You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: claude/content/wiki/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The result is collaboration that feels like working with an expert colleague who
31
31
The platform consists of two primary architectural systems that work together to transform AI interactions into persistent professional collaboration.
32
32
33
33
> [!NOTE]
34
-
> The platform was designed using **Site Reliability Engineering** methodologies and **behavioral psychology** principles, treating AI collaboration as infrastructure requiring systematic observability, monitoring, and reliability engineering for consistent professional partnership.
34
+
> The platform was [designed](/wiki/guide/components/design) using **Site Reliability Engineering** methodologies and **behavioral psychology** principles, treating AI collaboration as infrastructure requiring systematic observability, monitoring, and reliability engineering for consistent professional partnership.
Insert the `ansible_password` encrypted output into [`all.yaml`](https://{{< param variables.repository.cluster >}}/blob/main/inventory/cluster/group_vars/all.yaml) group variables file, while respecting the *existing* indentation.
60
+
Insert the `ansible_password` encrypted output into [`all.yaml`](https://{{< param variables.repository.cluster >}}/blob/main/inventory/cluster/group_vars/all.yaml) group variables file, while respecting the _existing_ indentation.
61
61
62
62
> [!TIP]
63
-
> Once all variables have been initially encrypted with the same global password, they can be decrypted or updated with the [Vault](/k3s-cluster/wiki/guide/playbooks/vault) playbook.
63
+
> Once all variables have been initially encrypted with the same global password, they can be decrypted or updated with the [Vault](/wiki/guide/playbooks/vault) playbook.
Copy file name to clipboardExpand all lines: k3s-cluster/content/tutorials/handbook/argocd/_index.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ This repository uses [ArgoCD](https://argoproj.github.io/cd) to deploy applicati
13
13
See the related role variables, defined into [`main.yaml`](https://{{< param variables.repository.cluster >}}/blob/main/roles/argo-cd/defaults/main.yaml) defaults file. Review the [`README.md`](https://{{< param variables.repository.cluster >}}/tree/main/roles/argo-cd) file, for additional details and the advanced configuration settings, listed below.
14
14
15
15
> [!IMPORTANT]
16
-
> A [role upgrade](/k3s-cluster/wiki/guide/configuration/roles/argocd/#upgrade) is required, in order to apply any changes related to configuration.
16
+
> A [role upgrade](/wiki/guide/configuration/roles/argocd/#upgrade) is required, in order to apply any changes related to configuration.
17
17
18
18
### Credentials
19
19
@@ -23,9 +23,9 @@ While still implemented, the `admin` credentials are disabled by default and `us
@@ -40,15 +40,15 @@ The `name` and `password` keys listed above are defined into [`all.yaml`](https:
40
40
Additional configuration parameters can be defined into [`config_params.j2`](https://{{< param variables.repository.cluster >}}/blob/main/roles/argo-cd/templates/config_params.j2) template.
41
41
42
42
> [!TIP]
43
-
> Perform a [role validation](/k3s-cluster/wiki/guide/configuration/roles/argocd/#validation), to visualize all rendered templates and variables.
43
+
> Perform a [role validation](/wiki/guide/configuration/roles/argocd/#validation), to visualize all rendered templates and variables.
44
44
45
45
### RBAC
46
46
47
47
Additional RBAC policies can be defined into [`config_rbac.j2`](https://{{< param variables.repository.cluster >}}/blob/main/roles/argo-cd/templates/config_rbac.j2) template. The role automatically injects the users specified into [`facts.yaml`](https://{{< param variables.repository.cluster >}}/blob/main/roles/argo-cd/tasks/facts.yaml) tasks file, under `argocd_resources.server.users` collection.
48
48
49
49
## Repository Setup
50
50
51
-
Login into [ArgoCD UI](/k3s-cluster/tutorials/handbook/externaldns/#argocd), navigate to `ArgoCD Settings` > `Repositories` and connect to official project repository:
51
+
Login into [ArgoCD UI](/tutorials/handbook/externaldns/#argocd), navigate to `ArgoCD Settings` > `Repositories` and connect to official project repository:
Copy file name to clipboardExpand all lines: k3s-cluster/content/tutorials/handbook/cilium/_index.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Due to the intricate nature of its requirements, Cilium is deployed in three ste
18
18
19
19
## Dependencies
20
20
21
-
See below the required Cilium dependencies, used into chart configuration.
21
+
See below the required Cilium dependencies, used into chart configuration.
22
22
23
23
### CertManager
24
24
@@ -30,6 +30,7 @@ During chart post-install provisioning, Cilium Hubble is configured to take adva
30
30
31
31
> [!IMPORTANT]
32
32
> Cilium details the following instructions, into their `cert-manager`[installation](https://docs.cilium.io/en/latest/observability/hubble/configuration/tls) steps:
33
+
>
33
34
> > Please make sure that your issuer is able to create certificates under the `cilium.io` domain name.
34
35
>
35
36
> CertManager cannot control a domain not owned by end-user, therefore the above listed `Certificate` and `ClusterIssuer` resources are created.
@@ -42,7 +43,7 @@ Refer to Cilium Hubble [documentation](https://docs.cilium.io/en/stable/gettings
42
43
43
44
#### Usage Example
44
45
45
-
This is an example of `Gateway` and `HTTPRoute` resources usage for [Cilium Hubble UI](/k3s-cluster/tutorials/handbook/externaldns/#cilium), as replacement for `Ingress` resource:
46
+
This is an example of `Gateway` and `HTTPRoute` resources usage for [Cilium Hubble UI](/tutorials/handbook/externaldns/#cilium), as replacement for `Ingress` resource:
46
47
47
48
-`Gateway` resource template, see [`gateway.j2`](https://{{< param variables.repository.cluster >}}/blob/main/roles/cilium/templates/gateway.j2)
48
49
-`HTTPRoute` insecure resource template, see [`http_route_insecure.j2`](https://{{< param variables.repository.cluster >}}/blob/main/roles/cilium/templates/http_route_insecure.j2)
Encrypt the `global_map.credentials.externaldns.cloudflare.api.token` value with [`ansible-vault`](/k3s-cluster/tutorials/handbook/ansible/#vault) and insert it into
22
+
Encrypt the `global_map.credentials.externaldns.cloudflare.api.token` value with [`ansible-vault`](/tutorials/handbook/ansible/#vault) and insert it into
23
23
[`all.yaml`](https://{{< param variables.repository.cluster >}}/blob/main/inventory/cluster/group_vars/all.yaml) group variables file.
Copy file name to clipboardExpand all lines: k3s-cluster/content/tutorials/handbook/k3s-monitor/_index.md
+63-63Lines changed: 63 additions & 63 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,78 +13,78 @@ The **K3s Monitor** tool is a comprehensive Python utility designed to collect,
13
13
14
14
## Tool Features
15
15
16
-
***Cluster Resource Monitoring**: Collects various resource metrics from nodes and pods
17
-
***Component-Specific Monitoring**: Tracks resource usage for all K3s Cluster [components](/k3s-cluster/wiki/guide/configuration/roles/#charts)
18
-
***Log Collection**: Gathers logs from system services and Kubernetes components
19
-
***Automated Analysis**: Identifies high resource consumption and potential issues
20
-
***Comparative Reporting**: Compares current metrics with previous monitoring runs
21
-
***Comprehensive Summary**: Generates detailed reports with recommendations, ready for AI-assisted analysis with tools like [Claude](https://claude.ai)
16
+
-**Cluster Resource Monitoring**: Collects various resource metrics from nodes and pods
17
+
-**Component-Specific Monitoring**: Tracks resource usage for all K3s Cluster [components](/wiki/guide/configuration/roles/#charts)
18
+
-**Log Collection**: Gathers logs from system services and Kubernetes components
19
+
-**Automated Analysis**: Identifies high resource consumption and potential issues
20
+
-**Comparative Reporting**: Compares current metrics with previous monitoring runs
21
+
-**Comprehensive Summary**: Generates detailed reports with recommendations, ready for AI-assisted analysis with tools like [Claude](https://claude.ai)
22
22
23
23
## Prerequisites
24
24
25
-
The following dependencies are required to run the **K3s Monitor** tool, automatically deployed with [Provisioning](/k3s-cluster/wiki/guide/playbooks/provisioning) playbook:
25
+
The following dependencies are required to run the **K3s Monitor** tool, automatically deployed with [Provisioning](/wiki/guide/playbooks/provisioning) playbook:
26
26
27
-
* Python 3.8+
28
-
*`python3-kubernetes` library
29
-
*`python3-yaml` library
30
-
*`kubectl` configured to access the K3s cluster
31
-
*`journalctl` for log collection
32
-
*`jq` for JSON processing
27
+
- Python 3.8+
28
+
-`python3-kubernetes` library
29
+
-`python3-yaml` library
30
+
-`kubectl` configured to access the K3s cluster
31
+
-`journalctl` for log collection
32
+
-`jq` for JSON processing
33
33
34
34
## Generated Reports
35
35
36
36
The following reports are generated:
37
37
38
-
***cilium-metrics.log**: Detailed Cilium networking status, endpoints and services information
39
-
***cluster-info.log**: Basic information about the cluster
40
-
***comparison.log**: Comparison with previous monitoring runs
41
-
***component-metrics.csv**: Time-series data for component resource usage
42
-
***summary.log**: Overall resource usage summary and recommendations
43
-
***etcd-metrics.log**: Status of HA clusters, `etcd` cluster health and metrics
44
-
***k3s-monitor.log**: Operational log of the monitoring tool itself, including all actions taken during execution
45
-
***log-summary.txt**: Summary of important log events (errors, warnings)
-**summary.log**: Overall resource usage summary and recommendations
49
49
50
50
See below the directories and files structure, containing the generated reports.
51
51
52
52
> [!NOTE]
53
53
> Submit the generated tarball to [Claude](https://claude.ai), for AI-assisted analysis. Upload the tarball to a chat with Claude and ask for an analysis of your K3s cluster metrics and performance.
54
54
55
55
{{< filetree/container >}}
56
-
{{< filetree/folder name="/var/log/k3s" >}}
57
-
{{< filetree/folder name="YYYYMMDD-HHMMSS (click to expand)" state="closed" >}}
Copy file name to clipboardExpand all lines: k3s-cluster/content/tutorials/handbook/k3s/_index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,15 +25,15 @@ The end-user can use `kubectl` to operate the cluster via local terminal, or [Le
25
25
[](k3s-lens.webp)
26
26
27
27
> [!TIP]
28
-
> Lens automatically detects and exposes the metrics produced by [VictoriaMetrics](/k3s-cluster/wiki/guide/configuration/roles/victoriametrics) role.
28
+
> Lens automatically detects and exposes the metrics produced by [VictoriaMetrics](/wiki/guide/configuration/roles/victoriametrics) role.
29
29
30
30
## Upgrade
31
31
32
-
Upon a new K3s version release, end-user can perform a [role upgrade](/k3s-cluster/wiki/guide/configuration/roles/k3s/#upgrade), which will schedule a [Kured](/k3s-cluster/wiki/guide/configuration/roles/kured) reboot.
32
+
Upon a new K3s version release, end-user can perform a [role upgrade](/wiki/guide/configuration/roles/k3s/#upgrade), which will schedule a [Kured](/wiki/guide/configuration/roles/kured) reboot.
33
33
34
34
### Manual Upgrade
35
35
36
-
Once the [role upgrade](/k3s-cluster/wiki/guide/configuration/roles/k3s/#upgrade) performed, end-user can choose to manually upgrade each cluster node. A [node drain](/k3s-cluster/tutorials/handbook/longhorn/#node-drain) must be executed one node at the time, followed by a node reboot. Once the node is up and running, it can be uncordoned with Lens or `kubectl`, via local terminal:
36
+
Once the [role upgrade](/wiki/guide/configuration/roles/k3s/#upgrade) performed, end-user can choose to manually upgrade each cluster node. A [node drain](/tutorials/handbook/longhorn/#node-drain) must be executed one node at the time, followed by a node reboot. Once the node is up and running, it can be uncordoned with Lens or `kubectl`, via local terminal:
Encrypt the `global_map.credentials.kured.slack.notify.url` value with [`ansible-vault`](/k3s-cluster/tutorials/handbook/ansible/#vault) and insert it into
33
+
Encrypt the `global_map.credentials.kured.slack.notify.url` value with [`ansible-vault`](/tutorials/handbook/ansible/#vault) and insert it into
0 commit comments