diff --git a/clusters/kube2/bootstrap.conf b/clusters/kube2/bootstrap.conf new file mode 100644 index 0000000..c84732f --- /dev/null +++ b/clusters/kube2/bootstrap.conf @@ -0,0 +1,19 @@ +acme_email="innovasjon@itpartner.no" +grafana_smtp_user="utvikling" +grafana_smtp_password="S0m3rp0m@de#21!" +fileserver="fs0-0" +read -r -d '' grafana_ldap_toml << EOM +verbose_logging = true + +[[servers]] +host = "itp-dc1.itpartner.intern" +port = 636 +use_ssl = true +start_tls = false +ssl_skip_verify = true +bind_dn = "gitlab@itpartner.intern" +bind_password = "hipp hopp snipp snopp" +search_filter = "(&(objectClass=user)(objectClass=person)(|(sAMAccountName=%s)(mail=%s)))" +search_base_dns = ["DC=itpartner,DC=intern"] +EOM +# vim:ft=sh diff --git a/clusters/kube2/default.nix b/clusters/kube2/default.nix new file mode 100644 index 0000000..85fffb7 --- /dev/null +++ b/clusters/kube2/default.nix @@ -0,0 +1,45 @@ +with import {}; +let + settings = { + clusterName = "kube2"; + master = { + name = "k2-0"; address = "10.253.18.114"; + }; + cidr = "10.11.0.0/16"; + workers = [ + { name = "k2-1"; address = "10.253.18.115"; } + { name = "k2-2"; address = "10.253.18.116"; } + { name = "k2-3"; address = "10.253.18.117"; } + { name = "k2-4"; address = "10.253.18.118"; } + ]; + initca = ./ca; + fileserver = "fs0-0"; + clusterHosts = ""; + adminAuthorizedKeys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiAS30ZO+wgfAqDE9Y7VhRunn2QszPHA5voUwo+fGOf jonas" + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMWEYtm1u3HiK4q4J5su6iKWfFjLXt9CIlm9Z9BfJYVj jens@itpartner@Jens-HP3" + "ssh-rsa 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 martin.moe.carstens@itpartner.no" + ]; + acme_email = "innovasjon@itpartner.no"; + grafana_smtp_user = "utvikling"; + grafana_smtp_password = "S0m3rp0m@de#21!"; + grafana_ldap_toml = '' + verbose_logging = true + + [[servers]] + host = "itp-dc1.itpartner.intern" + port = 636 + use_ssl = true + start_tls = false + ssl_skip_verify = true + bind_dn = "gitlab@itpartner.intern" + bind_password = "hipp hopp snipp snopp" + search_filter = "(&(objectClass=user)(objectClass=person)(|(sAMAccountName=%s)(mail=%s)))" + search_base_dns = ["DC=itpartner,DC=intern"] + ''; + }; +in + import ../../lib/k8s.nix { + inherit pkgs lib settings; + here = ./.; + } diff --git a/clusters/kube2/k2-0.nix b/clusters/kube2/k2-0.nix new file mode 100644 index 0000000..0bc0da8 --- /dev/null +++ b/clusters/kube2/k2-0.nix @@ -0,0 +1,22 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, ... }: + +{ + imports = [ ]; + + boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "floppy" "sd_mod" "sr_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/2351b733-4de3-4ea2-a9dc-3e5eaec1cc79"; + fsType = "ext4"; + }; + + swapDevices = [ ]; + + nix.maxJobs = lib.mkDefault 2; +} diff --git a/clusters/kube2/k2-1.nix b/clusters/kube2/k2-1.nix new file mode 100644 index 0000000..9936ec6 --- /dev/null +++ b/clusters/kube2/k2-1.nix @@ -0,0 +1,22 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, ... }: + +{ + imports = [ ]; + + boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "floppy" "sd_mod" "sr_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/77b888f2-9010-4ea1-b93b-c254b65d6d92"; + fsType = "ext4"; + }; + + swapDevices = [ ]; + + nix.maxJobs = lib.mkDefault 4; +} diff --git a/clusters/kube2/k2-2.nix b/clusters/kube2/k2-2.nix new file mode 100644 index 0000000..f7d4862 --- /dev/null +++ b/clusters/kube2/k2-2.nix @@ -0,0 +1,22 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, ... }: + +{ + imports = [ ]; + + boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "floppy" "sd_mod" "sr_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/543012dc-a688-4165-be44-dc1aae81083d"; + fsType = "ext4"; + }; + + swapDevices = [ ]; + + nix.maxJobs = lib.mkDefault 4; +} diff --git a/clusters/kube2/k2-3.nix b/clusters/kube2/k2-3.nix new file mode 100644 index 0000000..97bc56a --- /dev/null +++ b/clusters/kube2/k2-3.nix @@ -0,0 +1,22 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, ... }: + +{ + imports = [ ]; + + boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "floppy" "sd_mod" "sr_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/fff7002b-1a39-444a-8529-c47962e786a3"; + fsType = "ext4"; + }; + + swapDevices = [ ]; + + nix.maxJobs = lib.mkDefault 4; +} diff --git a/clusters/kube2/k2-4.nix b/clusters/kube2/k2-4.nix new file mode 100644 index 0000000..9afdade --- /dev/null +++ b/clusters/kube2/k2-4.nix @@ -0,0 +1,22 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, ... }: + +{ + imports = [ ]; + + boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "floppy" "sd_mod" "sr_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/805a40c9-c575-4579-8c6d-9de36b44b1ca"; + fsType = "ext4"; + }; + + swapDevices = [ ]; + + nix.maxJobs = lib.mkDefault 4; +} diff --git a/clusters/kube2/registry-auth-secret.yaml b/clusters/kube2/registry-auth-secret.yaml new file mode 100644 index 0000000..84e46ec --- /dev/null +++ b/clusters/kube2/registry-auth-secret.yaml @@ -0,0 +1,7 @@ +apiVersion: v1 +data: + .dockerconfigjson: eyJhdXRocyI6eyJodHRwczovL3JlZ2lzdHJ5Lml0cGFydG5lci5ubyI6eyJ1c2VybmFtZSI6ImpvbmFzIiwicGFzc3dvcmQiOiJTRldwLVk0bkVfdXpNZFJxeHp6SyIsImF1dGgiOiJhbTl1WVhNNlUwWlhjQzFaTkc1RlgzVjZUV1JTY1hoNmVrcz0ifX19 +kind: Secret +metadata: + name: registry-auth +type: kubernetes.io/dockerconfigjson