Files
kindOnVM/init_cluster..sh
2024-10-22 13:16:53 +02:00

89 lines
3.6 KiB
Bash
Executable File

#!/bin/bash
SCRIPTS_DIR="base_scripts"
set -o errexit
#Install Kind
${SCRIPTS_DIR}/install_kind.sh
#Install kubectl
${SCRIPTS_DIR}/install_kubectl.sh
# 1. Create registry container unless it already exists
reg_name='kind-registry'
reg_port='5001'
if [ "$(docker inspect -f '{{.State.Running}}' "${reg_name}" 2>/dev/null || true)" != 'true' ]; then
docker run \
-d --restart=always -p "127.0.0.1:${reg_port}:5000" --network bridge --name "${reg_name}" \
registry:2
fi
# 2. Create kind cluster with containerd registry config dir enabled
# TODO: kind will eventually enable this by default and this patch will
# be unnecessary.
#
# See:
# https://github.com/kubernetes-sigs/kind/issues/2875
# https://github.com/containerd/containerd/blob/main/docs/cri/config.md#registry-configuration
# See: https://github.com/containerd/containerd/blob/main/docs/hosts.md
kind create cluster --config manifests/kind-cluster-config.yaml
# cat <<EOF | kind create cluster --config=-
# kind: Cluster
# apiVersion: kind.x-k8s.io/v1alpha4
# containerdConfigPatches:
# - |-
# [plugins."io.containerd.grpc.v1.cri".registry]
# config_path = "/etc/containerd/certs.d"
# EOF
# 3. Add the registry config to the nodes
#
# This is necessary because localhost resolves to loopback addresses that are
# network-namespace local.
# In other words: localhost in the container is not localhost on the host.
#
# We want a consistent name that works from both ends, so we tell containerd to
# alias localhost:${reg_port} to the registry container when pulling images
REGISTRY_DIR="/etc/containerd/certs.d/localhost:${reg_port}"
for node in $(kind get nodes); do
docker exec "${node}" mkdir -p "${REGISTRY_DIR}"
cat <<EOF | docker exec -i "${node}" cp /dev/stdin "${REGISTRY_DIR}/hosts.toml"
[host."http://${reg_name}:5000"]
EOF
done
# 4. Connect the registry to the cluster network if not already connected
# This allows kind to bootstrap the network but ensures they're on the same network
if [ "$(docker inspect -f='{{json .NetworkSettings.Networks.kind}}' "${reg_name}")" = 'null' ]; then
docker network connect "kind" "${reg_name}"
fi
# 5. Document the local registry
# https://github.com/kubernetes/enhancements/tree/master/keps/sig-cluster-lifecycle/generic/1755-communicating-a-local-registry
cat <<EOF | kubectl apply -f -
apiVersion: v1
kind: ConfigMap
metadata:
name: local-registry-hosting
namespace: kube-public
data:
localRegistryHosting.v1: |
host: "localhost:${reg_port}"
help: "https://kind.sigs.k8s.io/docs/user/local-registry/"
EOF
#6. Install Kind LoadBalancer
kubectl label node kind-control-plane node.kubernetes.io/exclude-from-external-load-balancers-
git clone https://github.com/kubernetes-sigs/cloud-provider-kind.git
docker compose -f manifests/kind-cloud-provider.yaml up -d
#7. Install Ingress
kubectl apply -f manifests/ingress.yaml
kubectl wait --namespace ingress-nginx --for=condition=ready pod --selector=app.kubernetes.io/component=controller --timeout=90s
#8. Expose LoadBalancer
sudo apt install socat
wget https://raw.githubusercontent.com/aleskxyz/kind-exposer/main/kind-exposer -O kind-exposer && \
chmod +x kind-exposer && \
sudo mv kind-exposer /usr/local/bin/ && \
wget https://raw.githubusercontent.com/aleskxyz/kind-exposer/main/kind-exposer@.service -O kind-exposer@.service && \
sudo mv kind-exposer@.service /etc/systemd/system/ && \
sudo systemctl daemon-reload
LB_IP=$(kubectl get services -n ingress-nginx | grep ingress-nginx-controller | grep -v ingress-nginx-controller-admission | awk '{ print $4}')
sudo systemctl enable --now kind-exposer@${LB_IP}:80:8080:tcp
sudo systemctl enable --now kind-exposer@${LB_IP}:443:8443:tcp