diff --git a/CHANGES.md b/CHANGES.md index f97af512..36712fea 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -4,11 +4,7 @@ Notable changes between versions. ## Latest -### Azure - -* Allow controller and worker nodes to use different CPU architectures - * Add `controller_arch` and `worker_arch` variables - * Remove the `arch` variable +* Remove `cluster_domain_suffix` variable, always use "cluster.local" ## v1.30.3 diff --git a/README.md b/README.md index 956e8c9f..e6c04e64 100644 --- a/README.md +++ b/README.md @@ -127,9 +127,10 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1cs8z 2/2 Running 0 6m -kube-system calico-node-d1l5b 2/2 Running 0 6m -kube-system calico-node-sp9ps 2/2 Running 0 6m +kube-system cilium-1cs8z 1/1 Running 0 6m +kube-system cilium-d1l5b 1/1 Running 0 6m +kube-system cilium-sp9ps 1/1 Running 0 6m +kube-system cilium-operator-68d778b448-g744f 1/1 Running 0 6m kube-system coredns-1187388186-zj5dl 1/1 Running 0 6m kube-system coredns-1187388186-dkh3o 1/1 Running 0 6m kube-system kube-apiserver-controller-0 1/1 Running 0 6m diff --git a/aws/fedora-coreos/kubernetes/bootstrap.tf b/aws/fedora-coreos/kubernetes/bootstrap.tf index f1240f6b..a018652c 100644 --- a/aws/fedora-coreos/kubernetes/bootstrap.tf +++ b/aws/fedora-coreos/kubernetes/bootstrap.tf @@ -9,7 +9,6 @@ module "bootstrap" { network_mtu = var.network_mtu pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/aws/fedora-coreos/kubernetes/butane/controller.yaml b/aws/fedora-coreos/kubernetes/butane/controller.yaml index 940435c8..7023d509 100644 --- a/aws/fedora-coreos/kubernetes/butane/controller.yaml +++ b/aws/fedora-coreos/kubernetes/butane/controller.yaml @@ -149,7 +149,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/aws/fedora-coreos/kubernetes/controllers.tf b/aws/fedora-coreos/kubernetes/controllers.tf index 3a113650..a66acd88 100644 --- a/aws/fedora-coreos/kubernetes/controllers.tf +++ b/aws/fedora-coreos/kubernetes/controllers.tf @@ -65,7 +65,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/aws/fedora-coreos/kubernetes/variables.tf b/aws/fedora-coreos/kubernetes/variables.tf index b2468413..3b8a10ac 100644 --- a/aws/fedora-coreos/kubernetes/variables.tf +++ b/aws/fedora-coreos/kubernetes/variables.tf @@ -164,6 +164,14 @@ EOD default = "10.3.0.0/16" } +variable "worker_node_labels" { + type = list(string) + description = "List of initial worker node labels" + default = [] +} + +# advanced + variable "enable_reporting" { type = bool description = "Enable usage or analytics reporting to upstreams (Calico)" @@ -176,22 +184,6 @@ variable "enable_aggregation" { default = true } -variable "worker_node_labels" { - type = list(string) - description = "List of initial worker node labels" - default = [] -} - -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by CoreDNS. Default is cluster.local (e.g. foo.default.svc.cluster.local)" - default = "cluster.local" -} - -# advanced - variable "controller_arch" { type = string description = "Controller node(s) architecture (amd64 or arm64)" diff --git a/aws/fedora-coreos/kubernetes/workers.tf b/aws/fedora-coreos/kubernetes/workers.tf index 4ccd0ca9..debe57a6 100644 --- a/aws/fedora-coreos/kubernetes/workers.tf +++ b/aws/fedora-coreos/kubernetes/workers.tf @@ -6,23 +6,24 @@ module "workers" { vpc_id = aws_vpc.network.id subnet_ids = aws_subnet.public.*.id security_groups = [aws_security_group.worker.id] - worker_count = var.worker_count - instance_type = var.worker_type - os_stream = var.os_stream - arch = var.worker_arch - disk_type = var.worker_disk_type - disk_size = var.worker_disk_size - disk_iops = var.worker_disk_iops - cpu_credits = var.worker_cpu_credits - spot_price = var.worker_price - target_groups = var.worker_target_groups + + # instances + os_stream = var.os_stream + worker_count = var.worker_count + instance_type = var.worker_type + arch = var.worker_arch + disk_type = var.worker_disk_type + disk_size = var.worker_disk_size + disk_iops = var.worker_disk_iops + cpu_credits = var.worker_cpu_credits + spot_price = var.worker_price + target_groups = var.worker_target_groups # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels } diff --git a/aws/fedora-coreos/kubernetes/workers/butane/worker.yaml b/aws/fedora-coreos/kubernetes/workers/butane/worker.yaml index 3888a4bc..0e7f418f 100644 --- a/aws/fedora-coreos/kubernetes/workers/butane/worker.yaml +++ b/aws/fedora-coreos/kubernetes/workers/butane/worker.yaml @@ -104,7 +104,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/aws/fedora-coreos/kubernetes/workers/variables.tf b/aws/fedora-coreos/kubernetes/workers/variables.tf index 3f859e70..4b743368 100644 --- a/aws/fedora-coreos/kubernetes/workers/variables.tf +++ b/aws/fedora-coreos/kubernetes/workers/variables.tf @@ -108,12 +108,6 @@ EOD default = "10.3.0.0/16" } -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} - variable "node_labels" { type = list(string) description = "List of initial node labels" @@ -126,15 +120,14 @@ variable "node_taints" { default = [] } -# unofficial, undocumented, unsupported +# advanced variable "arch" { type = string description = "Container architecture (amd64 or arm64)" default = "amd64" - validation { - condition = var.arch == "amd64" || var.arch == "arm64" + condition = contains(["amd64", "arm64"], var.arch) error_message = "The arch must be amd64 or arm64." } } diff --git a/aws/fedora-coreos/kubernetes/workers/workers.tf b/aws/fedora-coreos/kubernetes/workers/workers.tf index d3038305..71729515 100644 --- a/aws/fedora-coreos/kubernetes/workers/workers.tf +++ b/aws/fedora-coreos/kubernetes/workers/workers.tf @@ -111,7 +111,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/aws/flatcar-linux/kubernetes/bootstrap.tf b/aws/flatcar-linux/kubernetes/bootstrap.tf index f1240f6b..a018652c 100644 --- a/aws/flatcar-linux/kubernetes/bootstrap.tf +++ b/aws/flatcar-linux/kubernetes/bootstrap.tf @@ -9,7 +9,6 @@ module "bootstrap" { network_mtu = var.network_mtu pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/aws/flatcar-linux/kubernetes/butane/controller.yaml b/aws/flatcar-linux/kubernetes/butane/controller.yaml index b591b785..69c6294d 100644 --- a/aws/flatcar-linux/kubernetes/butane/controller.yaml +++ b/aws/flatcar-linux/kubernetes/butane/controller.yaml @@ -148,7 +148,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/aws/flatcar-linux/kubernetes/controllers.tf b/aws/flatcar-linux/kubernetes/controllers.tf index b48aa770..a186d04a 100644 --- a/aws/flatcar-linux/kubernetes/controllers.tf +++ b/aws/flatcar-linux/kubernetes/controllers.tf @@ -66,7 +66,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/aws/flatcar-linux/kubernetes/variables.tf b/aws/flatcar-linux/kubernetes/variables.tf index 714f4123..fcf55277 100644 --- a/aws/flatcar-linux/kubernetes/variables.tf +++ b/aws/flatcar-linux/kubernetes/variables.tf @@ -164,6 +164,14 @@ EOD default = "10.3.0.0/16" } +variable "worker_node_labels" { + type = list(string) + description = "List of initial worker node labels" + default = [] +} + +# advanced + variable "enable_reporting" { type = bool description = "Enable usage or analytics reporting to upstreams (Calico)" @@ -176,20 +184,6 @@ variable "enable_aggregation" { default = true } -variable "worker_node_labels" { - type = list(string) - description = "List of initial worker node labels" - default = [] -} - -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by CoreDNS. Default is cluster.local (e.g. foo.default.svc.cluster.local)" - default = "cluster.local" -} - variable "controller_arch" { type = string description = "Controller node(s) architecture (amd64 or arm64)" @@ -210,7 +204,6 @@ variable "worker_arch" { } } - variable "daemonset_tolerations" { type = list(string) description = "List of additional taint keys kube-system DaemonSets should tolerate (e.g. ['custom-role', 'gpu-role'])" diff --git a/aws/flatcar-linux/kubernetes/workers.tf b/aws/flatcar-linux/kubernetes/workers.tf index 22d08b1f..9e5de509 100644 --- a/aws/flatcar-linux/kubernetes/workers.tf +++ b/aws/flatcar-linux/kubernetes/workers.tf @@ -6,22 +6,23 @@ module "workers" { vpc_id = aws_vpc.network.id subnet_ids = aws_subnet.public.*.id security_groups = [aws_security_group.worker.id] - worker_count = var.worker_count - instance_type = var.worker_type - os_image = var.os_image - arch = var.worker_arch - disk_type = var.worker_disk_type - disk_size = var.worker_disk_size - disk_iops = var.worker_disk_iops - spot_price = var.worker_price - target_groups = var.worker_target_groups + + # instances + os_image = var.os_image + worker_count = var.worker_count + instance_type = var.worker_type + arch = var.worker_arch + disk_type = var.worker_disk_type + disk_size = var.worker_disk_size + disk_iops = var.worker_disk_iops + spot_price = var.worker_price + target_groups = var.worker_target_groups # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels } diff --git a/aws/flatcar-linux/kubernetes/workers/butane/worker.yaml b/aws/flatcar-linux/kubernetes/workers/butane/worker.yaml index 33d212f0..8a789b88 100644 --- a/aws/flatcar-linux/kubernetes/workers/butane/worker.yaml +++ b/aws/flatcar-linux/kubernetes/workers/butane/worker.yaml @@ -103,7 +103,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/aws/flatcar-linux/kubernetes/workers/variables.tf b/aws/flatcar-linux/kubernetes/workers/variables.tf index 60f3b689..13a203ed 100644 --- a/aws/flatcar-linux/kubernetes/workers/variables.tf +++ b/aws/flatcar-linux/kubernetes/workers/variables.tf @@ -108,12 +108,6 @@ EOD default = "10.3.0.0/16" } -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} - variable "node_labels" { type = list(string) description = "List of initial node labels" @@ -134,7 +128,7 @@ variable "arch" { default = "amd64" validation { - condition = var.arch == "amd64" || var.arch == "arm64" + condition = contains(["amd64", "arm64"], var.arch) error_message = "The arch must be amd64 or arm64." } } diff --git a/aws/flatcar-linux/kubernetes/workers/workers.tf b/aws/flatcar-linux/kubernetes/workers/workers.tf index 3aef08ed..a20681f9 100644 --- a/aws/flatcar-linux/kubernetes/workers/workers.tf +++ b/aws/flatcar-linux/kubernetes/workers/workers.tf @@ -111,7 +111,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/azure/fedora-coreos/kubernetes/bootstrap.tf b/azure/fedora-coreos/kubernetes/bootstrap.tf index b721b646..285ced2f 100644 --- a/azure/fedora-coreos/kubernetes/bootstrap.tf +++ b/azure/fedora-coreos/kubernetes/bootstrap.tf @@ -14,7 +14,6 @@ module "bootstrap" { pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/azure/fedora-coreos/kubernetes/butane/controller.yaml b/azure/fedora-coreos/kubernetes/butane/controller.yaml index 9124e2c9..6a1ce854 100644 --- a/azure/fedora-coreos/kubernetes/butane/controller.yaml +++ b/azure/fedora-coreos/kubernetes/butane/controller.yaml @@ -144,7 +144,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/azure/fedora-coreos/kubernetes/controllers.tf b/azure/fedora-coreos/kubernetes/controllers.tf index 5c4a0cfb..504c6904 100644 --- a/azure/fedora-coreos/kubernetes/controllers.tf +++ b/azure/fedora-coreos/kubernetes/controllers.tf @@ -163,7 +163,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/azure/fedora-coreos/kubernetes/variables.tf b/azure/fedora-coreos/kubernetes/variables.tf index fb3706e1..d0240c06 100644 --- a/azure/fedora-coreos/kubernetes/variables.tf +++ b/azure/fedora-coreos/kubernetes/variables.tf @@ -27,7 +27,6 @@ variable "os_image" { description = "Fedora CoreOS image for instances" } - variable "controller_count" { type = number description = "Number of controllers (i.e. masters)" @@ -145,6 +144,14 @@ EOD default = "10.3.0.0/16" } +variable "worker_node_labels" { + type = list(string) + description = "List of initial worker node labels" + default = [] +} + +# advanced + variable "enable_reporting" { type = bool description = "Enable usage or analytics reporting to upstreams (Calico)" @@ -157,20 +164,6 @@ variable "enable_aggregation" { default = true } -variable "worker_node_labels" { - type = list(string) - description = "List of initial worker node labels" - default = [] -} - -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} - variable "daemonset_tolerations" { type = list(string) description = "List of additional taint keys kube-system DaemonSets should tolerate (e.g. ['custom-role', 'gpu-role'])" diff --git a/azure/fedora-coreos/kubernetes/workers.tf b/azure/fedora-coreos/kubernetes/workers.tf index e61ca3da..9ffc86f3 100644 --- a/azure/fedora-coreos/kubernetes/workers.tf +++ b/azure/fedora-coreos/kubernetes/workers.tf @@ -9,20 +9,20 @@ module "workers" { security_group_id = azurerm_network_security_group.worker.id backend_address_pool_ids = local.backend_address_pool_ids + # instances + os_image = var.os_image worker_count = var.worker_count vm_type = var.worker_type - os_image = var.os_image disk_type = var.worker_disk_type disk_size = var.worker_disk_size ephemeral_disk = var.worker_ephemeral_disk priority = var.worker_priority # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - azure_authorized_key = var.azure_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + azure_authorized_key = var.azure_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels } diff --git a/azure/fedora-coreos/kubernetes/workers/butane/worker.yaml b/azure/fedora-coreos/kubernetes/workers/butane/worker.yaml index b30fe1da..7eaf9474 100644 --- a/azure/fedora-coreos/kubernetes/workers/butane/worker.yaml +++ b/azure/fedora-coreos/kubernetes/workers/butane/worker.yaml @@ -99,7 +99,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/azure/fedora-coreos/kubernetes/workers/variables.tf b/azure/fedora-coreos/kubernetes/workers/variables.tf index d1f2d791..3a28d72a 100644 --- a/azure/fedora-coreos/kubernetes/workers/variables.tf +++ b/azure/fedora-coreos/kubernetes/workers/variables.tf @@ -120,12 +120,3 @@ variable "node_taints" { description = "List of initial node taints" default = [] } - -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - type = string - default = "cluster.local" -} - diff --git a/azure/fedora-coreos/kubernetes/workers/workers.tf b/azure/fedora-coreos/kubernetes/workers/workers.tf index 9cfa3058..cd0a52a2 100644 --- a/azure/fedora-coreos/kubernetes/workers/workers.tf +++ b/azure/fedora-coreos/kubernetes/workers/workers.tf @@ -84,7 +84,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/azure/flatcar-linux/kubernetes/bootstrap.tf b/azure/flatcar-linux/kubernetes/bootstrap.tf index b721b646..285ced2f 100644 --- a/azure/flatcar-linux/kubernetes/bootstrap.tf +++ b/azure/flatcar-linux/kubernetes/bootstrap.tf @@ -14,7 +14,6 @@ module "bootstrap" { pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/azure/flatcar-linux/kubernetes/butane/controller.yaml b/azure/flatcar-linux/kubernetes/butane/controller.yaml index 5974197d..9ffcb74b 100644 --- a/azure/flatcar-linux/kubernetes/butane/controller.yaml +++ b/azure/flatcar-linux/kubernetes/butane/controller.yaml @@ -144,7 +144,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/azure/flatcar-linux/kubernetes/controllers.tf b/azure/flatcar-linux/kubernetes/controllers.tf index e56d55ed..35d79405 100644 --- a/azure/flatcar-linux/kubernetes/controllers.tf +++ b/azure/flatcar-linux/kubernetes/controllers.tf @@ -185,7 +185,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/azure/flatcar-linux/kubernetes/variables.tf b/azure/flatcar-linux/kubernetes/variables.tf index 9ba88cf5..69350813 100644 --- a/azure/flatcar-linux/kubernetes/variables.tf +++ b/azure/flatcar-linux/kubernetes/variables.tf @@ -196,14 +196,6 @@ variable "daemonset_tolerations" { default = [] } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} - variable "components" { description = "Configure pre-installed cluster components" # Component configs are passed through to terraform-render-bootstrap, diff --git a/azure/flatcar-linux/kubernetes/workers.tf b/azure/flatcar-linux/kubernetes/workers.tf index 4a3d6488..cdfb1d33 100644 --- a/azure/flatcar-linux/kubernetes/workers.tf +++ b/azure/flatcar-linux/kubernetes/workers.tf @@ -18,12 +18,11 @@ module "workers" { priority = var.worker_priority # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - azure_authorized_key = var.azure_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels - arch = var.worker_arch + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + azure_authorized_key = var.azure_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels + arch = var.worker_arch } diff --git a/azure/flatcar-linux/kubernetes/workers/butane/worker.yaml b/azure/flatcar-linux/kubernetes/workers/butane/worker.yaml index cc0efb01..ff427647 100644 --- a/azure/flatcar-linux/kubernetes/workers/butane/worker.yaml +++ b/azure/flatcar-linux/kubernetes/workers/butane/worker.yaml @@ -99,7 +99,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/azure/flatcar-linux/kubernetes/workers/variables.tf b/azure/flatcar-linux/kubernetes/workers/variables.tf index 67a13d85..684619aa 100644 --- a/azure/flatcar-linux/kubernetes/workers/variables.tf +++ b/azure/flatcar-linux/kubernetes/workers/variables.tf @@ -137,12 +137,3 @@ variable "arch" { error_message = "The arch must be amd64 or arm64." } } - -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - type = string - default = "cluster.local" -} - diff --git a/azure/flatcar-linux/kubernetes/workers/workers.tf b/azure/flatcar-linux/kubernetes/workers/workers.tf index 0d0d22e4..f132bf7f 100644 --- a/azure/flatcar-linux/kubernetes/workers/workers.tf +++ b/azure/flatcar-linux/kubernetes/workers/workers.tf @@ -105,7 +105,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/bare-metal/fedora-coreos/kubernetes/bootstrap.tf b/bare-metal/fedora-coreos/kubernetes/bootstrap.tf index 49efd12b..c18b903e 100644 --- a/bare-metal/fedora-coreos/kubernetes/bootstrap.tf +++ b/bare-metal/fedora-coreos/kubernetes/bootstrap.tf @@ -10,7 +10,6 @@ module "bootstrap" { network_ip_autodetection_method = var.network_ip_autodetection_method pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation components = var.components diff --git a/bare-metal/fedora-coreos/kubernetes/butane/controller.yaml b/bare-metal/fedora-coreos/kubernetes/butane/controller.yaml index 7a248322..e21abf1b 100644 --- a/bare-metal/fedora-coreos/kubernetes/butane/controller.yaml +++ b/bare-metal/fedora-coreos/kubernetes/butane/controller.yaml @@ -154,7 +154,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/bare-metal/fedora-coreos/kubernetes/profiles.tf b/bare-metal/fedora-coreos/kubernetes/profiles.tf index c5b8c650..d1ec077f 100644 --- a/bare-metal/fedora-coreos/kubernetes/profiles.tf +++ b/bare-metal/fedora-coreos/kubernetes/profiles.tf @@ -59,7 +59,6 @@ data "ct_config" "controllers" { etcd_name = var.controllers.*.name[count.index] etcd_initial_cluster = join(",", formatlist("%s=https://%s:2380", var.controllers.*.name, var.controllers.*.domain)) cluster_dns_service_ip = module.bootstrap.cluster_dns_service_ip - cluster_domain_suffix = var.cluster_domain_suffix ssh_authorized_key = var.ssh_authorized_key }) strict = true diff --git a/bare-metal/fedora-coreos/kubernetes/variables.tf b/bare-metal/fedora-coreos/kubernetes/variables.tf index 2a1c08e2..80d1d8e8 100644 --- a/bare-metal/fedora-coreos/kubernetes/variables.tf +++ b/bare-metal/fedora-coreos/kubernetes/variables.tf @@ -151,13 +151,7 @@ variable "enable_aggregation" { default = true } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - type = string - default = "cluster.local" -} +# advanced variable "components" { description = "Configure pre-installed cluster components" diff --git a/bare-metal/fedora-coreos/kubernetes/worker/butane/worker.yaml b/bare-metal/fedora-coreos/kubernetes/worker/butane/worker.yaml index 653c25c6..cb098fec 100644 --- a/bare-metal/fedora-coreos/kubernetes/worker/butane/worker.yaml +++ b/bare-metal/fedora-coreos/kubernetes/worker/butane/worker.yaml @@ -108,7 +108,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/bare-metal/fedora-coreos/kubernetes/worker/matchbox.tf b/bare-metal/fedora-coreos/kubernetes/worker/matchbox.tf index 7fd0bdf9..3f7a7658 100644 --- a/bare-metal/fedora-coreos/kubernetes/worker/matchbox.tf +++ b/bare-metal/fedora-coreos/kubernetes/worker/matchbox.tf @@ -53,7 +53,6 @@ data "ct_config" "worker" { domain_name = var.domain ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/bare-metal/fedora-coreos/kubernetes/worker/variables.tf b/bare-metal/fedora-coreos/kubernetes/worker/variables.tf index fe89f21b..e2fd056c 100644 --- a/bare-metal/fedora-coreos/kubernetes/worker/variables.tf +++ b/bare-metal/fedora-coreos/kubernetes/worker/variables.tf @@ -103,9 +103,3 @@ The 1st IP will be reserved for kube_apiserver, the 10th IP will be reserved for EOD default = "10.3.0.0/16" } - -variable "cluster_domain_suffix" { - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - type = string - default = "cluster.local" -} diff --git a/bare-metal/fedora-coreos/kubernetes/workers.tf b/bare-metal/fedora-coreos/kubernetes/workers.tf index 38a599ac..c7f4186b 100644 --- a/bare-metal/fedora-coreos/kubernetes/workers.tf +++ b/bare-metal/fedora-coreos/kubernetes/workers.tf @@ -15,13 +15,12 @@ module "workers" { domain = var.workers[count.index].domain # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - node_labels = lookup(var.worker_node_labels, var.workers[count.index].name, []) - node_taints = lookup(var.worker_node_taints, var.workers[count.index].name, []) - snippets = lookup(var.snippets, var.workers[count.index].name, []) + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + node_labels = lookup(var.worker_node_labels, var.workers[count.index].name, []) + node_taints = lookup(var.worker_node_taints, var.workers[count.index].name, []) + snippets = lookup(var.snippets, var.workers[count.index].name, []) # optional cached_install = var.cached_install diff --git a/bare-metal/flatcar-linux/kubernetes/bootstrap.tf b/bare-metal/flatcar-linux/kubernetes/bootstrap.tf index f88cdfad..994d3721 100644 --- a/bare-metal/flatcar-linux/kubernetes/bootstrap.tf +++ b/bare-metal/flatcar-linux/kubernetes/bootstrap.tf @@ -10,7 +10,6 @@ module "bootstrap" { network_ip_autodetection_method = var.network_ip_autodetection_method pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation components = var.components diff --git a/bare-metal/flatcar-linux/kubernetes/butane/controller.yaml b/bare-metal/flatcar-linux/kubernetes/butane/controller.yaml index 042cf3c9..a77ad94f 100644 --- a/bare-metal/flatcar-linux/kubernetes/butane/controller.yaml +++ b/bare-metal/flatcar-linux/kubernetes/butane/controller.yaml @@ -155,7 +155,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/bare-metal/flatcar-linux/kubernetes/profiles.tf b/bare-metal/flatcar-linux/kubernetes/profiles.tf index 1537a408..6e8f2aca 100644 --- a/bare-metal/flatcar-linux/kubernetes/profiles.tf +++ b/bare-metal/flatcar-linux/kubernetes/profiles.tf @@ -88,7 +88,6 @@ data "ct_config" "controllers" { etcd_name = var.controllers.*.name[count.index] etcd_initial_cluster = join(",", formatlist("%s=https://%s:2380", var.controllers.*.name, var.controllers.*.domain)) cluster_dns_service_ip = module.bootstrap.cluster_dns_service_ip - cluster_domain_suffix = var.cluster_domain_suffix ssh_authorized_key = var.ssh_authorized_key }) strict = true diff --git a/bare-metal/flatcar-linux/kubernetes/variables.tf b/bare-metal/flatcar-linux/kubernetes/variables.tf index e486b409..48a65054 100644 --- a/bare-metal/flatcar-linux/kubernetes/variables.tf +++ b/bare-metal/flatcar-linux/kubernetes/variables.tf @@ -167,13 +167,7 @@ EOD default = "" } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "components" { description = "Configure pre-installed cluster components" diff --git a/bare-metal/flatcar-linux/kubernetes/worker/butane/worker.yaml b/bare-metal/flatcar-linux/kubernetes/worker/butane/worker.yaml index 1b3908ec..6f38f008 100644 --- a/bare-metal/flatcar-linux/kubernetes/worker/butane/worker.yaml +++ b/bare-metal/flatcar-linux/kubernetes/worker/butane/worker.yaml @@ -113,7 +113,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/bare-metal/flatcar-linux/kubernetes/worker/matchbox.tf b/bare-metal/flatcar-linux/kubernetes/worker/matchbox.tf index f0800fe9..ad98eaf4 100644 --- a/bare-metal/flatcar-linux/kubernetes/worker/matchbox.tf +++ b/bare-metal/flatcar-linux/kubernetes/worker/matchbox.tf @@ -79,7 +79,6 @@ data "ct_config" "worker" { domain_name = var.domain ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/bare-metal/flatcar-linux/kubernetes/worker/variables.tf b/bare-metal/flatcar-linux/kubernetes/worker/variables.tf index 98d3534d..77bae99b 100644 --- a/bare-metal/flatcar-linux/kubernetes/worker/variables.tf +++ b/bare-metal/flatcar-linux/kubernetes/worker/variables.tf @@ -114,13 +114,3 @@ The 1st IP will be reserved for kube_apiserver, the 10th IP will be reserved for EOD default = "10.3.0.0/16" } - - - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} - - diff --git a/bare-metal/flatcar-linux/kubernetes/workers.tf b/bare-metal/flatcar-linux/kubernetes/workers.tf index e558aec7..24e046b0 100644 --- a/bare-metal/flatcar-linux/kubernetes/workers.tf +++ b/bare-metal/flatcar-linux/kubernetes/workers.tf @@ -15,13 +15,12 @@ module "workers" { domain = var.workers[count.index].domain # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - node_labels = lookup(var.worker_node_labels, var.workers[count.index].name, []) - node_taints = lookup(var.worker_node_taints, var.workers[count.index].name, []) - snippets = lookup(var.snippets, var.workers[count.index].name, []) + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + node_labels = lookup(var.worker_node_labels, var.workers[count.index].name, []) + node_taints = lookup(var.worker_node_taints, var.workers[count.index].name, []) + snippets = lookup(var.snippets, var.workers[count.index].name, []) # optional download_protocol = var.download_protocol diff --git a/digital-ocean/fedora-coreos/kubernetes/bootstrap.tf b/digital-ocean/fedora-coreos/kubernetes/bootstrap.tf index ee8b1d80..4a319b82 100644 --- a/digital-ocean/fedora-coreos/kubernetes/bootstrap.tf +++ b/digital-ocean/fedora-coreos/kubernetes/bootstrap.tf @@ -11,11 +11,10 @@ module "bootstrap" { network_encapsulation = "vxlan" network_mtu = "1450" - pod_cidr = var.pod_cidr - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - enable_reporting = var.enable_reporting - enable_aggregation = var.enable_aggregation - components = var.components + pod_cidr = var.pod_cidr + service_cidr = var.service_cidr + enable_reporting = var.enable_reporting + enable_aggregation = var.enable_aggregation + components = var.components } diff --git a/digital-ocean/fedora-coreos/kubernetes/butane/controller.yaml b/digital-ocean/fedora-coreos/kubernetes/butane/controller.yaml index 041099b6..d7a02eb7 100644 --- a/digital-ocean/fedora-coreos/kubernetes/butane/controller.yaml +++ b/digital-ocean/fedora-coreos/kubernetes/butane/controller.yaml @@ -151,7 +151,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/digital-ocean/fedora-coreos/kubernetes/butane/worker.yaml b/digital-ocean/fedora-coreos/kubernetes/butane/worker.yaml index 2bf20e68..f025418b 100644 --- a/digital-ocean/fedora-coreos/kubernetes/butane/worker.yaml +++ b/digital-ocean/fedora-coreos/kubernetes/butane/worker.yaml @@ -104,7 +104,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/digital-ocean/fedora-coreos/kubernetes/controllers.tf b/digital-ocean/fedora-coreos/kubernetes/controllers.tf index 32568036..871c7252 100644 --- a/digital-ocean/fedora-coreos/kubernetes/controllers.tf +++ b/digital-ocean/fedora-coreos/kubernetes/controllers.tf @@ -74,7 +74,6 @@ data "ct_config" "controllers" { for i in range(var.controller_count) : "etcd${i}=https://${var.cluster_name}-etcd${i}.${var.dns_zone}:2380" ]) cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/digital-ocean/fedora-coreos/kubernetes/variables.tf b/digital-ocean/fedora-coreos/kubernetes/variables.tf index 0f577899..9e77c4c1 100644 --- a/digital-ocean/fedora-coreos/kubernetes/variables.tf +++ b/digital-ocean/fedora-coreos/kubernetes/variables.tf @@ -98,13 +98,7 @@ variable "enable_aggregation" { default = true } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "components" { description = "Configure pre-installed cluster components" diff --git a/digital-ocean/fedora-coreos/kubernetes/workers.tf b/digital-ocean/fedora-coreos/kubernetes/workers.tf index 2dd48572..1c4637b2 100644 --- a/digital-ocean/fedora-coreos/kubernetes/workers.tf +++ b/digital-ocean/fedora-coreos/kubernetes/workers.tf @@ -62,7 +62,6 @@ resource "digitalocean_tag" "workers" { data "ct_config" "worker" { content = templatefile("${path.module}/butane/worker.yaml", { cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.worker_snippets diff --git a/digital-ocean/flatcar-linux/kubernetes/bootstrap.tf b/digital-ocean/flatcar-linux/kubernetes/bootstrap.tf index ee8b1d80..4a319b82 100644 --- a/digital-ocean/flatcar-linux/kubernetes/bootstrap.tf +++ b/digital-ocean/flatcar-linux/kubernetes/bootstrap.tf @@ -11,11 +11,10 @@ module "bootstrap" { network_encapsulation = "vxlan" network_mtu = "1450" - pod_cidr = var.pod_cidr - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - enable_reporting = var.enable_reporting - enable_aggregation = var.enable_aggregation - components = var.components + pod_cidr = var.pod_cidr + service_cidr = var.service_cidr + enable_reporting = var.enable_reporting + enable_aggregation = var.enable_aggregation + components = var.components } diff --git a/digital-ocean/flatcar-linux/kubernetes/butane/controller.yaml b/digital-ocean/flatcar-linux/kubernetes/butane/controller.yaml index a1dd93f9..7cf9db86 100644 --- a/digital-ocean/flatcar-linux/kubernetes/butane/controller.yaml +++ b/digital-ocean/flatcar-linux/kubernetes/butane/controller.yaml @@ -153,7 +153,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/digital-ocean/flatcar-linux/kubernetes/butane/worker.yaml b/digital-ocean/flatcar-linux/kubernetes/butane/worker.yaml index bee5f7a0..fb9ac59b 100644 --- a/digital-ocean/flatcar-linux/kubernetes/butane/worker.yaml +++ b/digital-ocean/flatcar-linux/kubernetes/butane/worker.yaml @@ -103,7 +103,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/digital-ocean/flatcar-linux/kubernetes/controllers.tf b/digital-ocean/flatcar-linux/kubernetes/controllers.tf index 8432ff74..928c544a 100644 --- a/digital-ocean/flatcar-linux/kubernetes/controllers.tf +++ b/digital-ocean/flatcar-linux/kubernetes/controllers.tf @@ -79,7 +79,6 @@ data "ct_config" "controllers" { for i in range(var.controller_count) : "etcd${i}=https://${var.cluster_name}-etcd${i}.