Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 1 | // k0.hswaw.net kubernetes cluster |
| 2 | // This defines the cluster as a single object. |
| 3 | // Use the sibling k0*.jsonnet 'view' files to actually apply the configuration. |
| 4 | |
| 5 | local kube = import "../../kube/kube.libsonnet"; |
| 6 | local policies = import "../../kube/policies.libsonnet"; |
| 7 | |
| 8 | local cluster = import "cluster.libsonnet"; |
| 9 | |
| 10 | local cockroachdb = import "lib/cockroachdb.libsonnet"; |
| 11 | local registry = import "lib/registry.libsonnet"; |
| 12 | local rook = import "lib/rook.libsonnet"; |
| 13 | |
| 14 | { |
| 15 | k0: { |
| 16 | local k0 = self, |
| 17 | cluster: cluster.Cluster("k0", "hswaw.net") { |
| 18 | cfg+: { |
Serge Bazanski | 3d29484 | 2020-08-04 01:34:07 +0200 | [diff] [blame] | 19 | storageClassNameParanoid: k0.ceph.waw3Pools.blockRedundant.name, |
Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 20 | }, |
| 21 | metallb+: { |
| 22 | cfg+: { |
| 23 | peers: [ |
| 24 | { |
| 25 | "peer-address": "185.236.240.33", |
| 26 | "peer-asn": 65001, |
| 27 | "my-asn": 65002, |
| 28 | }, |
| 29 | ], |
| 30 | addressPools: [ |
| 31 | { |
| 32 | name: "public-v4-1", |
| 33 | protocol: "bgp", |
| 34 | addresses: [ |
| 35 | "185.236.240.48/28", |
| 36 | ], |
| 37 | }, |
| 38 | { |
| 39 | name: "public-v4-2", |
| 40 | protocol: "bgp", |
| 41 | addresses: [ |
| 42 | "185.236.240.112/28" |
| 43 | ], |
| 44 | }, |
| 45 | ], |
| 46 | }, |
| 47 | }, |
| 48 | }, |
| 49 | |
| 50 | // Docker registry |
| 51 | registry: registry.Environment { |
| 52 | cfg+: { |
| 53 | domain: "registry.%s" % [k0.cluster.fqdn], |
| 54 | storageClassName: k0.cluster.cfg.storageClassNameParanoid, |
Serge Bazanski | 3d29484 | 2020-08-04 01:34:07 +0200 | [diff] [blame] | 55 | objectStorageName: "waw-hdd-redundant-3-object", |
Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 56 | }, |
| 57 | }, |
| 58 | |
| 59 | // CockroachDB, running on bc01n{01,02,03}. |
| 60 | cockroach: { |
| 61 | waw2: cockroachdb.Cluster("crdb-waw1") { |
| 62 | cfg+: { |
| 63 | topology: [ |
| 64 | { name: "bc01n01", node: "bc01n01.hswaw.net" }, |
| 65 | { name: "bc01n02", node: "bc01n02.hswaw.net" }, |
| 66 | { name: "bc01n03", node: "bc01n03.hswaw.net" }, |
| 67 | ], |
| 68 | // Host path on SSD. |
| 69 | hostPath: "/var/db/crdb-waw1", |
Serge Bazanski | 509ab6e | 2020-07-30 22:43:20 +0200 | [diff] [blame] | 70 | extraDNS: [ |
| 71 | "crdb-waw1.hswaw.net", |
| 72 | ], |
Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 73 | }, |
| 74 | }, |
| 75 | clients: { |
| 76 | cccampix: k0.cockroach.waw2.Client("cccampix"), |
| 77 | cccampixDev: k0.cockroach.waw2.Client("cccampix-dev"), |
| 78 | buglessDev: k0.cockroach.waw2.Client("bugless-dev"), |
| 79 | sso: k0.cockroach.waw2.Client("sso"), |
Serge Bazanski | 509ab6e | 2020-07-30 22:43:20 +0200 | [diff] [blame] | 80 | herpDev: k0.cockroach.waw2.Client("herp-dev"), |
Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 81 | }, |
| 82 | }, |
| 83 | |
| 84 | ceph: { |
| 85 | // waw1 cluster - dead as of 2019/08/06, data corruption |
| 86 | // waw2 cluster: shitty 7200RPM 2.5" HDDs |
| 87 | waw2: rook.Cluster(k0.cluster.rook, "ceph-waw2") { |
| 88 | spec: { |
| 89 | mon: { |
| 90 | count: 3, |
| 91 | allowMultiplePerNode: false, |
| 92 | }, |
| 93 | storage: { |
| 94 | useAllNodes: false, |
| 95 | useAllDevices: false, |
| 96 | config: { |
| 97 | databaseSizeMB: "1024", |
| 98 | journalSizeMB: "1024", |
| 99 | }, |
| 100 | nodes: [ |
| 101 | { |
| 102 | name: "bc01n01.hswaw.net", |
| 103 | location: "rack=dcr01 chassis=bc01 host=bc01n01", |
| 104 | devices: [ { name: "sda" } ], |
| 105 | }, |
| 106 | { |
| 107 | name: "bc01n02.hswaw.net", |
| 108 | location: "rack=dcr01 chassis=bc01 host=bc01n02", |
| 109 | devices: [ { name: "sda" } ], |
| 110 | }, |
| 111 | { |
| 112 | name: "bc01n03.hswaw.net", |
| 113 | location: "rack=dcr01 chassis=bc01 host=bc01n03", |
| 114 | devices: [ { name: "sda" } ], |
| 115 | }, |
| 116 | ], |
| 117 | }, |
| 118 | benji:: { |
| 119 | metadataStorageClass: "waw-hdd-paranoid-2", |
| 120 | encryptionPassword: std.split((importstr "../secrets/plain/k0-benji-encryption-password"), '\n')[0], |
| 121 | pools: [ |
| 122 | "waw-hdd-redundant-2", |
| 123 | "waw-hdd-redundant-2-metadata", |
| 124 | "waw-hdd-paranoid-2", |
| 125 | "waw-hdd-yolo-2", |
| 126 | ], |
| 127 | s3Configuration: { |
| 128 | awsAccessKeyId: "RPYZIROFXNLQVU2WJ4R3", |
| 129 | awsSecretAccessKey: std.split((importstr "../secrets/plain/k0-benji-secret-access-key"), '\n')[0], |
| 130 | bucketName: "benji-k0-backups", |
| 131 | endpointUrl: "https://s3.eu-central-1.wasabisys.com/", |
| 132 | }, |
| 133 | } |
| 134 | }, |
| 135 | }, |
| 136 | waw2Pools: { |
| 137 | // redundant block storage |
| 138 | blockRedundant: rook.ECBlockPool(k0.ceph.waw2, "waw-hdd-redundant-2") { |
| 139 | spec: { |
| 140 | failureDomain: "host", |
| 141 | erasureCoded: { |
| 142 | dataChunks: 2, |
| 143 | codingChunks: 1, |
| 144 | }, |
| 145 | }, |
| 146 | }, |
| 147 | // paranoid block storage (3 replicas) |
| 148 | blockParanoid: rook.ReplicatedBlockPool(k0.ceph.waw2, "waw-hdd-paranoid-2") { |
| 149 | spec: { |
| 150 | failureDomain: "host", |
| 151 | replicated: { |
| 152 | size: 3, |
| 153 | }, |
| 154 | }, |
| 155 | }, |
| 156 | // yolo block storage (no replicas!) |
| 157 | blockYolo: rook.ReplicatedBlockPool(k0.ceph.waw2, "waw-hdd-yolo-2") { |
| 158 | spec: { |
| 159 | failureDomain: "host", |
| 160 | replicated: { |
| 161 | size: 1, |
| 162 | }, |
| 163 | }, |
| 164 | }, |
| 165 | objectRedundant: rook.S3ObjectStore(k0.ceph.waw2, "waw-hdd-redundant-2-object") { |
| 166 | spec: { |
| 167 | metadataPool: { |
| 168 | failureDomain: "host", |
| 169 | replicated: { size: 3 }, |
| 170 | }, |
| 171 | dataPool: { |
| 172 | failureDomain: "host", |
| 173 | erasureCoded: { |
| 174 | dataChunks: 2, |
| 175 | codingChunks: 1, |
| 176 | }, |
| 177 | }, |
| 178 | }, |
| 179 | }, |
| 180 | }, |
| 181 | |
| 182 | // waw3: 6TB SAS 3.5" HDDs |
| 183 | waw3: rook.Cluster(k0.cluster.rook, "ceph-waw3") { |
