Add kubelet.
This commit is contained in:
parent
fa24540bb3
commit
0463d2cbd1
@ -17,6 +17,7 @@
|
|||||||
./roles/kube_apiserver
|
./roles/kube_apiserver
|
||||||
./roles/kube_controller_manager
|
./roles/kube_controller_manager
|
||||||
./roles/kube_scheduler
|
./roles/kube_scheduler
|
||||||
|
./roles/kubelet
|
||||||
./roles/kubernetes
|
./roles/kubernetes
|
||||||
./roles/minimal_base
|
./roles/minimal_base
|
||||||
./roles/network
|
./roles/network
|
||||||
|
|||||||
@ -8,6 +8,7 @@
|
|||||||
# installCheckPhase
|
# installCheckPhase
|
||||||
# distPhase
|
# distPhase
|
||||||
{
|
{
|
||||||
|
config,
|
||||||
lib,
|
lib,
|
||||||
stdenv,
|
stdenv,
|
||||||
writeShellScript,
|
writeShellScript,
|
||||||
@ -16,17 +17,35 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
|
vm_name_to_hostname =
|
||||||
|
let
|
||||||
|
mapping = {
|
||||||
|
"nc0" = "controller0";
|
||||||
|
"nc1" = "controller1";
|
||||||
|
"nc2" = "controller2";
|
||||||
|
"nw0" = "worker0";
|
||||||
|
"nw1" = "worker1";
|
||||||
|
"nw2" = "worker2";
|
||||||
|
};
|
||||||
|
in
|
||||||
|
(vm_name: mapping."${vm_name}");
|
||||||
|
|
||||||
deploy_script_body = (
|
deploy_script_body = (
|
||||||
''
|
''
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
IFS=$'\n\t'
|
IFS=$'\n\t'
|
||||||
DIR="$( cd "$( dirname "''${BASH_SOURCE[0]}" )" && pwd )"
|
DIR="$( cd "$( dirname "''${BASH_SOURCE[0]}" )" && pwd )"
|
||||||
''
|
''
|
||||||
+ (lib.concatMapStringsSep "\n" deploy_machine [
|
+ (lib.concatMapStringsSep "\n" deploy_control_plane [
|
||||||
"nc0"
|
"nc0"
|
||||||
"nc1"
|
"nc1"
|
||||||
"nc2"
|
"nc2"
|
||||||
])
|
])
|
||||||
|
+ (lib.concatMapStringsSep "\n" deploy_worker [
|
||||||
|
"nw0"
|
||||||
|
"nw1"
|
||||||
|
"nw2"
|
||||||
|
])
|
||||||
);
|
);
|
||||||
deploy_script = (writeShellScript "deploy-script" deploy_script_body);
|
deploy_script = (writeShellScript "deploy-script" deploy_script_body);
|
||||||
deploy_file = (
|
deploy_file = (
|
||||||
@ -50,14 +69,14 @@ let
|
|||||||
|
|
||||||
''
|
''
|
||||||
);
|
);
|
||||||
deploy_machine = (
|
deploy_control_plane = (
|
||||||
vm_name:
|
vm_name:
|
||||||
(
|
(
|
||||||
''
|
''
|
||||||
##
|
##
|
||||||
## Create directories on ${vm_name}
|
## Create directories on ${vm_name}
|
||||||
##
|
##
|
||||||
${openssh}/bin/ssh mrmanager doas install -d -o 11235 -g 11235 -m 0755 /vm/${vm_name}/persist/keys
|
${openssh}/bin/ssh mrmanager doas install -d -o 0 -g 0 -m 0755 /vm/${vm_name}/persist/keys
|
||||||
${openssh}/bin/ssh mrmanager doas install -d -o 10016 -g 10016 -m 0755 /vm/${vm_name}/persist/keys/etcd
|
${openssh}/bin/ssh mrmanager doas install -d -o 10016 -g 10016 -m 0755 /vm/${vm_name}/persist/keys/etcd
|
||||||
${openssh}/bin/ssh mrmanager doas install -d -o 10024 -g 10024 -m 0755 /vm/${vm_name}/persist/keys/kube
|
${openssh}/bin/ssh mrmanager doas install -d -o 10024 -g 10024 -m 0755 /vm/${vm_name}/persist/keys/kube
|
||||||
|
|
||||||
@ -152,6 +171,55 @@ let
|
|||||||
])
|
])
|
||||||
)
|
)
|
||||||
);
|
);
|
||||||
|
deploy_worker = (
