# GitOps for tbrnt Zurrli ## Repo structure * Each subdirectory is a namespace * `_apps` is the meta directory for Argo CD apps ## Secrets Secrets are encrypted using [SOPS](https://github.com/mozilla/sops) and [age](https://github.com/FiloSottile/age). Argo CD uses [KSOPS](https://github.com/viaduct-ai/kustomize-sops) and [kustomize](https://github.com/kubernetes-sigs/kustomize/). Install `sops` and `age` packages on Arch Linux. Public key: `age1dfk8euu7afvw7ge5l2qek45z23hdq5anjd56cy4d7kcsf0e0e5pqfjylx8` The installation and configuration happens in a kustomize patch in `argocd/`. A good helper to work with SOPS encrypted secrets is [vscode-sops](https://github.com/signageos/vscode-sops). The `age` key needs to be stored at `$HOME/.config/sops/age/keys.txt` ### Usage Create a normal secret with a `.sops.yaml` file ending. Encrypt it with: ``` sops --encrypt --in-place secret.sops.yaml ``` Create a kustomize configuration to generate the secret: secret-generator.yaml ```yaml apiVersion: viaduct.ai/v1 kind: ksops metadata: name: secret-generator files: - ./secret.sops.yaml ``` kustomization.yaml ```yaml generators: - ./secret-generator.yaml ``` ## Argo CD Either `sudo -E kubefwd svc -n argocd` and then https://argocd-server/ or `kubectl port-forward svc/argocd-server -n argocd 8080:443` and then https://localhost:8080/ ## Maintenance * K3s is kept up-to-date using [System Upgrade Controller (SUC)](https://github.com/rancher/system-upgrade-controller). See `system/system-upgrade-controller/plan.yaml`. * The OS is kept up-to-date using unattended upgrades and [kured](https://github.com/kubereboot/kured). See `system/kube-system/unattended-upgrades.yaml`. ## Backup ### Kubernetes native - K8up K8up has a global configuration in `system/apps/k8up.yaml`. To access the storage destination which is only available in the tailnet, a Jspolicy policy injects Tailscale into the backup Pods. See `system/k8up`. ### Host level There is a full filesystem backup done on the host using BorgMatic. See `/etc/borgmatic/config.yaml` for the configuration. ## Bootstrap GitOps ``` kubectl create ns argocd kubectl -n argocd create secret generic sops-age --from-file=$HOME/.config/sops/age/keys.txt kubectl -n argocd apply -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml kubectl -n argocd get pods -l app.kubernetes.io/name=argocd-server -o name | cut -d'/' -f 2 kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo argocd login argocd-server kubectl apply -f system/apps/appprojects.yaml kubectl apply -f system/apps/_root.yaml ``` ## Bootstrap K3s Using [k3sup](https://github.com/alexellis/k3sup). ``` k3sup install \ --host zurrli.tbrnt.ch \ --tls-san zurrli.tbrnt.ch \ --k3s-extra-args '\ --flannel-backend=none \ --disable-network-policy \ --cluster-cidr=10.42.0.0/16,2001:cafe:42:0::/56 \ --service-cidr=10.43.0.0/16,2001:cafe:42:1::/112' ``` Then install Cilium: https://docs.cilium.io/en/v1.12/gettingstarted/k3s/ ``` cilium install --helm-set ipv6.enabled=true cilium status ```