forked from tim/k3s-ansible
Compare commits
6 Commits
dependabot
...
k3s-1-27
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
462f357856 | ||
|
|
9e244cd1be | ||
|
|
07b4bbe839 | ||
|
|
724d849fce | ||
|
|
e8c28ab9d2 | ||
|
|
9f040fd10a |
@@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
This playbook will build an HA Kubernetes cluster with `k3s`, `kube-vip` and MetalLB via `ansible`.
|
This playbook will build an HA Kubernetes cluster with `k3s`, `kube-vip` and MetalLB via `ansible`.
|
||||||
|
|
||||||
This is based on the work from [this fork](https://github.com/212850a/k3s-ansible) which is based on the work from [k3s-io/k3s-ansible](https://github.com/k3s-io/k3s-ansible). It uses [kube-vip](https://kube-vip.io/) to create a load balancer for control plane, and [metal-lb](https://metallb.universe.tf/installation/) for its service `LoadBalancer`.
|
This is based on the work from [this fork](https://github.com/212850a/k3s-ansible) which is based on the work from [k3s-io/k3s-ansible](https://github.com/k3s-io/k3s-ansible). It uses [kube-vip](https://kube-vip.chipzoller.dev/) to create a load balancer for control plane, and [metal-lb](https://metallb.universe.tf/installation/) for its service `LoadBalancer`.
|
||||||
|
|
||||||
If you want more context on how this works, see:
|
If you want more context on how this works, see:
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
k3s_version: v1.25.12+k3s1
|
k3s_version: v1.27.4+k3s1
|
||||||
# this is the user that has ssh access to these machines
|
# this is the user that has ssh access to these machines
|
||||||
ansible_user: ansibleuser
|
ansible_user: ansibleuser
|
||||||
systemd_dir: /etc/systemd/system
|
systemd_dir: /etc/systemd/system
|
||||||
@@ -81,49 +81,3 @@ proxmox_lxc_ct_ids:
