hetzner-mk8s-example
.
Security
in the left sidebar, then proceed to API tokens
.Generate API Token
.Read & Write
permissions to the token and copy it.Secrets
in the left sidebar and then select New
.Opaque
as the secret type and name it hetzner-mk8s-example
.hetzner-mk8s-example
on Hetzner:
Networks
in the left sidebar.
Create Network
.
Firewalls
in the left sidebar.Create Firewall
.Security
in the left sidebar.SSH Keys
and click on Add SSH Key
.hcloud context create hetzner-mk8s-example
and insert the API key
from the previous step.network
, and optionally the firewall
and the ssh-key
created in the previous step using the hcloud CLI.
hcloud network list
.hcloud firewall list
.hcloud ssh-key list
.hetzner-mk8s-example.yaml
YAML manifest with actual values from above. Customize the file as needed. Replace the placeholders for firewallId
, networkId
, and sshKey
.gcp-us-east1
location. Placing worker nodes close to the control plane is recommended for optimal performance.Default
rule, allowing public access to the Kubernetes API. It is advisable to restrict API access to a known IP range for security purposes.general
node pool, scaling on-demand between 1 and 4 nodes.hetzner-mk8s-example
cluster by applying the manifest.
hetzner-mk8s-example.yaml
file using the cpln apply >_
option in the upper right corner.cpln apply -f hetzner-mk8s-example.yaml --org YOUR_ORG_HERE
.cpln mk8s kubeconfig hetzner-mk8s-example -f /tmp/hetzner-mk8s-example-conf
.kubectl
: Use the obtained kubeconfig file by running export KUBECONFIG=/tmp/hetzner-mk8s-example-conf
for the current shell session.Kubernetes
in the left sidebar panel and click on Open
under Dashboard
for the cluster hetzner-mk8s-example
.