| 184 | spec: { |
| 185 | mon: { |
| 186 | count: 3, |
| 187 | allowMultiplePerNode: false, |
| 188 | }, |
| 189 | storage: { |
| 190 | useAllNodes: false, |
| 191 | useAllDevices: false, |
| 192 | config: { |
| 193 | databaseSizeMB: "1024", |
| 194 | journalSizeMB: "1024", |
| 195 | }, |
| 196 | nodes: [ |
| 197 | { |
| 198 | name: "dcr01s22.hswaw.net", |
| 199 | location: "rack=dcr01 host=dcr01s22", |
| 200 | devices: [ |
| 201 | // https://github.com/rook/rook/issues/1228 |
| 202 | //{ name: "disk/by-id/wwan-0x" + wwan } |
| 203 | //for wwan in [ |
| 204 | // "5000c5008508c433", |
| 205 | // "5000c500850989cf", |
| 206 | // "5000c5008508f843", |
| 207 | // "5000c5008508baf7", |
| 208 | //] |
| 209 | { name: "sdn" }, |
| 210 | { name: "sda" }, |
| 211 | { name: "sdb" }, |
| 212 | { name: "sdc" }, |
| 213 | ], |
| 214 | }, |
| 215 | { |
| 216 | name: "dcr01s24.hswaw.net", |
| 217 | location: "rack=dcr01 host=dcr01s22", |
| 218 | devices: [ |
| 219 | // https://github.com/rook/rook/issues/1228 |
| 220 | //{ name: "disk/by-id/wwan-0x" + wwan } |
| 221 | //for wwan in [ |
| 222 | // "5000c5008508ee03", |
| 223 | // "5000c5008508c9ef", |
| 224 | // "5000c5008508df33", |
| 225 | // "5000c5008508dd3b", |
| 226 | //] |
| 227 | { name: "sdm" }, |
| 228 | { name: "sda" }, |
| 229 | { name: "sdb" }, |
| 230 | { name: "sdc" }, |
| 231 | ], |
| 232 | }, |
| 233 | ], |
| 234 | }, |
| 235 | benji:: { |
| 236 | metadataStorageClass: "waw-hdd-redundant-3", |
| 237 | encryptionPassword: std.split((importstr "../secrets/plain/k0-benji-encryption-password"), '\n')[0], |
| 238 | pools: [ |
| 239 | "waw-hdd-redundant-3", |
| 240 | "waw-hdd-redundant-3-metadata", |
| 241 | "waw-hdd-yolo-3", |
| 242 | ], |
| 243 | s3Configuration: { |
| 244 | awsAccessKeyId: "RPYZIROFXNLQVU2WJ4R3", |
| 245 | awsSecretAccessKey: std.split((importstr "../secrets/plain/k0-benji-secret-access-key"), '\n')[0], |
| 246 | bucketName: "benji-k0-backups-waw3", |
| 247 | endpointUrl: "https://s3.eu-central-1.wasabisys.com/", |
| 248 | }, |
| 249 | } |
| 250 | }, |
| 251 | }, |
| 252 | waw3Pools: { |
| 253 | // redundant block storage |
| 254 | blockRedundant: rook.ECBlockPool(k0.ceph.waw3, "waw-hdd-redundant-3") { |
| 255 | metadataReplicas: 2, |
| 256 | spec: { |
| 257 | failureDomain: "host", |
| 258 | replicated: { |
| 259 | size: 2, |
| 260 | }, |
| 261 | }, |
| 262 | }, |
| 263 | // yolo block storage (low usage, no host redundancy) |
| 264 | blockYolo: rook.ReplicatedBlockPool(k0.ceph.waw3, "waw-hdd-yolo-3") { |
| 265 | spec: { |
| 266 | failureDomain: "osd", |
| 267 | erasureCoded: { |
| 268 | dataChunks: 12, |
| 269 | codingChunks: 4, |
| 270 | }, |
| 271 | }, |
| 272 | }, |
| 273 | objectRedundant: rook.S3ObjectStore(k0.ceph.waw3, "waw-hdd-redundant-3-object") { |
| 274 | spec: { |
| 275 | metadataPool: { |
| 276 | failureDomain: "host", |
| 277 | replicated: { size: 2 }, |
| 278 | }, |
| 279 | dataPool: { |
| 280 | failureDomain: "host", |
| 281 | replicated: { size: 2 }, |
| 282 | }, |
| 283 | }, |
