summaryrefslogtreecommitdiff
path: root/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md
diff options
context:
space:
mode:
authorPaul Buetow <paul@buetow.org>2025-01-29 08:03:14 +0200
committerPaul Buetow <paul@buetow.org>2025-01-29 08:03:14 +0200
commit1798a57ca2e813b5523107576b57ee1d7f00699e (patch)
tree5b812baa8c665621f442d779c1a083997a3bb4d1 /gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md
parentad5aa880195a3efcd031d276009c630e02e2aff4 (diff)
Update content for md
Diffstat (limited to 'gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md')
-rw-r--r--gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md10
1 files changed, 6 insertions, 4 deletions
diff --git a/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md b/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md
index 568813dd..25cdc7c4 100644
--- a/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md
+++ b/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.md
@@ -10,6 +10,7 @@ These are all the posts so far:
[2024-11-17 f3s: Kubernetes with FreeBSD - Part 1: Setting the stage (You are currently reading this)](./2024-11-17-f3s-kubernetes-with-freebsd-part-1.md)
[2024-12-03 f3s: Kubernetes with FreeBSD - Part 2: Hardware and base installation](./2024-12-03-f3s-kubernetes-with-freebsd-part-2.md)
+[f3s-kubernetes-with f3s: Kubernetes with FreeBSD - Rocky Linux Bhyve VMs - Part 4](./f3s-kubernetes-with-freebsd-part-4.md)
[![f3s logo](./f3s-kubernetes-with-freebsd-part-1/f3slogo.png "f3s logo")](./f3s-kubernetes-with-freebsd-part-1/f3slogo.png)
@@ -38,7 +39,7 @@ Let's begin...
My previous setup was great for learning Terraform and AWS, but it is too expensive. Costs are under control there, but only because I am shutting down all containers after use (so they are offline ninety percent of the time and still cost around $20 monthly). With the new setup, I could run all containers 24/7 at home, which would still be cheaper in terms of electricity consumption. I have a 50 MBit/s uplink (I could have more if I wanted, but it is plenty for my use case already).
-[From `babylon5.buetow.org` to `.cloud`](https://foo.zone/gemfeed/2024-02-04-from-babylon5.buetow.org-to-.cloud.html)
+[From `babylon5.buetow.org` to `.cloud`](./2024-02-04-from-babylon5.buetow.org-to-.cloud.html)
Migrating off all my containers from AWS ECS means I need a reliable and scalable environment to host my workloads. I wanted something:
@@ -96,8 +97,8 @@ All of this (every Linux VM to every OpenBSD box) will be connected via WireGuar
So, when I want to access a service running in k3s, I will hit an external DNS endpoint (with the authoritative DNS servers being the OpenBSD boxes). The DNS will resolve to the master OpenBSD VM (see my KISS highly-available with OpenBSD blog post), and from there, the `relayd` process (with a Let's Encrypt certificate—see my Let's Encrypt with OpenBSD and Rex blog post) will accept the TCP connection and forward it through the WireGuard tunnel to a reachable node port of one of the k3s nodes, thus serving the traffic.
-[KISS high-availability with OpenBSD](https://foo.zone/gemfeed/2024-04-01-KISS-high-availability-with-OpenBSD.html)
-[Let's Encrypt with OpenBSD and Rex](https://foo.zone/gemfeed/2022-07-30-lets-encrypt-with-openbsd-and-rex.html)
+[KISS high-availability with OpenBSD](./2024-04-01-KISS-high-availability-with-OpenBSD.html)
+[Let's Encrypt with OpenBSD and Rex](./2022-07-30-lets-encrypt-with-openbsd-and-rex.html)
The OpenBSD setup described here already exists and is ready to use. The only thing that does not yet exist is the configuration of `relayd` to forward requests to k3s through the WireGuard tunnel(s).
@@ -137,7 +138,7 @@ For visualization, Grafana will be deployed alongside Prometheus. Grafana lets m
Alerts generated by Prometheus are forwarded to Alertmanager, which I will configure to work with Gogios, a lightweight monitoring and alerting system I wrote myself. Gogios runs on one of my OpenBSD VMs. At regular intervals, Gogios scrapes the alerts generated in the k3s cluster and notifies me via Email.
-[KISS server monitoring with Gogios](https://foo.zone/gemfeed/2023-06-01-kiss-server-monitoring-with-gogios.html)
+[KISS server monitoring with Gogios](./2023-06-01-kiss-server-monitoring-with-gogios.html)
Ironically, I implemented Gogios to avoid using more complex alerting systems like Prometheus, but here we go—it integrates well now.
@@ -165,6 +166,7 @@ Other *BSD-related posts:
[2024-04-01 KISS high-availability with OpenBSD](./2024-04-01-KISS-high-availability-with-OpenBSD.md)
[2024-11-17 f3s: Kubernetes with FreeBSD - Part 1: Setting the stage (You are currently reading this)](./2024-11-17-f3s-kubernetes-with-freebsd-part-1.md)
[2024-12-03 f3s: Kubernetes with FreeBSD - Part 2: Hardware and base installation](./2024-12-03-f3s-kubernetes-with-freebsd-part-2.md)
+[f3s-kubernetes-with f3s: Kubernetes with FreeBSD - Rocky Linux Bhyve VMs - Part 4](./f3s-kubernetes-with-freebsd-part-4.md)
E-Mail your comments to `paul@nospam.buetow.org` :-)