|
||||||
|
vm_name:
|
||||||
|
(
|
||||||
|
''
|
||||||
|
##
|
||||||
|
## Create directories on ${vm_name}
|
||||||
|
##
|
||||||
|
${openssh}/bin/ssh mrmanager doas install -d -o 0 -g 0 -m 0755 /vm/${vm_name}/persist/keys
|
||||||
|
${openssh}/bin/ssh mrmanager doas install -d -o 10024 -g 10024 -m 0755 /vm/${vm_name}/persist/keys/kube
|
||||||
|
|
||||||
|
|
||||||
|
''
|
||||||
|
+ (lib.concatMapStringsSep "\n" deploy_file [
|
||||||
|
{
|
||||||
|
dest_dir = "/vm/${vm_name}/persist/keys/kube";
|
||||||
|
file = "${k8s.ca}/ca.crt";
|
||||||
|
owner = 10024;
|
||||||
|
group = 10024;
|
||||||
|
mode = "0640";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dest_dir = "/vm/${vm_name}/persist/keys/kube";
|
||||||
|
file = "${k8s.keys."${vm_name_to_hostname vm_name}"}/${vm_name_to_hostname vm_name}.crt";
|
||||||
|
name = "kubelet.crt";
|
||||||
|
owner = 10024;
|
||||||
|
group = 10024;
|
||||||
|
mode = "0640";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dest_dir = "/vm/${vm_name}/persist/keys/kube";
|
||||||
|
file = "${k8s.keys."${vm_name_to_hostname vm_name}"}/${vm_name_to_hostname vm_name}.key";
|
||||||
|
name = "kubelet.key";
|
||||||
|
owner = 10024;
|
||||||
|
group = 10024;
|
||||||
|
mode = "0600";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dest_dir = "/vm/${vm_name}/persist/keys/kube";
|
||||||
|
file = "${
|
||||||
|
k8s.client-configs."${vm_name_to_hostname vm_name}"
|
||||||
|
}/${vm_name_to_hostname vm_name}.kubeconfig";
|
||||||
|
name = "kubeconfig";
|
||||||
|
owner = 10024;
|
||||||
|
group = 10024;
|
||||||
|
mode = "0600";
|
||||||
|
}
|
||||||
|
])
|
||||||
|
)
|
||||||
|
);
|
||||||
in
|
in
|
||||||
stdenv.mkDerivation (finalAttrs: {
|
stdenv.mkDerivation (finalAttrs: {
|
||||||
name = "deploy-script";
|
name = "deploy-script";
|
||||||
|
|||||||
@ -69,12 +69,6 @@ let
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# _vm_name_to_hostname = {
|
|
||||||
# "nc0" = "controller0";
|
|
||||||
# "nc1" = "controller1";
|
|
||||||
# "nc2" = "controller2";
|
|
||||||
# };
|
|
||||||
# vm_name_to_hostname = (vm_name: _vm_name_to_hostname."${vm_name}");
|
|
||||||
in
|
in
|
||||||
makeScope newScope (
|
makeScope newScope (
|
||||||
self:
|
self:
|
||||||
@ -113,27 +107,36 @@ makeScope newScope (
|
|||||||
{
|
{
|
||||||
controller0 = {
|
controller0 = {
|
||||||
config_user = "system:node:controller0";
|
config_user = "system:node:controller0";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
controller1 = {
|
controller1 = {
|
||||||
config_user = "system:node:controller1";
|
config_user = "system:node:controller1";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
controller2 = {
|
controller2 = {
|
||||||
config_user = "system:node:controller2";
|
config_user = "system:node:controller2";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
worker0 = {
|
worker0 = {
|
||||||
config_user = "system:node:worker0";
|
config_user = "system:node:worker0";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://[2620:11f:7001:7:ffff:ffff:ad7:1dd]:6443";
