merge cloud-init changes
This commit is contained in:
commit
651791d643
1
.gitignore
vendored
1
.gitignore
vendored
@ -6,3 +6,4 @@ kubeconfig.yaml-e
|
|||||||
terraform.tfvars
|
terraform.tfvars
|
||||||
plans.yaml
|
plans.yaml
|
||||||
traefik_config.yaml
|
traefik_config.yaml
|
||||||
|
kured.yaml
|
||||||
|
@ -44,11 +44,11 @@ resource "null_resource" "agents" {
|
|||||||
provisioner "file" {
|
provisioner "file" {
|
||||||
content = yamlencode({
|
content = yamlencode({
|
||||||
node-name = module.agents[each.key].name
|
node-name = module.agents[each.key].name
|
||||||
server = "https://${local.first_control_plane_network_ipv4}:6443"
|
server = "https://${module.control_planes[0].private_ipv4_address}:6443"
|
||||||
token = random_password.k3s_token.result
|
token = random_password.k3s_token.result
|
||||||
kubelet-arg = "cloud-provider=external"
|
kubelet-arg = "cloud-provider=external"
|
||||||
flannel-iface = "eth1"
|
flannel-iface = "eth1"
|
||||||
node-ip = module.agents[each.key].ipv4_address
|
node-ip = module.agents[each.key].private_ipv4_address
|
||||||
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
||||||
})
|
})
|
||||||
destination = "/tmp/config.yaml"
|
destination = "/tmp/config.yaml"
|
||||||
|
@ -53,7 +53,6 @@ resource "null_resource" "control_planes" {
|
|||||||
kubelet-arg = "cloud-provider=external"
|
kubelet-arg = "cloud-provider=external"
|
||||||
node-ip = module.control_planes[count.index].private_ipv4_address
|
node-ip = module.control_planes[count.index].private_ipv4_address
|
||||||
advertise-address = module.control_planes[count.index].private_ipv4_address
|
advertise-address = module.control_planes[count.index].private_ipv4_address
|
||||||
tls-san = module.control_planes[count.index].private_ipv4_address
|
|
||||||
node-taint = var.allow_scheduling_on_control_plane ? [] : ["node-role.kubernetes.io/master:NoSchedule"]
|
node-taint = var.allow_scheduling_on_control_plane ? [] : ["node-role.kubernetes.io/master:NoSchedule"]
|
||||||
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
||||||
})
|
})
|
||||||
|
1
init.tf
1
init.tf
@ -18,7 +18,6 @@ resource "null_resource" "first_control_plane" {
|
|||||||
kubelet-arg = "cloud-provider=external"
|
kubelet-arg = "cloud-provider=external"
|
||||||
node-ip = module.control_planes[0].private_ipv4_address
|
node-ip = module.control_planes[0].private_ipv4_address
|
||||||
advertise-address = module.control_planes[0].private_ipv4_address
|
advertise-address = module.control_planes[0].private_ipv4_address
|
||||||
tls-san = module.control_planes[0].private_ipv4_address
|
|
||||||
node-taint = var.allow_scheduling_on_control_plane ? [] : ["node-role.kubernetes.io/master:NoSchedule"]
|
node-taint = var.allow_scheduling_on_control_plane ? [] : ["node-role.kubernetes.io/master:NoSchedule"]
|
||||||
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
|
||||||
})
|
})
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
locals {
|
locals {
|
||||||
first_control_plane_network_ipv4 = module.control_planes[0].private_ipv4_address
|
# if we are in a single cluster config, we use the default klipper lb instead of traefik
|
||||||
is_single_node_cluster = var.control_plane_count + length(keys(var.agent_nodepools)) == 1
|
is_single_node_cluster = var.control_plane_count + length(keys(var.agent_nodepools)) == 1
|
||||||
|
ssh_public_key = trimspace(file(var.public_key))
|
||||||
ssh_public_key = trimspace(file(var.public_key))
|
|
||||||
# ssh_private_key is either the contents of var.private_key or null to use a ssh agent.
|
# ssh_private_key is either the contents of var.private_key or null to use a ssh agent.
|
||||||
ssh_private_key = var.private_key == null ? null : trimspace(file(var.private_key))
|
ssh_private_key = var.private_key == null ? null : trimspace(file(var.private_key))
|
||||||
# ssh_identity is not set if the private key is passed directly, but if ssh agent is used, the public key tells ssh agent which private key to use.
|
# ssh_identity is not set if the private key is passed directly, but if ssh agent is used, the public key tells ssh agent which private key to use.
|
||||||
|
@ -43,6 +43,10 @@ runcmd:
|
|||||||
# We set Google DNS servers
|
# We set Google DNS servers
|
||||||
- [ sed, -i, 's#NETCONFIG_DNS_STATIC_SERVERS=""#NETCONFIG_DNS_STATIC_SERVERS="8.8.8.8 8.8.4.4"#g', /etc/sysconfig/network/config]
|
- [ sed, -i, 's#NETCONFIG_DNS_STATIC_SERVERS=""#NETCONFIG_DNS_STATIC_SERVERS="8.8.8.8 8.8.4.4"#g', /etc/sysconfig/network/config]
|
||||||
|
|
||||||
|
# Bound the amount of logs that can survive on the system
|
||||||
|
- [ sed, -i, 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]
|
||||||
|
- [ sed, -i, 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]
|
||||||
|
|
||||||
# Activate the private network
|
# Activate the private network
|
||||||
- systemctl reload network
|
- systemctl reload network
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user