mirror of
https://github.com/optim-enterprises-bv/terraform-talos.git
synced 2025-10-29 17:42:47 +00:00
196 lines
5.2 KiB
YAML
196 lines
5.2 KiB
YAML
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["events", "endpoints"]
|
|
verbs: ["create", "patch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods/eviction"]
|
|
verbs: ["create"]
|
|
- apiGroups: [""]
|
|
resources: ["pods/status"]
|
|
verbs: ["update"]
|
|
- apiGroups: [""]
|
|
resources: ["endpoints"]
|
|
resourceNames: ["cluster-autoscaler"]
|
|
verbs: ["get", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["nodes"]
|
|
verbs: ["watch", "list", "get", "update"]
|
|
- apiGroups: [""]
|
|
resources:
|
|
- "namespaces"
|
|
- "pods"
|
|
- "services"
|
|
- "replicationcontrollers"
|
|
- "persistentvolumeclaims"
|
|
- "persistentvolumes"
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["extensions"]
|
|
resources: ["replicasets", "daemonsets"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["policy"]
|
|
resources: ["poddisruptionbudgets"]
|
|
verbs: ["watch", "list"]
|
|
- apiGroups: ["apps"]
|
|
resources: ["statefulsets", "replicasets", "daemonsets"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["storage.k8s.io"]
|
|
resources: ["storageclasses", "csinodes", "csistoragecapacities", "csidrivers"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["batch", "extensions"]
|
|
resources: ["jobs"]
|
|
verbs: ["get", "list", "watch", "patch"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resourceNames: ["cluster-autoscaler"]
|
|
resources: ["leases"]
|
|
verbs: ["get", "update"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
verbs: ["create","list","watch"]
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
resourceNames: ["cluster-autoscaler-status", "cluster-autoscaler-priority-expander"]
|
|
verbs: ["delete", "get", "update", "watch"]
|
|
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cluster-autoscaler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: cluster-autoscaler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
app: cluster-autoscaler
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app: cluster-autoscaler
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cluster-autoscaler
|
|
annotations:
|
|
prometheus.io/scrape: 'true'
|
|
prometheus.io/port: '8085'
|
|
spec:
|
|
serviceAccountName: cluster-autoscaler
|
|
nodeSelector:
|
|
node-role.kubernetes.io/control-plane: ""
|
|
tolerations:
|
|
- key: node-role.kubernetes.io/control-plane
|
|
effect: NoSchedule
|
|
containers:
|
|
- name: cluster-autoscaler
|
|
# image: k8s.gcr.io/autoscaling/cluster-autoscaler:v1.23.1
|
|
image: ghcr.io/sergelogvinov/cluster-autoscaler-amd64:dev
|
|
name: cluster-autoscaler
|
|
resources:
|
|
limits:
|
|
cpu: 100m
|
|
memory: 300Mi
|
|
requests:
|
|
cpu: 100m
|
|
memory: 300Mi
|
|
command:
|
|
- ./cluster-autoscaler
|
|
- --cloud-provider=hetzner
|
|
- --stderrthreshold=info
|
|
- --node-deletion-delay-timeout=10m0s
|
|
- --scan-interval=3m
|
|
- --regional
|
|
- --balance-similar-node-groups
|
|
- --nodes=0:2:CPX31:NBG1:worker-nbg1
|
|
- --nodes=0:2:CPX31:FSN1:worker-fsn1
|
|
- --nodes=0:2:CPX31:HEL1:worker-hel1
|
|
- --v=1
|
|
env:
|
|
- name: HCLOUD_TOKEN
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: hcloud
|
|
key: token
|
|
- name: HCLOUD_NETWORK
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: hcloud
|
|
key: network
|
|
- name: HCLOUD_IMAGE
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: hcloud-init
|
|
key: image
|
|
- name: HCLOUD_CLOUD_INIT
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: hcloud-init
|
|
key: worker
|
|
- name: HCLOUD_SSH_KEY
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: hcloud-init
|
|
key: ssh-key
|