| 284 | }, |
| 285 | }, |
| 286 | |
| 287 | // Clients for S3/radosgw storage. |
| 288 | clients: { |
| 289 | # Used for owncloud.hackerspace.pl, which for now lives on boston-packets.hackerspace.pl. |
| 290 | nextcloudWaw3: kube.CephObjectStoreUser("nextcloud") { |
| 291 | metadata+: { |
| 292 | namespace: "ceph-waw3", |
| 293 | }, |
| 294 | spec: { |
| 295 | store: "waw-hdd-redundant-3-object", |
| 296 | displayName: "nextcloud", |
| 297 | }, |
| 298 | }, |
| 299 | |
| 300 | # nuke@hackerspace.pl's personal storage. |
| 301 | nukePersonalWaw3: kube.CephObjectStoreUser("nuke-personal") { |
| 302 | metadata+: { |
| 303 | namespace: "ceph-waw3", |
| 304 | }, |
| 305 | spec: { |
| 306 | store: "waw-hdd-redundant-3-object", |
| 307 | displayName: "nuke-personal", |
| 308 | }, |
| 309 | }, |
| 310 | |
| 311 | # patryk@hackerspace.pl's ArmA3 mod bucket. |
| 312 | cz2ArmaModsWaw3: kube.CephObjectStoreUser("cz2-arma3mods") { |
| 313 | metadata+: { |
| 314 | namespace: "ceph-waw3", |
| 315 | }, |
| 316 | spec: { |
| 317 | store: "waw-hdd-redundant-3-object", |
| 318 | displayName: "cz2-arma3mods", |
| 319 | }, |
| 320 | }, |
Bartosz Stebel | d9df587 | 2020-06-13 21:19:40 +0200 | [diff] [blame] | 321 | # Buckets for spark pipelines |
| 322 | # TODO(implr): consider a second yolo-backed one for temp data |
| 323 | implrSparkWaw3: kube.CephObjectStoreUser("implr-spark") { |
| 324 | metadata+: { |
| 325 | namespace: "ceph-waw3", |
| 326 | }, |
| 327 | spec: { |
| 328 | store: "waw-hdd-redundant-3-object", |
| 329 | displayName: "implr-spark", |
| 330 | }, |
| 331 | }, |
Sergiusz Bazanski | b1aadd8 | 2020-06-24 19:06:17 +0200 | [diff] [blame] | 332 | # q3k's personal user |
| 333 | q3kWaw3: kube.CephObjectStoreUser("q3k") { |
| 334 | metadata+: { |
| 335 | namespace: "ceph-waw3", |
| 336 | }, |
| 337 | spec: { |
| 338 | store: "waw-hdd-redundant-3-object", |
| 339 | displayName: "q3k", |
| 340 | }, |
| 341 | }, |
Sergiusz Bazanski | dbfa988 | 2020-06-06 01:21:45 +0200 | [diff] [blame] | 342 | }, |
| 343 | }, |
| 344 | |
| 345 | |
| 346 | # These are policies allowing for Insecure pods in some namespaces. |
| 347 | # A lot of them are spurious and come from the fact that we deployed |
| 348 | # these namespaces before we deployed the draconian PodSecurityPolicy |
| 349 | # we have now. This should be fixed by setting up some more granular |
| 350 | # policies, or fixing the workloads to not need some of the permission |
| 351 | # bits they use, whatever those might be. |
| 352 | # TODO(q3k): fix this? |
| 353 | unnecessarilyInsecureNamespaces: [ |
| 354 | policies.AllowNamespaceInsecure("ceph-waw2"), |
| 355 | policies.AllowNamespaceInsecure("ceph-waw3"), |
| 356 | policies.AllowNamespaceInsecure("matrix"), |
| 357 | policies.AllowNamespaceInsecure("registry"), |
| 358 | policies.AllowNamespaceInsecure("internet"), |
| 359 | # TODO(implr): restricted policy with CAP_NET_ADMIN and tuntap, but no full root |
| 360 | policies.AllowNamespaceInsecure("implr-vpn"), |
| 361 | ], |
| 362 | }, |
| 363 | } |