${var.dns_zone}:2380" ]) cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/digital-ocean/flatcar-linux/kubernetes/variables.tf b/digital-ocean/flatcar-linux/kubernetes/variables.tf index 7426f38a..3b84f1e4 100644 --- a/digital-ocean/flatcar-linux/kubernetes/variables.tf +++ b/digital-ocean/flatcar-linux/kubernetes/variables.tf @@ -98,13 +98,7 @@ variable "enable_aggregation" { default = true } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "components" { description = "Configure pre-installed cluster components" diff --git a/digital-ocean/flatcar-linux/kubernetes/workers.tf b/digital-ocean/flatcar-linux/kubernetes/workers.tf index 863248a0..8484f505 100644 --- a/digital-ocean/flatcar-linux/kubernetes/workers.tf +++ b/digital-ocean/flatcar-linux/kubernetes/workers.tf @@ -60,7 +60,6 @@ resource "digitalocean_tag" "workers" { data "ct_config" "worker" { content = templatefile("${path.module}/butane/worker.yaml", { cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.worker_snippets diff --git a/docs/fedora-coreos/aws.md b/docs/fedora-coreos/aws.md index ac20b777..b38902c2 100644 --- a/docs/fedora-coreos/aws.md +++ b/docs/fedora-coreos/aws.md @@ -79,12 +79,12 @@ module "tempest" { dns_zone = "aws.example.com" dns_zone_id = "Z3PAABBCFAKEC0" - # configuration - ssh_authorized_key = "ssh-ed25519 AAAAB3Nz..." - - # optional + # instances worker_count = 2 worker_type = "t3.small" + + # configuration + ssh_authorized_key = "ssh-ed25519 AAAAB3Nz..." } ``` @@ -155,9 +155,9 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1m5bf 2/2 Running 0 34m -kube-system calico-node-7jmr1 2/2 Running 0 34m -kube-system calico-node-bknc8 2/2 Running 0 34m +kube-system cilium-1m5bf 1/1 Running 0 34m +kube-system cilium-7jmr1 1/1 Running 0 34m +kube-system cilium-bknc8 1/1 Running 0 34m kube-system coredns-1187388186-wx1lg 1/1 Running 0 34m kube-system coredns-1187388186-qjnvp 1/1 Running 0 34m kube-system kube-apiserver-ip-10-0-3-155 1/1 Running 0 34m @@ -206,16 +206,21 @@ Reference the DNS zone id with `aws_route53_zone.zone-for-clusters.zone_id`. | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| +| os_stream | Fedora CoreOS stream for instances | "stable" | "testing", "next" | | controller_count | Number of controllers (i.e. masters) | 1 | 1 | -| worker_count | Number of workers | 1 | 3 | | controller_type | EC2 instance type for controllers | "t3.small" | See below | +| controller_disk_size | Size of EBS volume in GB | 30 | 100 | +| controller_disk_type | Type of EBS volume | gp3 | io1 | +| controller_disk_iops | IOPS of EBS volume | 3000 | 4000 | +| controller_cpu_credits | Burstable CPU pricing model | null (i.e. auto) | standard, unlimited | +| worker_count | Number of workers | 1 | 3 | | worker_type | EC2 instance type for workers | "t3.small" | See below | -| os_stream | Fedora CoreOS stream for compute instances | "stable" | "testing", "next" | -| disk_size | Size of the EBS volume in GB | 30 | 100 | -| disk_type | Type of the EBS volume | "gp3" | standard, gp2, gp3, io1 | -| disk_iops | IOPS of the EBS volume | 0 (i.e. auto) | 400 | -| worker_target_groups | Target group ARNs to which worker instances should be added | [] | [aws_lb_target_group.app.id] | +| worker_disk_size | Size of EBS volume in GB | 30 | 100 | +| worker_disk_type | Type of EBS volume | gp3 | io1 | +| worker_disk_iops | IOPS of EBS volume | 3000 | 4000 | +| worker_cpu_credits | Burstable CPU pricing model | null (i.e. auto) | standard, unlimited | | worker_price | Spot price in USD for worker instances or 0 to use on-demand instances | 0 | 0.10 | +| worker_target_groups | Target group ARNs to which worker instances should be added | [] | [aws_lb_target_group.app.id] | | controller_snippets | Controller Butane snippets | [] | [examples](/advanced/customization/) | | worker_snippets | Worker Butane snippets | [] | [examples](/advanced/customization/) | | networking | Choice of networking provider | "cilium" | "calico" or "cilium" or "flannel" | @@ -228,7 +233,7 @@ Reference the DNS zone id with `aws_route53_zone.zone-for-clusters.zone_id`. Check the list of valid [instance types](https://aws.amazon.com/ec2/instance-types/). !!! warning - Do not choose a `controller_type` smaller than `t2.small`. Smaller instances are not sufficient for running a controller. + Do not choose a `controller_type` smaller than `t3.small`. Smaller instances are not sufficient for running a controller. !!! tip "MTU" If your EC2 instance type supports [Jumbo frames](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/network_mtu.html#jumbo_frame_instances) (most do), we recommend you change the `network_mtu` to 8981! You will get better pod-to-pod bandwidth. diff --git a/docs/fedora-coreos/azure.md b/docs/fedora-coreos/azure.md index 397157bc..8ddf0bd4 100644 --- a/docs/fedora-coreos/azure.md +++ b/docs/fedora-coreos/azure.md @@ -93,16 +93,16 @@ module "ramius" { location = "centralus" dns_zone = "azure.example.com" dns_zone_group = "example-group" - - # configuration - os_image = "/subscriptions/some/path/Microsoft.Compute/images/fedora-coreos-36.20220716.3.1" - ssh_authorized_key = "ssh-ed25519 AAAAB3Nz..." - - # optional - worker_count = 2 - network_cidr = { + network_cidr = { ipv4 = ["10.0.0.0/20"] } + + # instances + os_image = "/subscriptions/some/path/Microsoft.Compute/images/fedora-coreos-36.20220716.3.1" + worker_count = 2 + + # configuration + ssh_authorized_key = "ssh-ed25519 AAAAB3Nz..." } ``` @@ -175,9 +175,9 @@ $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-7c6fbb4f4b-b6qzx 1/1 Running 0 26m kube-system coredns-7c6fbb4f4b-j2k3d 1/1 Running 0 26m -kube-system calico-node-1m5bf 2/2 Running 0 26m -kube-system calico-node-7jmr1 2/2 Running 0 26m -kube-system calico-node-bknc8 2/2 Running 0 26m +kube-system cilium-1m5bf 1/1 Running 0 26m +kube-system cilium-7jmr1 1/1 Running 0 26m +kube-system cilium-bknc8 1/1 Running 0 26m kube-system kube-apiserver-ramius-controller-0 1/1 Running 0 26m kube-system kube-controller-manager-ramius-controller-0 1/1 Running 0 26m kube-system kube-proxy-j4vpq 1/1 Running 0 26m @@ -240,10 +240,14 @@ Reference the DNS zone with `azurerm_dns_zone.clusters.name` and its resource gr | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| | controller_count | Number of controllers (i.e. masters) | 1 | 1 | -| worker_count | Number of workers | 1 | 3 | | controller_type | Machine type for controllers | "Standard_B2s" | See below | +| controller_disk_type | Managed disk for controllers | Premium_LRS | Standard_LRS | +| controller_disk_size | Managed disk size in GB | 30 | 50 | +| worker_count | Number of workers | 1 | 3 | | worker_type | Machine type for workers | "Standard_D2as_v5" | See below | -| disk_size | Size of the disk in GB | 30 | 100 | +| worker_disk_type | Managed disk for workers | Standard_LRS | Premium_LRS | +| worker_disk_size | Size of the disk in GB | 30 | 100 | +| worker_ephemeral_disk | Use ephemeral local disk instead of managed disk | false | true | | worker_priority | Set priority to Spot to use reduced cost surplus capacity, with the tradeoff that instances can be deallocated at any time | Regular | Spot | | controller_snippets | Controller Butane snippets | [] | [example](/advanced/customization/#usage) | | worker_snippets | Worker Butane snippets | [] | [example](/advanced/customization/#usage) | @@ -255,9 +259,6 @@ Reference the DNS zone with `azurerm_dns_zone.clusters.name` and its resource gr Check the list of valid [machine types](https://azure.microsoft.com/en-us/pricing/details/virtual-machines/linux/) and their [specs](https://docs.microsoft.com/en-us/azure/virtual-machines/linux/sizes-general). Use `az vm list-skus` to get the identifier. -!!! warning - Unlike AWS and GCP, Azure requires its *virtual* networks to have non-overlapping IPv4 CIDRs (yeah, go figure). Instead of each cluster just using `10.0.0.0/16` for instances, each Azure cluster's `host_cidr` must be non-overlapping (e.g. 10.0.0.0/20 for the 1st cluster, 10.0.16.0/20 for the 2nd cluster, etc). - !!! warning Do not choose a `controller_type` smaller than `Standard_B2s`. Smaller instances are not sufficient for running a controller. diff --git a/docs/fedora-coreos/bare-metal.md b/docs/fedora-coreos/bare-metal.md index 86baa3d2..0d70b94b 100644 --- a/docs/fedora-coreos/bare-metal.md +++ b/docs/fedora-coreos/bare-metal.md @@ -323,9 +323,10 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-6qp7f 2/2 Running 1 11m -kube-system calico-node-gnjrm 2/2 Running 0 11m -kube-system calico-node-llbgt 2/2 Running 0 11m +kube-system cilium-6qp7f 1/1 Running 1 11m +kube-system cilium-gnjrm 1/1 Running 0 11m +kube-system cilium-llbgt 1/1 Running 0 11m +kube-system cilium-operator-68d778b448-g744f 1/1 Running 0 11m kube-system coredns-1187388186-dj3pd 1/1 Running 0 11m kube-system coredns-1187388186-mx9rt 1/1 Running 0 11m kube-system kube-apiserver-node1.example.com 1/1 Running 0 11m diff --git a/docs/fedora-coreos/digitalocean.md b/docs/fedora-coreos/digitalocean.md index b16825ff..3605c925 100644 --- a/docs/fedora-coreos/digitalocean.md +++ b/docs/fedora-coreos/digitalocean.md @@ -88,12 +88,12 @@ module "nemo" { region = "nyc3" dns_zone = "digital-ocean.example.com" - # configuration - os_image = data.digitalocean_image.fedora-coreos-31-20200323-3-2.id - ssh_fingerprints = ["d7:9d:79:ae:56:32:73:79:95:88:e3:a2:ab:5d:45:e7"] - - # optional + # instances + os_image = data.digitalocean_image.fedora-coreos-31-20200323-3-2.id worker_count = 2 + + # configuration + ssh_fingerprints = ["d7:9d:79:ae:56:32:73:79:95:88:e3:a2:ab:5d:45:e7"] } ``` @@ -166,9 +166,9 @@ List the pods. NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-1187388186-ld1j7 1/1 Running 0 11m kube-system coredns-1187388186-rdhf7 1/1 Running 0 11m -kube-system calico-node-1m5bf 2/2 Running 0 11m -kube-system calico-node-7jmr1 2/2 Running 0 11m -kube-system calico-node-bknc8 2/2 Running 0 11m +kube-system cilium-1m5bf 1/1 Running 0 11m +kube-system cilium-7jmr1 1/1 Running 0 11m +kube-system cilium-bknc8 1/1 Running 0 11m kube-system kube-apiserver-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-controller-manager-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-proxy-6kxjf 1/1 Running 0 11m diff --git a/docs/fedora-coreos/google-cloud.md b/docs/fedora-coreos/google-cloud.md index 306bd1f6..17b0dd81 100644 --- a/docs/fedora-coreos/google-cloud.md +++ b/docs/fedora-coreos/google-cloud.md @@ -81,11 +81,11 @@ module "yavin" { dns_zone = "example.com" dns_zone_name = "example-zone" + # instances + worker_count = 2 + # configuration ssh_authorized_key = "ssh-ed25519 AAAAB3Nz..." - - # optional - worker_count = 2 } ``` @@ -157,9 +157,9 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1cs8z 2/2 Running 0 6m -kube-system calico-node-d1l5b 2/2 Running 0 6m -kube-system calico-node-sp9ps 2/2 Running 0 6m +kube-system cilium-1cs8z 1/1 Running 0 6m +kube-system cilium-d1l5b 1/1 Running 0 6m +kube-system cilium-sp9ps 1/1 Running 0 6m kube-system coredns-1187388186-dkh3o 1/1 Running 0 6m kube-system coredns-1187388186-zj5dl 1/1 Running 0 6m kube-system kube-apiserver-controller-0 1/1 Running 0 6m @@ -211,12 +211,13 @@ resource "google_dns_managed_zone" "zone-for-clusters" { | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| -| controller_count | Number of controllers (i.e. masters) | 1 | 3 | -| worker_count | Number of workers | 1 | 3 | -| controller_type | Machine type for controllers | "n1-standard-1" | See below | -| worker_type | Machine type for workers | "n1-standard-1" | See below | | os_stream | Fedora CoreOS stream for compute instances | "stable" | "stable", "testing", "next" | -| disk_size | Size of the disk in GB | 30 | 100 | +| controller_count | Number of controllers (i.e. masters) | 1 | 3 | +| controller_type | Machine type for controllers | "n1-standard-1" | See below | +| controller_disk_type | Controller disk size in GB | 30 | 20 | +| worker_count | Number of workers | 1 | 3 | +| worker_type | Machine type for workers | "n1-standard-1" | See below | +| worker_disk_size | Worker disk size in GB | 30 | 100 | | worker_preemptible | If enabled, Compute Engine will terminate workers randomly within 24 hours | false | true | | controller_snippets | Controller Butane snippets | [] | [examples](/advanced/customization/) | | worker_snippets | Worker Butane snippets | [] | [examples](/advanced/customization/) | diff --git a/docs/flatcar-linux/aws.md b/docs/flatcar-linux/aws.md index 57ed0a7d..f62594da 100644 --- a/docs/flatcar-linux/aws.md +++ b/docs/flatcar-linux/aws.md @@ -79,12 +79,12 @@ module "tempest" { dns_zone = "aws.example.com" dns_zone_id = "Z3PAABBCFAKEC0" - # configuration - ssh_authorized_key = "ssh-rsa AAAAB3Nz..." - - # optional + # instances worker_count = 2 worker_type = "t3.small" + + # configuration + ssh_authorized_key = "ssh-rsa AAAAB3Nz..." } ``` @@ -155,9 +155,9 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1m5bf 2/2 Running 0 34m -kube-system calico-node-7jmr1 2/2 Running 0 34m -kube-system calico-node-bknc8 2/2 Running 0 34m +kube-system cilium-1m5bf 1/1 Running 0 34m +kube-system cilium-7jmr1 1/1 Running 0 34m +kube-system cilium-bknc8 1/1 Running 0 34m kube-system coredns-1187388186-wx1lg 1/1 Running 0 34m kube-system coredns-1187388186-qjnvp 1/1 Running 0 34m kube-system kube-apiserver-ip-10-0-3-155 1/1 Running 0 34m @@ -206,16 +206,19 @@ Reference the DNS zone id with `aws_route53_zone.zone-for-clusters.zone_id`. | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| -| controller_count | Number of controllers (i.e. masters) | 1 | 1 | -| worker_count | Number of workers | 1 | 3 | -| controller_type | EC2 instance type for controllers | "t3.small" | See below | -| worker_type | EC2 instance type for workers | "t3.small" | See below | | os_image | AMI channel for a Container Linux derivative | "flatcar-stable" | flatcar-stable, flatcar-beta, flatcar-alpha | -| disk_size | Size of the EBS volume in GB | 30 | 100 | -| disk_type | Type of the EBS volume | "gp3" | standard, gp2, gp3, io1 | -| disk_iops | IOPS of the EBS volume | 0 (i.e. auto) | 400 | -| worker_target_groups | Target group ARNs to which worker instances should be added | [] | [aws_lb_target_group.app.id] | +| controller_count | Number of controllers (i.e. masters) | 1 | 1 | +| controller_type | EC2 instance type for controllers | "t3.small" | See below | +| controller_disk_size | Size of EBS volume in GB | 30 | 100 | +| controller_disk_type | Type of EBS volume | gp3 | io1 | +| controller_disk_iops | IOPS of EBS volume | 3000 | 4000 | +| controller_cpu_credits | Burstable CPU pricing model | null (i.e. auto) | standard, unlimited | +| worker_disk_size | Size of EBS volume in GB | 30 | 100 | +| worker_disk_type | Type of EBS volume | gp3 | io1 | +| worker_disk_iops | IOPS of EBS volume | 3000 | 4000 | +| worker_cpu_credits | Burstable CPU pricing model | null (i.e. auto) | standard, unlimited | | worker_price | Spot price in USD for worker instances or 0 to use on-demand instances | 0/null | 0.10 | +| worker_target_groups | Target group ARNs to which worker instances should be added | [] | [aws_lb_target_group.app.id] | | controller_snippets | Controller Container Linux Config snippets | [] | [example](/advanced/customization/) | | worker_snippets | Worker Container Linux Config snippets | [] | [example](/advanced/customization/) | | networking | Choice of networking provider | "cilium" | "calico" or "cilium" or "flannel" | @@ -228,7 +231,7 @@ Reference the DNS zone id with `aws_route53_zone.zone-for-clusters.zone_id`. Check the list of valid [instance types](https://aws.amazon.com/ec2/instance-types/). !!! warning - Do not choose a `controller_type` smaller than `t2.small`. Smaller instances are not sufficient for running a controller. + Do not choose a `controller_type` smaller than `t3.small`. Smaller instances are not sufficient for running a controller. !!! tip "MTU" If your EC2 instance type supports [Jumbo frames](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/network_mtu.html#jumbo_frame_instances) (most do), we recommend you change the `network_mtu` to 8981! You will get better pod-to-pod bandwidth. diff --git a/docs/flatcar-linux/azure.md b/docs/flatcar-linux/azure.md index 8298f6ce..85f519ff 100644 --- a/docs/flatcar-linux/azure.md +++ b/docs/flatcar-linux/azure.md @@ -82,15 +82,15 @@ module "ramius" { location = "centralus" dns_zone = "azure.example.com" dns_zone_group = "example-group" + network_cidr = { + ipv4 = ["10.0.0.0/20"] + } + + # instances + worker_count = 2 # configuration ssh_authorized_key = "ssh-rsa AAAAB3Nz..." - - # optional - worker_count = 2 - network_cidr = { - ipv4 = ["10.0.0.0/20"] - } } ``` @@ -163,9 +163,9 @@ $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-7c6fbb4f4b-b6qzx 1/1 Running 0 26m kube-system coredns-7c6fbb4f4b-j2k3d 1/1 Running 0 26m -kube-system calico-node-1m5bf 2/2 Running 0 26m -kube-system calico-node-7jmr1 2/2 Running 0 26m -kube-system calico-node-bknc8 2/2 Running 0 26m +kube-system cilium-1m5bf 1/1 Running 0 26m +kube-system cilium-7jmr1 1/1 Running 0 26m +kube-system cilium-bknc8 1/1 Running 0 26m kube-system kube-apiserver-ramius-controller-0 1/1 Running 0 26m kube-system kube-controller-manager-ramius-controller-0 1/1 Running 0 26m kube-system kube-proxy-j4vpq 1/1 Running 0 26m @@ -226,12 +226,16 @@ Reference the DNS zone with `azurerm_dns_zone.clusters.name` and its resource gr | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| -| controller_count | Number of controllers (i.e. masters) | 1 | 1 | -| worker_count | Number of workers | 1 | 3 | -| controller_type | Machine type for controllers | "Standard_B2s" | See below | -| worker_type | Machine type for workers | "Standard_D2as_v5" | See below | | os_image | Channel for a Container Linux derivative | "flatcar-stable" | flatcar-stable, flatcar-beta, flatcar-alpha | -| disk_size | Size of the disk in GB | 30 | 100 | +| controller_count | Number of controllers (i.e. masters) | 1 | 1 | +| controller_type | Machine type for controllers | "Standard_B2s" | See below | +| controller_disk_type | Managed disk for controllers | Premium_LRS | Standard_LRS | +| controller_disk_size | Managed disk size in GB | 30 | 50 | +| worker_count | Number of workers | 1 | 3 | +| worker_type | Machine type for workers | "Standard_D2as_v5" | See below | +| worker_disk_type | Managed disk for workers | Standard_LRS | Premium_LRS | +| worker_disk_size | Size of the disk in GB | 30 | 100 | +| worker_ephemeral_disk | Use ephemeral local disk instead of managed disk | false | true | | worker_priority | Set priority to Spot to use reduced cost surplus capacity, with the tradeoff that instances can be deallocated at any time | Regular | Spot | | controller_snippets | Controller Container Linux Config snippets | [] | [example](/advanced/customization/#usage) | | worker_snippets | Worker Container Linux Config snippets | [] | [example](/advanced/customization/#usage) | @@ -243,9 +247,6 @@ Reference the DNS zone with `azurerm_dns_zone.clusters.name` and its resource gr Check the list of valid [machine types](https://azure.microsoft.com/en-us/pricing/details/virtual-machines/linux/) and their [specs](https://docs.microsoft.com/en-us/azure/virtual-machines/linux/sizes-general). Use `az vm list-skus` to get the identifier. -!!! warning - Unlike AWS and GCP, Azure requires its *virtual* networks to have non-overlapping IPv4 CIDRs (yeah, go figure). Instead of each cluster just using `10.0.0.0/16` for instances, each Azure cluster's `host_cidr` must be non-overlapping (e.g. 10.0.0.0/20 for the 1st cluster, 10.0.16.0/20 for the 2nd cluster, etc). - !!! warning Do not choose a `controller_type` smaller than `Standard_B2s`. Smaller instances are not sufficient for running a controller. diff --git a/docs/flatcar-linux/bare-metal.md b/docs/flatcar-linux/bare-metal.md index b21ee90e..470d655c 100644 --- a/docs/flatcar-linux/bare-metal.md +++ b/docs/flatcar-linux/bare-metal.md @@ -333,9 +333,10 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-6qp7f 2/2 Running 1 11m -kube-system calico-node-gnjrm 2/2 Running 0 11m -kube-system calico-node-llbgt 2/2 Running 0 11m +kube-system cilium-6qp7f 1/1 Running 1 11m +kube-system cilium-gnjrm 1/1 Running 0 11m +kube-system cilium-llbgt 1/1 Running 0 11m +kube-system cilium-operator-68d778b448-g744f 1/1 Running 0 11m kube-system coredns-1187388186-dj3pd 1/1 Running 0 11m kube-system coredns-1187388186-mx9rt 1/1 Running 0 11m kube-system kube-apiserver-node1.example.com 1/1 Running 0 11m diff --git a/docs/flatcar-linux/digitalocean.md b/docs/flatcar-linux/digitalocean.md index 510bb7da..7d969e5a 100644 --- a/docs/flatcar-linux/digitalocean.md +++ b/docs/flatcar-linux/digitalocean.md @@ -88,12 +88,12 @@ module "nemo" { region = "nyc3" dns_zone = "digital-ocean.example.com" - # configuration - os_image = data.digitalocean_image.flatcar-stable-2303-4-0.id - ssh_fingerprints = ["d7:9d:79:ae:56:32:73:79:95:88:e3:a2:ab:5d:45:e7"] - - # optional + # instances + os_image = data.digitalocean_image.flatcar-stable-2303-4-0.id worker_count = 2 + + # configuration + ssh_fingerprints = ["d7:9d:79:ae:56:32:73:79:95:88:e3:a2:ab:5d:45:e7"] } ``` @@ -166,9 +166,9 @@ List the pods. NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-1187388186-ld1j7 1/1 Running 0 11m kube-system coredns-1187388186-rdhf7 1/1 Running 0 11m -kube-system calico-node-1m5bf 2/2 Running 0 11m -kube-system calico-node-7jmr1 2/2 Running 0 11m -kube-system calico-node-bknc8 2/2 Running 0 11m +kube-system cilium-1m5bf 1/1 Running 0 11m +kube-system cilium-7jmr1 1/1 Running 0 11m +kube-system cilium-bknc8 1/1 Running 0 11m kube-system kube-apiserver-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-controller-manager-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-proxy-6kxjf 1/1 Running 0 11m diff --git a/docs/flatcar-linux/google-cloud.md b/docs/flatcar-linux/google-cloud.md index 8ed758dc..3e7379b7 100644 --- a/docs/flatcar-linux/google-cloud.md +++ b/docs/flatcar-linux/google-cloud.md @@ -81,11 +81,11 @@ module "yavin" { dns_zone = "example.com" dns_zone_name = "example-zone" + # instances + worker_count = 2 + # configuration ssh_authorized_key = "ssh-rsa AAAAB3Nz..." - - # optional - worker_count = 2 } ``` @@ -157,9 +157,9 @@ List the pods. ``` $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1cs8z 2/2 Running 0 6m -kube-system calico-node-d1l5b 2/2 Running 0 6m -kube-system calico-node-sp9ps 2/2 Running 0 6m +kube-system cilium-1cs8z 1/1 Running 0 6m +kube-system cilium-d1l5b 1/1 Running 0 6m +kube-system cilium-sp9ps 1/1 Running 0 6m kube-system coredns-1187388186-dkh3o 1/1 Running 0 6m kube-system coredns-1187388186-zj5dl 1/1 Running 0 6m kube-system kube-apiserver-controller-0 1/1 Running 0 6m @@ -211,12 +211,13 @@ resource "google_dns_managed_zone" "zone-for-clusters" { | Name | Description | Default | Example | |:-----|:------------|:--------|:--------| -| controller_count | Number of controllers (i.e. masters) | 1 | 3 | -| worker_count | Number of workers | 1 | 3 | -| controller_type | Machine type for controllers | "n1-standard-1" | See below | -| worker_type | Machine type for workers | "n1-standard-1" | See below | | os_image | Flatcar Linux image for compute instances | "flatcar-stable" | flatcar-stable, flatcar-beta, flatcar-alpha | -| disk_size | Size of the disk in GB | 30 | 100 | +| controller_count | Number of controllers (i.e. masters) | 1 | 3 | +| controller_type | Machine type for controllers | "n1-standard-1" | See below | +| controller_disk_type | Controller disk size in GB | 30 | 20 | +| worker_count | Number of workers | 1 | 3 | +| worker_type | Machine type for workers | "n1-standard-1" | See below | +| worker_disk_size | Worker disk size in GB | 30 | 100 | | worker_preemptible | If enabled, Compute Engine will terminate workers randomly within 24 hours | false | true | | controller_snippets | Controller Container Linux Config snippets | [] | [example](/advanced/customization/) | | worker_snippets | Worker Container Linux Config snippets | [] | [example](/advanced/customization/) | diff --git a/google-cloud/fedora-coreos/kubernetes/bootstrap.tf b/google-cloud/fedora-coreos/kubernetes/bootstrap.tf index b135c65f..ba20a057 100644 --- a/google-cloud/fedora-coreos/kubernetes/bootstrap.tf +++ b/google-cloud/fedora-coreos/kubernetes/bootstrap.tf @@ -9,7 +9,6 @@ module "bootstrap" { network_mtu = 1440 pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/google-cloud/fedora-coreos/kubernetes/butane/controller.yaml b/google-cloud/fedora-coreos/kubernetes/butane/controller.yaml index 36990dd8..db632f53 100644 --- a/google-cloud/fedora-coreos/kubernetes/butane/controller.yaml +++ b/google-cloud/fedora-coreos/kubernetes/butane/controller.yaml @@ -143,7 +143,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/google-cloud/fedora-coreos/kubernetes/controllers.tf b/google-cloud/fedora-coreos/kubernetes/controllers.tf index cfba3c34..92261935 100644 --- a/google-cloud/fedora-coreos/kubernetes/controllers.tf +++ b/google-cloud/fedora-coreos/kubernetes/controllers.tf @@ -81,7 +81,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/google-cloud/fedora-coreos/kubernetes/variables.tf b/google-cloud/fedora-coreos/kubernetes/variables.tf index 77f2a213..b433f8ce 100644 --- a/google-cloud/fedora-coreos/kubernetes/variables.tf +++ b/google-cloud/fedora-coreos/kubernetes/variables.tf @@ -134,13 +134,7 @@ variable "worker_node_labels" { default = [] } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "daemonset_tolerations" { type = list(string) diff --git a/google-cloud/fedora-coreos/kubernetes/workers.tf b/google-cloud/fedora-coreos/kubernetes/workers.tf index 244901d0..a20a1e7f 100644 --- a/google-cloud/fedora-coreos/kubernetes/workers.tf +++ b/google-cloud/fedora-coreos/kubernetes/workers.tf @@ -13,11 +13,10 @@ module "workers" { preemptible = var.worker_preemptible # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels } diff --git a/google-cloud/fedora-coreos/kubernetes/workers/butane/worker.yaml b/google-cloud/fedora-coreos/kubernetes/workers/butane/worker.yaml index 53ce9bcc..82c2bb58 100644 --- a/google-cloud/fedora-coreos/kubernetes/workers/butane/worker.yaml +++ b/google-cloud/fedora-coreos/kubernetes/workers/butane/worker.yaml @@ -98,7 +98,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/google-cloud/fedora-coreos/kubernetes/workers/variables.tf b/google-cloud/fedora-coreos/kubernetes/workers/variables.tf index 8fed0043..704c6bbc 100644 --- a/google-cloud/fedora-coreos/kubernetes/workers/variables.tf +++ b/google-cloud/fedora-coreos/kubernetes/workers/variables.tf @@ -96,13 +96,7 @@ variable "node_taints" { default = [] } -# unofficial, undocumented, unsupported, temporary - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "accelerator_type" { type = string diff --git a/google-cloud/fedora-coreos/kubernetes/workers/workers.tf b/google-cloud/fedora-coreos/kubernetes/workers/workers.tf index b9daf2ec..e9bbe6b1 100644 --- a/google-cloud/fedora-coreos/kubernetes/workers/workers.tf +++ b/google-cloud/fedora-coreos/kubernetes/workers/workers.tf @@ -111,7 +111,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) }) diff --git a/google-cloud/flatcar-linux/kubernetes/bootstrap.tf b/google-cloud/flatcar-linux/kubernetes/bootstrap.tf index b135c65f..ba20a057 100644 --- a/google-cloud/flatcar-linux/kubernetes/bootstrap.tf +++ b/google-cloud/flatcar-linux/kubernetes/bootstrap.tf @@ -9,7 +9,6 @@ module "bootstrap" { network_mtu = 1440 pod_cidr = var.pod_cidr service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix enable_reporting = var.enable_reporting enable_aggregation = var.enable_aggregation daemonset_tolerations = var.daemonset_tolerations diff --git a/google-cloud/flatcar-linux/kubernetes/butane/controller.yaml b/google-cloud/flatcar-linux/kubernetes/butane/controller.yaml index be6479f2..3cc96f16 100644 --- a/google-cloud/flatcar-linux/kubernetes/butane/controller.yaml +++ b/google-cloud/flatcar-linux/kubernetes/butane/controller.yaml @@ -143,7 +143,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/google-cloud/flatcar-linux/kubernetes/controllers.tf b/google-cloud/flatcar-linux/kubernetes/controllers.tf index 40d3d3c1..b05dc375 100644 --- a/google-cloud/flatcar-linux/kubernetes/controllers.tf +++ b/google-cloud/flatcar-linux/kubernetes/controllers.tf @@ -81,7 +81,6 @@ data "ct_config" "controllers" { kubeconfig = indent(10, module.bootstrap.kubeconfig-kubelet) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix }) strict = true snippets = var.controller_snippets diff --git a/google-cloud/flatcar-linux/kubernetes/variables.tf b/google-cloud/flatcar-linux/kubernetes/variables.tf index 2fdd9c64..79990a80 100644 --- a/google-cloud/flatcar-linux/kubernetes/variables.tf +++ b/google-cloud/flatcar-linux/kubernetes/variables.tf @@ -115,7 +115,6 @@ EOD default = "10.3.0.0/16" } - variable "enable_reporting" { type = bool description = "Enable usage or analytics reporting to upstreams (Calico)" @@ -134,13 +133,7 @@ variable "worker_node_labels" { default = [] } -# unofficial, undocumented, unsupported - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "daemonset_tolerations" { type = list(string) diff --git a/google-cloud/flatcar-linux/kubernetes/workers.tf b/google-cloud/flatcar-linux/kubernetes/workers.tf index 30273817..b3a6ce12 100644 --- a/google-cloud/flatcar-linux/kubernetes/workers.tf +++ b/google-cloud/flatcar-linux/kubernetes/workers.tf @@ -13,11 +13,10 @@ module "workers" { preemptible = var.worker_preemptible # configuration - kubeconfig = module.bootstrap.kubeconfig-kubelet - ssh_authorized_key = var.ssh_authorized_key - service_cidr = var.service_cidr - cluster_domain_suffix = var.cluster_domain_suffix - snippets = var.worker_snippets - node_labels = var.worker_node_labels + kubeconfig = module.bootstrap.kubeconfig-kubelet + ssh_authorized_key = var.ssh_authorized_key + service_cidr = var.service_cidr + snippets = var.worker_snippets + node_labels = var.worker_node_labels } diff --git a/google-cloud/flatcar-linux/kubernetes/workers/butane/worker.yaml b/google-cloud/flatcar-linux/kubernetes/workers/butane/worker.yaml index f1a60972..9eefbcf3 100644 --- a/google-cloud/flatcar-linux/kubernetes/workers/butane/worker.yaml +++ b/google-cloud/flatcar-linux/kubernetes/workers/butane/worker.yaml @@ -98,7 +98,7 @@ storage: cgroupDriver: systemd clusterDNS: - ${cluster_dns_service_ip} - clusterDomain: ${cluster_domain_suffix} + clusterDomain: cluster.local healthzPort: 0 rotateCertificates: true shutdownGracePeriod: 45s diff --git a/google-cloud/flatcar-linux/kubernetes/workers/variables.tf b/google-cloud/flatcar-linux/kubernetes/workers/variables.tf index 1d4f9487..165bf25f 100644 --- a/google-cloud/flatcar-linux/kubernetes/workers/variables.tf +++ b/google-cloud/flatcar-linux/kubernetes/workers/variables.tf @@ -96,13 +96,7 @@ variable "node_taints" { default = [] } -# unofficial, undocumented, unsupported, temporary - -variable "cluster_domain_suffix" { - type = string - description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) " - default = "cluster.local" -} +# advanced variable "accelerator_type" { type = string diff --git a/google-cloud/flatcar-linux/kubernetes/workers/workers.tf b/google-cloud/flatcar-linux/kubernetes/workers/workers.tf index b3a87b0c..ada00224 100644 --- a/google-cloud/flatcar-linux/kubernetes/workers/workers.tf +++ b/google-cloud/flatcar-linux/kubernetes/workers/workers.tf @@ -111,7 +111,6 @@ data "ct_config" "worker" { kubeconfig = indent(10, var.kubeconfig) ssh_authorized_key = var.ssh_authorized_key cluster_dns_service_ip = cidrhost(var.service_cidr, 10) - cluster_domain_suffix = var.cluster_domain_suffix node_labels = join(",", var.node_labels) node_taints = join(",", var.node_taints) })