Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/utilitywarehouse/tf_kube_ignition
Flatcar Linux Ignition config for a Kubernetes cluster, in the form of a Terraform module.
https://github.com/utilitywarehouse/tf_kube_ignition
container-linux flatcar-linux ignition k8s kubernetes terraform uw-owner-system
Last synced: about 19 hours ago
JSON representation
Flatcar Linux Ignition config for a Kubernetes cluster, in the form of a Terraform module.
- Host: GitHub
- URL: https://github.com/utilitywarehouse/tf_kube_ignition
- Owner: utilitywarehouse
- License: mit
- Created: 2017-08-29T13:17:19.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2024-12-19T14:07:57.000Z (9 days ago)
- Last Synced: 2024-12-19T15:23:58.486Z (8 days ago)
- Topics: container-linux, flatcar-linux, ignition, k8s, kubernetes, terraform, uw-owner-system
- Language: HCL
- Homepage:
- Size: 455 KB
- Stars: 15
- Watchers: 7
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# tf_kube_ignition
This terraform module generates ignition configuration for Container Linux to help with the bootstrapping of kubernetes nodes. It requires at least Kubernetes v1.9.
## Input Variables
The input variables are documented in their description and it's best to refer to [variables.tf](variables.tf).
## Ouputs
- `master` - the rendered ignition config for master nodes
- `worker` - the rendered ignition config for worker nodes
- `etcd` - the rendered ignition config for etcd nodes
- `cfssl` - the rendered ignition config for cfssl server## Usage
Below is an example of how you might use this terraform module:
```hcl
module "ignition" {
source = "github.com/utilitywarehouse/tf_kube_ignition?ref=1.0.0"cloud_provider = "aws"
enable_container_linux_update-engine = true
enable_container_linux_locksmithd_master = false
enable_container_linux_locksmithd_worker = false
dns_domain = "${var.role_name}.${var.account}.${var.vpc_dns_zone_name}"
cluster_dns = "10.3.0.10"
master_instance_count = "3"
master_address = "master.kube.example.com"
etcd_addresses = ["10.10.0.6", "10.10.0.7", "10.10.0.8"]
oidc_issuer_url = "https://accounts.google.com"
oidc_client_id = "000000000000-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.apps.googleusercontent.com"
cfssl_ca_cn = "Example CA"
cfssl_server_address = "${var.cfssl_instance_address}"
cfssl_node_renew_timer = "*-*-* 00/6:00:00"
cfssl_data_volumeid = "${module.cluster.cfssl_data_volumeid}"
etcd_data_volumeids = "${module.cluster.etcd_data_volumeids}"
etcd_additional_files = ["${data.ignition_file.if.rendered}"]
etcd_additional_systemd_units = ["${data.ignition_systemd_unit.isu.rendered}", "${data.ignition_systemd_unit.isu2.rendered}"]
master_additional_systemd_units = ["${data.ignition_systemd_unit.isu.rendered}"]
worker_additional_systemd_units = ["${data.ignition_systemd_unit.isu.rendered}"]
cfssl_additional_systemd_units = ["${data.ignition_systemd_unit.isu.rendered}"]
}
```## Certificates
Certificates for the cluster components are fetched from the `cfssl` server, and they all use the same `CA`.
As part of `kubelet` systemd service pre start processes we fetch all the needed certificates, following `kubeadm` [docs](https://kubernetes.io/docs/reference/setup-tools/kubeadm/implementation-details/#generate-the-necessary-certificates). All kube components authenticate against apiservers using a client certificate and in particular `CN` as RBAC user and `ORG` as RBAC group.
We get the following certificates on every `kubelet` service restart:
### Master
#### Kubelet
- A `node` certificate to be used by kubelet kubeconfig to authenticate against apiserver
```
CN=system:node:
ORG=system:master-nodes
```- A `kubelet` certificate to serve apiserver requests on port `:10250`, based on [doc](https://kubernetes.io/docs/concepts/architecture/master-node-communication/#apiserver-to-kubelet)
```
CN=system:kubelet:
ORG=system:kubelets
```#### Apiserver
- A serving certificate for the API server (`apiserver`)
Common Name and Organisation are not important here as the cert will not be used to authenticate against apiservers, but the certificate need to specify all the alternative DNS names that the apiservers listen to.- A client certificate for the API server to connect to the kubelets securely (`apiserver-kubelet-client`)
```
CN=system:node:
ORG=system:masters
```#### Kube Scheduler
- A `scheduler` certificate to be used in kube-scheduler's kubeconfig file to communicate with apiservers.
```
CN=system:kube-scheduler
ORG=
```#### Kube Controller Manager
- A `controller-manager` certificate to be used in kube-controller-manager's kubeconfig file to communicate with apiservers.
```
CN=system:kube-controller-manager
ORG=
```### Node
#### Kubelet
- A `node` certificate to be used by kubelet kubeconfig to authenticate against apiserver
```
CN=system:node:
ORG=system:nodes
```- A `kubelet` certificate to serve apiserver requests on port `:10250`, based on [doc](https://kubernetes.io/docs/concepts/architecture/master-node-communication/#apiserver-to-kubelet)
```
CN=system:kubelet:
ORG=system:kubelets
```