Skip to content

Latest commit

 

History

History
75 lines (56 loc) · 2.31 KB

README.md

File metadata and controls

75 lines (56 loc) · 2.31 KB

One-Green Core

One-Green, an open source framework for plant cultivation, scalable.

Interact with IoT board provided by firmware IoT-Edge-Agent

This chart bootstraps a One-Green Core deployment on a Kubernetes cluster using the Helm package manager.

Prerequisites

  • Kubernetes 1.16+
  • Helm 3+

Helm must be installed to use the charts. Please refer to Helm's documentation to get started.

MicroK8s user specification

For Micok8s enable addons with sudo microk8s enable dns storage helm3 ingress, this operation can take ~15min .

Then add these lines in ~/.bashrc or ~/.zshrc

alias kubectl="sudo microk8s kubectl"
alias helm="sudo microk8s helm3"

Get Repo Info

helm repo add one-green https://one-green.github.io/helm/charts
helm repo update

You can then run helm search repo one-green to see the charts.

Install

helm install one-green one-green/one-green-core --version 0.0.1

Install on Microk8s

Microk8s use this values_raspberry_pi_microk8s.yaml

helm install one-green one-green/one-green-core --version 0.0.1 --values values_raspberry_pi_microk8s.yaml

Get secrets

MQTT user, password

# user
kubectl get secret one-green-secrets -o jsonpath='{.data.MOSQUITTO_USERNAME}' | base64 --decode
# password
kubectl get secret one-green-secrets -o jsonpath='{.data.MOSQUITTO_PASSWORD}' | base64 --decode
# token

Influxdb user, password, token

# user
kubectl get secret one-green-secrets -o jsonpath='{.data.DOCKER_INFLUXDB_INIT_USERNAME}' | base64 --decode
# password
kubectl get secret one-green-secrets -o jsonpath='{.data.DOCKER_INFLUXDB_INIT_PASSWORD}' | base64 --decode
# token
kubectl get secret one-green-secrets -o jsonpath='{.data.DOCKER_INFLUXDB_INIT_ADMIN_TOKEN}' | base64 --decode

Grafana user and password

# user
kubectl get secret one-green-grafana -o jsonpath='{.data.admin-user}' | base64 --decode
# password
kubectl get secret one-green-grafana -o jsonpath='{.data.admin-password}' | base64 --decode