|
|||||||
- 202
|
- 202
|
||||||
- 203
|
- 203
|
||||||
- 204
|
- 204
|
||||||
|
|
||||||
# Only enable this if you have set up your own container registry to act as a mirror / pull-through cache
|
|
||||||
# (harbor / nexus / docker's official registry / etc).
|
|
||||||
# Can be beneficial for larger dev/test environments (for example if you're getting rate limited by docker hub),
|
|
||||||
# or air-gapped environments where your nodes don't have internet access after the initial setup
|
|
||||||
# (which is still needed for downloading the k3s binary and such).
|
|
||||||
# k3s's documentation about private registries here: https://docs.k3s.io/installation/private-registry
|
|
||||||
custom_registries: false
|
|
||||||
# The registries can be authenticated or anonymous, depending on your registry server configuration.
|
|
||||||
# If they allow anonymous access, simply remove the following bit from custom_registries_yaml
|
|
||||||
# configs:
|
|
||||||
# "registry.domain.com":
|
|
||||||
# auth:
|
|
||||||
# username: yourusername
|
|
||||||
# password: yourpassword
|
|
||||||
# The following is an example that pulls all images used in this playbook through your private registries.
|
|
||||||
# It also allows you to pull your own images from your private registry, without having to use imagePullSecrets
|
|
||||||
# in your deployments.
|
|
||||||
# If all you need is your own images and you don't care about caching the docker/quay/ghcr.io images,
|
|
||||||
# you can just remove those from the mirrors: section.
|
|
||||||
custom_registries_yaml: |
|
|
||||||
mirrors:
|
|
||||||
docker.io:
|
|
||||||
endpoint:
|
|
||||||
- "https://registry.domain.com/v2/dockerhub"
|
|
||||||
quay.io:
|
|
||||||
endpoint:
|
|
||||||
- "https://registry.domain.com/v2/quayio"
|
|
||||||
ghcr.io:
|
|
||||||
endpoint:
|
|
||||||
- "https://registry.domain.com/v2/ghcrio"
|
|
||||||
registry.domain.com:
|
|
||||||
endpoint:
|
|
||||||
- "https://registry.domain.com"
|
|
||||||
|
|
||||||
configs:
|
|
||||||
"registry.domain.com":
|
|
||||||
auth:
|
|
||||||
username: yourusername
|
|
||||||
password: yourpassword
|
|
||||||
|
|
||||||
# Only enable and configure these if you access the internet through a proxy
|
|
||||||
# proxy_env:
|
|
||||||
# HTTP_PROXY: "http://proxy.domain.local:3128"
|
|
||||||
# HTTPS_PROXY: "http://proxy.domain.local:3128"
|
|
||||||
# NO_PROXY: "*.domain.local,127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
||||||
|
|||||||
@@ -6,7 +6,7 @@
|
|||||||
#
|
#
|
||||||
ansible-compat==3.0.1
|
ansible-compat==3.0.1
|
||||||
# via molecule
|
# via molecule
|
||||||
ansible-core==2.15.4
|
ansible-core==2.15.2
|
||||||
# via
|
# via
|
||||||
# -r requirements.in
|
# -r requirements.in
|
||||||
# ansible-compat
|
# ansible-compat
|
||||||
@@ -86,7 +86,7 @@ molecule==4.0.4
|
|||||||
# molecule-vagrant
|
# molecule-vagrant
|
||||||
molecule-vagrant==1.0.0
|
molecule-vagrant==1.0.0
|
||||||
# via -r requirements.in
|
# via -r requirements.in
|
||||||
netaddr==0.10.1
|
netaddr==0.8.0
|
||||||
# via -r requirements.in
|
# via -r requirements.in
|
||||||
nodeenv==1.7.0
|
nodeenv==1.7.0
|
||||||
# via pre-commit
|
# via pre-commit
|
||||||
@@ -103,7 +103,7 @@ pluggy==1.0.0
|
|||||||
# via molecule
|
# via molecule
|
||||||
pre-commit==2.21.0
|
pre-commit==2.21.0
|
||||||
# via -r requirements.in
|
# via -r requirements.in
|
||||||
pre-commit-hooks==4.5.0
|
pre-commit-hooks==4.4.0
|
||||||
# via -r requirements.in
|
# via -r requirements.in
|
||||||
pyasn1==0.4.8
|
pyasn1==0.4.8
|
||||||
# via
|
# via
|
||||||
|
|||||||
@@ -1,18 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
- name: Create k3s.service.d directory
|
|
||||||
file:
|
|
||||||
path: '{{ systemd_dir }}/k3s.service.d'
|
|
||||||
state: directory
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: '0755'
|
|
||||||
|
|
||||||
|
|
||||||
- name: Copy K3s http_proxy conf file
|
|
||||||
template:
|
|
||||||
src: "http_proxy.conf.j2"
|
|
||||||
dest: "{{ systemd_dir }}/k3s.service.d/http_proxy.conf"
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: '0755'
|
|
||||||
@@ -1,9 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
- name: Deploy K3s http_proxy conf
|
|
||||||
include_tasks: http_proxy.yml
|
|
||||||
when: proxy_env is defined
|
|
