From 6301b8a94eaad8fd298e8eb740c5a34836fe6045 Mon Sep 17 00:00:00 2001 From: 57_Wolve <57_wolve@private.email> Date: Wed, 14 Jan 2026 20:43:33 +0000 Subject: [PATCH] Update config.toml --- config.toml | 46 +++++++++++++++++++++++----------------------- 1 file changed, 23 insertions(+), 23 deletions(-) diff --git a/config.toml b/config.toml index 4af4349..22b21a4 100644 --- a/config.toml +++ b/config.toml @@ -1,38 +1,38 @@ [k0s] version = "v1.34.3+k0s.0" -private_ip_range = "10.1.0.0/24" # Node private IPv4 range in CIDR format. +private_ip_range = "10.1.0.0/24" # Node private IPv4 range in CIDR format. [metallb] version = "v0.15.3" -public_ip_range = "192.168.1.0/24" # Public IP range for external IPs in CIDR format. +public_ip_range = "192.168.1.0/24" # Public IP range for external IPs in CIDR format. [haproxy] -keepalived.id = "100" # KeepaliveD ID Number. -keepalived.auth = "4PycOh7xM" # KeepaliveD Password. -proxy.1.ip = "10.1.0.8" # HAProxy one IPv4 -proxy.2.ip = "10.1.0.9" # HAProxy two IPv4 -proxy.kube.ip = "10.1.0.10" # VIP for kubernetes cluster API high-availability. +keepalived.id = "100" # KeepaliveD ID Number. +keepalived.auth = "4PycOh7xM" # KeepaliveD Password. +proxy.1 = { mac = "BC:24:6E:9E:EE:E0", ip = "BC:24:FD:64:DF:FC" } # HAProxy one IPv4 +proxy.1 = { mac = "BC:24:6E:9E:EE:E0", ip = "BC:24:E4:BE:F1:A4" } # HAProxy twi IPv4 +proxy.kube.ip = "10.1.0.10" # VIP for kubernetes cluster API high-availability. [nodes] -ssh.user = "root" # Controller and worker node login information. +ssh.user = "root" # Controller and worker node login information. ssh.port = "22" ssh.key = "~/.ssh/id_rsa" -network.private.interface = "eth0" # Cluster internal network interface name. -network.private.gateway = "10.1.0.1" # Private network gateway -network.private.netmask = "24" # Public network netmask/cidr -network.public.interface = "eth1" # Cluster public network interface name. -network.public.gateway = "192.168.1.1" # Public network gateway -network.public.netmask = "24" # Public network netmask/cidr -controller.1 = { mac = "", ip = "10.1.0.11" } # Controller nodes IPv4 addresses. -controller.2 = { mac = "", ip = "10.1.0.13" } -controller.3 = { mac = "", ip = "10.1.0.15" } -worker.1 = { mac = "", ip = "10.1.0.14" } # Worker nodes IPv4 addresses. ( 1-250 ) -worker.2 = { mac = "", ip = "10.1.0.15" } -worker.3 = { mac = "", ip = "10.1.0.16" } -worker.4 = { mac = "", ip = "10.1.0.17" } -worker.5 = { mac = "", ip = "10.1.0.18" } +network.private.interface = "eth0" # Cluster internal network interface name. +network.private.gateway = "10.1.0.1" # Private network gateway +network.private.netmask = "24" # Public network netmask/cidr +network.public.interface = "eth1" # Cluster public network interface name. +network.public.gateway = "192.168.1.1" # Public network gateway +network.public.netmask = "24" # Public network netmask/cidr +controller.1 = { mac = "BC:24:6E:9E:EE:E0", ip = "10.1.0.11" } # Controller nodes IPv4 addresses. +controller.2 = { mac = "BC:24:FC:E1:CF:AB", ip = "10.1.0.13" } +controller.3 = { mac = "BC:24:EE:D0:1F:06", ip = "10.1.0.15" } +worker.1 = { mac = "BC:24:AC:76:96:DE", ip = "10.1.0.14" } # Worker nodes IPv4 addresses. ( 1-250 ) +worker.2 = { mac = "BC:24:B0:CF:7C:DF", ip = "10.1.0.15" } +worker.3 = { mac = "BC:24:BC:E9:4C:EF", ip = "10.1.0.16" } +worker.4 = { mac = "BC:24:1C:E7:5C:DE", ip = "10.1.0.17" } +worker.5 = { mac = "BC:24:FA:42:CF:AA", ip = "10.1.0.18" } -[bastion] # Enable for accessing nodes on secure networks that requires a bastion/jumphost for ssh access +[bastion] # Enable for nodes on secure networks that require a jumphost for ssh access. enable = false ssh.user = "example_user" ssh.port = "22"