75 lines
2.3 KiB
Nix
75 lines
2.3 KiB
Nix
with import <nixpkgs> {};
|
|
let
|
|
pki = pkgs.callPackage ./lib/pki.nix {};
|
|
certs = {
|
|
ca = pki.ca;
|
|
apiserver = pki.apiserver ''
|
|
"10.253.18.100",
|
|
"10.0.0.1",
|
|
"127.0.0.1",
|
|
"kubernetes",
|
|
"etcd0",
|
|
"k0-0"
|
|
'';
|
|
kube-proxy = pki.kube-proxy;
|
|
admin = pki.admin;
|
|
etcd = pki.etcd ''
|
|
"etcd0",
|
|
"etcd1",
|
|
"etcd2",
|
|
"10.253.18.100",
|
|
"10.253.18.101",
|
|
"10.253.18.102",
|
|
"127.0.0.1"
|
|
'';
|
|
k0-0 = pki.worker { name = "k0-0"; ip = "10.253.18.100"; };
|
|
k0-1 = pki.worker { name = "k0-1"; ip = "10.253.18.101"; };
|
|
k0-2 = pki.worker { name = "k0-2"; ip = "10.253.18.102"; };
|
|
k0-3 = pki.worker { name = "k0-3"; ip = "10.253.18.103"; };
|
|
k0-4 = pki.worker { name = "k0-4"; ip = "10.253.18.107"; };
|
|
k0-5 = pki.worker { name = "k0-5"; ip = "10.253.18.108"; };
|
|
};
|
|
cluster = callPackage ./lib/k8s.nix {
|
|
kubeMaster = "10.253.18.100";
|
|
etcdNodes = [ "etcd0" "etcd1" "etcd2" ];
|
|
clusterHosts = ''
|
|
10.253.18.100 k0-0 etcd0 kubernetes
|
|
10.253.18.101 k0-1 etcd1
|
|
10.253.18.102 k0-2 etcd2
|
|
10.253.18.103 k0-3
|
|
10.253.18.107 k0-4
|
|
10.253.18.108 k0-5
|
|
10.253.18.106 fs0-0
|
|
10.1.2.164 fs0-1
|
|
'';
|
|
inherit certs;
|
|
};
|
|
in
|
|
{
|
|
k0-0 = cluster.apiserver "k0-0" "10.253.18.100" "etcd0";
|
|
k0-1 = cluster.server "k0-1" "10.253.18.101" "etcd1";
|
|
k0-2 = cluster.server "k0-2" "10.253.18.102" "etcd2";
|
|
k0-3 = cluster.worker "k0-3" "10.253.18.103";
|
|
k0-4 = cluster.worker "k0-4" "10.253.18.107";
|
|
k0-5 = cluster.worker "k0-5" "10.253.18.108";
|
|
|
|
# k0-3 = { config, lib, pkgs, ... }:
|
|
# let
|
|
# instance = "k0-3";
|
|
# base = k8s.nixosConfig instance;
|
|
# in
|
|
# {
|
|
# deployment.targetHost = "10.253.18.103";
|
|
# require = [ k8s.base (k8s.kubeConfig instance) (k8s.kubeNode instance) ];
|
|
# services.kubernetes.addons.dns.enable = false;
|
|
# services.nfs.server = {
|
|
# enable=true;
|
|
# exports= ''
|
|
# /vol 10.253.18.0/24(insecure,rw,sync,no_subtree_check,crossmnt,fsid=0,no_root_squash)
|
|
# '';
|
|
# };
|
|
# networking.firewall.allowedTCPPorts = [ 111 2049 ];
|
|
# networking.firewall.allowedUDPPorts = [ 111 2049 ];
|
|
# };
|
|
}
|