Compare commits

...

40 Commits

Author SHA1 Message Date
f34763271e Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:44:19 +00:00
1456906d65 Update roles/vaultwarden/vars/main.yml 2025-10-30 17:38:53 +00:00
87e269c4b0 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:37:50 +00:00
b172e24a0e Update roles/vaultwarden/vars/main.yml 2025-10-30 17:24:10 +00:00
c850375dd4 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:22:46 +00:00
9e7f5be196 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:04:56 +00:00
e64863f887 nodejs 20 2025-10-30 13:47:09 +00:00
c0a8b0b00a bw via npm 2025-10-30 13:40:17 +00:00
2b060b27f0 bw 2025-10-30 13:33:00 +00:00
895dacd28d Update roles/stolon/tasks/main.yml 2025-10-30 13:14:08 +00:00
d5ed666c77 Update roles/stolon/tasks/main.yml 2025-10-30 12:46:22 +00:00
6b864989f5 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 12:30:26 +00:00
b4b99298e7 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 12:27:16 +00:00
077ac6f39b Update roles/stolon/tasks/main.yml 2025-10-30 09:49:29 +00:00
35a95c6553 Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:44:52 +00:00
aa55c290e1 Update roles/kube-master/tasks/main.yml 2025-10-30 09:29:51 +00:00
e2c0cb640c Update roles/stolon/tasks/main.yml 2025-10-30 09:25:02 +00:00
6b0bbff17c Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:12:52 +00:00
7c2908bea6 Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:11:43 +00:00
d79c611824 Update roles/kube-master/tasks/main.yml 2025-10-29 21:17:38 +00:00
b4ee6d1b83 Update roles/kube-master/tasks/main.yml 2025-10-29 20:59:35 +00:00
b774664389 Update roles/kube-master/tasks/main.yml 2025-10-29 20:51:25 +00:00
fd63bc9f0e Update roles/kube-master/tasks/main.yml 2025-10-29 20:30:38 +00:00
e8e9fa2d01 Update roles/kube-master/tasks/main.yml 2025-10-29 20:17:32 +00:00
928c6b2445 Update roles/kube-master/tasks/main.yml 2025-10-29 20:11:07 +00:00
dc2f6b163c Update roles/kube-master/tasks/main.yml 2025-10-29 20:01:11 +00:00
2f2d3c621b Update roles/kube-master/tasks/main.yml 2025-10-29 14:39:04 +00:00
e057170f9c namespace 2025-10-29 13:56:32 +00:00
db1d69e566 Update roles/stolon/tasks/main.yml 2025-10-29 13:51:04 +00:00
138e0e5b8d a 2025-10-29 13:46:32 +00:00
fe48f35c87 Update roles/stolon/tasks/main.yml 2025-10-29 13:36:27 +00:00
e295c09152 Update roles/stolon/tasks/main.yml 2025-10-29 13:24:18 +00:00
814abb92dd [deploy-opentofu] 2025-10-29 13:18:01 +00:00
983167e8bc yaml format 2025-10-29 13:16:03 +00:00
a142e3acda Update roles/stolon/kubernetes-files/stolon-proxy-service.yaml 2025-10-29 13:14:20 +00:00
2eaea3dbb3 Update roles/stolon/tasks/main.yml 2025-10-28 09:05:36 +00:00
db87c453ce teste com secrets falsos 2025-10-28 09:00:53 +00:00
5d60378c35 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-10-25 16:05:15 +01:00
892b80c438 vaultwarden test 2025-10-25 16:04:58 +01:00
39dd5e0c72 Update playbook.yml 2025-10-25 14:56:49 +00:00
17 changed files with 451 additions and 1 deletions

View File

@ -35,6 +35,7 @@ jobs:
bw login --apikey bw login --apikey
echo "session" echo "session"
BW_SESSION=$(bw unlock "$BW_PASSWORD" --raw) BW_SESSION=$(bw unlock "$BW_PASSWORD" --raw)
echo "BW_SESSION=$BW_SESSION" >> $GITEA_ENV
- name: Cloning ansible repository - name: Cloning ansible repository
@ -55,4 +56,6 @@ jobs:
- name: Run Ansible Playbook - name: Run Ansible Playbook
working-directory: ansible/iac working-directory: ansible/iac
run: | run: |
ansible-playbook -i inventory.ini playbook.yml ansible-playbook -i inventory.ini playbook.yml
env:
BW_SESSION: ${{ env.BW_SESSION }}

View File

@ -3,13 +3,16 @@
become: yes become: yes
roles: roles:
- common - common
- vaultwarden
- kubernetes - kubernetes
- kube-master - kube-master
- stolon
- name: Configure Kubernetes Nodes - name: Configure Kubernetes Nodes
hosts: workers hosts: workers
become: yes become: yes
roles: roles:
- common - common
- vaultwarden
- kubernetes - kubernetes
- kube-node - kube-node

