remove Weave GitOps addon
Drop the Flux UI addon and its Tailscale exposure because the UI lags the current Flux APIs and reports misleading HelmRelease errors. Keep Flux managed through the controllers themselves and use Rancher or the flux CLI for access.
This commit is contained in:
@@ -201,8 +201,6 @@ Runtime cluster secrets are moving to Doppler + External Secrets Operator.
|
||||
- Initial auth: service token via `DOPPLER_HETZNERTERRA_SERVICE_TOKEN`
|
||||
- First synced secrets:
|
||||
- `GRAFANA_ADMIN_PASSWORD`
|
||||
- `WEAVE_GITOPS_ADMIN_USERNAME`
|
||||
- `WEAVE_GITOPS_ADMIN_PASSWORD_BCRYPT_HASH`
|
||||
|
||||
Terraform/bootstrap secrets remain in Gitea Actions secrets and are not managed by Doppler.
|
||||
|
||||
@@ -237,7 +235,7 @@ Terraform/bootstrap secrets remain in Gitea Actions secrets and are not managed
|
||||
- Active Flux addons for stable baseline: `addon-tailscale-operator`, `addon-tailscale-proxyclass`, `addon-external-secrets`.
|
||||
- Deferred addons: `addon-ccm`, `addon-csi`, `addon-observability`, `addon-observability-content` (to be added after baseline is stable).
|
||||
- Ansible is limited to cluster bootstrap, private-access setup, and prerequisite secret creation for Flux-managed addons.
|
||||
- `addon-flux-ui` is optional for the stable-baseline phase and is not a blocker for rebuild success.
|
||||
- Weave GitOps / Flux UI is no longer deployed; use Rancher or the `flux` CLI for Flux operations.
|
||||
|
||||
### Rancher access
|
||||
|
||||
@@ -269,17 +267,14 @@ Flux deploys a lightweight observability stack in the `observability` namespace:
|
||||
|
||||
Grafana content is managed as code via ConfigMaps in `infrastructure/addons/observability-content/`.
|
||||
|
||||
Grafana and Prometheus are exposed through a single Tailscale front door backed by Traefik when the Tailscale Kubernetes Operator is healthy.
|
||||
Grafana and Prometheus are exposed through dedicated Tailscale LoadBalancer services when the Tailscale Kubernetes Operator is healthy.
|
||||
|
||||
### Access Grafana and Prometheus
|
||||
|
||||
Preferred private access:
|
||||
|
||||
- Grafana: `http://k8s-cluster-cp-1.<your-tailnet>:30080/`
|
||||
- Prometheus: `http://k8s-cluster-cp-1.<your-tailnet>:30990/`
|
||||
- Flux UI: `http://k8s-cluster-cp-1.<your-tailnet>:30901/`
|
||||
|
||||
This access path is bootstrapped automatically by Ansible on `control_plane[0]` using persistent `kubectl port-forward` systemd services plus `tailscale serve`, so it survives cluster rebuilds.
|
||||
- Grafana: `http://grafana.silverside-gopher.ts.net/`
|
||||
- Prometheus: `http://prometheus.silverside-gopher.ts.net:9090/`
|
||||
|
||||
Fallback (port-forward from a tailnet-connected machine):
|
||||
|
||||
|
||||
Reference in New Issue
Block a user