mirror of
https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private.git
synced 2025-10-28 09:02:26 +00:00
Compare commits
11 Commits
47b3cb9bd4
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| db87c453ce | |||
| 5d60378c35 | |||
| 892b80c438 | |||
| 39dd5e0c72 | |||
| 9385da0ed1 | |||
| feefc19d09 | |||
| 3c990702ed | |||
| 55ac95fc90 | |||
| 880c7b23f1 | |||
| 78e1bb9b48 | |||
| 2391d89175 |
@ -1,9 +1,9 @@
|
||||
[kube-master]
|
||||
master1 ansible_host=192.168.1.10 ansible_user=ubuntu
|
||||
master1 ansible_host=192.168.1.10 ansible_user=ubuntu ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
|
||||
[kube-node]
|
||||
node1 ansible_host=192.168.1.11 ansible_user=ubuntu
|
||||
node2 ansible_host=192.168.1.12 ansible_user=ubuntu
|
||||
node1 ansible_host=192.168.1.11 ansible_user=ubuntu ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
node2 ansible_host=192.168.1.12 ansible_user=ubuntu ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
|
||||
[all:vars]
|
||||
ansible_python_interpreter=/usr/bin/python3
|
||||
#[all:vars]
|
||||
#ansible_python_interpreter=/usr/bin/python3
|
||||
@ -5,6 +5,7 @@
|
||||
- common
|
||||
- kubernetes
|
||||
- kube-master
|
||||
- stolon
|
||||
|
||||
- name: Configure Kubernetes Nodes
|
||||
hosts: workers
|
||||
|
||||
@ -22,7 +22,7 @@
|
||||
replace:
|
||||
path: /tmp/kube-flannel.yml
|
||||
regexp: '10\.244\.0\.0/16'
|
||||
replace: '192.168.2.0/24' # .3.
|
||||
replace: '10.244.0.0/16' # .3.
|
||||
|
||||
- name: Corrigir net-conf.json no manifest do Flannel
|
||||
become: true
|
||||
@ -40,12 +40,12 @@
|
||||
debug:
|
||||
var: flannel_manifest.stdout
|
||||
|
||||
- name: Adicionar --iface=eth1 ao flanneld
|
||||
- name: Adicionar --iface=eth0 ao flanneld
|
||||
become: true
|
||||
ansible.builtin.lineinfile:
|
||||
path: /tmp/kube-flannel.yml
|
||||
insertafter: ' - --kube-subnet-mgr'
|
||||
line: ' - --iface=eth1'
|
||||
line: ' - --iface=eth0'
|
||||
|
||||
|
||||
|
||||
@ -55,7 +55,7 @@
|
||||
argv:
|
||||
- kubeadm
|
||||
- init
|
||||
- --pod-network-cidr=192.168.2.0/24 # .3.
|
||||
- --pod-network-cidr=10.244.0.0/16 # .3.
|
||||
- --apiserver-advertise-address=192.168.1.150
|
||||
creates: /etc/kubernetes/admin.conf
|
||||
|
||||
|
||||
@ -10,11 +10,11 @@ with open("/tmp/kube-flannel.yml", "r") as f:
|
||||
for doc in docs:
|
||||
if doc.get("kind") == "ConfigMap" and doc.get("metadata", {}).get("name") == "kube-flannel-cfg":
|
||||
doc["data"]["net-conf.json"] = '''{
|
||||
"Network": "192.168.2.0/24",
|
||||
"Network": "10.244.0.0/16",
|
||||
"Backend": {
|
||||
"Type": "vxlan"
|
||||
},
|
||||
"Interface": "eth1"
|
||||
"Interface": "eth0"
|
||||
}'''
|
||||
|
||||
with open("/tmp/kube-flannel.yml", "w") as f:
|
||||
|
||||
@ -23,9 +23,9 @@
|
||||
- node_status.stdout | trim == "NOT_IN_CLUSTER"
|
||||
|
||||
|
||||
- name: Atribuir podCIDR ao nó via hostname real
|
||||
shell: |
|
||||
kubectl patch node {{ node_hostname.stdout }} -p '{"spec":{"podCIDR":"192.168.2.0/24"}}'
|
||||
when:
|
||||
- hostvars['master1']['kubeadm_join_command'] is defined
|
||||
- node_status.stdout | trim == "NOT_IN_CLUSTER"
|
||||
#- name: Atribuir podCIDR ao nó via hostname real
|
||||
# shell: |
|
||||
# kubectl patch node {{ node_hostname.stdout }} -p '{"spec":{"podCIDR":"192.168.2.0/24"}}'
|
||||
# when:
|
||||
# - hostvars['master1']['kubeadm_join_command'] is defined
|
||||
# - node_status.stdout | trim == "NOT_IN_CLUSTER"
|
||||
9
roles/stolon/kubernetes-files/docker-secrets.yaml
Normal file
9
roles/stolon/kubernetes-files/docker-secrets.yaml
Normal file
@ -0,0 +1,9 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: regcred
|
||||
namespace: postgresql
|
||||
data:
|
||||
.dockerconfigjson: >-
|
||||
eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJ1c2VyIiwicGFzc3dvcmQiOiJwYXNzIiwiYXV0aCI6ImRmamlla2ZlcldFS1dFa29mY2RrbzM0MzUzZmQ9In19fQ==
|
||||
type: kubernetes.io/dockerconfigjson
|
||||
109
roles/stolon/kubernetes-files/stolon-keeper
Normal file
109
roles/stolon/kubernetes-files/stolon-keeper
Normal file
@ -0,0 +1,109 @@
|
||||
# PetSet was renamed to StatefulSet in k8s 1.5
|
||||
# apiVersion: apps/v1alpha1
|
||||
# kind: PetSet
|
||||
apiVersion: apps/v1
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
name: stolon-keeper
|
||||
namespace: postgresql
|
||||
spec:
|
||||
serviceName: "stolon-keeper"
|
||||
replicas: 3
|
||||
selector:
|
||||
matchLabels:
|
||||
component: stolon-keeper
|
||||
stolon-cluster: kube-stolon
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
component: stolon-keeper
|
||||
stolon-cluster: kube-stolon
|
||||
annotations:
|
||||
pod.alpha.kubernetes.io/initialized: "true"
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "8080"
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: regcred
|
||||
terminationGracePeriodSeconds: 10
|
||||
containers:
|
||||
- name: stolon-keeper
|
||||
image: sorintlab/stolon:master-pg15
|
||||
command:
|
||||
- "/bin/bash"
|
||||
- "-ec"
|
||||
- |
|
||||
id stolon
|
||||
# Generate our keeper uid using the pod index
|
||||
IFS='-' read -ra ADDR <<< "$(hostname)"
|
||||
export STKEEPER_UID="keeper${ADDR[-1]}"
|
||||
export POD_IP=$(hostname -i)
|
||||
export STKEEPER_PG_LISTEN_ADDRESS=$POD_IP
|
||||
mkdir -p /stolon-data/data
|
||||
export STOLON_DATA=/stolon-data/data
|
||||
chown stolon:stolon /stolon-data
|
||||
chown stolon:stolon $STOLON_DATA
|
||||
exec gosu stolon stolon-keeper --data-dir $STOLON_DATA
|
||||
env:
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
- name: STKEEPER_CLUSTER_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.labels['stolon-cluster']
|
||||
- name: STKEEPER_STORE_BACKEND
|
||||
value: "kubernetes"
|
||||
- name: STKEEPER_KUBE_RESOURCE_KIND
|
||||
