Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HA Kubernetes on 6 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s - bare metal simulation #54

Open
obriensystems opened this issue Sep 12, 2024 · 4 comments
Assignees

Comments

@obriensystems
Copy link
Member

obriensystems commented Sep 12, 2024

Software

Hardware

References

Current

Review

Older 2019

@obriensystems obriensystems self-assigned this Sep 12, 2024
@obriensystems
Copy link
Member Author

Screenshot 2024-09-11 at 21 53 08

@obriensystems obriensystems changed the title Kubernetes on 4 node 8GB Raspberry PI 5 cluster Kubernetes on 4 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s Sep 12, 2024
@obriensystems obriensystems changed the title Kubernetes on 4 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s Kubernetes on 4 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s - bare metal simulation Sep 12, 2024
@obriensystems
Copy link
Member Author

Screenshot 2024-09-12 at 18 34 16

@obriensystems
Copy link
Member Author

config
192.168.16.14 (0) - 192.168.16.11 (pi53)

@obriensystems obriensystems changed the title Kubernetes on 4 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s - bare metal simulation HA Kubernetes on 6 node 8GB Raspberry PI 5 cluster via kubeadm or Rancher k3s - bare metal simulation Sep 16, 2024
@obriensystems
Copy link
Member Author

obriensystems commented Sep 16, 2024

Simulate on AWS VMs

AWS

Screenshot 2024-09-16 at 16 22 43

Create VPC: vpc-006e77544bb4dd4f6
Enable DNS hostnames
Enable DNS resolution
Verifying VPC creation: vpc-006e77544bb4dd4f6
Create S3 endpoint: vpce-0a061605eed305ba7
Create subnet: subnet-0a1043cded4b2fae1
Create subnet: subnet-0e578b478b16fcf4b
Create subnet: subnet-0ca3d194409fd41c3
Create subnet: subnet-043da12a418a7cde5
Create subnet: subnet-0f643b64bfbd69dbc
Create subnet: subnet-0aa6053f3a511a5d4
Create internet gateway: igw-0704a4df43c65427e
Attach internet gateway to the VPC
Create route table: rtb-0851d95a46d236365
Create route
Associate route table
Associate route table
Associate route table
Create route table: rtb-09bd7b0b3e35cc9bc
Associate route table
Create route table: rtb-06a5100aa92e7f6e0
Associate route table
Create route table: rtb-0b0e219acfe1f20cd
Associate route table
Verifying route table creation
Associate S3 endpoint with private subnet route tables: vpce-0a061605eed305ba7

RunInstances
{
  "MaxCount": 1,
  "MinCount": 1,
  "ImageId": "ami-0e86e20dae9224db8",
  "InstanceType": "t3a.medium",
  "KeyName": "obrie...15",
  "EbsOptimized": true,
  "UserData": "Z2l0IGNsb25lIGh0dHBzOi8vZ2l0aHViLmNvbS9PYnJpZW5sYWJzRGV2L2t1YmVybmV0ZXMtY2x1c3Rlci5naXQKY2Qga3ViZXJuZXRlcy1jbHVzdGVyL3NyYy9hd3MKLi9rdWJlcm5ldGVzLWF3cy1tYXN0ZXIuc2g=",
  "BlockDeviceMappings": [
    {
      "DeviceName": "/dev/sda1",
      "Ebs": {
        "Encrypted": false,
        "DeleteOnTermination": true,
        "Iops": 3000,
        "SnapshotId": "snap-0a00520ef60a68bed",
        "VolumeSize": 40,
        "VolumeType": "gp3",
        "Throughput": 125
      }
    }
  ],
  "NetworkInterfaces": [
    {
      "SubnetId": "subnet-0aa6053f3a511a5d4",
      "AssociatePublicIpAddress": false,
      "DeviceIndex": 0,
      "Groups": [
        "<groupId of the new security group created below>"
      ]
    }
  ],
  "CreditSpecification": {
    "CpuCredits": "unlimited"
  },
  "TagSpecifications": [
    {
      "ResourceType": "instance",
      "Tags": [
        {
          "Key": "Name",
          "Value": "kube-master-0"
        }
      ]
    }
  ],
  "MetadataOptions": {
    "HttpEndpoint": "enabled",
    "HttpPutResponseHopLimit": 2,
    "HttpTokens": "required"
  },
  "PrivateDnsNameOptions": {
    "HostnameType": "ip-name",
    "EnableResourceNameDnsARecord": false,
    "EnableResourceNameDnsAAAARecord": false
  }
}

CreateSecurityGroup
{
  "GroupName": "all-open-kube",
  "Description": "all-open-kube",
  "VpcId": "vpc-006e77544bb4dd4f6"
}

AuthorizeSecurityGroupIngress
{
  "GroupId": "<groupId of the security group created above>",
  "IpPermissions": [
    {
      "IpProtocol": "tcp",
      "FromPort": 22,
      "ToPort": 22,
      "IpRanges": [
        {
          "CidrIp": "0.0.0.0/0"
        }
      ]
    }
  ]
}

bastion

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant