forked from tim/k3s-ansible
Compare commits
28 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
394e3342ae | ||
|
|
3db77957b1 | ||
|
|
e880f08d26 | ||
|
|
95b2836dfc | ||
|
|
505c2eeff2 | ||
|
|
9b6d551dd6 | ||
|
|
a64e882fb7 | ||
|
|
38e773315b | ||
|
|
70ddf7b63c | ||
|
|
fb3128a783 | ||
|
|
2e318e0862 | ||
|
|
86541ac52a | ||
|
|
0607eb8aa4 | ||
|
|
a9904d1562 | ||
|
|
9707bc8a58 | ||
|
|
b81b3962d2 | ||
|
|
c738b8d040 | ||
|
|
c5eb0a0ad1 | ||
|
|
1350fea9bd | ||
|
|
49e97d0981 | ||
|
|
47b08b21d8 | ||
|
|
0f7a722ac5 | ||
|
|
39fbf86df6 | ||
|
|
495bdfdde9 | ||
|
|
08917be44a | ||
|
|
874cc9f1f4 | ||
|
|
73b76da984 | ||
|
|
4502ebd439 |
@@ -4,7 +4,7 @@
|
||||
|
||||
This playbook will build an HA Kubernetes cluster with `k3s`, `kube-vip` and MetalLB via `ansible`.
|
||||
|
||||
This is based on the work from [this fork](https://github.com/212850a/k3s-ansible) which is based on the work from [k3s-io/k3s-ansible](https://github.com/k3s-io/k3s-ansible). It uses [kube-vip](https://kube-vip.chipzoller.dev/) to create a load balancer for control plane, and [metal-lb](https://metallb.universe.tf/installation/) for its service `LoadBalancer`.
|
||||
This is based on the work from [this fork](https://github.com/212850a/k3s-ansible) which is based on the work from [k3s-io/k3s-ansible](https://github.com/k3s-io/k3s-ansible). It uses [kube-vip](https://kube-vip.io/) to create a load balancer for control plane, and [metal-lb](https://metallb.universe.tf/installation/) for its service `LoadBalancer`.
|
||||
|
||||
If you want more context on how this works, see:
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
---
|
||||
k3s_version: v1.25.9+k3s1
|
||||
k3s_version: v1.26.11+k3s2
|
||||
# this is the user that has ssh access to these machines
|
||||
ansible_user: ansibleuser
|
||||
systemd_dir: /etc/systemd/system
|
||||
@@ -81,3 +81,49 @@ proxmox_lxc_ct_ids:
|
||||
- 202
|
||||
- 203
|
||||
- 204
|
||||
|
||||
# Only enable this if you have set up your own container registry to act as a mirror / pull-through cache
|
||||
# (harbor / nexus / docker's official registry / etc).
|
||||
# Can be beneficial for larger dev/test environments (for example if you're getting rate limited by docker hub),
|
||||
# or air-gapped environments where your nodes don't have internet access after the initial setup
|
||||
# (which is still needed for downloading the k3s binary and such).
|
||||
# k3s's documentation about private registries here: https://docs.k3s.io/installation/private-registry
|
||||
custom_registries: false
|
||||
# The registries can be authenticated or anonymous, depending on your registry server configuration.
|
||||
# If they allow anonymous access, simply remove the following bit from custom_registries_yaml
|
||||
# configs:
|
||||
# "registry.domain.com":
|
||||
# auth:
|
||||
# username: yourusername
|
||||
# password: yourpassword
|
||||
# The following is an example that pulls all images used in this playbook through your private registries.
|
||||
# It also allows you to pull your own images from your private registry, without having to use imagePullSecrets
|
||||
# in your deployments.
|
||||
# If all you need is your own images and you don't care about caching the docker/quay/ghcr.io images,
|
||||
# you can just remove those from the mirrors: section.
|
||||
custom_registries_yaml: |
|
||||
mirrors:
|
||||
docker.io:
|
||||
endpoint:
|
||||
- "https://registry.domain.com/v2/dockerhub"
|
||||
quay.io:
|
||||
endpoint:
|
||||
- "https://registry.domain.com/v2/quayio"
|
||||
ghcr.io:
|
||||
endpoint:
|
||||
- "https://registry.domain.com/v2/ghcrio"
|
||||
registry.domain.com:
|
||||
endpoint:
|
||||
- "https://registry.domain.com"
|
||||
|
||||
configs:
|
||||
"registry.domain.com":
|
||||
auth:
|
||||
username: yourusername
|
||||
password: yourpassword
|
||||
|
||||
# Only enable and configure these if you access the internet through a proxy
|
||||
# proxy_env:
|
||||
# HTTP_PROXY: "http://proxy.domain.local:3128"
|
||||
# HTTPS_PROXY: "http://proxy.domain.local:3128"
|
||||
# NO_PROXY: "*.domain.local,127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
#
|
||||
ansible-compat==3.0.1
|
||||
# via molecule
|
||||
ansible-core==2.15.2
|
||||
ansible-core==2.15.4
|
||||
# via
|
||||
# -r requirements.in
|
||||
# ansible-compat
|
||||
@@ -86,7 +86,7 @@ molecule==4.0.4
|
||||
# molecule-vagrant
|
||||
molecule-vagrant==1.0.0
|
||||
# via -r requirements.in
|
||||
netaddr==0.8.0
|
||||
netaddr==0.9.0
|
||||
# via -r requirements.in
|
||||
nodeenv==1.7.0
|
||||
# via pre-commit
|
||||
@@ -103,7 +103,7 @@ pluggy==1.0.0
|
||||
# via molecule
|
||||
pre-commit==2.21.0
|
||||
# via -r requirements.in
|
||||
pre-commit-hooks==4.4.0
|
||||
pre-commit-hooks==4.5.0
|
||||
# via -r requirements.in
|
||||
pyasn1==0.4.8
|
||||
# via
|
||||
|
||||
18
roles/k3s_agent/tasks/http_proxy.yml
Normal file
18
roles/k3s_agent/tasks/http_proxy.yml
Normal file
@@ -0,0 +1,18 @@
|
||||
---
|
||||
|
||||
- name: Create k3s.service.d directory
|
||||
file:
|
||||
path: '{{ systemd_dir }}/k3s.service.d'
|
||||
state: directory
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
|
||||
|
||||
- name: Copy K3s http_proxy conf file
|
||||
template:
|
||||
src: "http_proxy.conf.j2"
|
||||
