Add kubelet.
This commit is contained in:
@@ -35,7 +35,6 @@ in
|
||||
serviceConfig = {
|
||||
ExecStart = (
|
||||
shellCommand [
|
||||
# NEW:
|
||||
"${pkgs.kubernetes}/bin/kube-controller-manager"
|
||||
"--bind-address=0.0.0.0"
|
||||
# "--cluster-cidr=10.200.0.0/16"
|
||||
|
||||
101
nix/kubernetes/roles/kubelet/default.nix
Normal file
101
nix/kubernetes/roles/kubelet/default.nix
Normal file
@@ -0,0 +1,101 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
|
||||
let
|
||||
# shellCommand = cmd: (lib.concatMapStringsSep " " lib.strings.escapeShellArg cmd);
|
||||
shellCommand = cmd: (builtins.concatStringsSep " " cmd);
|
||||
settingsFormat = pkgs.formats.yaml { };
|
||||
config_file = settingsFormat.generate "kubelet-config.yaml" config.me.kubelet.settings;
|
||||
in
|
||||
{
|
||||
imports = [ ];
|
||||
|
||||
options.me = {
|
||||
kubelet.enable = lib.mkOption {
|
||||
type = lib.types.bool;
|
||||
default = false;
|
||||
example = true;
|
||||
description = "Whether we want to install kubelet.";
|
||||
};
|
||||
|
||||
kubelet.settings = lib.mkOption {
|
||||
type = settingsFormat.type;
|
||||
default = {
|
||||
kind = "KubeletConfiguration";
|
||||
apiVersion = "kubelet.config.k8s.io/v1beta1";
|
||||
address = "0.0.0.0";
|
||||
authentication = {
|
||||
anonymous = {
|
||||
enabled = false;
|
||||
};
|
||||
webhook = {
|
||||
enabled = true;
|
||||
};
|
||||
x509 = {
|
||||
clientCAFile = "/var/lib/kubelet/ca.crt";
|
||||
};
|
||||
};
|
||||
authorization = {
|
||||
mode = "Webhook";
|
||||
};
|
||||
cgroupDriver = "systemd";
|
||||
containerRuntimeEndpoint = "unix:///var/run/containerd/containerd.sock";
|
||||
enableServer = true;
|
||||
failSwapOn = false;
|
||||
maxPods = 16;
|
||||
memorySwap = {
|
||||
swapBehavior = "NoSwap";
|
||||
};
|
||||
port = 10250;
|
||||
resolvConf = "/etc/resolv.conf";
|
||||
registerNode = true;
|
||||
runtimeRequestTimeout = "15m";
|
||||
tlsCertFile = "/var/lib/kubelet/kubelet.crt";
|
||||
tlsPrivateKeyFile = "/var/lib/kubelet/kubelet.key";
|
||||
};
|
||||
description = ''
|
||||
kubelet-config.yaml
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf config.me.kubelet.enable {
|
||||
systemd.services.kubelet = {
|
||||
enable = true;
|
||||
description = "Kubernetes Kubelet";
|
||||
documentation = [ "https://github.com/kubernetes/kubernetes" ];
|
||||
wantedBy = [ "kubernetes.target" ];
|
||||
after = [ "containerd.service" ];
|
||||
requires = [ "containerd.service" ];
|
||||
# path = with pkgs; [
|
||||
# zfs
|
||||
# ];
|
||||
unitConfig.DefaultDependencies = "no";
|
||||
serviceConfig = {
|
||||
ExecStart = (
|
||||
shellCommand [
|
||||
"${pkgs.kubernetes}/bin/kubelet"
|
||||
# "--config=${config_file}"
|
||||
"--config=${./files/kubelet-config.yaml}"
|
||||
"--kubeconfig=/.persist/keys/kube/kubeconfig"
|
||||
"--v=2"
|
||||
]
|
||||
);
|
||||
Restart = "on-failure";
|
||||
RestartSec = 5;
|
||||
# ConfigurationDirectory = "kubernetes";
|
||||
# CPUAccounting = "true";
|
||||
# IPAccounting = "true";
|
||||
# KillMode = "process";
|
||||
# MemoryAccounting = "true";
|
||||
# StartLimitInterval = 0;
|
||||
# RuntimeDirectory = "kubelet";
|
||||
# StateDirectory = "kubelet";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
25
nix/kubernetes/roles/kubelet/files/kubelet-config.yaml
Normal file
25
nix/kubernetes/roles/kubelet/files/kubelet-config.yaml
Normal file
@@ -0,0 +1,25 @@
|
||||
kind: KubeletConfiguration
|
||||
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||
address: "0.0.0.0"
|
||||
authentication:
|
||||
anonymous:
|
||||
enabled: false
|
||||
webhook:
|
||||
enabled: true
|
||||
x509:
|
||||
clientCAFile: "/.persist/keys/kube/ca.crt"
|
||||
authorization:
|
||||
mode: Webhook
|
||||
cgroupDriver: systemd
|
||||
containerRuntimeEndpoint: "unix:///var/run/containerd/containerd.sock"
|
||||
enableServer: true
|
||||
failSwapOn: false
|
||||
maxPods: 16
|
||||
memorySwap:
|
||||
swapBehavior: NoSwap
|
||||
port: 10250
|
||||
resolvConf: "/etc/resolv.conf"
|
||||
registerNode: true
|
||||
runtimeRequestTimeout: "15m"
|
||||
tlsCertFile: "/.persist/keys/kube/kubelet.crt"
|
||||
tlsPrivateKeyFile: "/.persist/keys/kube/kubelet.key"
|
||||
@@ -19,6 +19,7 @@
|
||||
|
||||
config = lib.mkIf config.me.worker_node.enable {
|
||||
me.containerd.enable = true;
|
||||
me.kubelet.enable = true;
|
||||
me.kubernetes.enable = true;
|
||||
};
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user