|
||||||
|
# config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
worker1 = {
|
worker1 = {
|
||||||
config_user = "system:node:worker1";
|
config_user = "system:node:worker1";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://[2620:11f:7001:7:ffff:ffff:ad7:1dd]:6443";
|
||||||
|
# config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
worker2 = {
|
worker2 = {
|
||||||
config_user = "system:node:worker2";
|
config_user = "system:node:worker2";
|
||||||
config_server = "https://server.kubernetes.local:6443";
|
config_server = "https://[2620:11f:7001:7:ffff:ffff:ad7:1dd]:6443";
|
||||||
|
# config_server = "https://127.0.0.1:6443";
|
||||||
|
# config_server = "https://server.kubernetes.local:6443";
|
||||||
};
|
};
|
||||||
kube-proxy = {
|
kube-proxy = {
|
||||||
config_user = "system:kube-proxy";
|
config_user = "system:kube-proxy";
|
||||||
|
|||||||
@ -35,7 +35,6 @@ in
|
|||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
ExecStart = (
|
ExecStart = (
|
||||||
shellCommand [
|
shellCommand [
|
||||||
# NEW:
|
|
||||||
"${pkgs.kubernetes}/bin/kube-controller-manager"
|
"${pkgs.kubernetes}/bin/kube-controller-manager"
|
||||||
"--bind-address=0.0.0.0"
|
"--bind-address=0.0.0.0"
|
||||||
# "--cluster-cidr=10.200.0.0/16"
|
# "--cluster-cidr=10.200.0.0/16"
|
||||||
|
|||||||
101
nix/kubernetes/roles/kubelet/default.nix
Normal file
101
nix/kubernetes/roles/kubelet/default.nix
Normal file
@ -0,0 +1,101 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
|
let
|
||||||
|
# shellCommand = cmd: (lib.concatMapStringsSep " " lib.strings.escapeShellArg cmd);
|
||||||
|
shellCommand = cmd: (builtins.concatStringsSep " " cmd);
|
||||||
|
settingsFormat = pkgs.formats.yaml { };
|
||||||
|
config_file = settingsFormat.generate "kubelet-config.yaml" config.me.kubelet.settings;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
imports = [ ];
|
||||||
|
|
||||||
|
options.me = {
|
||||||
|
kubelet.enable = lib.mkOption {
|
||||||
|
type = lib.types.bool;
|
||||||
|
default = false;
|
||||||
|
example = true;
|
||||||
|
description = "Whether we want to install kubelet.";
|
||||||
|
};
|
||||||
|
|
||||||
|
kubelet.settings = lib.mkOption {
|
||||||
|
type = settingsFormat.type;
|
||||||
|
default = {
|
||||||
|
kind = "KubeletConfiguration";
|
||||||
|
apiVersion = "kubelet.config.k8s.io/v1beta1";
|
||||||
|
address = "0.0.0.0";
|
||||||
|
authentication = {
|
||||||
|
anonymous = {
|
||||||
|
enabled = false;
|
||||||
|
};
|
||||||
|
webhook = {
|
||||||
|
enabled = true;
|
||||||
|
};
|
||||||
|
x509 = {
|
||||||
|
clientCAFile = "/var/lib/kubelet/ca.crt";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
authorization = {
|
||||||
|
mode = "Webhook";
|
||||||
|
};
|
||||||
|
cgroupDriver = "systemd";
|
||||||
|
containerRuntimeEndpoint = "unix:///var/run/containerd/containerd.sock";
|
||||||
|
enableServer = true;
|
||||||
|
failSwapOn = false;
|
||||||
|
maxPods = 16;
|
||||||
|
memorySwap = {
|
||||||
|
swapBehavior = "NoSwap";
|
||||||
|
};
|
||||||
|
port = 10250;
|
||||||
|
resolvConf = "/etc/resolv.conf";
|
||||||
|
registerNode = true;
|
||||||
|
runtimeRequestTimeout = "15m";
|
||||||
|
tlsCertFile = "/var/lib/kubelet/kubelet.crt";
|
||||||
|
tlsPrivateKeyFile = "/var/lib/kubelet/kubelet.key";
|
||||||
|
};
|
||||||
|
description = ''
|
||||||
|
kubelet-config.yaml
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.me.kubelet.enable {
|
||||||
|
systemd.services.kubelet = {
|
||||||
|
enable = true;
|
||||||
|
description = "Kubernetes Kubelet";
|
||||||
|
documentation = [ "https://github.com/kubernetes/kubernetes" ];
|
||||||
|
wantedBy = [ "kubernetes.target" ];
|
||||||
|
after = [ "containerd.service" ];
|
||||||
|
requires = [ "containerd.service" ];
|
||||||
|
# path = with pkgs; [
|
||||||
|
# zfs
|
||||||
|
# ];
|
||||||
|
unitConfig.DefaultDependencies = "no";
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = (
|
||||||
|
shellCommand [
|
||||||
|
"${pkgs.kubernetes}/bin/kubelet"
|
||||||
|
# "--config=${config_file}"
|
||||||
|
"--config=${./files/kubelet-config.yaml}"
|
||||||
|
"--kubeconfig=/.persist/keys/kube/kubeconfig"
|
||||||
|
"--v=2"
|
||||||
|
]
|
||||||
|
);
|
||||||
|
Restart = "on-failure";
|
||||||
|
RestartSec = 5;
|
||||||
|
# ConfigurationDirectory = "kubernetes";
|
||||||
|
# CPUAccounting = "true";
|
||||||
|
# IPAccounting = "true";
|
||||||
|
# KillMode = "process";
|
||||||
|
# MemoryAccounting = "true";
|
||||||
|
# StartLimitInterval = 0;
|
||||||
|
# RuntimeDirectory = "kubelet";
|
||||||
|
# StateDirectory = "kubelet";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
25
nix/kubernetes/roles/kubelet/files/kubelet-config.yaml
Normal file
25
nix/kubernetes/roles/kubelet/files/kubelet-config.yaml
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
kind: KubeletConfiguration
|
||||||
|
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||||
|
address: "0.0.0.0"
|
||||||
|
authentication:
|
||||||
|
anonymous:
|
||||||
|
enabled: false
|
||||||
|
webhook:
|
||||||
|
enabled: true
|
||||||
|
x509:
|
||||||
|
clientCAFile: "/.persist/keys/kube/ca.crt"
|
||||||
|
authorization:
|
||||||
|
mode: Webhook
|
||||||
|
cgroupDriver: systemd
|
||||||
|
containerRuntimeEndpoint: "unix:///var/run/containerd/containerd.sock"
|
||||||
|
enableServer: true
|
||||||
|
failSwapOn: false
|
||||||
|
maxPods: 16
|
||||||
|
memorySwap:
|
||||||
|
swapBehavior: NoSwap
|
||||||
|
port: 10250
|
||||||
|
resolvConf: "/etc/resolv.conf"
|
||||||
|
registerNode: true
|
||||||
|
runtimeRequestTimeout: "15m"
|
||||||
|
tlsCertFile: "/.persist/keys/kube/kubelet.crt"
|
||||||
|
tlsPrivateKeyFile: "/.persist/keys/kube/kubelet.key"
|
||||||
@ -19,6 +19,7 @@
|
|||||||
|
|
||||||
config = lib.mkIf config.me.worker_node.enable {
|
config = lib.mkIf config.me.worker_node.enable {
|
||||||
me.containerd.enable = true;
|
me.containerd.enable = true;
|
||||||
|
me.kubelet.enable = true;
|
||||||
me.kubernetes.enable = true;
|
me.kubernetes.enable = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user