dest: "{{ systemd_dir }}/k3s.service.d/http_proxy.conf"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
@@ -1,5 +1,9 @@
|
||||
---
|
||||
|
||||
- name: Deploy K3s http_proxy conf
|
||||
include_tasks: http_proxy.yml
|
||||
when: proxy_env is defined
|
||||
|
||||
- name: Copy K3s service file
|
||||
template:
|
||||
src: "k3s.service.j2"
|
||||
|
||||
4
roles/k3s_agent/templates/http_proxy.conf.j2
Normal file
4
roles/k3s_agent/templates/http_proxy.conf.j2
Normal file
@@ -0,0 +1,4 @@
|
||||
[Service]
|
||||
Environment=HTTP_PROXY={{ proxy_env.HTTP_PROXY }}
|
||||
Environment=HTTPS_PROXY={{ proxy_env.HTTPS_PROXY }}
|
||||
Environment=NO_PROXY={{ proxy_env.NO_PROXY }}
|
||||
6
roles/k3s_custom_registries/defaults/main.yml
Normal file
6
roles/k3s_custom_registries/defaults/main.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
---
|
||||
# Indicates whether custom registries for k3s should be configured
|
||||
# Possible values:
|
||||
# - present
|
||||
# - absent
|
||||
state: present
|
||||
17
roles/k3s_custom_registries/tasks/main.yml
Normal file
17
roles/k3s_custom_registries/tasks/main.yml
Normal file
@@ -0,0 +1,17 @@
|
||||
---
|
||||
|
||||
- name: Create directory /etc/rancher/k3s
|
||||
file:
|
||||
path: "/etc/{{ item }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
loop:
|
||||
- rancher
|
||||
- rancher/k3s
|
||||
|
||||
- name: Insert registries into /etc/rancher/k3s/registries.yaml
|
||||
blockinfile:
|
||||
path: /etc/rancher/k3s/registries.yaml
|
||||
block: "{{ custom_registries_yaml }}"
|
||||
mode: '0600'
|
||||
create: true
|
||||
18
roles/k3s_server/tasks/http_proxy.yml
Normal file
18
roles/k3s_server/tasks/http_proxy.yml
Normal file
@@ -0,0 +1,18 @@
|
||||
---
|
||||
|
||||
- name: Create k3s.service.d directory
|
||||
file:
|
||||
path: '{{ systemd_dir }}/k3s.service.d'
|
||||
state: directory
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
|
||||
|
||||
- name: Copy K3s http_proxy conf file
|
||||
template:
|
||||
src: "http_proxy.conf.j2"
|
||||
dest: "{{ systemd_dir }}/k3s.service.d/http_proxy.conf"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
@@ -12,11 +12,16 @@
|
||||
failed_when: false
|
||||
changed_when: false
|
||||
|
||||
- name: Deploy K3s http_proxy conf
|
||||
include_tasks: http_proxy.yml
|
||||
when: proxy_env is defined
|
||||
|
||||
- name: Deploy vip manifest
|
||||
include_tasks: vip.yml
|
||||
|
||||
- name: Deploy metallb manifest
|
||||
include_tasks: metallb.yml
|
||||
tags: metallb
|
||||
|
||||
- name: Init cluster inside the transient k3s-init service
|
||||
command:
|
||||
|
||||
4
roles/k3s_server/templates/http_proxy.conf.j2
Normal file
4
roles/k3s_server/templates/http_proxy.conf.j2
Normal file
@@ -0,0 +1,4 @@
|
||||
[Service]
|
||||
Environment=HTTP_PROXY={{ proxy_env.HTTP_PROXY }}
|
||||
Environment=HTTPS_PROXY={{ proxy_env.HTTPS_PROXY }}
|
||||
Environment=NO_PROXY={{ proxy_env.NO_PROXY }}
|
||||
@@ -1,6 +1,7 @@
|
||||
---
|
||||
- name: Deploy metallb pool
|
||||
include_tasks: metallb.yml
|
||||
tags: metallb
|
||||
|
||||
- name: Remove tmp directory used for manifests
|
||||
file:
|
||||
|
||||
@@ -2,3 +2,4 @@
|
||||
- name: Reboot server
|
||||
become: true
|
||||
reboot:
|
||||
listen: reboot server
|
||||
|
||||
4
roles/prereq/defaults/main.yml
Normal file
4
roles/prereq/defaults/main.yml
Normal file
@@ -0,0 +1,4 @@
|
||||
---
|
||||
secure_path:
|
||||
RedHat: '/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
