Hetzner project preparation

There are several tasks that have to be completed before a workload cluster can be created.

Preparing Hetzner Cloud

  1. Create a new HCloud project .
  2. Generate an API token with read and write access. You'll find this if you click on the project and go to "security".
  3. If you want to use it, generate an SSH key, upload the public key to HCloud (also via "security"), and give it a name. Read more about Managing SSH Keys .

Preparing Hetzner Robot

  1. Create a new web service user. Here you can define a password and copy your user name
  2. Generate an SSH key. You can either upload it via Hetzner Robot UI or just rely on the controller to upload a key that it does not find in the robot API. This is possible, as you have to store the public and private key together with the SSH key's name in a secret that the controller reads.

Bootstrap or Management Cluster Installation

Common Prerequisites

  • Install and set kubectl up in your local environment
  • Install Kind and Docker

Install and configure a Kubernetes cluster

Cluster API requires an existing Kubernetes cluster accessible via kubectl. During the installation process, the Kubernetes cluster will be transformed into a management cluster by installing the Cluster API provider components, so it is recommended to keep it separated from any application workload.

It is a common practice to create a temporary, local bootstrap cluster, which is then used to provision a target management cluster on the selected infrastructure provider.

Choose one of the options below

1. Existing Management Cluster

For production use, a “real” Kubernetes cluster should be used with appropriate backup and Disaster Recovery policies and procedures in place. The Kubernetes cluster must be of a supported version .

2. Kind

kind can be used for creating a local Kubernetes cluster for development environments or for the creation of a temporary bootstrap cluster used to provision a target management cluster on the selected infrastructure provider.


Install Clusterctl and initialize Management Cluster

Install Clusterctl

Please use the instructions in the official Cluster API docs , or use this command: make clusterctl

Initialize the management cluster

Now that we’ve got clusterctl installed and all the prerequisites are in place, we can transform the Kubernetes cluster into a management cluster by using the clusterctl init command. More information about clusterctl can be found here .

For the latest version:

shell
clusterctl init --core cluster-api --bootstrap kubeadm --control-plane kubeadm --infrastructure hetzner

Or for a specific version : --infrastructure hetzner:vX.X.X


Variable Preparation to generate a cluster-template

shell
export SSH_KEY_NAME="" export CLUSTER_NAME="my-cluster" export HCLOUD_REGION="fsn1" export CONTROL_PLANE_MACHINE_COUNT=3 export WORKER_MACHINE_COUNT=3 export KUBERNETES_VERSION=1.29.4 export HCLOUD_CONTROL_PLANE_MACHINE_TYPE=cpx31 export HCLOUD_WORKER_MACHINE_TYPE=cpx31

For a list of all variables needed for generating a cluster manifest (from the cluster-template.yaml), use clusterctl generate cluster --infrastructure hetzner:<caph-version> --list-variables hetzner-cluster

shell
$ clusterctl generate cluster --infrastructure hetzner: --list-variables hetzner-cluster Required Variables: - HCLOUD_CONTROL_PLANE_MACHINE_TYPE - HCLOUD_REGION - SSH_KEY_NAME - HCLOUD_WORKER_MACHINE_TYPE Optional Variables: - CLUSTER_NAME (defaults to hetzner-cluster) - CONTROL_PLANE_MACHINE_COUNT (defaults to 3) - KUBERNETES_VERSION (defaults to 1.29.4) - WORKER_MACHINE_COUNT (defaults to 3)

Create a secret for hcloud only

In order for the provider integration hetzner to communicate with the Hetzner API ( HCloud API ), we need to create a secret with the access data. The secret must be in the same namespace as the other CRs.

export HCLOUD_TOKEN="<YOUR-TOKEN>"

  • HCLOUD_TOKEN: The project where your cluster will be placed. You have to get a token from your HCloud Project.
shell
kubectl create secret generic hetzner --from-literal=hcloud=$HCLOUD_TOKEN # Patch the created secret so it is automatically moved to the target cluster later. kubectl patch secret hetzner -p '{"metadata":{"labels":{"clusterctl.cluster.x-k8s.io/move":""}}}'

The secret name and the tokens can also be customized in the cluster template.

Create a secret for Hetzner (Hcloud + Robot)

In order for the provider integration hetzner to communicate with the Hetzner API ( HCloud API + Robot API ), we need to create a secret with the access data. The secret must be in the same namespace as the other CRs.

shell
export HCLOUD_TOKEN="" export HETZNER_ROBOT_USER="" export HETZNER_ROBOT_PASSWORD="" export HETZNER_SSH_PUB_PATH="" export HETZNER_SSH_PRIV_PATH=""
  • HCLOUD_TOKEN: The project where your cluster will be placed. You have to get a token from your HCloud Project.
  • HETZNER_ROBOT_USER: The User you have defined in Robot under settings/Webservice and app settings.
  • HETZNER_ROBOT_PASSWORD: The Robot Password you have set in Robot under settings/Webservice and app settings.
  • HETZNER_SSH_PUB_PATH: The Path to your generated Public SSH Key.
  • HETZNER_SSH_PRIV_PATH: The Path to your generated Private SSH Key. This is needed because CAPH uses this key to provision the node in Hetzner Dedicated.
shell
kubectl create secret generic hetzner --from-literal=hcloud=$HCLOUD_TOKEN --from-literal=robot-user=$HETZNER_ROBOT_USER --from-literal=robot-password=$HETZNER_ROBOT_PASSWORD kubectl create secret generic robot-ssh --from-literal=sshkey-name=cluster --from-file=ssh-privatekey=$HETZNER_SSH_PRIV_PATH --from-file=ssh-publickey=$HETZNER_SSH_PUB_PATH # Patch the created secrets so that they get automatically moved to the target cluster later. kubectl patch secret hetzner -p '{"metadata":{"labels":{"clusterctl.cluster.x-k8s.io/move":""}}}' kubectl patch secret robot-ssh -p '{"metadata":{"labels":{"clusterctl.cluster.x-k8s.io/move":""}}}'

The secret name and the tokens can also be customized in the cluster template.

See node-image for more information.

Previous
Next steps
Next
SSH key management