This project will make it very easy to automatically setup a K3s based Kubernetes environment on your local development machine with metrics, certificate manager, ingress controller and dashboard.
It supports native Linux and also a WSL2 based setup. There is no more need to use Docker for Desktop on Windows which makes it ideal for Corporate environments to save of license costs.
The setup was tested for following environments:
- Ubuntu Linux 22.04
- Debian 11
- Ubuntu Linux 22.04 for WSL2 (MS Windows 10 / 11)
- Debian 11 for WSL2 (MS Windows 10 / 11)
- Fedora 38
- Make sure your Linux or WSL2 environment has access to the Internet (directly or via properly configured HTTP/HTTPS proxy)
- Your WSL2 distro must have systemd support enabled
- Make sure you have
sudopermissions - You need to have
curland helm installed in your Linux environment
git clone https://github.com/groundhog2k/k3s-setup.git
cd k3s-setup
./k3s-setup.shInstall the self-signed root certificate that was generated in ./cluster-system/cert-manager/certs/tls.crt into your local browser or computer truststore for root certificates.
When setup is finished and all services are running open https://k8s.dashboad or https://rancher.local in your browser and enjoy Kubernetes.
Important - For Windows only:
Edit the hosts file (typically in C:\Windows\system32\drivers\etc\hosts) and add mapping lines for the hostname k8s.dashboard and rancher.local:
<WSL2 Default Interface IP> k8s.dashboard
<WSL2 Default Interface IP> rancher.local
To configure the correct KUBECONFIG in Linux/WSL2 do:
export KUBECONFIG=~/.kube/k3s.yamlYou can stop the installed k3s with:
k3s-killall.sh...and start it again with:
sudo service k3s startUninstall everything related to k3s with a simple:
k3s-uninstall.shIf you want to uninstall nginx too (WSL2 only):
sudo apt remove nginxFor Linux it will simply install K3s and prepare a few more services like, metrics server, Jetstack certificate manager, Ingress nginx and Kubernetes dashboard.
In WSL2 it will spin up K3s inside the WSL environment, deploy the same services like on the Linux environment and expose the Ingress nginx HTTPS port (443) to the host machine using Nginx as a reverse proxy.
The script k3s-setup.sh builds the bracket around a few other scripts.
It will call the following sub-scripts:
-
k3s/prepare-k3s.shK3s is using the crictl tool and containerd as runtime.
crictlhas a default search order for container runtimes which is not optimal. At first it will copy thecrictl.yamlto/etcto point the default search to containerd.In a second step it downloads and spins up K3s WITHOUT helm controller, treafik and metrics-server to create a really clean K8s environment (similar to vanilla Kubernetes).
-
cluster-system/cluster-setup.shThis sub-script creates a namespace
cluster-system. All following custom cluster-wide components will be deployed to this namespace via helm charts.-
cluster-system/metrics-server/install.shInstalls the Kubernetes metrics-server from the original helm chart.
-
cluster-system/cert-manager/install.shThe script generates a self-signed root certificate (if not already existend in the
certsfolder) and deploys this together with the Jetstack cert-manager. -
cluster-system/ingress-nginx/install.shDeploys the Ingress-nginx service as Kubernetes Ingress Controller.
-
cluster-system/k8s-dashboard/install.shThis scripts deploys the Kubernetes dashboard management UI from the original helm chart.
Together with the Ingress component from previous step the UI should appear for the local URI https://k8s.dashboard
Important:
Install the self-signed root certificate into your local browser or computer truststore for root certificates.
-
-
nginx/prepare-nginxThis script will only be executed when the setup was started in context of WSL2 (Windows). It installs an nginx in WSL2 as Linux daemon and configures it to forward all incoming TCP traffic on Port 443 to the Ingress controller endpoint.
Attention:
Be aware that this will overwrite a possible existing
/etc/nginx.confin your WSL2.