Files
HomeAudit/stacks/apps/appflowy.yml
admin 705a2757c1 Major infrastructure migration and Vaultwarden PostgreSQL troubleshooting
COMPREHENSIVE CHANGES:

INFRASTRUCTURE MIGRATION:
- Migrated services to Docker Swarm on OMV800 (192.168.50.229)
- Deployed PostgreSQL database for Vaultwarden migration
- Updated all stack configurations for Docker Swarm compatibility
- Added comprehensive monitoring stack (Prometheus, Grafana, Blackbox)
- Implemented proper secret management for all services

VAULTWARDEN POSTGRESQL MIGRATION:
- Attempted migration from SQLite to PostgreSQL for NFS compatibility
- Created PostgreSQL stack with proper user/password configuration
- Built custom Vaultwarden image with PostgreSQL support
- Troubleshot persistent SQLite fallback issue despite PostgreSQL config
- Identified known issue where Vaultwarden silently falls back to SQLite
- Added ENABLE_DB_WAL=false to prevent filesystem compatibility issues
- Current status: Old Vaultwarden on lenovo410 still working, new one has config issues

PAPERLESS SERVICES:
- Successfully deployed Paperless-NGX and Paperless-AI on OMV800
- Both services running on ports 8000 and 3000 respectively
- Caddy configuration updated for external access
- Services accessible via paperless.pressmess.duckdns.org and paperless-ai.pressmess.duckdns.org

CADDY CONFIGURATION:
- Updated Caddyfile on Surface (192.168.50.254) for new service locations
- Fixed Vaultwarden reverse proxy to point to new Docker Swarm service
- Removed old notification hub reference that was causing conflicts
- All services properly configured for external access via DuckDNS

BACKUP AND DISCOVERY:
- Created comprehensive backup system for all hosts
- Generated detailed discovery reports for infrastructure analysis
- Implemented automated backup validation scripts
- Created migration progress tracking and verification reports

MONITORING STACK:
- Deployed Prometheus, Grafana, and Blackbox monitoring
- Created infrastructure and system overview dashboards
- Added proper service discovery and alerting configuration
- Implemented performance monitoring for all critical services

DOCUMENTATION:
- Reorganized documentation into logical structure
- Created comprehensive migration playbook and troubleshooting guides
- Added hardware specifications and optimization recommendations
- Documented all configuration changes and service dependencies

CURRENT STATUS:
- Paperless services:  Working and accessible externally
- Vaultwarden:  PostgreSQL configuration issues, old instance still working
- Monitoring:  Deployed and operational
- Caddy:  Updated and working for external access
- PostgreSQL:  Database running, connection issues with Vaultwarden

NEXT STEPS:
- Continue troubleshooting Vaultwarden PostgreSQL configuration
- Consider alternative approaches for Vaultwarden migration
- Validate all external service access
- Complete final migration validation

TECHNICAL NOTES:
- Used Docker Swarm for orchestration on OMV800
- Implemented proper secret management for sensitive data
- Added comprehensive logging and monitoring
- Created automated backup and validation scripts
2025-08-30 20:18:44 -04:00

72 lines
1.9 KiB
YAML

version: '3.9'
services:
appflowy:
image: ghcr.io/appflowy-io/appflowy-cloud:0.3.5
environment:
DATABASE_URL_FILE: /run/secrets/appflowy_db_url
REDIS_URL: redis://redis_master:6379
STORAGE_ENDPOINT: http://minio:9000
STORAGE_BUCKET: appflowy
STORAGE_ACCESS_KEY_FILE: /run/secrets/minio_access_key
STORAGE_SECRET_KEY_FILE: /run/secrets/minio_secret_key
secrets:
- appflowy_db_url
- minio_access_key
- minio_secret_key
networks:
- traefik-public
- database-network
depends_on:
- minio
deploy:
labels:
- traefik.enable=true
- traefik.http.routers.appflowy.rule=Host(`appflowy.localhost`)
- traefik.http.routers.appflowy.entrypoints=websecure
- traefik.http.routers.appflowy.tls=true
- traefik.http.services.appflowy.loadbalancer.server.port=8000
minio:
image: quay.io/minio/minio:RELEASE.2024-05-10T01-41-38Z
command: server /data --console-address ":9001"
environment:
MINIO_ROOT_USER_FILE: /run/secrets/minio_access_key
MINIO_ROOT_PASSWORD_FILE: /run/secrets/minio_secret_key
secrets:
- minio_access_key
- minio_secret_key
volumes:
- appflowy_minio:/data
networks:
- traefik-public
deploy:
labels:
- traefik.enable=true
- traefik.http.routers.minio.rule=Host(`minio.localhost`)
- traefik.http.routers.minio.entrypoints=websecure
- traefik.http.routers.minio.tls=true
- traefik.http.services.minio.loadbalancer.server.port=9001
volumes:
appflowy_minio:
driver: local
driver_opts:
type: nfs
o: addr=omv800.local,nolock,soft,rw
device: :/srv/mergerfs/DataPool/appflowy
secrets:
appflowy_db_url:
external: true
minio_access_key:
external: true
minio_secret_key:
external: true
networks:
traefik-public:
external: true
database-network:
external: true