Create two A records within your domain DNS:
<HOSTNAME>. 300 IN A <IP>
*.<HOSTNAME>. 300 IN A <IP>
Install git (for kustomize)
Install k3s
curl -sfL https://get.k3s.io | sh -
Install acme-dns
kubectl get secret -n codius codius-certificate -o go-template='{{ index .data "tls.crt" | base64decode }}' > tls.crt
kubectl get secret -n codius codius-certificate -o go-template='{{ index .data "tls.key" | base64decode }}' > tls.key
//Install kata
//Install calico
Create namespace
apiVersion: v1
kind: Namespace
metadata:
labels:
app: codius
name: codius
Install CRD operator
kubectl kustomize github.com/wilsonianb/codius-crd-operator/config/default | kubectl apply -f -
or make kustomization.yaml
bases:
- github.com/wilsonianb/codius-crd-operator/config/default
patchesStrategicMerge:
- manager_env_patch.yaml
manager_env_patch.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: controller-manager
namespace: codius-crd-operator-system
spec:
template:
spec:
containers:
- name: manager
env:
- name: CODIUS_HOSTNAME
value: codius.example.com
- name: CODIUS_CERT_SECRET
value: codius-certificate
kubectl apply -k .
Copy codius-certificate from codius namespace to default namespace...
Add insecureSkipVerify to existing ssl field in traefik helm file
/var/lib/rancher/k3s/server/manifests/traefik.yaml