value: "configmap"
|
||||
- name: STKEEPER_PG_REPL_USERNAME
|
||||
#value: "repluser"
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: stolon-repl-secret
|
||||
key: username
|
||||
- name: STKEEPER_PG_REPL_PASSWORD
|
||||
#value: "replpassword"
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: stolon-repl-secret
|
||||
key: password
|
||||
- name: STKEEPER_PG_SU_USERNAME
|
||||
#value: "stolon"
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: stolon-secret
|
||||
key: username
|
||||
- name: STKEEPER_PG_SU_PASSWORDFILE
|
||||
value: "/etc/secrets/stolon/password"
|
||||
- name: STKEEPER_METRICS_LISTEN_ADDRESS
|
||||
value: "0.0.0.0:8080"
|
||||
# Uncomment this to enable debug logs
|
||||
#- name: STKEEPER_DEBUG
|
||||
# value: "true"
|
||||
ports:
|
||||
- containerPort: 5432
|
||||
- containerPort: 8080
|
||||
volumeMounts:
|
||||
- mountPath: /stolon-data
|
||||
name: data
|
||||
- mountPath: /etc/secrets/stolon
|
||||
name: stolon
|
||||
volumes:
|
||||
- name: stolon
|
||||
secret:
|
||||
secretName: stolon-secret
|
||||
volumeClaimTemplates:
|
||||
- kind: PersistentVolumeClaim
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: data
|
||||
namespace: postgresql
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
resources:
|
||||
requests:
|
||||
storage: 10Gi
|
||||
storageClassName: stolon-nfs-csi
|
||||
11
roles/stolon/kubernetes-files/stolon-nfs-csi.yaml
Normal file
11
roles/stolon/kubernetes-files/stolon-nfs-csi.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
apiVersion: storage.k8s.io/v1
|
||||
kind: StorageClass
|
||||
metadata:
|
||||
name: stolon-nfs-csi
|
||||
namespace: postgresql
|
||||
provisioner: nfs.csi.k8s.io
|
||||
parameters:
|
||||
server: 192.168.1.34
|
||||
share: /mnt/pool/data/k8s-Volumes/postgress_stolon/keepers
|
||||
allowVolumeExpansion: true
|
||||
reclaimPolicy: Retain
|
||||
14
roles/stolon/kubernetes-files/stolon-proxy-service.yaml
Normal file
14
roles/stolon/kubernetes-files/stolon-proxy-service.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: stolon-proxy-service
|
||||
namespace: postgresql
|
||||
spec:
|
||||
ports:
|
||||
- port: 5432
|
||||
targetPort: 5432
|
||||
selector:
|
||||
component: stolon-proxy
|
||||
stolon-cluster: kube-stolon
|
||||
type: LoadBalancer
|
||||
loadBalancerIP: 192.168.1.100
|
||||
58
roles/stolon/kubernetes-files/stolon-proxy.yaml
Normal file
58
roles/stolon/kubernetes-files/stolon-proxy.yaml
Normal file
@ -0,0 +1,58 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: stolon-proxy
|
||||
namespace: postgresql
|
||||
spec:
|
||||
replicas: 3
|
||||
selector:
|
||||
matchLabels:
|
||||
component: stolon-proxy
|
||||
stolon-cluster: kube-stolon
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
component: stolon-proxy
|
||||
stolon-cluster: kube-stolon
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "8080"
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: regcred
|
||||
containers:
|
||||
- name: stolon-proxy
|
||||
image: sorintlab/stolon:master-pg10
|
||||
command:
|
||||
- "/bin/bash"
|
||||
- "-ec"
|
||||
- |
|
||||
exec gosu stolon stolon-proxy
|
||||
env:
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
- name: STPROXY_CLUSTER_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.labels['stolon-cluster']
|
||||
- name: STPROXY_STORE_BACKEND
|
||||
value: "kubernetes"
|
||||
- name: STPROXY_KUBE_RESOURCE_KIND
|
||||
value: "configmap"
|
||||
- name: STPROXY_LISTEN_ADDRESS
|
||||
value: "0.0.0.0"
|
||||
- name: STPROXY_METRICS_LISTEN_ADDRESS
|
||||
value: "0.0.0.0:8080"
|
||||
## Uncomment this to enable debug logs
|
