Split out wild-setup into three phase scripts.
This commit is contained in:
@@ -1,22 +0,0 @@
|
||||
machine:
|
||||
install:
|
||||
disk: {{ .cluster.nodes.control.node1.disk }}
|
||||
image: factory.talos.dev/metal-installer/{{ .cluster.nodes.talos.schematicId}}:{{ .cluster.nodes.talos.version}}
|
||||
network:
|
||||
interfaces:
|
||||
- interface: {{ .cluster.nodes.control.node1.interface }}
|
||||
dhcp: false
|
||||
addresses:
|
||||
- {{ .cluster.nodes.control.node1.ip }}/24
|
||||
routes:
|
||||
- network: 0.0.0.0/0
|
||||
gateway: {{ .cloud.router.ip }}
|
||||
vip:
|
||||
ip: {{ .cluster.nodes.control.vip }}
|
||||
cluster:
|
||||
discovery:
|
||||
enabled: true
|
||||
registries:
|
||||
service:
|
||||
disabled: true
|
||||
allowSchedulingOnControlPlanes: true
|
@@ -1,22 +0,0 @@
|
||||
machine:
|
||||
install:
|
||||
disk: {{ .cluster.nodes.control.node2.disk }}
|
||||
image: factory.talos.dev/metal-installer/{{ .cluster.nodes.talos.schematicId}}:{{ .cluster.nodes.talos.version}}
|
||||
network:
|
||||
interfaces:
|
||||
- interface: {{ .cluster.nodes.control.node2.interface }}
|
||||
dhcp: false
|
||||
addresses:
|
||||
- {{ .cluster.nodes.control.node2.ip }}/24
|
||||
routes:
|
||||
- network: 0.0.0.0/0
|
||||
gateway: {{ .cloud.router.ip }}
|
||||
vip:
|
||||
ip: {{ .cluster.nodes.control.vip }}
|
||||
cluster:
|
||||
discovery:
|
||||
enabled: true
|
||||
registries:
|
||||
service:
|
||||
disabled: true
|
||||
allowSchedulingOnControlPlanes: true
|
@@ -1,13 +1,13 @@
|
||||
machine:
|
||||
install:
|
||||
disk: {{ .cluster.nodes.control.node3.disk }}
|
||||
disk: {{ index .cluster.nodes.active "{{NODE_IP}}" "disk" }}
|
||||
image: factory.talos.dev/metal-installer/{{ .cluster.nodes.talos.schematicId}}:{{ .cluster.nodes.talos.version}}
|
||||
network:
|
||||
interfaces:
|
||||
- interface: {{ .cluster.nodes.control.node3.interface }}
|
||||
- interface: {{ index .cluster.nodes.active "{{NODE_IP}}" "interface" }}
|
||||
dhcp: false
|
||||
addresses:
|
||||
- {{ .cluster.nodes.control.node3.ip }}/24
|
||||
- "{{NODE_IP}}/24"
|
||||
routes:
|
||||
- network: 0.0.0.0/0
|
||||
gateway: {{ .cloud.router.ip }}
|
||||
@@ -19,4 +19,4 @@ cluster:
|
||||
registries:
|
||||
service:
|
||||
disabled: true
|
||||
allowSchedulingOnControlPlanes: true
|
||||
allowSchedulingOnControlPlanes: true
|
@@ -1,10 +1,7 @@
|
||||
machine:
|
||||
install:
|
||||
disk: /dev/sdc
|
||||
network:
|
||||
interfaces:
|
||||
- interface: enp4s0
|
||||
dhcp: true
|
||||
disk: {{ index .cluster.nodes.active "{{NODE_IP}}" "disk" }}
|
||||
image: factory.talos.dev/metal-installer/{{ .cluster.nodes.talos.schematicId}}:{{ .cluster.nodes.talos.version}}
|
||||
kubelet:
|
||||
extraMounts:
|
||||
- destination: /var/lib/longhorn
|
||||
@@ -14,9 +11,3 @@ machine:
|
||||
- bind
|
||||
- rshared
|
||||
- rw
|
||||
# NOTE: System extensions need to be added via Talos Image Factory
|
||||
# customization:
|
||||
# systemExtensions:
|
||||
# officialExtensions:
|
||||
# - siderolabs/iscsi-tools
|
||||
# - siderolabs/util-linux-tools
|
@@ -34,7 +34,7 @@ sleep 30
|
||||
|
||||
# Setup Cloudflare API token for DNS01 challenges
|
||||
echo "Creating Cloudflare API token secret..."
|
||||
CLOUDFLARE_API_TOKEN=$(wild-secret cluster.certManager.cloudflare.apiToken) || exit 1
|
||||
CLOUDFLARE_API_TOKEN=$(wild-secret cloudflare.token) || exit 1
|
||||
kubectl create secret generic cloudflare-api-token \
|
||||
--namespace cert-manager \
|
||||
--from-literal=api-token="${CLOUDFLARE_API_TOKEN}" \
|
||||
|
@@ -14,7 +14,7 @@ data:
|
||||
reload
|
||||
template IN A {
|
||||
match (.*)\.{{ .cloud.internalDomain | strings.ReplaceAll "." "\\." }}\.
|
||||
answer "{{`{{ .Name }}`}} 60 IN A {{ .cluster.loadBalancerIp }}"
|
||||
answer "{{`{{"{{ .Name }}"}}`}} 60 IN A {{ .cluster.loadBalancerIp }}"
|
||||
}
|
||||
template IN AAAA {
|
||||
match (.*)\.{{ .cloud.internalDomain | strings.ReplaceAll "." "\\." }}\.
|
||||
|
@@ -21,7 +21,7 @@ kubectl apply -k ${EXTERNALDNS_DIR}/kustomize
|
||||
|
||||
# Setup Cloudflare API token secret
|
||||
echo "Creating Cloudflare API token secret..."
|
||||
CLOUDFLARE_API_TOKEN=$(wild-secret cluster.certManager.cloudflare.apiToken) || exit 1
|
||||
CLOUDFLARE_API_TOKEN=$(wild-secret cloudflare.token) || exit 1
|
||||
kubectl create secret generic cloudflare-api-token \
|
||||
--namespace externaldns \
|
||||
--from-literal=api-token="${CLOUDFLARE_API_TOKEN}" \
|
||||
|
Reference in New Issue
Block a user