||||
Suse: '/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/bin'
|
||||
@@ -15,6 +15,7 @@
|
||||
value: "1"
|
||||
state: present
|
||||
reload: yes
|
||||
tags: sysctl
|
||||
|
||||
- name: Enable IPv6 forwarding
|
||||
ansible.posix.sysctl:
|
||||
@@ -22,6 +23,7 @@
|
||||
value: "1"
|
||||
state: present
|
||||
reload: yes
|
||||
tags: sysctl
|
||||
|
||||
- name: Enable IPv6 router advertisements
|
||||
ansible.posix.sysctl:
|
||||
@@ -29,6 +31,7 @@
|
||||
value: "2"
|
||||
state: present
|
||||
reload: yes
|
||||
tags: sysctl
|
||||
|
||||
- name: Add br_netfilter to /etc/modules-load.d/
|
||||
copy:
|
||||
@@ -53,13 +56,14 @@
|
||||
loop:
|
||||
- net.bridge.bridge-nf-call-iptables
|
||||
- net.bridge.bridge-nf-call-ip6tables
|
||||
tags: sysctl
|
||||
|
||||
- name: Add /usr/local/bin to sudo secure_path
|
||||
lineinfile:
|
||||
line: 'Defaults secure_path = /sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
||||
line: 'Defaults secure_path = {{ secure_path[ansible_os_family] }}'
|
||||
regexp: "Defaults(\\s)*secure_path(\\s)*="
|
||||
state: present
|
||||
insertafter: EOF
|
||||
path: /etc/sudoers
|
||||
validate: 'visudo -cf %s'
|
||||
when: ansible_os_family == "RedHat"
|
||||
when: ansible_os_family in [ "RedHat", "Suse" ]
|
||||
|
||||
@@ -5,7 +5,9 @@
|
||||
set_fact:
|
||||
proxmox_lxc_filtered_ids: >-
|
||||
{{ proxmox_lxc_filtered_files | map("split", "/") | map("last") | map("split", ".") | map("first") }}
|
||||
listen: reboot containers
|
||||
- name: Reboot container
|
||||
command: "pct reboot {{ item }}"
|
||||
loop: "{{ proxmox_lxc_filtered_ids }}"
|
||||
changed_when: true
|
||||
listen: reboot containers
|
||||
|
||||
@@ -1,3 +1,4 @@
|
||||
---
|
||||
- name: Reboot
|
||||
reboot:
|
||||
listen: reboot
|
||||
|
||||
@@ -46,6 +46,15 @@
|
||||
- /var/lib/rancher/
|
||||
- /var/lib/cni/
|
||||
|
||||
- name: Remove K3s http_proxy files
|
||||
file:
|
||||
name: "{{ item }}"
|
||||
state: absent
|
||||
with_items:
|
||||
- "{{ systemd_dir }}/k3s.service.d"
|
||||
- "{{ systemd_dir }}/k3s-node.service.d"
|
||||
when: proxy_env is defined
|
||||
|
||||
- name: Reload daemon_reload
|
||||
systemd:
|
||||
daemon_reload: yes
|
||||
|
||||
8
site.yml
8
site.yml
@@ -3,6 +3,7 @@
|
||||
hosts: proxmox
|
||||
gather_facts: true
|
||||
become: yes
|
||||
environment: "{{ proxy_env | default({}) }}"
|
||||
roles:
|
||||
- role: proxmox_lxc
|
||||
when: proxmox_lxc_configure
|
||||
@@ -10,6 +11,7 @@
|
||||
- name: Prepare k3s nodes
|
||||
hosts: k3s_cluster
|
||||
gather_facts: yes
|
||||
environment: "{{ proxy_env | default({}) }}"
|
||||
roles:
|
||||
- role: lxc
|
||||
become: true
|
||||
@@ -20,21 +22,27 @@
|
||||
become: true
|
||||
- role: raspberrypi
|
||||
become: true
|
||||
- role: k3s_custom_registries
|
||||
become: true
|
||||
when: custom_registries
|
||||
|
||||
- name: Setup k3s servers
|
||||
hosts: master
|
||||
environment: "{{ proxy_env | default({}) }}"
|
||||
roles:
|
||||
- role: k3s_server
|
||||
become: true
|
||||
|
||||
- name: Setup k3s agents
|
||||
hosts: node
|
||||
environment: "{{ proxy_env | default({}) }}"
|
||||
roles:
|
||||
- role: k3s_agent
|
||||
become: true
|
||||
|
||||
- name: Configure k3s cluster
|
||||
hosts: master
|
||||
environment: "{{ proxy_env | default({}) }}"
|
||||
roles:
|
||||
- role: k3s_server_post
|
||||
become: true
|
||||
|
||||
Reference in New Issue
Block a user