Talos
Install
Section titled “Install”choco install talosctlWe generate secrets that must be kept safe.
talosctl gen secretstalosctl gen config <cluster-name> https://<kube.endpoint.ip>:6443 --with-secrets ./secrets.yamlTalos will generate two config files controlplane.yaml and worker.yaml that could be used to setup nodes in cluster.
talosctl -e <entrypoint.node.ip> -n <entrypoint.node.ip>,<other.nodes.ip> apply-config --insecure --file [controlplane|worker].yamlWe still need to bootstrap etcd on only one node so it can be replicated
talosctl -e <entrypoint.node.ip> -n <only.one.node.ip> bootstrap --talosconfig ./talosconfigAnd now let’s get your kubeconfig to get access to our cluster
talosctl -e <entrypoint.node.ip> -n <only.one.node.ip> kubeconfig --talosconfig ./talosconfigTraefik NodePort exposure
Section titled “Traefik NodePort exposure”Add the following key to your controlplane.yaml and your worker.yaml
machine: kubelet: extraArgs: allowed-unsafe-sysctls: net.ipv4.ip_forward