||||
#- name: STPROXY_DEBUG
|
||||
# value: "true"
|
||||
ports:
|
||||
- containerPort: 5432
|
||||
- containerPort: 8080
|
||||
readinessProbe:
|
||||
tcpSocket:
|
||||
port: 5432
|
||||
initialDelaySeconds: 10
|
||||
timeoutSeconds: 5
|
||||
9
roles/stolon/kubernetes-files/stolon-repl-secret.yaml
Normal file
9
roles/stolon/kubernetes-files/stolon-repl-secret.yaml
Normal file
@ -0,0 +1,9 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: stolon-repl-secret
|
||||
namespace: postgresql
|
||||
type: Opaque
|
||||
data:
|
||||
username: asOndDQ5aWZqa2w0aW85
|
||||
password: asOndDQ5aWZqa2w0aW85
|
||||
13
roles/stolon/kubernetes-files/stolon-role-binding.yaml
Normal file
13
roles/stolon/kubernetes-files/stolon-role-binding.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: stolon-role-binding
|
||||
namespace: postgresql
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: stolon-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: default
|
||||
namespace: postgresql
|
||||
14
roles/stolon/kubernetes-files/stolon-role.yaml
Normal file
14
roles/stolon/kubernetes-files/stolon-role.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: stolon-role
|
||||
namespace: postgresql
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- configmaps
|
||||
- events
|
||||
verbs:
|
||||
- "*"
|
||||
9
roles/stolon/kubernetes-files/stolon-secret.yaml
Normal file
9
roles/stolon/kubernetes-files/stolon-secret.yaml
Normal file
@ -0,0 +1,9 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: stolon-secret
|
||||
namespace: postgresql
|
||||
type: Opaque
|
||||
data:
|
||||
username: asOndDQ5aWZqa2w0aW85
|
||||
password: asOndDQ5aWZqa2w0aW85
|
||||
50
roles/stolon/kubernetes-files/stolon-sentinel.yaml
Normal file
50
roles/stolon/kubernetes-files/stolon-sentinel.yaml
Normal file
@ -0,0 +1,50 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: stolon-sentinel
|
||||
namespace: postgresql
|
||||
spec:
|
||||
replicas: 3
|
||||
selector:
|
||||
matchLabels:
|
||||
component: stolon-sentinel
|
||||
stolon-cluster: kube-stolon
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
component: stolon-sentinel
|
||||
stolon-cluster: kube-stolon
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "8080"
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: regcred
|
||||
containers:
|
||||
- name: stolon-sentinel
|
||||
image: sorintlab/stolon:master-pg10
|
||||
command:
|
||||
- "/bin/bash"
|
||||
- "-ec"
|
||||
- |
|
||||
exec gosu stolon stolon-sentinel
|
||||
env:
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
- name: STSENTINEL_CLUSTER_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.labels['stolon-cluster']
|
||||
- name: STSENTINEL_STORE_BACKEND
|
||||
value: "kubernetes"
|
||||
- name: STSENTINEL_KUBE_RESOURCE_KIND
|
||||
value: "configmap"
|
||||
- name: STSENTINEL_METRICS_LISTEN_ADDRESS
|
||||
value: "0.0.0.0:8080"
|
||||
## Uncomment this to enable debug logs
|
||||
#- name: STSENTINEL_DEBUG
|
||||
# value: "true"
|
||||
ports:
|
||||
- containerPort: 8080
|
||||
14
roles/stolon/tasks/main.yml
Normal file
14
roles/stolon/tasks/main.yml
Normal file
@ -0,0 +1,14 @@
|
||||
- name: Criar diretório temporário no remoto
|
||||
file:
|
||||
path: /tmp/stolon/kubernetes-files
|
||||
state: directory
|
||||
mode: '0755'
|
||||
|
||||
- name: Copiar arquivos YAML para o remoto
|
||||
copy:
|
||||
src: ./roles/stolon/kubernetes-files
|
||||
dest: /tmp/stolon/kubernetes-files
|
||||
mode: '0644'
|
||||
|
||||
- name: Aplicar os YAMLs com kubectl
|
||||
command: kubectl apply -f /tmp/k8s_yamls/
|
||||
Reference in New Issue
Block a user