||||||
|
|
||||||
- name: Copy K3s service file
|
- name: Copy K3s service file
|
||||||
template:
|
template:
|
||||||
src: "k3s.service.j2"
|
src: "k3s.service.j2"
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
[Service]
|
|
||||||
Environment=HTTP_PROXY={{ proxy_env.HTTP_PROXY }}
|
|
||||||
Environment=HTTPS_PROXY={{ proxy_env.HTTPS_PROXY }}
|
|
||||||
Environment=NO_PROXY={{ proxy_env.NO_PROXY }}
|
|
||||||
@@ -1,6 +0,0 @@
|
|||||||
---
|
|
||||||
# Indicates whether custom registries for k3s should be configured
|
|
||||||
# Possible values:
|
|
||||||
# - present
|
|
||||||
# - absent
|
|
||||||
state: present
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
- name: Create directory /etc/rancher/k3s
|
|
||||||
file:
|
|
||||||
path: "/etc/{{ item }}"
|
|
||||||
state: directory
|
|
||||||
mode: '0755'
|
|
||||||
loop:
|
|
||||||
- rancher
|
|
||||||
- rancher/k3s
|
|
||||||
|
|
||||||
- name: Insert registries into /etc/rancher/k3s/registries.yaml
|
|
||||||
blockinfile:
|
|
||||||
path: /etc/rancher/k3s/registries.yaml
|
|
||||||
block: "{{ custom_registries_yaml }}"
|
|
||||||
mode: '0600'
|
|
||||||
create: true
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
- name: Create k3s.service.d directory
|
|
||||||
file:
|
|
||||||
path: '{{ systemd_dir }}/k3s.service.d'
|
|
||||||
state: directory
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: '0755'
|
|
||||||
|
|
||||||
|
|
||||||
- name: Copy K3s http_proxy conf file
|
|
||||||
template:
|
|
||||||
src: "http_proxy.conf.j2"
|
|
||||||
dest: "{{ systemd_dir }}/k3s.service.d/http_proxy.conf"
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: '0755'
|
|
||||||
@@ -12,16 +12,11 @@
|
|||||||
failed_when: false
|
failed_when: false
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
- name: Deploy K3s http_proxy conf
|
|
||||||
include_tasks: http_proxy.yml
|
|
||||||
when: proxy_env is defined
|
|
||||||
|
|
||||||
- name: Deploy vip manifest
|
- name: Deploy vip manifest
|
||||||
include_tasks: vip.yml
|
include_tasks: vip.yml
|
||||||
|
|
||||||
- name: Deploy metallb manifest
|
- name: Deploy metallb manifest
|
||||||
include_tasks: metallb.yml
|
include_tasks: metallb.yml
|
||||||
tags: metallb
|
|
||||||
|
|
||||||
- name: Init cluster inside the transient k3s-init service
|
- name: Init cluster inside the transient k3s-init service
|
||||||
command:
|
command:
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
[Service]
|
|
||||||
Environment=HTTP_PROXY={{ proxy_env.HTTP_PROXY }}
|
|
||||||
Environment=HTTPS_PROXY={{ proxy_env.HTTPS_PROXY }}
|
|
||||||
Environment=NO_PROXY={{ proxy_env.NO_PROXY }}
|
|
||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: Deploy metallb pool
|
- name: Deploy metallb pool
|
||||||
include_tasks: metallb.yml
|
include_tasks: metallb.yml
|
||||||
tags: metallb
|
|
||||||
|
|
||||||
- name: Remove tmp directory used for manifests
|
- name: Remove tmp directory used for manifests
|
||||||
file:
|
file:
|
||||||
|
|||||||
@@ -2,4 +2,3 @@
|
|||||||
- name: Reboot server
|
- name: Reboot server
|
||||||
become: true
|
become: true
|
||||||
reboot:
|
reboot:
|
||||||
listen: reboot server
|
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
---
|
|
||||||
secure_path:
|
|
||||||
RedHat: '/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
|
||||||
Suse: '/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/bin'
|
|
||||||
@@ -15,7 +15,6 @@
|
|||||||
value: "1"
|
value: "1"
|
||||||
state: present
|
state: present
|
||||||
reload: yes
|
reload: yes
|
||||||
tags: sysctl
|
|
||||||
|
|
||||||
- name: Enable IPv6 forwarding
|
- name: Enable IPv6 forwarding
|
||||||
ansible.posix.sysctl:
|
ansible.posix.sysctl:
|
||||||
@@ -23,7 +22,6 @@
|
|||||||
value: "1"
|
value: "1"
|
||||||
state: present
|
state: present
|
||||||
reload: yes
|
reload: yes
|
||||||
tags: sysctl
|
|
||||||
|
|
||||||
- name: Enable IPv6 router advertisements
|
- name: Enable IPv6 router advertisements
|
||||||
ansible.posix.sysctl:
|
ansible.posix.sysctl:
|
||||||
@@ -31,7 +29,6 @@
|
|||||||
value: "2"
|
value: "2"
|
||||||
state: present
|
state: present
|
||||||
reload: yes
|
reload: yes
|
||||||
tags: sysctl
|
|
||||||
|
|
||||||
- name: Add br_netfilter to /etc/modules-load.d/
|
- name: Add br_netfilter to /etc/modules-load.d/
