Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

How to deploy Portainer to a MicroK8s environment

Researcher by Researcher
January 6, 2023
in Networking
0
How to deploy Portainer to a MicroK8s environment
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


If you want to add Kubernetes to your development workflow, try the easy route with this Microk8s and Portainer combination.

A developer writes code on multiple screens.
Image: Gorodenkoff/Adobe Stock

Blink and technology changes. It was only several months ago that I wrote a TechRepublic tutorial on deploying Portainer to a Microk8s cluster for simplified Kubernetes development. Now that tutorial no longer works, because the latest versions of Microk8s have trouble clustering, and the versions of Microk8s prior to 1.24 won’t work with Portainer. Read on to learn the new process of deploying this all-in-one container management platform to a Microk8s cluster.

SEE: Hiring kit: Back-end Developer (TechRepublic Premium)

What you need to deploy Portainer to Microk8s

You’ll need a Microk8s cluster with at least three nodes and a user with sudo privileges.

How to install Microk8s and join the cluster

Here’s a quick refresher on how to deploy a Microk8s cluster properly.

  1. Install version 1.24 of Microk8s on all Ubuntu Server nodes via snap.
  2. Edit your /etc/hosts file to map hostnames to IP addresses.
  3. Set the hostnames for each machine.
  4. Set the proper timezone on all machines.
  5. Run the microk8s add-node command on the controller.
  6. Run the microk8s join command, shown in the output of the add-node command, on every node.
  7. Add your user to the microk8s group with sudo usermod -aG microk8s $USER.
  8. Change the permission of the .kube folder with chown -f -R $USER ~/.kube.
  9. Log out and log back in.

Now that you have your cluster up and running, it’s time to deploy Portainer to the cluster.

How to deploy Portainer to a Microk8s cluster

First, enable a few add-ons to Microk8s. Log in to your Microk8s controller and issue the following commands to enable the necessary add-ons:

microk8s enable dns

microk8s enable ha-cluster

microk8s enable ingress

microk8s enable metrics-server

microk8s enable rbac

microk8s enable hostpath-storage

Before enabling Portainer, you must enable the community repository with the command:

microk8s enable community

Now, you can enable Portainer with:

microk8s enable portainer

Give Portainer enough time to spin up – you can check the status with the following command:

microk8s kubectl get pods -n portainer

When you see Portainer listed as running, you can open a web browser and point it to http://SERVER:30777 or https://SERVER:30799, where SERVER is the IP address or domain of the hosting server.

You will be prompted to create an admin user. After you take care of that, select the local environment, and you’ll find yourself on the Portainer Dashboard (Figure A), where you can start managing your Kubernetes deployments.

Figure A

The Portainer Dashboard as seen on a Microk8s cluster.
The Portainer Dashboard as seen on a Microk8s cluster.

Watch for the latest releases of Microk8s

Now you know how to properly deploy Portainer to a Microk8s cluster; however, since this could change, you should watch for the latest releases of Microk8s on the Snap store. As soon as the latest stable version of Microk8s is better capable of clustering, I highly recommend you upgrade to that release and re-deploy Portainer.



Source link

Related articles

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023
Tags: DeployenvironmentMicroK8sPortainer
Share76Tweet47

Related Posts

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
0

These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the...

Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023
0

In an era where the experience is everything, digital transformation can be hard for IT organizations, creating increased operational complexity....

Cisco Catalyst 9200CX now orderable!

New Cisco Catalyst 9200CX Compact With HVDC, Cisco UPOE And mGig

February 6, 2023
0

Figure 1. Cisco Live Amsterdam 2023 Make sure your network is ready for a hybrid world where the workplace is...

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

February 2, 2023
0

There have been a lot of talks recently about the article entitled “Multidecadal variation of the Earth’s inner-core rotation”. The...

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

February 1, 2023
0

I’m excited to pack my bags to attend Cisco Live EMEA in Amsterdam next week! After a three-year hiatus, two words...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved