diff --git a/docs/cl/aws.md b/docs/cl/aws.md index d388b323..f46a76a8 100644 --- a/docs/cl/aws.md +++ b/docs/cl/aws.md @@ -1,6 +1,6 @@ # AWS -In this tutorial, we'll create a Kubernetes v1.17.3 cluster on AWS with Container Linux. +In this tutorial, we'll create a Kubernetes v1.17.3 cluster on AWS with CoreOS Container Linux or Flatcar Linux. We'll declare a Kubernetes cluster using the Typhoon Terraform module. Then apply the changes to create a VPC, gateway, subnets, security groups, controller instances, worker auto-scaling group, network load balancer, and TLS assets. @@ -18,7 +18,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -49,7 +49,7 @@ Configure the AWS provider to use your access key credentials in a `providers.tf ```tf provider "aws" { - version = "2.41.0" + version = "2.48.0" region = "eu-central-1" shared_credentials_file = "/home/user/.config/aws/credentials" } @@ -152,18 +152,18 @@ List the pods. ``` $ kubectl get pods --all-namespaces -NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system calico-node-1m5bf 2/2 Running 0 34m -kube-system calico-node-7jmr1 2/2 Running 0 34m -kube-system calico-node-bknc8 2/2 Running 0 34m -kube-system coredns-1187388186-wx1lg 1/1 Running 0 34m +NAMESPACE NAME READY STATUS RESTARTS AGE +kube-system calico-node-1m5bf 2/2 Running 0 34m +kube-system calico-node-7jmr1 2/2 Running 0 34m +kube-system calico-node-bknc8 2/2 Running 0 34m +kube-system coredns-1187388186-wx1lg 1/1 Running 0 34m kube-system coredns-1187388186-qjnvp 1/1 Running 0 34m -kube-system kube-apiserver-ip-10-0-3-155 1/1 Running 0 34m -kube-system kube-controller-manager-ip-10-0-3-155 1/1 Running 0 34m -kube-system kube-proxy-14wxv 1/1 Running 0 34m -kube-system kube-proxy-9vxh2 1/1 Running 0 34m -kube-system kube-proxy-sbbsh 1/1 Running 0 34m -kube-system kube-scheduler-ip-10-0-3-155 1/1 Running 1 34m +kube-system kube-apiserver-ip-10-0-3-155 1/1 Running 0 34m +kube-system kube-controller-manager-ip-10-0-3-155 1/1 Running 0 34m +kube-system kube-proxy-14wxv 1/1 Running 0 34m +kube-system kube-proxy-9vxh2 1/1 Running 0 34m +kube-system kube-proxy-sbbsh 1/1 Running 0 34m +kube-system kube-scheduler-ip-10-0-3-155 1/1 Running 1 34m ``` ## Going Further diff --git a/docs/cl/azure.md b/docs/cl/azure.md index 7761929f..3bf311c9 100644 --- a/docs/cl/azure.md +++ b/docs/cl/azure.md @@ -3,7 +3,7 @@ !!! danger Typhoon for Azure is alpha. For production, use AWS, Google Cloud, or bare-metal. As Azure matures, check [errata](https://github.com/poseidon/typhoon/wiki/Errata) for known shortcomings. -In this tutorial, we'll create a Kubernetes v1.17.3 cluster on Azure with Container Linux. +In this tutorial, we'll create a Kubernetes v1.17.3 cluster on Azure with CoreOS Container Linux or Flatcar Linux. We'll declare a Kubernetes cluster using the Typhoon Terraform module. Then apply the changes to create a resource group, virtual network, subnets, security groups, controller availability set, worker scale set, load balancer, and TLS assets. @@ -21,7 +21,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -50,7 +50,7 @@ Configure the Azure provider in a `providers.tf` file. ```tf provider "azurerm" { - version = "1.38.0" + version = "1.43.0" } provider "ct" { @@ -152,9 +152,9 @@ $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-7c6fbb4f4b-b6qzx 1/1 Running 0 26m kube-system coredns-7c6fbb4f4b-j2k3d 1/1 Running 0 26m -kube-system calico-node-1m5bf 2/2 Running 0 26m -kube-system calico-node-7jmr1 2/2 Running 0 26m -kube-system calico-node-bknc8 2/2 Running 0 26m +kube-system calico-node-1m5bf 2/2 Running 0 26m +kube-system calico-node-7jmr1 2/2 Running 0 26m +kube-system calico-node-bknc8 2/2 Running 0 26m kube-system kube-apiserver-ramius-controller-0 1/1 Running 0 26m kube-system kube-controller-manager-ramius-controller-0 1/1 Running 0 26m kube-system kube-proxy-j4vpq 1/1 Running 0 26m diff --git a/docs/cl/bare-metal.md b/docs/cl/bare-metal.md index c63500bb..77587027 100644 --- a/docs/cl/bare-metal.md +++ b/docs/cl/bare-metal.md @@ -1,6 +1,6 @@ # Bare-Metal -In this tutorial, we'll network boot and provision a Kubernetes v1.17.3 cluster on bare-metal with Container Linux. +In this tutorial, we'll network boot and provision a Kubernetes v1.17.3 cluster on bare-metal with CoreOS Container Linux or Flatcar Linux. First, we'll deploy a [Matchbox](https://github.com/poseidon/matchbox) service and setup a network boot environment. Then, we'll declare a Kubernetes cluster using the Typhoon Terraform module and power on machines. On PXE boot, machines will install Container Linux to disk, reboot into the disk install, and provision themselves as Kubernetes controllers or workers via Ignition. @@ -27,7 +27,7 @@ Configure each machine to boot from the disk through IPMI or the BIOS menu. ``` ipmitool -H node1 -U USER -P PASS chassis bootdev disk options=persistent ``` - + During provisioning, you'll explicitly set the boot device to `pxe` for the next boot only. Machines will install (overwrite) the operating system to disk on PXE boot and reboot into the disk install. !!! tip "" @@ -111,7 +111,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-matchbox](https://github.com/poseidon/terraform-provider-matchbox) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -161,7 +161,7 @@ Define a Kubernetes cluster using the module `bare-metal/container-linux/kuberne ```tf module "mercury" { source = "git::https://github.com/poseidon/typhoon//bare-metal/container-linux/kubernetes?ref=v1.17.3" - + # bare-metal cluster_name = "mercury" matchbox_http_endpoint = "http://matchbox.example.com" @@ -355,7 +355,7 @@ Check the [variables.tf](https://github.com/poseidon/typhoon/blob/master/bare-me | cached_install | PXE boot and install from the Matchbox `/assets` cache. Admin MUST have downloaded Container Linux or Flatcar images into the cache | false | true | | install_disk | Disk device where Container Linux should be installed | "/dev/sda" | "/dev/sdb" | | networking | Choice of networking provider | "calico" | "calico" or "flannel" | -| network_mtu | CNI interface MTU (calico-only) | 1480 | - | +| network_mtu | CNI interface MTU (calico-only) | 1480 | - | | clc_snippets | Map from machine names to lists of Container Linux Config snippets | {} | [example](/advanced/customization/#usage) | | network_ip_autodetection_method | Method to detect host IPv4 address (calico-only) | "first-found" | "can-reach=10.0.0.1" | | pod_cidr | CIDR IPv4 range to assign to Kubernetes pods | "10.2.0.0/16" | "10.22.0.0/16" | diff --git a/docs/cl/digital-ocean.md b/docs/cl/digital-ocean.md index 07774b83..f2e5078f 100644 --- a/docs/cl/digital-ocean.md +++ b/docs/cl/digital-ocean.md @@ -1,6 +1,6 @@ # Digital Ocean -In this tutorial, we'll create a Kubernetes v1.17.3 cluster on DigitalOcean with Container Linux. +In this tutorial, we'll create a Kubernetes v1.17.3 cluster on DigitalOcean with CoreOS Container Linux or Flatcar Linux. We'll declare a Kubernetes cluster using the Typhoon Terraform module. Then apply the changes to create controller droplets, worker droplets, DNS records, tags, and TLS assets. @@ -18,7 +18,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -50,7 +50,7 @@ Configure the DigitalOcean provider to use your token in a `providers.tf` file. ```tf provider "digitalocean" { - version = "1.11.0" + version = "1.14.0" token = "${chomp(file("~/.config/digital-ocean/token"))}" } @@ -74,7 +74,7 @@ module "nemo" { # configuration ssh_fingerprints = ["d7:9d:79:ae:56:32:73:79:95:88:e3:a2:ab:5d:45:e7"] - + # optional worker_count = 2 } @@ -149,9 +149,9 @@ List the pods. NAMESPACE NAME READY STATUS RESTARTS AGE kube-system coredns-1187388186-ld1j7 1/1 Running 0 11m kube-system coredns-1187388186-rdhf7 1/1 Running 0 11m -kube-system calico-node-1m5bf 2/2 Running 0 11m -kube-system calico-node-7jmr1 2/2 Running 0 11m -kube-system calico-node-bknc8 2/2 Running 0 11m +kube-system calico-node-1m5bf 2/2 Running 0 11m +kube-system calico-node-7jmr1 2/2 Running 0 11m +kube-system calico-node-bknc8 2/2 Running 0 11m kube-system kube-apiserver-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-controller-manager-ip-10.132.115.81 1/1 Running 0 11m kube-system kube-proxy-6kxjf 1/1 Running 0 11m diff --git a/docs/cl/google-cloud.md b/docs/cl/google-cloud.md index 661cdac9..eefd2ebb 100644 --- a/docs/cl/google-cloud.md +++ b/docs/cl/google-cloud.md @@ -1,6 +1,6 @@ # Google Cloud -In this tutorial, we'll create a Kubernetes v1.17.3 cluster on Google Compute Engine with Container Linux. +In this tutorial, we'll create a Kubernetes v1.17.3 cluster on Google Compute Engine with CoreOS Container Linux or Flatcar Linux. We'll declare a Kubernetes cluster using the Typhoon Terraform module. Then apply the changes to create a network, firewall rules, health checks, controller instances, worker managed instance group, load balancers, and TLS assets. @@ -18,7 +18,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -49,7 +49,7 @@ Configure the Google Cloud provider to use your service account key, project-id, ```tf provider "google" { - version = "3.4.0" + version = "3.7.0" project = "project-id" region = "us-central1" credentials = file("~/.config/google-cloud/terraform.json") diff --git a/docs/fedora-coreos/aws.md b/docs/fedora-coreos/aws.md index cb708c2c..61876769 100644 --- a/docs/fedora-coreos/aws.md +++ b/docs/fedora-coreos/aws.md @@ -18,7 +18,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -49,7 +49,7 @@ Configure the AWS provider to use your access key credentials in a `providers.tf ```tf provider "aws" { - version = "2.41.0" + version = "2.48.0" region = "eu-central-1" shared_credentials_file = "/home/user/.config/aws/credentials" } diff --git a/docs/fedora-coreos/bare-metal.md b/docs/fedora-coreos/bare-metal.md index a29557b4..42974f6f 100644 --- a/docs/fedora-coreos/bare-metal.md +++ b/docs/fedora-coreos/bare-metal.md @@ -111,7 +111,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-matchbox](https://github.com/poseidon/terraform-provider-matchbox) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. diff --git a/docs/fedora-coreos/google-cloud.md b/docs/fedora-coreos/google-cloud.md index 9e05041d..80d25569 100644 --- a/docs/fedora-coreos/google-cloud.md +++ b/docs/fedora-coreos/google-cloud.md @@ -21,7 +21,7 @@ Install [Terraform](https://www.terraform.io/downloads.html) v0.12.6+ on your sy ```sh $ terraform version -Terraform v0.12.16 +Terraform v0.12.20 ``` Add the [terraform-provider-ct](https://github.com/poseidon/terraform-provider-ct) plugin binary for your system to `~/.terraform.d/plugins/`, noting the final name. @@ -52,7 +52,7 @@ Configure the Google Cloud provider to use your service account key, project-id, ```tf provider "google" { - version = "3.4.0" + version = "3.7.0" project = "project-id" region = "us-central1" credentials = file("~/.config/google-cloud/terraform.json")