|
||||||
copy:
|
copy:
|
||||||
@@ -56,14 +53,13 @@
|
|||||||
loop:
|
loop:
|
||||||
- net.bridge.bridge-nf-call-iptables
|
- net.bridge.bridge-nf-call-iptables
|
||||||
- net.bridge.bridge-nf-call-ip6tables
|
- net.bridge.bridge-nf-call-ip6tables
|
||||||
tags: sysctl
|
|
||||||
|
|
||||||
- name: Add /usr/local/bin to sudo secure_path
|
- name: Add /usr/local/bin to sudo secure_path
|
||||||
lineinfile:
|
lineinfile:
|
||||||
line: 'Defaults secure_path = {{ secure_path[ansible_os_family] }}'
|
line: 'Defaults secure_path = /sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
||||||
regexp: "Defaults(\\s)*secure_path(\\s)*="
|
regexp: "Defaults(\\s)*secure_path(\\s)*="
|
||||||
state: present
|
state: present
|
||||||
insertafter: EOF
|
insertafter: EOF
|
||||||
path: /etc/sudoers
|
path: /etc/sudoers
|
||||||
validate: 'visudo -cf %s'
|
validate: 'visudo -cf %s'
|
||||||
when: ansible_os_family in [ "RedHat", "Suse" ]
|
when: ansible_os_family == "RedHat"
|
||||||
|
|||||||
@@ -5,9 +5,7 @@
|
|||||||
set_fact:
|
set_fact:
|
||||||
proxmox_lxc_filtered_ids: >-
|
proxmox_lxc_filtered_ids: >-
|
||||||
{{ proxmox_lxc_filtered_files | map("split", "/") | map("last") | map("split", ".") | map("first") }}
|
{{ proxmox_lxc_filtered_files | map("split", "/") | map("last") | map("split", ".") | map("first") }}
|
||||||
listen: reboot containers
|
|
||||||
- name: Reboot container
|
- name: Reboot container
|
||||||
command: "pct reboot {{ item }}"
|
command: "pct reboot {{ item }}"
|
||||||
loop: "{{ proxmox_lxc_filtered_ids }}"
|
loop: "{{ proxmox_lxc_filtered_ids }}"
|
||||||
changed_when: true
|
changed_when: true
|
||||||
listen: reboot containers
|
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
---
|
---
|
||||||
- name: Reboot
|
- name: Reboot
|
||||||
reboot:
|
reboot:
|
||||||
listen: reboot
|
|
||||||
|
|||||||
@@ -46,15 +46,6 @@
|
|||||||
- /var/lib/rancher/
|
- /var/lib/rancher/
|
||||||
- /var/lib/cni/
|
- /var/lib/cni/
|
||||||
|
|
||||||
- name: Remove K3s http_proxy files
|
|
||||||
file:
|
|
||||||
name: "{{ item }}"
|
|
||||||
state: absent
|
|
||||||
with_items:
|
|
||||||
- "{{ systemd_dir }}/k3s.service.d"
|
|
||||||
- "{{ systemd_dir }}/k3s-node.service.d"
|
|
||||||
when: proxy_env is defined
|
|
||||||
|
|
||||||
- name: Reload daemon_reload
|
- name: Reload daemon_reload
|
||||||
systemd:
|
systemd:
|
||||||
daemon_reload: yes
|
daemon_reload: yes
|
||||||
|
|||||||
8
site.yml
8
site.yml
@@ -3,7 +3,6 @@
|
|||||||
hosts: proxmox
|
hosts: proxmox
|
||||||
gather_facts: true
|
gather_facts: true
|
||||||
become: yes
|
become: yes
|
||||||
environment: "{{ proxy_env | default({}) }}"
|
|
||||||
roles:
|
roles:
|
||||||
- role: proxmox_lxc
|
- role: proxmox_lxc
|
||||||
when: proxmox_lxc_configure
|
when: proxmox_lxc_configure
|
||||||
@@ -11,7 +10,6 @@
|
|||||||
- name: Prepare k3s nodes
|
- name: Prepare k3s nodes
|
||||||
hosts: k3s_cluster
|
hosts: k3s_cluster
|
||||||
gather_facts: yes
|
gather_facts: yes
|
||||||
environment: "{{ proxy_env | default({}) }}"
|
|
||||||
roles:
|
roles:
|
||||||
- role: lxc
|
- role: lxc
|
||||||
become: true
|
become: true
|
||||||
@@ -22,27 +20,21 @@
|
|||||||
become: true
|
become: true
|
||||||
- role: raspberrypi
|
- role: raspberrypi
|
||||||
become: true
|
become: true
|
||||||
- role: k3s_custom_registries
|
|
||||||
become: true
|
|
||||||
when: custom_registries
|
|
||||||
|
|
||||||
- name: Setup k3s servers
|
- name: Setup k3s servers
|
||||||
hosts: master
|
hosts: master
|
||||||
environment: "{{ proxy_env | default({}) }}"
|
|
||||||
roles:
|
roles:
|
||||||
- role: k3s_server
|
- role: k3s_server
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
- name: Setup k3s agents
|
- name: Setup k3s agents
|
||||||
hosts: node
|
hosts: node
|
||||||
environment: "{{ proxy_env | default({}) }}"
|
|
||||||
roles:
|
roles:
|
||||||
- role: k3s_agent
|
- role: k3s_agent
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
- name: Configure k3s cluster
|
- name: Configure k3s cluster
|
||||||
hosts: master
|
hosts: master
|
||||||
environment: "{{ proxy_env | default({}) }}"
|
|
||||||
roles:
|
roles:
|
||||||
- role: k3s_server_post
|
- role: k3s_server_post
|
||||||
become: true
|
become: true
|
||||||
|
|||||||
Reference in New Issue
Block a user