will use ghcr.io/hotio/sonarr:release as the Sonarr Docker image.
Should we choose to switch to "nightly" versions, we can add the following line to localhost.yml:
sonarr_docker_image_tag:"nightly"
This will cause Saltbox to use the ghcr.io/hotio/sonarr:nightly Docker image, overriding the default: release. When we update Saltbox, our tag change to nightly will remain in effect.
A common use for additions is to specify extra Docker mappings or flags. Let's examine how to give our code-server container access to more locations on the host:
Variables suffixed with _custom and variables defined with an empty string fall under this category. Respectively, this is used to add custom values to a list or a dictionary without discarding existing values, and to assign a value to an exposed role-specific setting.
Note the list syntax. Since we want the container to preserve existing volumes, the _docker_volumes_default list should not be overridden. Instead, we use the _docker_volumes_custom list.
To expose additional host locations (in this case, /srv and our home directory), we can add custom volumes to the list using the following syntax in the Inventory:
The container will then be created with the new volumes included, and the target locations will be accessible to code-server at /host_srv and /host_home.
##### Enabling different media servers, downloaders and indexers #####media_servers_enabled:["emby"]download_clients_enabled:["deluge","nzbget"]download_indexers_enabled:["prowlarr"]##### Plex Ports for local access #####plex_open_main_ports:trueplex_open_local_ports:true##### Plex Container Variables ####plex_docker_image_pull:falseplex_docker_image_tag:beta#### Examples of specified container images: ####radarr_docker_image_tag:nightlysonarr_docker_image_tag:nightlypetio_docker_image_tag:nightly#### Bandwidth limiting ####transfer_docker_envs_custom:MAX_UPLOAD_SIZE:"104857546"#### Specify Overseerr DNS server - can fix name resolution issue with TMDb ####overseerr_docker_dns_servers:-8.8.8.8-8.8.4.4#### Add custom aliases to bash shell ######## Note the syntax - a pipe and two space indentation for the contents ####shell_bash_bashrc_block_custom:|alias sbu='sb update'alias sbi='sb install'#### Add custom aliases to zsh shell ####### Note the syntax - a pipe and two space indentation for the contents ####shell_zsh_zshrc_block_custom:|alias sbu='sb update'alias sbi='sb install'
After making this change in the Inventory file, simply run the appropriate role command to disable Authelia on that specific app. Remember, you can run multiple tags at once.
Should you wish to enable Authelia on an application that did not previously use it you do something similar as above but use a different value to enable it:
It should be noted that we take care of whitelisting any API endpoints when enabling Authelia for you so ask on the discord if you have trouble with enabling Authelia on an application that needs to have its API whitelisted and the below example isn't enough.
Inject an Authorization header - Traefik performs basic auth with the backend app
This will allow you to keep basic auth enabled within apps while avoiding the hassle of entering the credentials manually. The authorization header is only inserted if the request is authorized through the SSO middleware (Authelia) and is not applied to the API endpoint(s).
You can use this tool to generate the header contents based on your credentials.
#### Make Organizr available only at the base domain ####organizr_web_subdomain:""#### Make Tautulli available only at `stats.domain.tld` ####tautulli_web_subdomain:"stats"
DNS records for the following examples won't be set up by Saltbox. You can add them manually or if using Cloudflare, have the ddns service handle it.
#### Make Organizr available at `organizr.domain.tld`, `domain.tld` and `example.com` ####organizr_web_host_override:"Host(`'+traefik_host+'`)||Host(`{{organizr_web_domain}}`)||Host(`example.com`)"#### Make Overseerr available at both `overseerr.domain.tld` and `requests.domain.tld` ####overseerr_web_host_override:"Host(`'+traefik_host+'`)||Host(`{{'requests.'+overseerr_web_domain}}`)"