Run Kubernetes using Talos Linux on bare metal.
Tools you'll need.
- kubectl
- talhelper
- talosctl
- 1password
- taskfile
- helm
Talos Linux is Linux designed for Kubernetes - secure, immutable, and minimal.
Talos and Kubernetes versions are a bit interdependent. You can find a support-matrix here (example v1.5, update URL as needed). Talos releases are here. Use the release page to get the latest patch. Kubernetes releases are here. These versions are used in the talos/talenv.yaml
file.
We're going to use talhelper
to generate talos node configs. Talos node configs are node specific and are applied to the nodes later via a task. Normally we'd do something like talosctl gen config myCluster https://<VIP>:<port>
to generate talos node configs but this doesn't scale very well. With talhelper
we can leverage talos/talconfig.yaml
+ talos/talenv.yaml
+ talos/talsecret.sops.yaml
to generate all talos node configs at once. The following is a brief description of each file.
talos/talconfig.yaml
: talos config template (created by hand initially via a starter template) This is atalhelper
specific config that leverages variable substitution fromtalos/talenv.yaml
(e.g.${domainName}
).talos/talenv.yaml
: talos environment variables that are injected into talos node config files.talos/talsecret.sops.yaml
: talos secrets that are injected into talos node config files. It holds k8s certs/keys, talos specific certs/keys and bootstrap tokens that get injected into talos config files. This file was created withtalhelper gensecret > talsecret.sops.yaml
, only needed once! This file was encrypted withsops -e -i talos/talsecret.sops.yaml
discussed later.
Use talhelper
to generate talos configs. The following will generate individual talos node config files and a talosconfig
in talos/clusterconfig
. Regenerating configs is only necessary if you want to change the talos version, kubernetes version, or a talos config setting.
task talos:genconfig
talsecret.sops.yaml
is encrypted with SOPS leveraging age. age-keygen -o myKey.txt
was used to generate the public key and age secret. SOPS is configured to use the age public key via the .sops.yaml
in the root of this repo to encrypt files. Via the VSCode extension signageos.signageos-vscode-sops
we can automatically encrypt/decrypt secrets in place. In order for this to work you must have SOPS_AGE_KEY
set as an environment variable (this is a requirement of SOPS). SOPS_AGE_KEY
is set by the git ignored .envrc
file in the root of this repo.
The .sops.yaml
file defines rules for what files via path filtering are in scope for encryption in addition to what keys in those files should be encrypted. To onboard a file for encryption (not the entire file, just the keys that match the rules) you can run sops -e -i ./testing/test.sops.yaml
.
regenerate configs if needed.
> task talos:genconfig
apply the configs.
> talos:apply-config
initiate bootstrap.
> task talos:bootstrap
get kubeconfig if needed, only required if new talos secrets were generated.
> task talos:get-kubeconfig
begin to install core infra. cilium and argocd will be managed under argocd later.
> task install:gateway_api_crds
> task install:cilium
> task install:argocd
> task stage:onepassword_secrets
install argo app of apps infra
.
> k apply -n argocd -f argocd/aoa_infra.yaml
now that longhorn is installed, proceed to the longhorn UI to restore volumes.
- restore volumes one at a time, checking "Use Previous Name"
- restore volume PV/PVC, checking create both pv and pvc
install argo app of apps apps
.
> k apply -n argocd -f argocd/aoa_apps.yaml