Commit Graph

62 Commits

Author SHA1 Message Date
Henk van Maanen
b142be2d84 fix(control-plane): use correct taints and labels for first control plane node and fix existing default taints 2022-04-11 17:44:50 +02:00
Karim Naufal
4117776994
ip problem solved 2022-04-09 09:51:11 +02:00
Karim Naufal
65297f7ded
initial success for one control plane nodepool 2022-04-09 08:40:36 +02:00
Henk van Maanen
5e4d82fd95 wip 2022-04-06 20:38:24 +02:00
Henk van Maanen
4d6afe7d04 feat(agents): add location, label and taint options to agent-nodepool 2022-04-05 11:27:16 +02:00
Karim Naufal
31924b1038 disable flags tweak 2022-03-22 11:47:51 +01:00
Karim Naufal
be1c4efefb tweaked single node setup 2022-03-09 03:43:10 +01:00
Karim Naufal
2b7d2722c5 changed the agent_nodepools to be a list 2022-03-09 03:15:15 +01:00
Karim Naufal
a72facdd1a automated the creation of the subnets 2022-03-09 02:07:24 +01:00
Karim Naufal
385bd788be reduced number of words in names and remove cluster name in node names 2022-03-04 23:41:49 +01:00
Karim Naufal
d035dd9cf1 minor tweaks 2022-03-04 11:06:03 +01:00
Karim Naufal
651791d643 merge cloud-init changes 2022-03-04 09:29:51 +01:00
Karim Naufal
c92868c054 fixed TLS handshake error on agents 2022-03-03 19:08:12 +01:00
phaer
a02ccdfb9f improve support of single-node clusters 2022-03-03 13:32:57 +01:00
Karim Naufal
a0d3cb2ffd fixed k3s selinux 2022-03-03 01:56:04 +01:00
Karim Naufal
e2ca54c6fe delegated back the k3s selinux RPM to the install script with subsequent reboot 2022-03-02 02:06:31 +01:00
Karim Naufal
e5404b6adc proper application of selinux 2022-03-01 21:57:57 +01:00
Marco Nenciarini
dbc6dbf0aa
Switch to cloud-init for host initialization 2022-02-28 16:07:42 +01:00
Marco Nenciarini
830ca14118
Revert "Switch to cloud-init for host initialization"
This reverts commit 5f7d47783b.
This reverts commit 33c62d0c42.
2022-02-28 16:04:03 +01:00
Marco Nenciarini
5f7d47783b
Switch to cloud-init for host initialization 2022-02-28 10:30:49 +01:00
Karim Naufal
c309a1b290 default subnet not defined, so removing it 2022-02-28 00:49:07 +01:00
Karim Naufal
852a3f30c1 clarified Hetzner IPs 2022-02-27 23:58:46 +01:00
Karim Naufal
48b15fafbf clarified Hetzner IPs 2022-02-27 23:51:05 +01:00
Karim Naufal
4fe79625b1 added dynamic rule and var extra_firewall_rules 2022-02-27 23:15:46 +01:00
phaer
38fc145ad0 ip -> ipv4...
...explictly label current ip values as ipv4, in order to more
easily add ipv6 support later on.
2022-02-26 12:26:14 +01:00
jodhi
ec42a2b519 merge from upstream 2022-02-26 01:18:34 +07:00
jodhi
c9101824fc add specific subnet for nodepool 2022-02-26 01:16:38 +07:00
jodhi
b5039e2bc1 fix dynamic private ip 2022-02-24 23:57:36 +07:00
jodhi
58c630ba78 not hardcode the ip allocation for agents 2022-02-24 22:49:36 +07:00
Karim Naufal
0b19d36416 ability to chose k3s install channel 2022-02-23 21:35:42 +01:00
jodhi
7d301f2c6d [WIP] nodepools feature 2022-02-23 22:46:46 +07:00
Marco Nenciarini
0c3aa36c03
First control plane node is not special anymore
The first control plane node is now identical to any other server
node. The cluster initialization happens once in two steps: first,
make sure that the k3s cluster is initialized and then apply our
configurations while the other nodes join. This change makes the
initialization more resilient and even faster than before.
2022-02-22 13:36:25 +01:00
Marco Nenciarini
0f9d277293
Merge branch 'master' into modules 2022-02-20 11:30:07 +01:00
Karim Naufal
e39dc064e2 making k3s start more robust 2022-02-20 02:04:37 +01:00
Marco Nenciarini
0090c1a6f1
Fist attempt to factor microOS install 2022-02-20 00:00:13 +01:00
phaer
2fa1b17ac6 allow additional ssh public keys 2022-02-19 15:12:04 +01:00
phaer
406ba988bf use jsonencode, not template for config.ign 2022-02-19 15:07:39 +01:00
Karim Naufal
1f0a03b335 moved k3s-selinux install to combustion 2022-02-17 13:19:21 +01:00
Karim Naufal
1165389fc3 fix ip_not_available error 2022-02-16 10:56:22 +01:00
Karim Naufal
addf44c39f k3s install method ok 2022-02-16 05:27:52 +01:00
Karim Naufal
d920132694 k3s install method ok 2022-02-16 04:24:20 +01:00
Karim Naufal
fec695086a k3s-install ready for testing 2022-02-16 03:18:40 +01:00
Karim Naufal
1f0c825b23 switch image to standard microos 2022-02-16 00:13:02 +01:00
Karim Naufal
51f9718657 removed latest csi and latest ccm containers option, as it was causing problems over time 2022-02-15 22:33:22 +01:00
Karim Naufal
e6b12a172c fix for error messages 2022-02-12 01:45:25 +01:00
phaer
347ba42866 replace kustomization.yaml.tpl with yamlencode
benefit is replacing inline strings in yaml with proper files
locally while still just deploying a single file to the remote
host.
2022-02-11 23:49:54 +01:00
phaer
9dc4952665 Expose kubeconfig in outputs...
* To do so, we need to ensure that the generated kubeconfig is part of
  terraforms dependency graph. This has the additional benefit of not
  depending on local files anymore which should enable multi-user
  setups.

* This also means that we can't deploy CCM, CSI & Traefik from our local
  host, because we don't have kubeconfig.yaml locally while provisioning
  the control plane, only afterwards.

* So we just run kubectl apply on the control plane itself, after k3s is
  ready.

* To do so, we need to deploy all manifests. I've merged the patches
  into a single kustomization.yaml file, because that makes the
  deployment of those files to the control-plane server easier.

* we could also put the traefik config into the same kustomization file,
  which would save us one of the file provisioner blocks. I didn't want
  this PR to get any bigger, and will consider merging this config later
  on. kustomization.yaml is small enough that we could yamlencode() for
  it and store the patches in separate files again, not as
  inline-strings which is kind of ugly.
2022-02-11 12:45:03 +01:00
Karim Naufal
86673fea86 fixed for missing metalink 2022-02-10 13:16:09 +01:00
Karim Naufal
e7f016fc59 tempory patch for aria2c file 2022-02-10 03:06:40 +01:00
Marco Nenciarini
0b13f900e1
Agents IP should not depend on servers_num 2022-02-09 13:03:31 +01:00