View File

@ -133,6 +133,34 @@
delay: 6 delay: 6
become: yes become: yes
- name: Instalar Helm no nó master
become: true
shell: |
curl -fsSL https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | bash
args:
creates: /usr/local/bin/helm
- name: Adicionar repositório Helm do CSI NFS
command: >
helm repo add csi-driver-nfs https://raw.githubusercontent.com/kubernetes-csi/csi-driver-nfs/master/charts
args:
creates: /root/.cache/helm/repository/csi-driver-nfs-index.yaml
- name: Atualizar repositórios Helm
command: helm repo update
- name: Instalar CSI NFS Driver via Helm
command: helm upgrade --install csi-driver-nfs csi-driver-nfs/csi-driver-nfs --namespace kube-system --version 4.12.0
register: resultado_nfs
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Mostrar resultado do nfs csi driver
debug:
var: resultado_nfs.stdout_lines
- name: Get kubeadm join command - name: Get kubeadm join command
become: true become: true
shell: kubeadm token create --print-join-command shell: kubeadm token create --print-join-command

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: regcred
namespace: postgresql
data:
.dockerconfigjson: >-
eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJ1c2VyIiwicGFzc3dvcmQiOiJwYXNzIiwiYXV0aCI6ImRmamlla2ZlcldFS1dFa29mY2RrbzM0MzUzZmQ9In19fQ==
type: kubernetes.io/dockerconfigjson

View File

@ -0,0 +1,109 @@
# PetSet was renamed to StatefulSet in k8s 1.5
# apiVersion: apps/v1alpha1
# kind: PetSet
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: stolon-keeper
namespace: postgresql
spec:
serviceName: "stolon-keeper"
replicas: 3
selector:
matchLabels:
component: stolon-keeper
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-keeper
stolon-cluster: kube-stolon
annotations:
pod.alpha.kubernetes.io/initialized: "true"
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
terminationGracePeriodSeconds: 10
containers:
- name: stolon-keeper
image: sorintlab/stolon:master-pg15
command:
- "/bin/bash"
- "-ec"
- |
id stolon
# Generate our keeper uid using the pod index
IFS='-' read -ra ADDR <<< "$(hostname)"
export STKEEPER_UID="keeper${ADDR[-1]}"
export POD_IP=$(hostname -i)
export STKEEPER_PG_LISTEN_ADDRESS=$POD_IP
mkdir -p /stolon-data/data
export STOLON_DATA=/stolon-data/data
chown stolon:stolon /stolon-data
chown stolon:stolon $STOLON_DATA
exec gosu stolon stolon-keeper --data-dir $STOLON_DATA
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STKEEPER_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STKEEPER_STORE_BACKEND
value: "kubernetes"
- name: STKEEPER_KUBE_RESOURCE_KIND
value: "configmap"
- name: STKEEPER_PG_REPL_USERNAME
#value: "repluser"
valueFrom:
secretKeyRef:
name: stolon-repl-secret
key: username
- name: STKEEPER_PG_REPL_PASSWORD
#value: "replpassword"
valueFrom:
secretKeyRef:
name: stolon-repl-secret
key: password
- name: STKEEPER_PG_SU_USERNAME
#value: "stolon"
valueFrom:
secretKeyRef:
name: stolon-secret
key: username
- name: STKEEPER_PG_SU_PASSWORDFILE
value: "/etc/secrets/stolon/password"
- name: STKEEPER_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
# Uncomment this to enable debug logs
#- name: STKEEPER_DEBUG
# value: "true"
ports:
- containerPort: 5432
- containerPort: 8080
volumeMounts:
- mountPath: /stolon-data
name: data
- mountPath: /etc/secrets/stolon
name: stolon
volumes:
- name: stolon
secret:
secretName: stolon-secret
volumeClaimTemplates:
- kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: data
namespace: postgresql
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
storageClassName: stolon-nfs-csi

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: postgresql

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: stolon-nfs-csi
namespace: postgresql
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/postgresql-stolon
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,14 @@
apiVersion: v1
kind: Service
metadata:
name: stolon-proxy-service
namespace: postgresql
spec:
ports:
- port: 5432
targetPort: 5432
selector:
component: stolon-proxy
stolon-cluster: kube-stolon
type: LoadBalancer
loadBalancerIP: 192.168.1.105

