-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
initial checkin of k8s documentation #114
base: master
Are you sure you want to change the base?
Conversation
First attempt at pulling together documentation on how to install k3s and work with k8s.
@@ -0,0 +1,60 @@ | |||
# Installation | |||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need to add:
https://github.com/metacpan/metacpan-servers - being setting up the servers
1. Generate a token using `head -c48 /dev/urandom | base64 | tr -d "\n"` and store | ||
in a secure location. | ||
|
||
2. Sign into server using ssh and an unprivileged account. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
e.g if using flatcar
the core
user
Remote tools like [kubectl](https://kubernetes.io/docs/reference/kubectl/), | ||
[k9s](https://k9scli.io/), and [kubeseal](https://sealed-secrets.netlify.app/) | ||
require authentication with the cluster during use. The authentication uses a | ||
certificate assigned to the cluster during its installation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure where to create or get a cert for this auth - or how to actually start those tools - but maybe that's in the k8s repo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The certificate was automatically created and is part of the k3s.yaml
file copied to the credentials repo.
certificate assigned to the cluster during its installation. | ||
|
||
On the first server installed copy the contents of the `sudo cat | ||
/etc/rancher/k3s/k3s.yaml` to your `~/.kube/configs/` directory as `<2 letter |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mention updating server: https://127.0.0.1:6443
before committing the config
On the first server installed copy the contents of the `sudo cat | ||
/etc/rancher/k3s/k3s.yaml` to your `~/.kube/configs/` directory as `<2 letter | ||
code>-mc`. Also copy this file to the metacpan-credential repository's `k8s/` | ||
directory. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would be good to mention... now goto https://../metacpan0-k8s
First attempt at pulling together documentation on how to install k3s and work with k8s.