From 7410984c5e76d9064a68fac84af815d4b5964ac5 Mon Sep 17 00:00:00 2001 From: richard Date: Tue, 2 Aug 2022 09:59:27 -0400 Subject: [PATCH] k3s unistall script --- ansible-5/playbooks/kube.uninstall.yaml | 10 ++ .../roles/prod.k3s/tasks/cert_manager.yml | 0 ansible-5/roles/prod.k3s/tasks/main.yml | 140 +++++++++--------- 3 files changed, 80 insertions(+), 70 deletions(-) create mode 100644 ansible-5/playbooks/kube.uninstall.yaml create mode 100644 ansible-5/roles/prod.k3s/tasks/cert_manager.yml diff --git a/ansible-5/playbooks/kube.uninstall.yaml b/ansible-5/playbooks/kube.uninstall.yaml new file mode 100644 index 0000000..bacc279 --- /dev/null +++ b/ansible-5/playbooks/kube.uninstall.yaml @@ -0,0 +1,10 @@ +--- +- name: ping + hosts: kube + gather_facts: true + + tasks: + - name: running uninstall script + ansible.builtin.command: /usr/local/bin/k3s-uninstall.sh + args: + removes: /usr/local/bin/k3s-uninstall.sh diff --git a/ansible-5/roles/prod.k3s/tasks/cert_manager.yml b/ansible-5/roles/prod.k3s/tasks/cert_manager.yml new file mode 100644 index 0000000..e69de29 diff --git a/ansible-5/roles/prod.k3s/tasks/main.yml b/ansible-5/roles/prod.k3s/tasks/main.yml index 759f6c0..f87f2a1 100644 --- a/ansible-5/roles/prod.k3s/tasks/main.yml +++ b/ansible-5/roles/prod.k3s/tasks/main.yml @@ -13,52 +13,52 @@ with_items: "{{fstab.gluster}}" become: true -# provision docker image registry +# add helm repositories - include_tasks: add_repos.yml # https://artifacthub.io/packages/helm/twuni/docker-registry -- name: Deploy latest version of docker-registry in dev-tools namespace - local_action: - module: kubernetes.core.helm - name: dkregistry - chart_ref: twuni/docker-registry - release_namespace: dev-tools - create_namespace: True - values: - replicaCount: 1 - ingress: - enabled: true - hosts: - - dkregistry.xai-corp.net - className: traefik - secrets.htpassword: me1 - extraVolumeMounts: - - name: registry-data - mountPath: /var/lib/registry-data - - name: registry-auth - mountPath: /auth - - name: registry-auth - mountPath: /etc/docker/registry/ - - name: letsencrypt-data - mountPath: /certs - - name: letsencrypt-config - mountPath: /etc/letsencrypt - extraVolumes: - - name: registry-data - hostPath: - path: /opt/shared/dkregistry/data - - name: registry-auth - hostPath: - path: /opt/shared/dkregistry/auth - - name: registry-config - hostPath: - path: /opt/shared/dkregistry/config/ - - name: letsencrypt-data - hostPath: - path: /opt/shared/letsencrypt-2 - - name: letsencrypt-config - hostPath: - path: /opt/shared/letsencrypt-2 +#- name: Deploy latest version of docker-registry in dev-tools namespace +# local_action: +# module: kubernetes.core.helm +# name: dkregistry +# chart_ref: twuni/docker-registry +# release_namespace: dev-tools +# create_namespace: True +# values: +# replicaCount: 1 +# ingress: +# enabled: true +# hosts: +# - dkregistry.xai-corp.net +# className: traefik +# secrets.htpassword: me1 +# extraVolumeMounts: +# - name: registry-data +# mountPath: /var/lib/registry-data +# - name: registry-auth +# mountPath: /auth +# - name: registry-auth +# mountPath: /etc/docker/registry/ +# - name: letsencrypt-data +# mountPath: /certs +# - name: letsencrypt-config +# mountPath: /etc/letsencrypt +# extraVolumes: +# - name: registry-data +# hostPath: +# path: /opt/shared/dkregistry/data +# - name: registry-auth +# hostPath: +# path: /opt/shared/dkregistry/auth +# - name: registry-config +# hostPath: +# path: /opt/shared/dkregistry/config/ +# - name: letsencrypt-data +# hostPath: +# path: /opt/shared/letsencrypt-2 +# - name: letsencrypt-config +# hostPath: +# path: /opt/shared/letsencrypt-2 # extraEnvVars: # - name: REGISTRY_HTTP_SECRET # value: aabuioqlwlcpp2 @@ -80,30 +80,30 @@ # provision argoCD # provision graphana -- name: Copy manifest for graphana - ansible.builtin.copy: - src: manifests/graphana.helm.yaml - dest: /var/lib/rancher/k3s/server/manifests/graphana.helm.yaml - become: true - -- name: Copy manifest for docker registry - ansible.builtin.copy: - src: manifests/registry.helm.yaml - dest: /var/lib/rancher/k3s/server/manifests/dkregistry.helm.yaml - become: true - -- name: Copy manifest for mariadb - ansible.builtin.copy: - src: manifests/mariadb.helm.yaml - dest: /var/lib/rancher/k3s/server/manifests/mariadb.helm.yaml - become: true - -- name: remove manifests - ansible.builtin.file: - state: absent - path: "{{ item }}" - loop: - - /var/lib/rancher/k3s/server/manifests/graphana.helm.yaml - - /var/lib/rancher/k3s/server/manifests/dkregistry.helm.yaml - - /var/lib/rancher/k3s/server/manifests/mariadb.helm.yaml - become: true +#- name: Copy manifest for graphana +# ansible.builtin.copy: +# src: manifests/graphana.helm.yaml +# dest: /var/lib/rancher/k3s/server/manifests/graphana.helm.yaml +# become: true +# +#- name: Copy manifest for docker registry +# ansible.builtin.copy: +# src: manifests/registry.helm.yaml +# dest: /var/lib/rancher/k3s/server/manifests/dkregistry.helm.yaml +# become: true +# +#- name: Copy manifest for mariadb +# ansible.builtin.copy: +# src: manifests/mariadb.helm.yaml +# dest: /var/lib/rancher/k3s/server/manifests/mariadb.helm.yaml +# become: true +# +#- name: remove manifests +# ansible.builtin.file: +# state: absent +# path: "{{ item }}" +# loop: +# - /var/lib/rancher/k3s/server/manifests/graphana.helm.yaml +# - /var/lib/rancher/k3s/server/manifests/dkregistry.helm.yaml +# - /var/lib/rancher/k3s/server/manifests/mariadb.helm.yaml +# become: true