Skip to content
This repository was archived by the owner on Nov 18, 2024. It is now read-only.

Commit ed8dbb1

Browse files
authored
Merge pull request #44 from openfun/small_repo_adjustments
Improve README
2 parents 6966e08 + 1f40e9b commit ed8dbb1

File tree

1 file changed

+25
-7
lines changed

1 file changed

+25
-7
lines changed

README.md

Lines changed: 25 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,29 @@
1-
# SharedKube
1+
# Kubic - Kubernetes Infrastructure as Code
22

3-
## Overview
3+
[![Kubernetes](https://img.shields.io/static/v1?style=for-the-badge&message=Kubernetes&color=326CE5&logo=Kubernetes&logoColor=FFFFFF&label=)](https://kubernetes.io)
4+
[![NGINX](https://img.shields.io/static/v1?style=for-the-badge&message=NGINX&color=009639&logo=NGINX&logoColor=FFFFFF&label=)](https://kubernetes.github.io/ingress-nginx/)
5+
[![ArgoCD](https://img.shields.io/static/v1?style=for-the-badge&message=ArgoCD&color=EF7B4D&logo=Argo&logoColor=FFFFFF&label=)](https://argo-cd.readthedocs.io)
6+
[![Vault](https://img.shields.io/static/v1?style=for-the-badge&message=Vault&color=000000&logo=Vault&logoColor=FFFFFF&label=)](https://www.vaultproject.io)
7+
[![Terraform](https://img.shields.io/static/v1?style=for-the-badge&message=Terraform&color=7B42BC&logo=Terraform&logoColor=FFFFFF&label=)](https://www.terraform.io)
8+
9+
Available on:
10+
11+
[![Scaleway](https://img.shields.io/static/v1?style=for-the-badge&message=Scaleway&color=4F0599&logo=Scaleway&logoColor=FFFFFF&label=)](https://www.scaleway.com)
12+
[![OVH](https://img.shields.io/static/v1?style=for-the-badge&message=OVH&color=123F6D&logo=OVH&logoColor=FFFFFF&label=)](https://www.ovh.com)
13+
14+
## Overview
15+
16+
Kubic is a cutting edge, ready for production and multi cloud provider Kubernetes infrastructure as code. It integates an ingress controller, a certificate manager, a monitoring stack, a GitOps tool with complete secret management and a backup tool.
417

518
This Terraform aims at creating a managed k8s cluster setup with :
619

720
- NGINX Ingress Controller
821
- Cert-manager
9-
- ArgoCD
1022
- Prometheus / Grafana
11-
- Velero for backuping the cluster
23+
- ArgoCD
1224
- Hashicorp Vault if needed
25+
- ArgoCD Vault Plugin if Vault is deployed
26+
- Velero for backuping the cluster
1327

1428
The cluster can be deployed either on OVHCloud or on Scaleway. New provider can be added by creating a new folder in the root of the repository, and by following the same architecture as the existing providers.
1529

@@ -26,23 +40,25 @@ The cluster can be deployed either on OVHCloud or on Scaleway. New provider can
2640
├── examples # Folder containing examples of applications to deploy with ArgoCD
2741
├── .gitignore
2842
├── LICENSE
29-
└── README.md
43+
└── README.md
3044
```
3145

3246
All files contained in the folder `common` are symbolicaly linked in the folders `ovh` and `scaleway` to avoid code duplication.
47+
3348
## Getting started
3449

3550
- Create you cluster:
3651
- [Manual deployment](docs/cluster-manual.md)
3752
- [Automatic deployment](docs/cluster-auto.md)
38-
- [Configure HashicorpVault](docs/hashicorp-vault.md)
53+
- [Configure Hashicorp Vault](docs/hashicorp-vault.md)
3954
- [Configure ArgoCD](docs/argocd.md)
4055
- [Configure Velero](docs/velero.md)
4156
- [Standalone use](docs/standalone.md)
4257

4358
## Contributing
4459

4560
Currently, only OVH and Scaleway are supported as providers. Here are the guidelines to add a new provider:
61+
4662
- Create a new folder in the root of the repository, with the name of the provider;
4763
- Create a symlink for all files in `common` to your new folder;
4864
- Create a `terraform.tf` file containing:
@@ -52,6 +68,7 @@ Currently, only OVH and Scaleway are supported as providers. Here are the guidel
5268
- A `ingress-nginx.tf` file, deploying the [ingress-nginx ingress controller](https://kubernetes.github.io/ingress-nginx) and configuring it with an external IP (you may need to create a load balancer on your provider). The ingress IP should be a Terraform output named `ingress_ip`;
5369
- This must also create a `null_resource` named `ingress-nginx` that will `depends_on` on the node pool of your cluster (this is to get a consistent dependency chain for Terraform)
5470
- The controller must have at least the following configuration:
71+
5572
```yaml
5673
controller:
5774
metrics:
@@ -65,4 +82,5 @@ controller:
6582
admissionWebhooks:
6683
timeoutSeconds: 30
6784
```
68-
- Edit the `docker-compose.yaml` and create a service (adapt merely the code) for your provider.
85+
86+
- Edit the `docker-compose.yaml` and create a service (adapt merely the code) for your provider.

0 commit comments

Comments
 (0)