Difference between revisions of "Install k3s with dashboard in Rocky9"

From Bitbull Wiki
Jump to navigation Jump to search
Line 20: Line 20:
 
== Step 3: Open necessary firewall ports ==
 
== Step 3: Open necessary firewall ports ==
 
<pre>
 
<pre>
firewall-cmd --permanent --add-port=8443/tcp # dashboard
+
firewall-cmd --permanent --add-port=30443/tcp # dashboard
 
firewall-cmd --permanent --add-port=443/tcp  # ingress controller
 
firewall-cmd --permanent --add-port=443/tcp  # ingress controller
 
firewall-cmd --permanent --add-port=6443/tcp  # API server
 
firewall-cmd --permanent --add-port=6443/tcp  # API server
Line 31: Line 31:
 
== Step 4: Install k3s ==
 
== Step 4: Install k3s ==
 
<pre>
 
<pre>
curl -sfL https://get.k3s.io | sh -s - --service-node-port-range=8000-32767
+
curl -sfL https://get.k3s.io | sh
 
grep 'kubectl completion bash' $HOME/.bashrc || echo 'source <(kubectl completion bash)' >> $HOME/.bashrc
 
grep 'kubectl completion bash' $HOME/.bashrc || echo 'source <(kubectl completion bash)' >> $HOME/.bashrc
 
</pre>
 
</pre>
Line 69: Line 69:
 
         "protocol": "TCP",
 
         "protocol": "TCP",
 
         "targetPort": 8443,
 
         "targetPort": 8443,
         "nodePort": 8443
+
         "nodePort": 30443
 
       }
 
       }
 
     ],
 
     ],
Line 122: Line 122:
 
</pre>
 
</pre>
  
Use the retrieved token to log in to the Kubernetes Dashboard at https://your.cluster.fqdn:8443
+
Use the retrieved token to log in to the Kubernetes Dashboard at https://your.cluster.fqdn:30443
  
  

Revision as of 06:31, 19 September 2024

1 Kubernetes Dashboard via NodePort and Auth Token on K3S

1.1 Description

The goal is to install and expose the Kubernetes Dashboard using NodePort and an authentication token, allowing LAN users to access it without port forwarding.


1.2 Step 1: Upgrade and install necessary packages

dnf -y upgrade
dnf -y install setroubleshoot-server curl lsof wget tar vim git bash-completion

1.3 Step 2: Disable swap

sed -i  '/swap/d' /etc/fstab
swapoff -a

1.4 Step 3: Open necessary firewall ports

firewall-cmd --permanent --add-port=30443/tcp # dashboard
firewall-cmd --permanent --add-port=443/tcp   # ingress controller
firewall-cmd --permanent --add-port=6443/tcp  # API server
firewall-cmd --permanent --zone=trusted --add-source=10.42.0.0/16 # pods
firewall-cmd --permanent --zone=trusted --add-source=10.43.0.0/16 # services
firewall-cmd --reload
reboot

1.5 Step 4: Install k3s

curl -sfL https://get.k3s.io | sh
grep 'kubectl completion bash' $HOME/.bashrc || echo 'source <(kubectl completion bash)' >> $HOME/.bashrc

Check k3s version:

k3s -v
# Expected output:
# k3s version v1.30.4+k3s1 (98262b5d)
# go version go1.22.5

1.6 Step 5: Install Helm

curl https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | sh
helm completion bash > /etc/bash_completion.d/helm
grep KUBECONFIG $HOME/.bashrc || echo 'export KUBECONFIG=/etc/rancher/k3s/k3s.yaml' >> $HOME/.bashrc

Log out and back in to apply changes, then proceed with Helm setup.

1.7 Step 6: Add the Kubernetes Dashboard Helm repo and install the Dashboard

helm repo add kubernetes-dashboard https://kubernetes.github.io/dashboard/
helm upgrade --install kubernetes-dashboard kubernetes-dashboard/kubernetes-dashboard --create-namespace --namespace kubernetes-dashboard

1.8 Step 7: Expose Dashboard via NodePort

kubectl patch service kubernetes-dashboard-kong-proxy -n kubernetes-dashboard --type='merge' -p '{
  "spec": {
    "type": "NodePort",
    "ports": [
      {
        "name": "kong-proxy-tls",
        "port": 443,
        "protocol": "TCP",
        "targetPort": 8443,
        "nodePort": 30443
      }
    ],
    "selector": {
      "app.kubernetes.io/component": "app",
      "app.kubernetes.io/instance": "kubernetes-dashboard",
      "app.kubernetes.io/name": "kong"
    },
    "sessionAffinity": "None"
  },
  "status": {
    "loadBalancer": {}
  }
}'

1.9 Step 8: Create Service Account and RoleBinding for Admin Access

echo 'apiVersion: v1
kind: ServiceAccount
metadata:
  name: admin-user
  namespace: kubernetes-dashboard
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: admin-user
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cluster-admin
subjects:
- kind: ServiceAccount
  name: admin-user
  namespace: kubernetes-dashboard
---
apiVersion: v1
kind: Secret
metadata:
  name: admin-user
  namespace: kubernetes-dashboard
  annotations:
    kubernetes.io/service-account.name: "admin-user"
type: kubernetes.io/service-account-token
' | kubectl apply -f -

1.10 Step 9: Retrieve the Admin User Token

kubectl get secret admin-user -n kubernetes-dashboard -o jsonpath={".data.token"} | base64 -d

Use the retrieved token to log in to the Kubernetes Dashboard at https://your.cluster.fqdn:30443


2 Cleanup

To remove the Kubernetes Dashboard, run the following commands:

helm uninstall kubernetes-dashboard --namespace kubernetes-dashboard
kubectl get all -n kubernetes-dashboard
kubectl delete namespace kubernetes-dashboard
helm repo remove kubernetes-dashboard