Compare commits
6 commits
Author | SHA1 | Date | |
---|---|---|---|
2e3bcfac2d | |||
fd31ce7eed | |||
f22d7423e8 | |||
3bcf42e94a | |||
83a3d12dbd | |||
4c65ddfb9e |
5 changed files with 126 additions and 0 deletions
18
README_GO.md
18
README_GO.md
|
@ -8,3 +8,21 @@ export HAPROXY_TEMPLATE="./haproxy.tmpl"
|
|||
|
||||
./haproxy-generator > /etc/haproxy/haproxy.cfg && sudo systemctl restart haproxy
|
||||
```
|
||||
|
||||
# HaProxy Template
|
||||
|
||||
```
|
||||
{{- range .backends }}
|
||||
|
||||
backend {{ .Name }}
|
||||
mode tcp
|
||||
balance leastconn
|
||||
cookie {{ .Name }} insert indirect nocache
|
||||
|
||||
{{- range .Servers }}
|
||||
server {{ .Name }} {{ .Address }}:{{ .Port }} check cookie {{ .Cookie }}
|
||||
{{- end }}
|
||||
|
||||
{{- end }}
|
||||
|
||||
```
|
30
generate_kubeconfig.sh
Normal file
30
generate_kubeconfig.sh
Normal file
|
@ -0,0 +1,30 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Erstellt ein Token
|
||||
TOKEN=$(kubectl -n kube-system create token haproxy-sa)
|
||||
|
||||
# Get Cluster Info
|
||||
CLUSTER_NAME=$(kubectl config view -o jsonpath='{.clusters[0].name}')
|
||||
CLUSTER_SERVER=$(kubectl config view -o jsonpath="{.clusters[0].cluster.server}")
|
||||
CA_DATA=$(kubectl config view --raw -o jsonpath="{.clusters[0].cluster.certificate-authority-data}")
|
||||
|
||||
# Erstelle kubeconfig
|
||||
cat <<EOF > haproxy-kubeconfig.yaml
|
||||
apiVersion: v1
|
||||
kind: Config
|
||||
clusters:
|
||||
- cluster:
|
||||
certificate-authority-data: ${CA_DATA}
|
||||
server: ${CLUSTER_SERVER}
|
||||
name: ${CLUSTER_NAME}
|
||||
contexts:
|
||||
- context:
|
||||
cluster: ${CLUSTER_NAME}
|
||||
user: haproxy-sa
|
||||
name: haproxy-context
|
||||
current-context: haproxy-context
|
||||
users:
|
||||
- name: haproxy-sa
|
||||
user:
|
||||
token: ${TOKEN}
|
||||
EOF
|
42
go_cron_bash.sh
Normal file
42
go_cron_bash.sh
Normal file
|
@ -0,0 +1,42 @@
|
|||
#!/bin/bash
|
||||
|
||||
set -euo pipefail
|
||||
|
||||
BIN_PATH="/usr/local/bin/haproxy_generator"
|
||||
CONFIG_PATH="/etc/haproxy/haproxy.cfg"
|
||||
NEW_CONFIG="${CONFIG_PATH}.new"
|
||||
TEMPLATE_PATH="/etc/haproxy/haproxy.tmpl"
|
||||
|
||||
# Setze notwendige Umgebungsvariablen
|
||||
export HAPROXY_TEMPLATE="$TEMPLATE_PATH"
|
||||
export KUBERNETES_HOST="https://10.0.20.7:6443"
|
||||
export KUBERNETES_TOKEN="eyJhbGciOi..." # <<< hier echten Token einfügen
|
||||
export KUBERNETES_VERIFYSSL="false"
|
||||
|
||||
# Prüfe, ob Template vorhanden ist
|
||||
if [ ! -f "$TEMPLATE_PATH" ]; then
|
||||
echo "[ERROR] Template-Datei nicht gefunden: $TEMPLATE_PATH" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Neue Konfiguration generieren
|
||||
if ! "$BIN_PATH" > "$NEW_CONFIG"; then
|
||||
echo "[ERROR] Fehler beim Ausführen von haproxy_generator" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Syntaxprüfung der neuen Konfiguration
|
||||
if ! /sbin/haproxy -f "$NEW_CONFIG" -c; then
|
||||
echo "[ERROR] Neue Konfiguration ist syntaktisch ungültig (haproxy -c)" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Unterschiede prüfen und ggf. übernehmen
|
||||
if ! diff -q "$CONFIG_PATH" "$NEW_CONFIG" > /dev/null; then
|
||||
echo "[INFO] Änderungen erkannt - Konfiguration wird übernommen"
|
||||
mv "$NEW_CONFIG" "$CONFIG_PATH"
|
||||
/usr/sbin/service haproxy reload
|
||||
else
|
||||
echo "[INFO] Keine Änderungen - kein Reload notwendig"
|
||||
rm -f "$NEW_CONFIG"
|
||||
fi
|
9
haproxy-ingress-configmap.yaml
Normal file
9
haproxy-ingress-configmap.yaml
Normal file
|
@ -0,0 +1,9 @@
|
|||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: haproxy-config
|
||||
namespace: kube-system
|
||||
data:
|
||||
ssl-redirect: "true"
|
||||
timeout-http-request: "5s"
|
||||
use-forwarded-headers: "true"
|
27
haproxy-ingress-rbac.yaml
Normal file
27
haproxy-ingress-rbac.yaml
Normal file
|
@ -0,0 +1,27 @@
|
|||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: gateway
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: gateway
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["endpoints", "services", "namespaces", "nodes"]
|
||||
verbs: ["get", "list", "watch"]
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: gateway
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: gateway
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: gateway
|
||||
namespace: kube-system
|
Loading…
Add table
Reference in a new issue