ingress/Traefik2.x | ||
services | ||
storage | ||
system | ||
README.md |
TODO: Files with sensitive data; move to Vault
# line 6-8: services/Guacamole/configMap_Guacamole.yml
Kubernetes.K3s.installLog
3 VM's provisioned with Ubuntu Server 18.04
K3s cluster
On first node:
curl -sfL https://get.k3s.io | sh -s - --no-deploy traefik
cat /var/lib/rancher/k3s/server/token
kubectl config view --raw
On subsequent nodes:
curl -sfL https://get.k3s.io | K3S_URL=https://<fqdn or ip>:6443 K3S_TOKEN=<value from master> sh -
Install Rancher's System Upgrade Controller:
kubectl apply -f https://github.com/rancher/system-upgrade-controller/releases/download/v0.4.0/system-upgrade-controller.yaml
Apply a server (master node) and agent (worker node) plan:
kubectl apply -f system/UpgradeController/plan-Server.yml -f system/UpgradeController/plan-Agent.yml
1) Persistent storage
1.1) SMB (CIFS) CSI-driver
:
See https://github.com/kubernetes-csi/csi-driver-smb:
curl -skSL https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/deploy/install-driver.sh | bash -s master --
1.2) SMB (CIFS) FlexVolume
:
curl -Ls https://github.com/juliohm1978/kubernetes-cifs-volumedriver/blob/master/install.yaml -o storage/flexVolSMB/daemonSet-flexVolSMB.yml
Override drivername to something more sensible (see storage/flexVolSMB/daemonSet-flexVolSMB.yml)
spec:
template:
spec:
containers:
- image: juliohm/kubernetes-cifs-volumedriver-installer:2.0
...
env:
- name: VENDOR
value: mount
- name: DRIVER
value: smb
...
Perform installation:
kubectl apply -f storage/flexVolSMB/daemonSet-flexVolSMB.yml
Wait for installation to complete (check logs of all installer-pods), then delete daemonSet
:
kubectl delete -f storage/flexVolSMB/daemonSet-flexVolSMB.yml
Store credentials in secret
:
kubectl create secret generic --type=mount/smb smb-secret --from-literal=username=<<omitted>> --from-literal=password=<<omitted>>
Optional
Install Longhorn for block storage with NFS-backed backup schedules.
2) Ingress Controller
2.1) Create configMap
, secret
and persistentVolumeClaim
The configMap
contains Traefik's static and dynamic config:
kubectl apply -f ingress/Traefik2.x/configMap_traefik.yml
The secret
contains credentials for Cloudflare's API:
kubectl create secret generic traefik-cloudflare --from-literal=CF_API_EMAIL=<<omitted>> --from-literal=CF_API_KEY=<<omitted>> --namespace kube-system
The persistentVolumeClaim
will contain /data/acme.json
(referenced as existingClaim
):
kubectl apply -f ingress/Traefik2.x/pvc_traefik.yml
2.2) Install Helm Chart
helm repo add traefik https://containous.github.io/traefik-helm-chart
helm repo update
helm install traefik traefik/traefik --namespace kube-system --values=ingress/Traefik2.x/chart-values.yml
2.3) Replace IngressRoute
for Traefik's dashboard:
kubectl apply -f ingress/Traefik2.x/ingressRoute-Traefik.yaml
kubectl delete ingressroute traefik-dashboard --namespace kube-system
3) Secret management
Perform these steps after configuring persistent storage and ingress
3.1) Create persistentVolume
and ingressRoute
Requires specifying a uid
& gid
in the flexvolSMB-persistentVolume
kubectl apply -f services/Vault/persistentVolume-Vault.yml
kubectl apply -f services/Vault/ingressRoute-Vault.yml
3.2) Install Helm Chart
See HashiCorp Vault:
kubectl create namespace vault
helm repo add hashicorp https://helm.releases.hashicorp.com
helm repo update
helm install vault hashicorp/vault --namespace vault --values=services/Vault/chart-values.yml
Configure Vault for use;
- Enable Kubernetes authentication (see https://www.vaultproject.io/api-docs/auth/kubernetes)
- Store basic access policy template
- Enable
kv
-engine
# kubectl exec -n vault -it vault-0 -- sh
vault auth enable kubernetes
vault write auth/kubernetes/config \
token_reviewer_jwt="$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" \
kubernetes_host=https://${KUBERNETES_PORT_443_TCP_ADDR}:443 \
kubernetes_ca_cert=@/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
cat <<EOF > /home/vault/app-policy.hcl
path "secret*" {
capabilities = ["read"]
}
EOF
vault secrets enable -path=secret -version=2 kv
4) Services
4.1) Adminer (SQL management)
kubectl apply -f services/Adminer/configMap_Adminer.yml
kubectl apply -f services/Adminer/deploy_Adminer.yml
Vault configuration:
vault kv put secret/adminer \
sqlitepw=<value>
vault write auth/kubernetes/role/adminer \
bound_service_account_names=adminer \
bound_service_account_namespaces=default \
policies=adminer \
ttl=1h
vault policy write adminer /home/vault/app-policy.hcl
4.2) Bitwarden_rs (password manager)
Requires mount.cifs' option nobrl
kubectl apply -f services/Bitwarden/deployment_Bitwarden.yml
Vault configuration:
vault kv put secret/bitwarden \
admintoken=<value> \
yubicoclientid=<value> \
yubicosecretkey=<value>
vault write auth/kubernetes/role/bitwarden \
bound_service_account_names=bitwarden \
bound_service_account_namespaces=default \
policies=bitwarden \
ttl=1h
vault policy write bitwarden /home/vault/app-policy.hcl
4.3) DroneCI (contineous delivery)
kubectl apply -f services/DroneCI/deployment_DroneCI.yml
Vault configuration:
vault kv put secret/drone \
rpcsecret=<value> \
giteaclientid=<value> \
giteaclientsecret=<value>
vault write auth/kubernetes/role/drone \
bound_service_account_names=drone \
bound_service_account_namespaces=default \
policies=drone \
ttl=1h
vault policy write drone /home/vault/app-policy.hcl
4.4) Gitea (git repository)
kubectl apply -f services/Gitea/deployment_Gitea.yml
4.5) Gotify (notifications)
kubectl apply -f services/Gotify/deploy_Gotify.yml
4.6) Guacamole (remote desktop gateway)
Requires specifying a uid
& gid
in both the securityContext
of the MySQL container and the persistentVolume
kubectl apply -f services/Guacamole/configMap_Guacamole.yml
kubectl apply -f services/Guacamole/deployment_Guacamole.yml
Wait for the included containers to start, then perform the following commands to initialize the database:
kubectl exec -i guacamole-<pod-id> --container guacamole -- /opt/guacamole/bin/initdb.sh --mysql > initdb.sql
kubectl exec -i guacamole-<pod-id> --container mysql -- mysql -uguacamole -pguacamole guacamole < initdb.sql
kubectl rollout restart deployment guacamole
4.7) Harbor (container image registry)
Create ingressRoute
and storageClass
kubectl apply -f services/Harbor/ingressRoute-Harbor.yml
kubectl apply -f services/Harbor/storageClass-Harbor.yml
Install Helm chart
kubectl create namespace harbor
helm repo add harbor https://helm.goharbor.io
helm repo update
helm install harbor harbor/harbor --namespace harbor --values=services/Harbor/chart-values.yml
4.8) Lighttpd (webserver)
Serves various semi-containerized websites; respective webcontent is stored on fileshare
kubectl apply -f services/Lighttpd/configMap_lighttpd.yml
kubectl apply -f services/Lighttpd/deploy_Lighttpd.yml
kubectl apply -f services/Lighttpd/cronJob-Spotweb.yml
4.9) Shaarli (bookmarks/notes)
kubectl apply -f services/Shaarli/deploy_Shaarli.yml
4.10) Theia (web IDE)
kubectl apply -f services/Theia/deploy_Theia.yml
4.11) Traefik-Certs-Dumper (certificate tooling)
kubectl apply -f services/TraefikCertsDumper/deploy-TraefikCertsDumper.yml
4.12) External Endpoint
s
4.12.1) NZBHydra, Plex, Radarr, SABnzbd & Sonarr (automated media management)
Running externally, due to connectivity requirements
kubectl apply -f services/PVR/deploy-PVR.yml
5) Miscellaneous
Various notes/useful links
-
Replacement for not-yet-deprecated
kubectl get all -A
:kubectl get $(kubectl api-resources --verbs=list -o name | paste -sd, -) --ignore-not-found --all-namespaces
-
...