View File

@ -0,0 +1,58 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: stolon-proxy
namespace: postgresql
spec:
replicas: 3
selector:
matchLabels:
component: stolon-proxy
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-proxy
stolon-cluster: kube-stolon
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
containers:
- name: stolon-proxy
image: sorintlab/stolon:master-pg10
command:
- "/bin/bash"
- "-ec"
- |
exec gosu stolon stolon-proxy
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STPROXY_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STPROXY_STORE_BACKEND
value: "kubernetes"
- name: STPROXY_KUBE_RESOURCE_KIND
value: "configmap"
- name: STPROXY_LISTEN_ADDRESS
value: "0.0.0.0"
- name: STPROXY_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
## Uncomment this to enable debug logs
#- name: STPROXY_DEBUG
# value: "true"
ports:
- containerPort: 5432
- containerPort: 8080
readinessProbe:
tcpSocket:
port: 5432
initialDelaySeconds: 10
timeoutSeconds: 5

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: stolon-repl-secret
namespace: postgresql
type: Opaque
data:
username: asOndDQ5aWZqa2w0aW85
password: asOndDQ5aWZqa2w0aW85

View File

@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: stolon-role-binding
namespace: postgresql
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: stolon-role
subjects:
- kind: ServiceAccount
name: default
namespace: postgresql

View File

@ -0,0 +1,14 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: stolon-role
namespace: postgresql
rules:
- apiGroups:
- ""
resources:
- pods
- configmaps
- events
verbs:
- "*"

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: stolon-secret
namespace: postgresql
type: Opaque
data:
username: asOndDQ5aWZqa2w0aW85
password: asOndDQ5aWZqa2w0aW85

View File

@ -0,0 +1,50 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: stolon-sentinel
namespace: postgresql
spec:
replicas: 3
selector:
matchLabels:
component: stolon-sentinel
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-sentinel
stolon-cluster: kube-stolon
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
containers:
- name: stolon-sentinel
image: sorintlab/stolon:master-pg10
command:
- "/bin/bash"
- "-ec"
- |
exec gosu stolon stolon-sentinel
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STSENTINEL_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STSENTINEL_STORE_BACKEND
value: "kubernetes"
- name: STSENTINEL_KUBE_RESOURCE_KIND
value: "configmap"
- name: STSENTINEL_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
## Uncomment this to enable debug logs
#- name: STSENTINEL_DEBUG
# value: "true"
ports:
- containerPort: 8080

View File

@ -0,0 +1,47 @@
- name: Remover o diretório /tmp/stolon/kubernetes-files
ansible.builtin.file:
path: /tmp/stolon/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stolon/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stolon/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stolon/kubernetes-files/files
register: resultado_ls
- name: Obter várias notas do Bitwarden
shell: |
export BW_SESSION={{ lookup('env', 'BW_SESSION') }}
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.dockersecrets", dest: "/tmp/stolon/kubernetes-files/files/docker-secrets.yaml" }
- { id: "iac.ansible.stolon.repl.secret", dest: "/tmp/stolon/kubernetes-files/files/stolon-repl-secret.yaml" }
- { id: "iac.ansible.stolon.keeper.secret", dest: "/tmp/stolon/kubernetes-files/files/stolon-secret.yaml" }
args:
executable: /bin/bash
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stolon/kubernetes-files/files/stolon-namespace.yaml
kubectl apply -f /tmp/stolon/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,65 @@
- name: Atualizar pacotes e instalar dependências básicas
become: true
apt:
name:
- curl
- git
- unzip
- jq
- gnupg
- ca-certificates
state: present
update_cache: true
- name: Adicionar repositório NodeSource para Node.js 20
become: true
shell: curl -fsSL https://deb.nodesource.com/setup_20.x | bash -
args:
executable: /bin/bash
- name: Instalar Node.js 20
become: true
apt:
name: nodejs
state: present
update_cache: true
- name: Verificar versão do Node.js
command: node -v
register: node_version
changed_when: false
- name: Verificar versão do npm
command: npm -v
register: npm_version
changed_when: false
- name: Instalar Bitwarden CLI via npm
become: true
shell: npm install -g @bitwarden/cli
args:
executable: /bin/bash
- name: Verificar instalação do Bitwarden CLI
command: bw --version
register: bw_version
failed_when: bw_version.rc != 0
- name: Fazer login no Bitwarden
shell: |
echo "config"
echo "VAULTWARDEN_LINK: {{ VAULTWARDEN_LINK }}"
bw config server {{ VAULTWARDEN_LINK }}
echo "login"
bw login --apikey
args:
executable: /bin/bash
register: bw_login
- name: Desbloquear cofre e guardar sessão
shell: bw unlock --password {{ bw_password }} --raw
register: bw_session
- name: Exportar sessão para ambiente local
shell: echo "export BW_SESSION={{ bw_session.stdout }}" >> /etc/profile.d/bw-session.sh
become: true

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"