Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

initial checkin of k8s documentation #114

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

ssoriche
Copy link
Contributor

First attempt at pulling together documentation on how to install k3s and work with k8s.

First attempt at pulling together documentation on how to install k3s
and work with k8s.
@@ -0,0 +1,60 @@
# Installation

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Need to add:

https://github.com/metacpan/metacpan-servers - being setting up the servers

1. Generate a token using `head -c48 /dev/urandom | base64 | tr -d "\n"` and store
in a secure location.

2. Sign into server using ssh and an unprivileged account.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

e.g if using flatcar the core user

Remote tools like [kubectl](https://kubernetes.io/docs/reference/kubectl/),
[k9s](https://k9scli.io/), and [kubeseal](https://sealed-secrets.netlify.app/)
require authentication with the cluster during use. The authentication uses a
certificate assigned to the cluster during its installation.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure where to create or get a cert for this auth - or how to actually start those tools - but maybe that's in the k8s repo

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The certificate was automatically created and is part of the k3s.yaml file copied to the credentials repo.

certificate assigned to the cluster during its installation.

On the first server installed copy the contents of the `sudo cat
/etc/rancher/k3s/k3s.yaml` to your `~/.kube/configs/` directory as `<2 letter
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mention updating server: https://127.0.0.1:6443 before committing the config

On the first server installed copy the contents of the `sudo cat
/etc/rancher/k3s/k3s.yaml` to your `~/.kube/configs/` directory as `<2 letter
code>-mc`. Also copy this file to the metacpan-credential repository's `k8s/`
directory.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would be good to mention... now goto https://../metacpan0-k8s

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants