libvirt-ocp4-provisioner
cilium-cli
libvirt-ocp4-provisioner | cilium-cli | |
---|---|---|
9 | 11 | |
88 | 368 | |
- | 2.4% | |
7.1 | 9.8 | |
2 months ago | 4 days ago | |
HCL | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
libvirt-ocp4-provisioner
-
libvirt-ocp4-provisioner - Provision an OCP 4.x.y cluster in minutes with Ansible, now with Single Node OCP support! .
Hi guys!I wanted to allotment with you a tool to provision a fully working OCP 4.x.y cluster in minutes using Ansible for automation, libvirt as virtualization provider and terraform as VMs templating and creation tool. https://github.com/kubealex/libvirt-ocp4-provisioner It will take care of all the infrastructure provisioning and OCP machines provisioning, starting and completing the UPI installation of a cluster. (IPI work in progress ;) ) To give a quick overview, this project will allow you to provision a fully working OCP stable environment, consisting of: * Bastion machine provisioned with: * dnsmasq (with SELinux module, compiled and activated) * dhcp based on dnsmasq * nginx (for ignition files and rhcos pxe-boot) * pxeboot * Loadbalancer machine provisioned with: * haproxy * OCP Bootstrap machine * OCP Master(s) VM(s) * OCP Worker(s) VM(s) From latest release, it also supports installing SNO on a single host! It also takes care of preparing the host machine with needed packages, configuring: * dedicated libvirt network (fully customizable) * dedicated libvirt storage pool (fully customizable) * terraform * libvirt-terraform-provider ( compiled and initialized basedon https://github.com/dmacvicar/terraform-provider-libvirt) PXE is automatic, based on MAC binding to different OCP nodes role, so no need of choosing it from the menus, this means you can just run the playbook, take a beer and have your fully running OCP 4.9.latest stable up and running. It has been tested on Fedora 3x and CentOS 7/8. Playing around with it and contributions to make it work even on different OSes is more than welcome, hope you enjoy it! Alex
- libvirt-k8s-provisioner - Ansible and terraform to build a cluster from scratch in less than 10 minutes ok KVM - Updated for 1.25
- libvirt-ocp4-provisioner - Provision an OCP 4.x cluster in minutes with Ansible and Terraform on KVM, with Single Node OCP support
- libvirt-ocp4-provisioner - Provision an OCP 4.x.y cluster in minutes with Ansible, with Single Node OCP support
- libvirt-ocp4-provisioner - Provision an OCP 4.x.y cluster in minutes with Ansible, now with Single Node OCP support!!
- libvirt-ocp4-provisioner - Provision an OCP 4.x.y cluster in minutes with Ansible, now with Single Node OCP support!
- GitHub - kubealex/libvirt-ocp4-provisioner: Automate your OCP4 installation
- libvirt-ocp4-provisioner - Provision an OCP 4.x.y cluster in minutes with Ansible
cilium-cli
-
Grant Kubernetes Pods Access to AWS Services Using OpenID Connect
resource "tls_private_key" "this" { algorithm = "ECDSA" ecdsa_curve = "P384" } resource "hcloud_ssh_key" "this" { name = var.stack_name public_key = tls_private_key.this.public_key_openssh } resource "hcloud_server" "this" { name = var.stack_name server_type = "cax11" image = "ubuntu-22.04" location = "nbg1" ssh_keys = [ hcloud_ssh_key.this.id, ] public_net { ipv4 = hcloud_primary_ip.this["ipv4"].id ipv6 = hcloud_primary_ip.this["ipv6"].id } user_data = <<-EOF #cloud-config users: - name: ${var.username} groups: users, admin, adm sudo: ALL=(ALL) NOPASSWD:ALL shell: /bin/bash ssh_authorized_keys: - ${tls_private_key.this.public_key_openssh} packages: - certbot package_update: true package_upgrade: true runcmd: - sed -i -e '/^\(#\|\)PermitRootLogin/s/^.*$/PermitRootLogin no/' /etc/ssh/sshd_config - sed -i -e '/^\(#\|\)PasswordAuthentication/s/^.*$/PasswordAuthentication no/' /etc/ssh/sshd_config - sed -i '$a AllowUsers ${var.username}' /etc/ssh/sshd_config - | curl https://get.k3s.io | \ INSTALL_K3S_VERSION="v1.29.3+k3s1" \ INSTALL_K3S_EXEC="--disable traefik --kube-apiserver-arg=service-account-jwks-uri=https://${cloudflare_record.this.name}/openid/v1/jwks --kube-apiserver-arg=service-account-issuer=https://${cloudflare_record.this.name} --disable-network-policy --flannel-backend none --write-kubeconfig /home/${var.username}/.kube/config --secrets-encryption" \ sh - - chown -R ${var.username}:${var.username} /home/${var.username}/.kube/ - | CILIUM_CLI_VERSION=v0.16.4 CLI_ARCH=arm64 curl -L --fail --remote-name-all https://github.com/cilium/cilium-cli/releases/download/$CILIUM_CLI_VERSION/cilium-linux-$CLI_ARCH.tar.gz{,.sha256sum} sha256sum --check cilium-linux-$CLI_ARCH.tar.gz.sha256sum sudo tar xzvfC cilium-linux-$CLI_ARCH.tar.gz /usr/local/bin - kubectl completion bash | tee /etc/bash_completion.d/kubectl - k3s completion bash | tee /etc/bash_completion.d/k3s - | cat << 'EOF2' >> /home/${var.username}/.bashrc alias k=kubectl complete -F __start_kubectl k EOF2 - reboot EOF }
- Install RKE2 with Cilium and Metallb
- External service LB with k8s cluster
-
libvirt-k8s-provisioner - Ansible and terraform to build a cluster from scratch in less than 10 minutes ok KVM - Updated for 1.25
network plugin to be used, based on the documentation. (Project Calico ,Flannel, Cilium )
-
7 Kubernetes Companies to Watch in 2022
Isovalent makes an enterprise version of Cilium, an open source tool that uses eBPF to provide security and observability for cloud native environments. Liz gave a great talk at KubeCon Los Angeles about eBPF that I highly recommend. My reaction to her talk was that I wished I had Cilium years ago to troubleshoot some difficult incidents. When I first heard about eBPF I had thought of it more from the observability standpoint, but Cilium also provides a CNI plugin, transparent encryption, logs for security audits, and much more.
-
Pixie: an X-ray Machine for Kubernetes Traffic
Pixie is one of a handful of observability tools that offer eBPF or kernel-level observability. Other well-known tools are Cilium and CVF.
-
Redundancy for apps
A lot of projects are currently heavily focused on K8S (like Cilium - ebpf service mesh).
-
Managing Distributed Applications in Kubernetes Using Cilium and Istio with Helm and Operator for Deployment
Using a container network interface (Cilium) and service mesh (Istio) on top of your K8s infrastructure to more easily manage your distributed applications.
-
Ask HN: Who is hiring? (March 2022)
Isovalent | Multiple roles | Mountain View (US), Zürich (CH), or Remote
We're the company behind the open source Cilium project (https://cilium.io) (11K stars on GitHub) providing eBPF-based networking, observability, and security for container workloads and clusters.
We have an amazing and in-demand product using revolutionary technology and are looking for top talent to help us build and explore all of its possibilities.
We're remote-first, mainly in the EU and US timezones.
If you're interested please apply through our careers site https://isovalent.com/careers and mention Hacker News in your application.
Keywords for searchers: open source, Go/Golang, eBPF, C, C++, Kubernetes, networking, OpenShift, Linux kernel, performance, CI, SRE, technical writing, marketing, community advocate
-
libvirt-k8s-provisioner - Ansible and terraform to build a cluster from scratch in less than 10 minutes ok KVM
network plugin to be used, based on the documentation. (Project Calico ,Flannel, Cilium )
What are some alternatives?
eks-in-action - 🎤 Creating an EKS cluster and VPC in AWS
ingress-nginx - Ingress-NGINX Controller for Kubernetes
terraform-aws-eks-node-group - Terraform module to provision a fully managed AWS EKS Node Group
metallb - A network load-balancer implementation for Kubernetes using standard routing protocols
examples - Official Open Source repository of "Developers Thought" Blog and YouTube Channel.
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
terraform-hcloud-kube-hetzner - Optimized and Maintenance-free Kubernetes on Hetzner Cloud in one command!
istio - Connect, secure, control, and observe services.
Azure-Terraform-Scripts - Terraform scripts on Azure for Windows and Linux VM's
Gravitational Teleport - The easiest, and most secure way to access and protect all of your infrastructure.
personal-zero-trust-hashicorp-vault - Cloudflare for Teams + HashiCorp Vault = Zero Trust Love
operator-sdk - SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding.