diff --git a/README.md b/README.md index 311cc53..c6709ff 100644 --- a/README.md +++ b/README.md @@ -68,7 +68,7 @@ If you would like to add a new config, you can use the [service-template](templa | 📻 **Miniflux** | A minimalist and opinionated feed reader. | [Details](services/miniflux) | | 🎶 **Navidrome** | Your Personal Streaming Service self-hosted. | [Details](services/navidrome) | | 🎶 **Swing Music** | A fast, beautiful, self-hosted music streaming server for your local audio library. | [Details](services/swingmx) | -| 🎬 **Overseerr** | A request management and media discovery tool for Plex and Jellyfin users. | [Details](services/overseerr) | +| 🎬 **Seerr** | A request management and media discovery tool for Plex, Jellyfin and Emby. | [Details](services/seerr) | | 🎵 **Picard** | MusicBrainz Picard is a cross-platform music tagger for organizing and tagging music files. | [Details](services/picard) | | 🎬 **Plex** | A media server that organizes video, music, and photos from personal media libraries. | [Details](services/plex) | | 📥 **qBittorrent** | An open-source BitTorrent client. | [Details](services/qbittorrent) | diff --git a/services/overseerr/README.md b/services/overseerr/README.md deleted file mode 100644 index 74b570c..0000000 --- a/services/overseerr/README.md +++ /dev/null @@ -1,13 +0,0 @@ -# Overseerr with Tailscale Sidecar Configuration - -This Docker Compose configuration sets up [Overseerr](https://github.com/sct/overseerr) with Tailscale as a sidecar container to securely manage and access your request management system over a private Tailscale network. By integrating Tailscale in a sidecar configuration, you enhance the privacy and security of your Overseerr instance, ensuring it is only accessible within your Tailscale network. - -## Overseerr - -[Overseerr](https://github.com/sct/overseerr) is an open-source request management and media discovery tool built to work with Plex and Jellyfin. It allows users to search and request media, track request status, and manage users in a visually appealing and user-friendly interface. By pairing Overseerr with Tailscale, your instance becomes securely accessible through a zero-config mesh VPN, preventing unauthorized access over the public internet. - -## Configuration Overview - -In this setup, the `tailscale-overseerr` service runs the Tailscale daemon to provide secure, private networking. The `overseerr` service is configured to use Tailscale’s network stack via Docker’s `network_mode: service:` syntax. This binds Overseerr’s network interface to the Tailscale container, making the web UI and API available only through your Tailscale network (or locally, if needed). - -This architecture is ideal for self-hosters who want to access Overseerr from anywhere without exposing it to the internet, maintaining both ease of access and strict privacy controls. diff --git a/services/overseerr/.env b/services/seerr/.env similarity index 82% rename from services/overseerr/.env rename to services/seerr/.env index 0810edf..c4c8594 100644 --- a/services/overseerr/.env +++ b/services/seerr/.env @@ -3,8 +3,8 @@ #COMPOSE_PROJECT_NAME= # Optional: only use when running multiple deployments on the same infrastructure. # Service Configuration -SERVICE=overseerr -IMAGE_URL=sctx/overseerr:latest +SERVICE=seerr +IMAGE_URL=ghcr.io/seerr-team/seerr:latest # Network Configuration SERVICEPORT=5055 @@ -14,4 +14,4 @@ DNS_SERVER=9.9.9.9 TS_AUTHKEY= # Optional Service variables -# PUID=1000 +# PUID=1000 \ No newline at end of file diff --git a/services/seerr/README.md b/services/seerr/README.md new file mode 100644 index 0000000..a778eb0 --- /dev/null +++ b/services/seerr/README.md @@ -0,0 +1,13 @@ +# Seerr with Tailscale Sidecar Configuration + +This Docker Compose configuration sets up [Seerr](https://github.com/seerr-team/seerr) with Tailscale as a sidecar container to securely manage and access your request management system over a private Tailscale network. By integrating Tailscale in a sidecar configuration, you enhance the privacy and security of your Seerr instance, ensuring it is only accessible within your Tailscale network. + +## Seerr + +[Seerr](https://github.com/seerr-team/seerr) is an open-source request management and media discovery tool built to work with Plex, Jellyfin and Emby. It allows users to search and request media, track request status, and manage users in a visually appealing and user-friendly interface. By pairing Seer with Tailscale, your instance becomes securely accessible through a zero-config mesh VPN, preventing unauthorized access over the public internet. + +## Configuration Overview + +In this setup, the `tailscale-seerr` service runs the Tailscale daemon to provide secure, private networking. The `seerr` service is configured to use Tailscale’s network stack via Docker’s `network_mode: service:` syntax. This binds Seer’s network interface to the Tailscale container, making the web UI and API available only through your Tailscale network (or locally, if needed). + +This architecture is ideal for self-hosters who want to access Seerr from anywhere without exposing it to the internet, maintaining both ease of access and strict privacy controls. diff --git a/services/overseerr/compose.yaml b/services/seerr/compose.yaml similarity index 93% rename from services/overseerr/compose.yaml rename to services/seerr/compose.yaml index e8a863b..18576aa 100644 --- a/services/overseerr/compose.yaml +++ b/services/seerr/compose.yaml @@ -52,6 +52,7 @@ services: image: ${IMAGE_URL} # Image to be used network_mode: service:tailscale # Sidecar configuration to route ${SERVICE} through Tailscale container_name: app-${SERVICE} # Name for local container management + init: true # Use an init system to properly handle signals and process reaping environment: - LOG_LEVEL=debug - TZ=Europe/Amsterdam @@ -62,7 +63,7 @@ services: tailscale: condition: service_healthy healthcheck: - test: ["CMD", "pgrep", "-f", "yarn"] # Check if ${SERVICE} process is running + test: wget --no-verbose --tries=1 --spider http://localhost:5055/api/v1/status || exit 1 # Check if ${SERVICE} process is running interval: 1m # How often to perform the check timeout: 10s # Time to wait for the check to succeed retries: 3 # Number of retries before marking as unhealthy