On 03/04, Henrik Jonsson wrote:
> So if I have to bite the bullet and have a dependency on some shared
> resource which CoreOS nodes coming up need to access to fetch those extra
> configs, I'd maybe do something like:
>
> - Write a bootstrap oneshot systemd service with cloud-config that runs
> on node startup
> - That systemd service should fetch "extra cloud-config data" over TLS,
> ideally verifying cert of config server as well as checksum or signature of
> config data itself
> - Config format for the "extra data" should ideally just be the regular
> cloud-config format and be applied with the same mechanism, same way as you
> want to append Ignition configs
>
> Thoughts?
If you want to use coreos-cloudinit, you could do something like this (I haven't
tested this):
#cloud-config
coreos:
units:
- name: extra-cloudinit.service
command: start
content: |
[Service]
Type=oneshot
RemainAfterExit=yes
ExecStart=/usr/bin/coreos-cloudinit --from-url=
https://example.com
I think this is just about the most simple implementation. As long as you keep
example.com running, this should be fine.
-Alex