Setup cluster with kubeadm
Disable swap for kubelet to work properly
swapoff -a
Install prerequisites
sudo apt-get update
sudo apt-get install -y apt-transport-https ca-certificates curl
sudo curl -fsSLo /usr/share/keyrings/kubernetes-archive-keyring.gpg https://packages.cloud.google.com/apt/doc/apt-key.gpg
echo "deb [signed-by=/usr/share/keyrings/kubernetes-archive-keyring.gpg] https://apt.kubernetes.io/ kubernetes-xenial main" | sudo tee /etc/apt/sources.list.d/kubernetes.list
sudo apt-get update
sudo apt-get install -y containerd conntrack socat kubelet kubeadm kubectl 
cri-ctl: https://github.com/kubernetes-sigs/cri-tools TODO: nerdctl?
We are going to use Cilium kube-proxy (TODO)
Initialise cluster
sudo kubeadm init 
Set up kubectl
https://kubernetes.io/docs/tasks/tools/
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config && sudo chown $(id -u):$(id -g) $HOME/.kube/config
For remote kubectl copy the config file to local machine
scp veh@192.168.1.12:/home/veh/.kube/config ~/.kube/config
(Optional) Remove taint for single node use
Get taints on nodes
kubectl get nodes -o json | jq '.items[].spec.taints'
Remove taint on master node to allow scheduling of all deployments
kubectl taint nodes --all node-role.kubernetes.io/control-plane-
Install Cilium as Container Network Interface (CNI)
https://docs.cilium.io/en/stable/gettingstarted/k8s-install-default/
Install Cilium CLI
CILIUM_CLI_VERSION=$(curl -s https://raw.githubusercontent.com/cilium/cilium-cli/master/stable.txt)
CLI_ARCH=amd64
if [ "$(uname -m)" = "aarch64" ]; then CLI_ARCH=arm64; fi
curl -L --fail --remote-name-all https://github.com/cilium/cilium-cli/releases/download/${CILIUM_CLI_VERSION}/cilium-linux-${CLI_ARCH}.tar.gz{,.sha256sum}
sha256sum --check cilium-linux-${CLI_ARCH}.tar.gz.sha256sum
sudo tar xzvfC cilium-linux-${CLI_ARCH}.tar.gz /usr/local/bin
rm cilium-linux-${CLI_ARCH}.tar.gz{,.sha256sum}
Install Cilium
cilium install
Validate install
cilium status
(Optional) Replace kube-proxy with Cilium [TODO]
https://docs.cilium.io/en/v1.12/gettingstarted/kubeproxy-free/
NB Cluster should be initialised with
sudo kubeadm init --skip-phases=addon/kube-proxy
MetalLB
For load balancing
https://metallb.universe.tf/installation/
Installation https://raw.githubusercontent.com/metallb/metallb/v0.13.5/config/manifests/metallb-native.yaml
kubectl apply -f metallb/00-manifest.yml
Configure IP-pool and advertise as Level 2 https://metallb.universe.tf/configuration/
kubectl apply -f metallb/02-configuration
Traefik
Traefik IngressRoute Custom Resource Definition (CRD)
https://doc.traefik.io/traefik/v2.8/routing/providers/kubernetes-crd/ https://doc.traefik.io/traefik/v2.8/user-guides/crd-acme/
Create Custom Resource Definitions for Traefik
kubectl apply -f traefik/00-crd-definition.yml
kubectl apply -f traefik/01-crd-rbac.yml
Service
Create service for exposing Traefik deployment
kubectl apply -f traefik/02-service.yml
Deployment
Create deployment for Traefik
kubectl apply -f traefik/03-deployment.yml
Port forward Traefik
Port forward Traefik ports from 8000 to 80 for http and 4443 to 443 for https.
IP can be found with kubectl get svc.
Test-application
Create a test-application with
kubectl apply -f whoami/00-whoami.yml
whoami should now be available using https at https://test.ratatoskr.myddns.rocks/tls
and using http at http://test.ratatoskr.myddns.rocks/notls.
Cleanup
kubectl drain ratatoskr --delete-emptydir-data --force --ignore-daemonsets
sudo kubeadm reset
sudo iptables -F && sudo iptables -t nat -F && sudo iptables -t mangle -F && sudo iptables -X
sudo ipvsadm -C
TODO
Deploy using Terraform
https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/guides/getting-started
terraform plan 
terraform apply
