feat(borgmatic): ensure that all sqlite databases are backed up separately from the services they store data for

This commit is contained in:
wi11-holdsworth 2026-01-15 15:38:54 +11:00
parent 48b0a2325d
commit 2197490b63
12 changed files with 78 additions and 1 deletions

View file

@ -11,6 +11,13 @@ in
listenPort = port; listenPort = port;
}; };
borgmatic.settings.sqlite_databases = [
{
name = "bazarr";
path = "/srv/bazarr/db/bazarr.db";
}
];
caddy.virtualHosts."bazarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."bazarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -10,6 +10,13 @@ in
group = "srv"; group = "srv";
}; };
borgmatic.settings.sqlite_databases = [
{
name = "jellyfin";
path = "/srv/jellyfin/data/jellyfin.db";
}
];
caddy.virtualHosts."jellyfin.fi33.buzz".extraConfig = '' caddy.virtualHosts."jellyfin.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -12,6 +12,13 @@ in
}; };
}; };
borgmatic.settings.sqlite_databases = [
{
name = "karakeep";
path = "/var/lib/karakeep/db.db";
}
];
caddy.virtualHosts."karakeep.fi33.buzz".extraConfig = '' caddy.virtualHosts."karakeep.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -15,6 +15,13 @@ in
tokenKeyFile = config.age.secrets.kavita.path; tokenKeyFile = config.age.secrets.kavita.path;
}; };
borgmatic.settings.sqlite_databases = [
{
name = "kavita";
path = "/srv/kavita/config/kavita.db";
}
];
caddy.virtualHosts."kavita.fi33.buzz".extraConfig = '' caddy.virtualHosts."kavita.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -13,6 +13,13 @@ in
group = "srv"; group = "srv";
}; };
borgmatic.settings.sqlite_databases = [
{
name = "lidarr";
path = "/srv/lidarr/lidarr.db";
}
];
caddy.virtualHosts."lidarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."lidarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -12,6 +12,13 @@ in
}; };
}; };
borgmatic.settings.sqlite_databases = [
{
name = "prowlarr";
path = "/srv/prowlarr/prowlarr.db";
}
];
caddy.virtualHosts."prowlarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."prowlarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -23,6 +23,13 @@ in
}; };
}; };
services.borgmatic.settings.sqlite_databases = [
{
name = "qui";
path = "/srv/qui/qui.db";
}
];
services.caddy.virtualHosts."qui.fi33.buzz".extraConfig = '' services.caddy.virtualHosts."qui.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -13,6 +13,13 @@ in
group = "srv"; group = "srv";
}; };
borgmatic.settings.sqlite_databases = [
{
name = "radarr";
path = "/srv/radarr/radarr.db";
}
];
caddy.virtualHosts."radarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."radarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -13,6 +13,13 @@ in
group = "srv"; group = "srv";
}; };
borgmatic.settings.sqlite_databases = [
{
name = "readarr";
path = "/srv/readarr/readarr.db";
}
];
caddy.virtualHosts."readarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."readarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -13,6 +13,13 @@ in
group = "srv"; group = "srv";
}; };
borgmatic.settings.sqlite_databases = [
{
name = "sonarr";
path = "/srv/sonarr/sonarr.db";
}
];
caddy.virtualHosts."sonarr.fi33.buzz".extraConfig = '' caddy.virtualHosts."sonarr.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {

View file

@ -23,6 +23,13 @@ in
}; };
}; };
borgmatic.settings.sqlite_databases = [
{
name = "vaultwarden";
path = "/srv/vaultwarden/db.sqlite3";
}
];
caddy.virtualHosts."vaultwarden.fi33.buzz".extraConfig = '' caddy.virtualHosts."vaultwarden.fi33.buzz".extraConfig = ''
reverse_proxy localhost:${toString port} reverse_proxy localhost:${toString port}
tls ${certloc}/cert.pem ${certloc}/key.pem { tls ${certloc}/cert.pem ${certloc}/key.pem {