Skip to content

Bjoggis-Studios/flux-control

Repository files navigation

flux-control

juice-docker-desktop

Tip: You can run the setup script to automatically setup the cluster with correct secrets and a bootstrapped flux.

chmod +x setup

./setup

To recreate a cluster you will need to delete it first with the command

k3d cluster delete juice

The commands below is ran in the setup function, but kept here for easy access.

The following command will create a value that contains the json data Set that value as a environment variable before running the kustomize build command.

kubectl create secret generic tunnel-credentials --from-file=credentials.json=/home/$USER/.cloudflared/<tunnel-id>.json -o yaml --dry-run=client
kubectl create secret generic config-server-credentials -n jonasandersen-no --from-literal=username=$SPRING_CLOUD_CONFIG_USERNAME --from-literal=password=$SPRING_CLOUD_CONFIG_PASSWORD

Remember to also run tenants env files.

kustomize build ./env/jonasandersen-no | envsubst | kubectl apply -f -

Flux

flux bootstrap github \
  --owner=$GITHUB_USER \
  --repository=flux-control \
  --branch=main \
  --path=./clusters/$(kubectx -c)

Optional flux command that supports image updating

 flux bootstrap github \
   --owner=Bjoggis-Studios \   
   --repository=flux-control \
   --branch=main \
   --path=./clusters/$(kubectx -c) \
   --components-extra image-reflector-controller,image-automation-controller \
   --read-write-key

k3d setup

k3d cluster create juice --k3s-arg "--disable=traefik@server:0"

k3sup setup

Setup a cluster with k3sup

export CONTROL_NODE_IP=<ip>
k3sup install --ip $CONTROL_NODE_IP --user gollien --k3s-extra-args '--disable traefik' --merge --local-path ~/.kube/config --context cluster00 --ssh-key pi-cluster

If running from control node

k3sup install --ip 172.19.181.254 --user gollien --ssh-key /home/gollien/.ssh/id_ed25519 --k3s-extra-args '--disable traefik' --context cluster00  

Cloudflare tunnel

cloudflared tunnel create <NAME>

Take credential file from cloudflare and transform it to a

Example to create secret from credentials file.

Put the value of the single data entry in 1Password and depend on it in .envrc

kubectl create secret generic database-credentials --dry-run=client --output=yaml --from-file .cloudflared/83a81522-daed-4722-838e-e261fb258769.json

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages