本文完全是根据二进制部署kubernets集群的所有步骤,同时开启了集群的TLS安全认证。

环境说明

在下面的步骤中,我们将在三台CentOS系统的物理机上部署具有三个节点的kubernetes1.7.0集群。

角色分配如下:

镜像仓库:172.16.138.100,域名为 harbor.suixingpay.com,为私有镜像仓库,请替换为公共仓库或你自己的镜像仓库地址。

Master:172.16.138.171

Node:172.16.138.172,172.16.138.173

注意:172.16.138.171这台主机master和node复用。所有生成证书、执行kubectl命令的操作都在这台节点上执行。一旦node加入到kubernetes集群之后就不需要再登陆node节点了。

安装前的准备

1、在node节点上安装docker1.17.03.2.ce

2、关闭所有节点的SELinux

永久方法 – 需要重启服务器

修改/etc/selinux/config文件中设置SELINUX=disabled ,然后重启服务器。

临时方法 – 设置系统参数

使用命令setenforce 0

3、准备harbor私有镜像仓库

参考:https://github.com/vmware/harbor

提示

由于启用了 TLS 双向认证、RBAC 授权等严格的安全机制,建议从头开始部署,而不要从中间开始,否则可能会认证、授权等失败!

1、创建TLS证书和密钥

kubernetes 系统的各组件需要使用 TLS 证书对通信进行加密,本文档使用 CloudFlare 的 PKI 工具集 cfssl 来生成 Certificate Authority (CA) 和其它证书;

生成的 CA 证书和秘钥文件如下:

  • ca-key.pem
  • ca.pem
  • kubernetes-key.pem
  • kubernetes.pem
  • kube-proxy.pem
  • kube-proxy-key.pem
  • admin.pem
  • admin-key.pem

使用证书的组件如下:

  • etcd:使用 ca.pem、kubernetes-key.pem、kubernetes.pem;
  • kube-apiserver:使用 ca.pem、kubernetes-key.pem、kubernetes.pem;
  • kubelet:使用 ca.pem;
  • kube-proxy:使用 ca.pem、kube-proxy-key.pem、kube-proxy.pem;
  • kubectl:使用 ca.pem、admin-key.pem、admin.pem;
  • kube-controller-manager:使用 ca-key.pem、ca.pem;

注意:以下操作都在 master 节点即 172.16.138.171 这台主机上执行,证书只需要创建一次即可,以后在向集群中添加新节点时只要将 /etc/kubernetes/ 目录下的证书拷贝到新节点上即可。

安装 CFSSL

直接使用二进制源码包安装

  1. wget https://pkg.cfssl.org/R1.2/cfssl_linux-amd64
  2. chmod +x cfssl_linux-amd64
  3. mv cfssl_linux-amd64 /usr/local/bin/cfssl
  4.  
  5. wget https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64
  6. chmod +x cfssljson_linux-amd64
  7. mv cfssljson_linux-amd64 /usr/local/bin/cfssljson
  8.  
  9. wget https://pkg.cfssl.org/R1.2/cfssl-certinfo_linux-amd64
  10. chmod +x cfssl-certinfo_linux-amd64
  11. mv cfssl-certinfo_linux-amd64 /usr/local/bin/cfssl-certinfo

创建 CA (Certificate Authority)

创建 CA 配置文件

  1. mkdir /root/ssl
  2. cd /root/ssl
  3. cfssl print-defaults config > config.json
  4. cfssl print-defaults csr > csr.json
  5. # 根据config.json文件的格式创建如下的ca-config.json文件
  6. # 过期时间设置成了 87600h
  7. cat > ca-config.json <<EOF
  8. {
  9. "signing": {
  10. "default": {
  11. "expiry": "87600h"
  12. },
  13. "profiles": {
  14. "kubernetes": {
  15. "usages": [
  16. "signing",
  17. "key encipherment",
  18. "server auth",
  19. "client auth"
  20. ],
  21. "expiry": "87600h"
  22. }
  23. }
  24. }
  25. }
    EOF

字段说明

  • ca-config.json:可以定义多个 profiles,分别指定不同的过期时间、使用场景等参数;后续在签名证书时使用某个 profile;
  • signing:表示该证书可用于签名其它证书;生成的 ca.pem 证书中 CA=TRUE
  • server auth:表示client可以用该 CA 对server提供的证书进行验证;
  • client auth:表示server可以用该CA对client提供的证书进行验证;

创建 CA 证书签名请求

创建 ca-csr.json 文件,内容如下:

  1. {
  2. "CN": "kubernetes",
  3. "key": {
  4. "algo": "rsa",
  5. "size":
  6. },
  7. "names": [
  8. {
  9. "C": "CN",
  10. "ST": "BeiJing",
  11. "L": "BeiJing",
  12. "O": "k8s",
  13. "OU": "System"
  14. }
  15. ],
  16. "ca": {
  17. "expiry": "87600h"
  18. }
  19. }
  • "CN":Common Name,kube-apiserver 从证书中提取该字段作为请求的用户名 (User Name);浏览器使用该字段验证网站是否合法;
  • "O":Organization,kube-apiserver 从证书中提取该字段作为请求用户所属的组 (Group);

生成 CA 证书和私钥

  1. $ cfssl gencert -initca ca-csr.json | cfssljson -bare ca
  2. $ ls ca*
  3. ca-config.json ca.csr ca-csr.json ca-key.pem ca.pem

创建 kubernetes 证书

创建 kubernetes 证书签名请求文件 kubernetes-csr.json

  1. {
  2. "CN": "kubernetes",
  3. "hosts": [
  4. "127.0.0.1",
  5. "172.16.138.100",
  6. "172.16.138.171",
  7. "172.16.138.172",
  8. "172.16.138.173",
  9. "10.254.0.1",
  10. "kubernetes",
  11. "kubernetes.default",
  12. "kubernetes.default.svc",
  13. "kubernetes.default.svc.cluster",
  14. "kubernetes.default.svc.cluster.local"
  15. ],
  16. "key": {
  17. "algo": "rsa",
  18. "size":
  19. },
  20. "names": [
  21. {
  22. "C": "CN",
  23. "ST": "BeiJing",
  24. "L": "BeiJing",
  25. "O": "k8s",
  26. "OU": "System"
  27. }
  28. ]
  29. }
  • 如果 hosts 字段不为空则需要指定授权使用该证书的 IP 或域名列表,由于该证书后续被 etcd 集群和 kubernetes master 集群使用,所以上面分别指定了 etcd 集群、kubernetes master 集群的主机 IP 和 kubernetes 服务的服务 IP(一般是 kube-apiserver 指定的 service-cluster-ip-range 网段的第一个IP,如 10.254.0.1)。
  • 这是最小化安装的kubernetes集群,包括一个私有镜像仓库,三个节点的kubernetes集群,以上物理节点的IP也可以更换为主机名。

生成 kubernetes 证书和私钥

  1. $ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes kubernetes-csr.json | cfssljson -bare kubernetes
  2. $ ls kubernetes*
  3. kubernetes.csr kubernetes-csr.json kubernetes-key.pem kubernetes.pem

创建 admin 证书

创建 admin 证书签名请求文件 admin-csr.json

  1. {
  2. "CN": "admin",
  3. "hosts": [],
  4. "key": {
  5. "algo": "rsa",
  6. "size":
  7. },
  8. "names": [
  9. {
  10. "C": "CN",
  11. "ST": "BeiJing",
  12. "L": "BeiJing",
  13. "O": "system:masters",
  14. "OU": "System"
  15. }
  16. ]
  17. }
  • 后续 kube-apiserver 使用 RBAC 对客户端(如 kubeletkube-proxyPod)请求进行授权;
  • kube-apiserver 预定义了一些 RBAC 使用的 RoleBindings,如 cluster-admin 将 Group system:masters 与 Role cluster-admin 绑定,该 Role 授予了调用kube-apiserver所有 API的权限;
  • O 指定该证书的 Group 为 system:masterskubelet 使用该证书访问 kube-apiserver 时 ,由于证书被 CA 签名,所以认证通过,同时由于证书用户组为经过预授权的 system:masters,所以被授予访问所有 API 的权限;

注意:这个admin 证书,是将来生成管理员用的kube config 配置文件用的,现在我们一般建议使用RBAC 来对kubernetes 进行角色权限控制, kubernetes 将证书中的CN 字段 作为User, O 字段作为 Group

在搭建完 kubernetes 集群后,我们可以通过命令: kubectl get clusterrolebinding cluster-admin -o yaml ,查看到 clusterrolebinding cluster-admin 的 subjects 的 kind 是 Group,name 是 system:mastersroleRef 对象是 ClusterRole cluster-admin。 意思是凡是 system:masters Group 的 user 或者 serviceAccount 都拥有 cluster-admin 的角色。 因此我们在使用 kubectl 命令时候,才拥有整个集群的管理权限。可以使用 kubectl get clusterrolebinding cluster-admin -o yaml 来查看。

生成 admin 证书和私钥:

  1. $ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes admin-csr.json | cfssljson -bare admin
  2. $ ls admin*
  3. admin.csr admin-csr.json admin-key.pem admin.pem

创建 kube-proxy 证书

创建 kube-proxy 证书签名请求文件 kube-proxy-csr.json

  1. {
  2. "CN": "system:kube-proxy",
  3. "hosts": [],
  4. "key": {
  5. "algo": "rsa",
  6. "size":
  7. },
  8. "names": [
  9. {
  10. "C": "CN",
  11. "ST": "BeiJing",
  12. "L": "BeiJing",
  13. "O": "k8s",
  14. "OU": "System"
  15. }
  16. ]
  17. }
  • CN 指定该证书的 User 为 system:kube-proxy
  • kube-apiserver 预定义的 RoleBinding cluster-admin 将User system:kube-proxy 与 Role system:node-proxier 绑定,该 Role 授予了调用 kube-apiserver Proxy 相关 API 的权限;

生成 kube-proxy 客户端证书和私钥

校验证书

以 kubernetes 证书为例

  1. $ openssl x509 -noout -text -in kubernetes.pem
  2. .......
  3. Signature Algorithm: sha256WithRSAEncryption
  4. Issuer: C=CN, ST=BeiJing, L=BeiJing, O=k8s, OU=System, CN=kubernetes
  5. Validity
  6. Not Before: May :: GMT
  7. Not After : May :: GMT
  8. Subject: C=CN, ST=BeiJing, L=BeiJing, O=k8s, OU=System, CN=kubernetes
  9. Subject Public Key Info:
  10. Public Key Algorithm: rsaEncryption
  11. Public-Key: ( bit)
  12. .........
  13. X509v3 extensions:
  14. X509v3 Key Usage: critical
  15. Digital Signature, Key Encipherment
  16. X509v3 Extended Key Usage:
  17. TLS Web Server Authentication, TLS Web Client Authentication
  18. X509v3 Basic Constraints: critical
  19. CA:FALSE
  20. X509v3 Subject Key Identifier:
  21. E8:::B4::C6:E2::BA:9D::::B8:EA:B8::C9::A8
  22. X509v3 Authority Key Identifier:
  23. .........
  • 确认 Issuer 字段的内容和 ca-csr.json 一致;
  • 确认 Subject 字段的内容和 kubernetes-csr.json 一致;
  • 确认 X509v3 Subject Alternative Name 字段的内容和 kubernetes-csr.json 一致;
  • 确认 X509v3 Key Usage、Extended Key Usage 字段的内容和 ca-config.jsonkubernetes profile 一致;

使用 cfssl-certinfo 命令

  1. cfssl-certinfo -cert kubernetes.pem
  2. {
  3. "subject": {
  4. "common_name": "kubernetes",
  5. "country": "CN",
  6. "organization": "k8s",
  7. "organizational_unit": "System",
  8. "locality": "BeiJing",
  9. "province": "BeiJing",
  10. "names": [
  11. "CN",
  12. "BeiJing",
  13. "BeiJing",
  14. "k8s",
  15. "System",
  16. "kubernetes"
  17. ]
  18. },
  19. "issuer": {
  20. "common_name": "kubernetes",
  21. "country": "CN",
  22. "organization": "k8s",
  23. "organizational_unit": "System",
  24. "locality": "BeiJing",
  25. "province": "BeiJing",
  26. "names": [
  27. "CN",
  28. "BeiJing",
  29. "BeiJing",
  30. "k8s",
  31. "System",
  32. "kubernetes"
  33. ]
  34. },
  35. "serial_number": "",
  36. "sans": [
  37. "kubernetes",
  38. "kubernetes.default",
  39. "kubernetes.default.svc",
  40. "kubernetes.default.svc.cluster",
  41. "kubernetes.default.svc.cluster.local",
  42. "127.0.0.1",
  43. "172.16.138.100",
  44. "172.16.138.171",
  45. "172.16.138.172",
  46. "172.16.138.173",
  47. "10.254.0.1"
  48. ],
  49. "not_before": "2018-05-08T07:32:00Z",
  50. "not_after": "2028-05-05T07:32:00Z",
  51. "sigalg": "SHA256WithRSA",

分发证书

将生成的证书和秘钥文件(后缀名为.pem)拷贝到所有机器的 /etc/kubernetes/ssl 目录下备用;

  1. mkdir -p /etc/kubernetes/ssl
  2. cp *.pem /etc/kubernetes/ssl

2、安装kubectl命令行工具

下载 kubectl

注意请下载对应的Kubernetes版本的安装包。

  1. wget https://dl.k8s.io/v1.6.0/kubernetes-client-linux-amd64.tar.gz
  2. tar -xzvf kubernetes-client-linux-amd64.tar.gz
  3. cp kubernetes/client/bin/kube* /usr/bin/
  4. chmod a+x /usr/bin/kube*

3、创建 kubeconfig 文件

创建 TLS Bootstrapping Token

Token auth file

Token可以是任意的包含128 bit的字符串,可以使用安全的随机数发生器生成。

  1. export BOOTSTRAP_TOKEN=$(head -c /dev/urandom | od -An -t x | tr -d ' ')
  2. cat > token.csv <<EOF
  3. ${BOOTSTRAP_TOKEN},kubelet-bootstrap,,"system:kubelet-bootstrap"
  4. EOF

注意:在进行后续操作前请检查 token.csv 文件,确认其中的 ${BOOTSTRAP_TOKEN} 环境变量已经被真实的值替换。

BOOTSTRAP_TOKEN 将被写入到 kube-apiserver 使用的 token.csv 文件和 kubelet 使用的 bootstrap.kubeconfig 文件,如果后续重新生成了 BOOTSTRAP_TOKEN,则需要:

  1. 更新 token.csv 文件,分发到所有机器 (master 和 node)的 /etc/kubernetes/ 目录下,分发到node节点上非必需;
  2. 重新生成 bootstrap.kubeconfig 文件,分发到所有 node 机器的 /etc/kubernetes/ 目录下;
  3. 重启 kube-apiserver 和 kubelet 进程;
  4. 重新 approve kubelet 的 csr 请求;
  1. cp token.csv /etc/kubernetes/

创建 kubelet bootstrapping kubeconfig 文件

  1. cd /etc/kubernetes
  2. export KUBE_APISERVER="https://172.16.138.171:6443"
  3.  
  4. # 设置集群参数
  5. kubectl config set-cluster kubernetes \
  6. --certificate-authority=/etc/kubernetes/ssl/ca.pem \
  7. --embed-certs=true \
  8. --server=${KUBE_APISERVER} \
  9. --kubeconfig=bootstrap.kubeconfig
  10.  
  11. # 设置客户端认证参数
  12. kubectl config set-credentials kubelet-bootstrap \
  13. --token=${BOOTSTRAP_TOKEN} \
  14. --kubeconfig=bootstrap.kubeconfig
  15.  
  16. # 设置上下文参数
  17. kubectl config set-context default \
  18. --cluster=kubernetes \
  19. --user=kubelet-bootstrap \
  20. --kubeconfig=bootstrap.kubeconfig
  21.  
  22. # 设置默认上下文
  23. kubectl config use-context default --kubeconfig=bootstrap.kubeconfig
  • --embed-certstrue 时表示将 certificate-authority 证书写入到生成的 bootstrap.kubeconfig 文件中;
  • 设置客户端认证参数时没有指定秘钥和证书,后续由 kube-apiserver 自动生成;

创建 kube-proxy kubeconfig 文件

  1. export KUBE_APISERVER="https://172.16.138.171:6443"
  2. # 设置集群参数
  3. kubectl config set-cluster kubernetes \
  4. --certificate-authority=/etc/kubernetes/ssl/ca.pem \
  5. --embed-certs=true \
  6. --server=${KUBE_APISERVER} \
  7. --kubeconfig=kube-proxy.kubeconfig
  8.  
  9. # 设置客户端认证参数
  10. kubectl config set-credentials kube-proxy \
  11. --client-certificate=/etc/kubernetes/ssl/kube-proxy.pem \
  12. --client-key=/etc/kubernetes/ssl/kube-proxy-key.pem \
  13. --embed-certs=true \
  14. --kubeconfig=kube-proxy.kubeconfig
  15.  
  16. # 设置上下文参数
  17. kubectl config set-context default \
  18. --cluster=kubernetes \
  19. --user=kube-proxy \
  20. --kubeconfig=kube-proxy.kubeconfig
  21.  
  22. # 设置默认上下文
  23. kubectl config use-context default --kubeconfig=kube-proxy.kubeconfig
  • 设置集群参数和客户端认证参数时 --embed-certs 都为 true,这会将 certificate-authorityclient-certificateclient-key 指向的证书文件内容写入到生成的 kube-proxy.kubeconfig 文件中;
  • kube-proxy.pem 证书中 CN 为 system:kube-proxykube-apiserver 预定义的 RoleBinding cluster-admin 将User system:kube-proxy 与 Role system:node-proxier 绑定,该 Role 授予了调用 kube-apiserver Proxy 相关 API 的权限;

安装kubectl命令行工具

  1. export KUBE_APISERVER="https://172.16.138.171:6443"
  2. # 设置集群参数
  3. kubectl config set-cluster kubernetes \
  4. --certificate-authority=/etc/kubernetes/ssl/ca.pem \
  5. --embed-certs=true \
  6. --server=${KUBE_APISERVER}
  7.  
  8. # 设置客户端认证参数
  9. kubectl config set-credentials admin \
  10. --client-certificate=/etc/kubernetes/ssl/admin.pem \
  11. --embed-certs=true \
  12. --client-key=/etc/kubernetes/ssl/admin-key.pem
  13.  
  14. # 设置上下文参数
  15. kubectl config set-context kubernetes \
  16. --cluster=kubernetes \
  17. --user=admin
  18.  
  19. # 设置默认上下文
  20. kubectl config use-context kubernetes
  • admin.pem 证书 OU 字段值为 system:masterskube-apiserver 预定义的 RoleBinding cluster-admin 将 Group system:masters 与 Role cluster-admin 绑定,该 Role 授予了调用kube-apiserver 相关 API 的权限;
  • 生成的 kubeconfig 被保存到 ~/.kube/config 文件;

注意:~/.kube/config文件拥有对该集群的最高权限,请妥善保管。

分发 kubeconfig 文件

将两个 kubeconfig 文件分发到所有 Node 机器的 /etc/kubernetes/ 目录

  1. cp bootstrap.kubeconfig kube-proxy.kubeconfig /etc/kubernetes/

4、创建高可用 etcd 集群

TLS 认证文件

需要为 etcd 集群创建加密通信的 TLS 证书,这里复用以前创建的 kubernetes 证书

  1. cp ca.pem kubernetes-key.pem kubernetes.pem /etc/kubernetes/ssl
  • kubernetes 证书的 hosts 字段列表中包含上面三台机器的 IP,否则后续证书校验会失败;

下载二进制文件

https://github.com/coreos/etcd/releases 页面下载最新版本的二进制文件

  1. wget https://github.com/coreos/etcd/releases/download/v3.1.5/etcd-v3.1.5-linux-amd64.tar.gz
  2. tar -xvf etcd-v3.1.5-linux-amd64.tar.gz
  3. mv etcd-v3.1.5-linux-amd64/etcd* /usr/local/bin

创建 etcd 的 systemd unit 文件

在/usr/lib/systemd/system/目录下创建文件etcd.service,内容如下。注意替换IP地址为你自己的etcd集群的主机IP。

  1. [Unit]
  2. Description=Etcd Server
  3. After=network.target
  4. After=network-online.target
  5. Wants=network-online.target
  6. Documentation=https://github.com/coreos
  7.  
  8. [Service]
  9. Type=notify
  10. WorkingDirectory=/var/lib/etcd/
  11. EnvironmentFile=-/etc/etcd/etcd.conf
  12. ExecStart=/usr/local/bin/etcd \
  13. --name ${ETCD_NAME} \
  14. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  15. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  16. --peer-cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  17. --peer-key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  18. --trusted-ca-file=/etc/kubernetes/ssl/ca.pem \
  19. --peer-trusted-ca-file=/etc/kubernetes/ssl/ca.pem \
  20. --initial-advertise-peer-urls ${ETCD_INITIAL_ADVERTISE_PEER_URLS} \
  21. --listen-peer-urls ${ETCD_LISTEN_PEER_URLS} \
  22. --listen-client-urls ${ETCD_LISTEN_CLIENT_URLS},http://127.0.0.1:2379 \
  23. --advertise-client-urls ${ETCD_ADVERTISE_CLIENT_URLS} \
  24. --initial-cluster-token ${ETCD_INITIAL_CLUSTER_TOKEN} \
  25. --initial-cluster infra1=https://172.16.138.171:2380,infra2=https://172.16.138.172:2380,infra3=https://172.16.138.173:2380 \
  26. --initial-cluster-state new \
  27. --data-dir=${ETCD_DATA_DIR}
  28. Restart=on-failure
  29. RestartSec=
  30. LimitNOFILE=
  31.  
  32. [Install]
  33. WantedBy=multi-user.target
  • 指定 etcd 的工作目录为 /var/lib/etcd,数据目录为 /var/lib/etcd,需在启动服务前创建这个目录,否则启动服务的时候会报错“Failed at step CHDIR spawning /usr/bin/etcd: No such file or directory”;
  • 为了保证通信安全,需要指定 etcd 的公私钥(cert-file和key-file)、Peers 通信的公私钥和 CA 证书(peer-cert-file、peer-key-file、peer-trusted-ca-file)、客户端的CA证书(trusted-ca-file);
  • 创建 kubernetes.pem 证书时使用的 kubernetes-csr.json 文件的 hosts 字段包含所有 etcd 节点的IP,否则证书校验会出错;
  • --initial-cluster-state 值为 new 时,--name 的参数值必须位于 --initial-cluster 列表中;

环境变量配置文件/etc/etcd/etcd.conf

  1. # [member]
  2. ETCD_NAME=infra1
  3. ETCD_DATA_DIR="/var/lib/etcd"
  4. ETCD_LISTEN_PEER_URLS="https://172.16.138.171:2380"
  5. ETCD_LISTEN_CLIENT_URLS="https://172.16.138.171:2379"
  6.  
  7. #[cluster]
  8. ETCD_INITIAL_ADVERTISE_PEER_URLS="https://172.16.138.171:2380"
  9. ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster"
  10. ETCD_ADVERTISE_CLIENT_URLS="https://172.16.138.171:2379"

这是172.16.138.171节点的配置,其他两个etcd节点只要将上面的IP地址改成相应节点的IP地址即可。ETCD_NAME换成对应节点的infra1/2/3。

启动 etcd 服务

  1. mv etcd.service /usr/lib/systemd/system/
  2. systemctl daemon-reload
  3. systemctl enable etcd
  4. systemctl start etcd
  5. systemctl status etcd

在所有的 kubernetes master 节点重复上面的步骤,直到所有机器的 etcd 服务都已启动。

验证服务

在任意 kubernetes master 机器上执行如下命令:

  1. $ etcdctl \
  2. --ca-file=/etc/kubernetes/ssl/ca.pem \
  3. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  4. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  5. cluster-health
  6. -- ::53.668852 I | warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
  7. -- ::53.670937 I | warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
  8. member ab044f0f6d623edf is healthy: got healthy result from https://172.16.138.173:2379
  9. member cf3528b42907470b is healthy: got healthy result from https://172.16.138.172:2379
  10. member eab584ea44e13ad4 is healthy: got healthy result from https://172.16.138.171:2379
  11. cluster is healt

5、 部署master节点

kubernetes master 节点包含的组件:

  • kube-apiserver
  • kube-scheduler
  • kube-controller-manager

目前这三个组件需要部署在同一台机器上。

  • kube-schedulerkube-controller-managerkube-apiserver 三者的功能紧密相关;
  • 同时只能有一个 kube-schedulerkube-controller-manager 进程处于工作状态,如果运行多个,则需要通过选举产生一个 leader;

TLS 证书文件

  1. $ ls /etc/kubernetes/ssl
  2. admin-key.pem admin.pem ca-key.pem ca.pem kube-proxy-key.pem kube-proxy.pem kubernetes-key.pem kubernetes.pem

下载最新版本的二进制文件

changelog下载 clientserver tar包 文件

server 的 tarball kubernetes-server-linux-amd64.tar.gz 已经包含了 client(kubectl) 二进制文件,所以不用单独下载kubernetes-client-linux-amd64.tar.gz文件;

  1. wget https://dl.k8s.io/v1.7.16/kubernetes-server-linux-amd64.tar.gz
  2. tar -xzvf kubernetes-server-linux-amd64.tar.gz
  3. cd kubernetes
  4. tar -xzvf kubernetes-src.tar.gz

将二进制文件拷贝到指定路径

  1. cp -r server/bin/{kube-apiserver,kube-controller-manager,kube-scheduler,kubectl,kube-proxy,kubelet} /usr/local/bin/

配置和启动 kube-apiserver

创建 kube-apiserver的service配置文件

service配置文件/usr/lib/systemd/system/kube-apiserver.service内容:

  1. [Unit]
  2. Description=Kubernetes API Service
  3. Documentation=https://github.com/GoogleCloudPlatform/kubernetes
  4. After=network.target
  5. After=etcd.service
  6.  
  7. [Service]
  8. EnvironmentFile=-/etc/kubernetes/config
  9. EnvironmentFile=-/etc/kubernetes/apiserver
  10. ExecStart=/usr/local/bin/kube-apiserver \
  11. $KUBE_LOGTOSTDERR \
  12. $KUBE_LOG_LEVEL \
  13. $KUBE_ETCD_SERVERS \
  14. $KUBE_API_ADDRESS \
  15. $KUBE_API_PORT \
  16. $KUBELET_PORT \
  17. $KUBE_ALLOW_PRIV \
  18. $KUBE_SERVICE_ADDRESSES \
  19. $KUBE_ADMISSION_CONTROL \
  20. $KUBE_API_ARGS
  21. Restart=on-failure
  22. Type=notify
  23. LimitNOFILE=
  24.  
  25. [Install]
  26. WantedBy=multi-user.target

/etc/kubernetes/config文件的内容为:

  1. # kubernetes system config
  2. #
  3. # The following values are used to configure various aspects of all
  4. # kubernetes services, including
  5. #
  6. # kube-apiserver.service
  7. # kube-controller-manager.service
  8. # kube-scheduler.service
  9. # kubelet.service
  10. # kube-proxy.service
  11. # logging to stderr means we get it in the systemd journal
  12. KUBE_LOGTOSTDERR="--logtostderr=true"
  13.  
  14. # journal message level, is debug
  15. KUBE_LOG_LEVEL="--v=0"
  16.  
  17. # Should this cluster be allowed to run privileged docker containers
  18. KUBE_ALLOW_PRIV="--allow-privileged=true"
  19.  
  20. # How the controller-manager, scheduler, and proxy find the apiserver
  21.  
  22. KUBE_MASTER="--master=http://172.16.138.171:8080"

该配置文件同时被kube-apiserver、kube-controller-manager、kube-scheduler、kubelet、kube-proxy使用。

apiserver配置文件/etc/kubernetes/apiserver内容为:

  1. ###
  2. ## kubernetes system config
  3. ##
  4. ## The following values are used to configure the kube-apiserver
  5. ##
  6. #
  7. ## The address on the local server to listen to.
  8. #KUBE_API_ADDRESS="--insecure-bind-address=test-001.jimmysong.io"
  9. KUBE_API_ADDRESS="--advertise-address=172.16.138.171 --bind-address=172.16.138.171 --insecure-bind-address=172.16.138.171"
  10. #
  11. ## The port on the local server to listen on.
  12. #KUBE_API_PORT="--port=8080"
  13. #
  14. ## Port minions listen on
  15. #KUBELET_PORT="--kubelet-port=10250"
  16. #
  17. ## Comma separated list of nodes in the etcd cluster
  18. KUBE_ETCD_SERVERS="--etcd-servers=https://172.16.138.171:2379,https://172.16.138.172:2379,https://172.16.138.173:2379"
  19. #
  20. ## Address range to use for services
  21. KUBE_SERVICE_ADDRESSES="--service-cluster-ip-range=10.254.0.0/16"
  22. #
  23. ## default admission control policies
  24. KUBE_ADMISSION_CONTROL="--admission-control=ServiceAccount,NamespaceLifecycle,NamespaceExists,LimitRanger,ResourceQuota"
  25. #
  26. ## Add your own!
  27. KUBE_API_ARGS="--authorization-mode=RBAC --runtime-config=rbac.authorization.k8s.io/v1beta1 --kubelet-https=true --experimental-bootstrap-token-auth --token-auth-file=/etc/kubernetes/token.csv --service-node-por
  28. t-range=- --tls-cert-file=/etc/kubernetes/ssl/kubernetes.pem --tls-private-key-file=/etc/kubernetes/ssl/kubernetes-key.pem --client-ca-file=/etc/kubernetes/ssl/ca.pem --service-account-key-file=/etc/ku
  29. bernetes/ssl/ca-key.pem --etcd-cafile=/etc/kubernetes/ssl/ca.pem --etcd-certfile=/etc/kubernetes/ssl/kubernetes.pem --etcd-keyfile=/etc/kubernetes/ssl/kubernetes-key.pem --enable-swagger-ui=true --apiserver-coun
  30. t= --audit-log-maxage= --audit-log-maxbackup= --audit-log-maxsize= --audit-log-path=/var/lib/audit.log --event-ttl=1h"
  •  --experimental-bootstrap-token-auth Bootstrap Token Authentication在1.9版本已经变成了正式feature,参数名称改为--enable-bootstrap-token-auth
  • 如果中途修改过--service-cluster-ip-range地址,则必须将default命名空间的kubernetes的service给删除,使用命令:kubectl delete service kubernetes,然后系统会自动用新的ip重建这个service,不然apiserver的log有报错the cluster IP x.x.x.x for service kubernetes/default is not within the service CIDR x.x.x.x/16; please recreate
  • --authorization-mode=RBAC 指定在安全端口使用 RBAC 授权模式,拒绝未通过授权的请求;
  • kube-scheduler、kube-controller-manager 一般和 kube-apiserver 部署在同一台机器上,它们使用非安全端口和 kube-apiserver通信;
  • kubelet、kube-proxy、kubectl 部署在其它 Node 节点上,如果通过安全端口访问 kube-apiserver,则必须先通过 TLS 证书认证,再通过 RBAC 授权;
  • kube-proxy、kubectl 通过在使用的证书里指定相关的 User、Group 来达到通过 RBAC 授权的目的;
  • 如果使用了 kubelet TLS Boostrap 机制,则不能再指定 --kubelet-certificate-authority--kubelet-client-certificate--kubelet-client-key 选项,否则后续 kube-apiserver 校验 kubelet 证书时出现 ”x509: certificate signed by unknown authority“ 错误;
  • --admission-control 值必须包含 ServiceAccount
  • --bind-address 不能为 127.0.0.1
  • runtime-config配置为rbac.authorization.k8s.io/v1beta1,表示运行时的apiVersion;
  • --service-cluster-ip-range 指定 Service Cluster IP 地址段,该地址段不能路由可达;
  • 缺省情况下 kubernetes 对象保存在 etcd /registry 路径下,可以通过 --etcd-prefix 参数进行调整;
  • 如果需要开通http的无认证的接口,则可以增加以下两个参数:--insecure-port=8080 --insecure-bind-address=127.0.0.1。注意,生产上不要绑定到非127.0.0.1的地址上

启动kube-apiserver

  1. systemctl daemon-reload
  2. systemctl enable kube-apiserver
  3. systemctl start kube-apiserver
  4. systemctl status kube-apiserver

配置和启动 kube-controller-manager

创建 kube-controller-manager的serivce配置文件

文件路径/usr/lib/systemd/system/kube-controller-manager.service

  1. [Unit]
  2. Description=Kubernetes Controller Manager
  3. Documentation=https://github.com/GoogleCloudPlatform/kubernetes
  4.  
  5. [Service]
  6. EnvironmentFile=-/etc/kubernetes/config
  7. EnvironmentFile=-/etc/kubernetes/controller-manager
  8. ExecStart=/usr/local/bin/kube-controller-manager \
  9. $KUBE_LOGTOSTDERR \
  10. $KUBE_LOG_LEVEL \
  11. $KUBE_MASTER \
  12. $KUBE_CONTROLLER_MANAGER_ARGS
  13. Restart=on-failure
  14. LimitNOFILE=
  15.  
  16. [Install]
  17. WantedBy=multi-user.target

配置文件/etc/kubernetes/controller-manager

  1. ###
  2. # The following values are used to configure the kubernetes controller-manager
  3.  
  4. # defaults from config and apiserver should be adequate
  5.  
  6. # Add your own!
  7. KUBE_CONTROLLER_MANAGER_ARGS="--address=127.0.0.1 --service-cluster-ip-range=10.254.0.0/16 --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/ssl/ca.pem --cluster-signing-key-file=/etc/kubernetes/ssl/ca-key.pem --service-account-private-key-file=/etc/kubernetes/ssl/ca-key.pem --root-ca-file=/etc/kubernetes/ssl/ca.pem --leader-elect=true"
  • --service-cluster-ip-range 参数指定 Cluster 中 Service 的CIDR范围,该网络在各 Node 间必须路由不可达,必须和 kube-apiserver 中的参数一致;
  • --cluster-signing-* 指定的证书和私钥文件用来签名为 TLS BootStrap 创建的证书和私钥;
  • --root-ca-file 用来对 kube-apiserver 证书进行校验,指定该参数后,才会在Pod 容器的 ServiceAccount 中放置该 CA 证书文件
  • --address 值必须为 127.0.0.1,kube-apiserver 期望 scheduler 和 controller-manager 在同一台机器;

启动 kube-controller-manager

  1. systemctl daemon-reload
  2. systemctl enable kube-controller-manager
  3. systemctl start kube-controller-manager
  4. systemctl status kube-controller-manager

我们启动每个组件后可以通过执行命令kubectl get componentstatuses,来查看各个组件的状态;

  1. $ kubectl get componentstatuses
  2. NAME STATUS MESSAGE ERROR
  3. scheduler Unhealthy Get http://127.0.0.1:10251/healthz: dial tcp 127.0.0.1:10251: getsockopt: connection refused
  4. controller-manager Healthy ok
  5. etcd- Healthy {"health": "true"}
  6. etcd- Healthy {"health": "true"}
  7. etcd- Healthy {"health": "true"}

配置和启动 kube-scheduler

创建 kube-scheduler的serivce配置文件

文件路径/usr/lib/systemd/system/kube-scheduler.service

  1. [Unit]
  2. Description=Kubernetes Scheduler Plugin
  3. Documentation=https://github.com/GoogleCloudPlatform/kubernetes
  4.  
  5. [Service]
  6. EnvironmentFile=-/etc/kubernetes/config
  7. EnvironmentFile=-/etc/kubernetes/scheduler
  8. ExecStart=/usr/local/bin/kube-scheduler \
  9. $KUBE_LOGTOSTDERR \
  10. $KUBE_LOG_LEVEL \
  11. $KUBE_MASTER \
  12. $KUBE_SCHEDULER_ARGS
  13. Restart=on-failure
  14. LimitNOFILE=
  15.  
  16. [Install]
  17. WantedBy=multi-user.target

配置文件/etc/kubernetes/scheduler

  1. ###
  2. # kubernetes scheduler config
  3.  
  4. # default config should be adequate
  5.  
  6. # Add your own!
  7. KUBE_SCHEDULER_ARGS="--leader-elect=true --address=127.0.0.1"
  • --address 值必须为 127.0.0.1,因为当前 kube-apiserver 期望 scheduler 和 controller-manager 在同一台机器;

启动 kube-scheduler

  1. systemctl daemon-reload
  2. systemctl enable kube-scheduler
  3. systemctl start kube-scheduler
  4. systemctl status kube-scheduler

验证 master 节点功能

  1. $ kubectl get componentstatuses
  2. NAME STATUS MESSAGE ERROR
  3. scheduler Healthy ok
  4. controller-manager Healthy ok
  5. etcd- Healthy {"health": "true"}
  6. etcd- Healthy {"health": "true"}
  7. etcd- Healthy {"health": "true"}

6、安装flannel网络插件

所有的node节点都需要安装网络插件才能让所有的Pod加入到同一个局域网中,本文是安装flannel网络插件的参考文档。

建议直接使用yum安装flanneld,除非对版本有特殊需求,默认安装的是0.7.1版本的flannel。

  1. yum install -y flannel

service配置文件/usr/lib/systemd/system/flanneld.service

  1. [Unit]
  2. Description=Flanneld overlay address etcd agent
  3. After=network.target
  4. After=network-online.target
  5. Wants=network-online.target
  6. After=etcd.service
  7. Before=docker.service
  8.  
  9. [Service]
  10. Type=notify
  11. EnvironmentFile=/etc/sysconfig/flanneld
  12. EnvironmentFile=-/etc/sysconfig/docker-network
  13. ExecStart=/usr/bin/flanneld-start \
  14. -etcd-endpoints=${FLANNEL_ETCD_ENDPOINTS} \
  15. -etcd-prefix=${FLANNEL_ETCD_PREFIX} \
  16. $FLANNEL_OPTIONS
  17. ExecStartPost=/usr/libexec/flannel/mk-docker-opts.sh -k DOCKER_NETWORK_OPTIONS -d /run/flannel/docker
  18. Restart=on-failure
  19.  
  20. [Install]
  21. WantedBy=multi-user.target
  22. RequiredBy=docker.service

/etc/sysconfig/flanneld配置文件:

  1. # Flanneld configuration options
  2. #
  3. # # etcd url location. Point this to the server where etcd runs
  4. FLANNEL_ETCD_ENDPOINTS="https://172.16.138.171:2379,https://172.16.138.172:2379,https://172.16.138.173:2379"
  5. #
  6. # # etcd config key. This is the configuration key that flannel queries
  7. # # For address range assignment
  8. FLANNEL_ETCD_PREFIX="/kube-centos/network"
  9. #
  10. # # Any additional options that you want to pass
  11. FLANNEL_OPTIONS="-etcd-cafile=/etc/kubernetes/ssl/ca.pem -etcd-certfile=/etc/kubernetes/ssl/kubernetes.pem -etcd-keyfile=/etc/kubernetes/ssl/kubernetes-key.pem"

如果是多网卡(例如vagrant环境),则需要在FLANNEL_OPTIONS中增加指定的外网出口的网卡,例如-iface=eth2

在etcd中创建网络配置

执行下面的命令为docker分配IP地址段。

  1. etcdctl --endpoints=https://172.16.138.171:2379,https://172.16.138.172:2379,https://172.16.138.173:2379 \
  2. --ca-file=/etc/kubernetes/ssl/ca.pem \
  3. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  4. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  5. mkdir /kube-centos/network
  6.  
  7. etcdctl --endpoints=https://172.16.138.171:2379,https://172.16.138.171:2379,https://172.16.138.171:2379 \
  8. --ca-file=/etc/kubernetes/ssl/ca.pem \
  9. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  10. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  11. mk /kube-centos/network/config '{"Network":"172.30.0.0/16","SubnetLen":24,"Backend":{"Type":"vxlan"}}'

如果你要使用host-gw模式,可以直接将vxlan改成host-gw即可。

启动flannel

  1. systemctl daemon-reload
  2. systemctl enable flanneld
  3. systemctl start flanneld
  4. systemctl status flanneld

现在查询etcd中的内容可以看到:

  1. $ etcdctl --endpoints=${ETCD_ENDPOINTS} \
  2. --ca-file=/etc/kubernetes/ssl/ca.pem \
  3. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  4. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  5. ls /kube-centos/network/subnets
  6.  
  7. /kube-centos/network/subnets/172.30.71.0-
  8. /kube-centos/network/subnets/172.30.16.0-
  9. /kube-centos/network/subnets/172.30.58.0-
  10.  
  11. $ etcdctl --endpoints=${ETCD_ENDPOINTS} \
  12. --ca-file=/etc/kubernetes/ssl/ca.pem \
  13. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  14. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  15. get /kube-centos/network/config
  16.  
  17. {"Network":"172.30.0.0/16","SubnetLen":,"Backend":{"Type":"vxlan"}}
  18.  
  19. $ etcdctl --endpoints=${ETCD_ENDPOINTS} \
  20. --ca-file=/etc/kubernetes/ssl/ca.pem \
  21. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  22. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  23. get /kube-centos/network/subnets/172.30.14.0-
  24.  
  25. {"PublicIP":"172.16.138.171","BackendType":"vxlan","BackendData":{"VtepMAC":"7e:0e:49:74:de:b3"}}
  26.  
  27. $ etcdctl --endpoints=${ETCD_ENDPOINTS} \
  28. --ca-file=/etc/kubernetes/ssl/ca.pem \
  29. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  30. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  31. get /kube-centos/network/subnets/172.30.16.0-
  32.  
  33. {"PublicIP":"172.16.138.172","BackendType":"vxlan","BackendData":{"VtepMAC":"5a:ab:55:02:7f:96"}}
  34.  
  35. $ etcdctl --endpoints=${ETCD_ENDPOINTS} \
  36. --ca-file=/etc/kubernetes/ssl/ca.pem \
  37. --cert-file=/etc/kubernetes/ssl/kubernetes.pem \
  38. --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \
  39. get /kube-centos/network/subnets/172.30.58.0-
  40.  
  41. {"PublicIP":"172.16.138.173","BackendType":"vxlan","BackendData":{"VtepMAC":"3a:37:7d:55:b7:77"}}

如果可以查看到以上内容证明flannel已经安装完成,下一步是在node节点上安装和配置docker、kubelet、kube-proxy

7、部署node节点

Kubernetes node节点包含如下组件:

  • Flanneld:参考上一节
  • Docker1.17.03:docker的安装很简单,这里也不说了,但是需要注意docker的配置。
  • kubelet:直接用二进制文件安装
  • kube-proxy:直接用二进制文件安装

注意:每台 node 上都需要安装 flannel,master 节点上可以不安装。

步骤简介

  1. 确认在上一步中我们安装配置的网络插件flannel已启动且运行正常
  2. 安装配置docker后启动
  3. 安装配置kubelet、kube-proxy后启动
  4. 验证

目录和文件

我们再检查一下三个节点上,经过前几步操作我们已经创建了如下的证书和配置文件。

  1. $ ls /etc/kubernetes/ssl
  2. admin-key.pem admin.pem ca-key.pem ca.pem kube-proxy-key.pem kube-proxy.pem kubernetes-key.pem kubernetes.pem
  3. $ ls /etc/kubernetes/
  4. apiserver bootstrap.kubeconfig config controller-manager kubelet kube-proxy.kubeconfig proxy scheduler ssl token.csv

配置Docker

yum方式安装的flannel

修改docker的配置文件/usr/lib/systemd/system/docker.service,增加一条环境变量配置:

  1. EnvironmentFile=-/run/flannel/docker

/run/flannel/docker文件是flannel启动后自动生成的,其中包含了docker启动时需要的参数。

启动docker

重启了docker后还要重启kubelet,这时又遇到问题,kubelet启动失败。报错:

  1. Mar :: k8s-master kubelet[]: error: failed to run Kubelet: failed to create kubelet: misconfiguration: kubelet cgroup driver: "cgroupfs" is different from docker cgroup driver: "systemd"

这是kubelet与docker的cgroup driver不一致导致的,kubelet启动的时候有个—cgroup-driver参数可以指定为"cgroupfs"或者“systemd”。

  1. --cgroup-driver string Driver that the kubelet uses to manipulate cgroups on the host. Possible values: 'cgroupfs', 'systemd' (default "cgroupfs")

配置docker的service配置文件/usr/lib/systemd/system/docker.service,设置ExecStart中的--exec-opt native.cgroupdriver=systemd

安装和配置kubelet

kubelet 启动时向 kube-apiserver 发送 TLS bootstrapping 请求,需要先将 bootstrap token 文件中的 kubelet-bootstrap 用户赋予 system:node-bootstrapper cluster 角色(role), 然后 kubelet 才能有权限创建认证请求(certificate signing requests):

  1. cd /etc/kubernetes
  2. kubectl create clusterrolebinding kubelet-bootstrap \
  3. --clusterrole=system:node-bootstrapper \
  4. --user=kubelet-bootstrap
  • --user=kubelet-bootstrap 是在 /etc/kubernetes/token.csv 文件中指定的用户名,同时也写入了 /etc/kubernetes/bootstrap.kubeconfig 文件;

下载最新的kubelet和kube-proxy二进制文件

注意请下载对应的Kubernetes版本的安装包。

  1. wget https://dl.k8s.io/v1.7.16/kubernetes-server-linux-amd64.tar.gz
  2. tar -xzvf kubernetes-server-linux-amd64.tar.gz
  3. cd kubernetes
  4. tar -xzvf kubernetes-src.tar.gz
  5. cp -r ./server/bin/{kube-proxy,kubelet} /usr/local/bin/

创建kubelet的service配置文件

文件位置/usr/lib/systemd/system/kubelet.service

  1. [Unit]
  2. Description=Kubernetes Kubelet Server
  3. Documentation=https://github.com/GoogleCloudPlatform/kubernetes
  4. After=docker.service
  5. Requires=docker.service
  6.  
  7. [Service]
  8. WorkingDirectory=/var/lib/kubelet
  9. EnvironmentFile=-/etc/kubernetes/config
  10. EnvironmentFile=-/etc/kubernetes/kubelet
  11. ExecStart=/usr/local/bin/kubelet \
  12. $KUBE_LOGTOSTDERR \
  13. $KUBE_LOG_LEVEL \
  14. $KUBELET_API_SERVER \
  15. $KUBELET_ADDRESS \
  16. $KUBELET_PORT \
  17. $KUBELET_HOSTNAME \
  18. $KUBE_ALLOW_PRIV \
  19. $KUBELET_POD_INFRA_CONTAINER \
  20. $KUBELET_ARGS
  21. Restart=on-failure
  22.  
  23. [Install]
  24. WantedBy=multi-user.target

kubelet的配置文件/etc/kubernetes/kubelet。其中的IP地址更改为你的每台node节点的IP地址。

注意:在启动kubelet之前,需要先手动创建/var/lib/kubelet目录。

下面是kubelet的配置文件/etc/kubernetes/kubelet:

  1. ###
  2. ## kubernetes kubelet (minion) config
  3. #
  4. ## The address for the info server to serve on (set to 0.0.0.0 or "" for all interfaces)
  5. KUBELET_ADDRESS="--address=172.16.138.171"
  6. #
  7. ## The port for the info server to serve on
  8. #KUBELET_PORT="--port=10250"
  9. #
  10. ## You may leave this blank to use the actual hostname
  11. KUBELET_HOSTNAME="--hostname-override=172.16.138.171"
  12. #
  13. ## location of the api-server
  14. ## COMMENT THIS ON KUBERNETES 1.8+
  15. KUBELET_API_SERVER="--api-servers=http://172.16.138.171:8080"
  16. #
  17. ## pod infrastructure container
  18. KUBELET_POD_INFRA_CONTAINER="--pod-infra-container-image=harbor.suixingpay.com/kube/pause-amd64:3.0"
  19. #
  20. ## Add your own!
  21. KUBELET_ARGS="--cgroup-driver=systemd --cluster-dns=10.254.0.2 --experimental-bootstrap-kubeconfig=/etc/kubernetes/bootstrap.kubeconfig --kubeconfig=/etc/kubernetes/kubelet.kubeconfig --require-kubeconfig --cert
  22. -dir=/etc/kubernetes/ssl --cluster-domain=cluster.local --hairpin-mode promiscuous-bridge --serialize-image-pulls=false"
  • 如果使用systemd方式启动,则需要额外增加两个参数--runtime-cgroups=/systemd/system.slice --kubelet-cgroups=/systemd/system.slice
  • --experimental-bootstrap-kubeconfig 在1.9版本已经变成了--bootstrap-kubeconfig
  • --address 不能设置为 127.0.0.1,否则后续 Pods 访问 kubelet 的 API 接口时会失败,因为 Pods 访问的 127.0.0.1 指向自己而不是 kubelet;
  • 如果设置了 --hostname-override 选项,则 kube-proxy 也需要设置该选项,否则会出现找不到 Node 的情况;
  • "--cgroup-driver 配置成 systemd,不要使用cgroup,否则在 CentOS 系统中 kubelet 将启动失败(保持docker和kubelet中的cgroup driver配置一致即可,不一定非使用systemd)。
  • --experimental-bootstrap-kubeconfig 指向 bootstrap kubeconfig 文件,kubelet 使用该文件中的用户名和 token 向 kube-apiserver 发送 TLS Bootstrapping 请求;
  • 管理员通过了 CSR 请求后,kubelet 自动在 --cert-dir 目录创建证书和私钥文件(kubelet-client.crtkubelet-client.key),然后写入 --kubeconfig 文件;
  • 建议在 --kubeconfig 配置文件中指定 kube-apiserver 地址,如果未指定 --api-servers 选项,则必须指定 --require-kubeconfig 选项后才从配置文件中读取 kube-apiserver 的地址,否则 kubelet 启动后将找不到 kube-apiserver (日志中提示未找到 API Server),kubectl get nodes 不会返回对应的 Node 信息;
  • --cluster-dns 指定 kubedns 的 Service IP(可以先分配,后续创建 kubedns 服务时指定该 IP),--cluster-domain 指定域名后缀,这两个参数同时指定后才会生效;
  • --cluster-domain 指定 pod 启动时 /etc/resolve.conf 文件中的 search domain ,起初我们将其配置成了 cluster.local.,这样在解析 service 的 DNS 名称时是正常的,可是在解析 headless service 中的 FQDN pod name 的时候却错误,因此我们将其修改为 cluster.local,去掉最后面的 ”点号“ 就可以解决该问题。
  • --kubeconfig=/etc/kubernetes/kubelet.kubeconfig中指定的kubelet.kubeconfig文件在第一次启动kubelet之前并不存在,请看下文,当通过CSR请求后会自动生成kubelet.kubeconfig文件,如果你的节点上已经生成了~/.kube/config文件,你可以将该文件拷贝到该路径下,并重命名为kubelet.kubeconfig,所有node节点可以共用同一个kubelet.kubeconfig文件,这样新添加的节点就不需要再创建CSR请求就能自动添加到kubernetes集群中。同样,在任意能够访问到kubernetes集群的主机上使用kubectl --kubeconfig命令操作集群时,只要使用~/.kube/config文件就可以通过权限认证,因为这里面已经有认证信息并认为你是admin用户,对集群拥有所有权限。
  • KUBELET_POD_INFRA_CONTAINER 是基础镜像容器,这里我用的是私有镜像仓库地址,大家部署的时候需要修改为自己的镜像

启动kublet

  1. systemctl daemon-reload
  2. systemctl enable kubelet
  3. systemctl start kubelet
  4. systemctl status kubelet

通过 kublet 的 TLS 证书请求

kubelet 首次启动时向 kube-apiserver 发送证书签名请求,必须通过后 kubernetes 系统才会将该 Node 加入到集群。

查看未授权的 CSR 请求

  1. $ kubectl get csr
  2. NAME AGE REQUESTOR CONDITION
  3. node-csr-0bi8ZxaLgRc4fUV1sGSsG6II84MMlEg-4ttACLGq3AE 21s kubelet-bootstrap Pending
  4. $ kubectl get nodes
  5. No resources found.

通过 CSR 请求

  1. $ kubectl certificate approve node-csr-0bi8ZxaLgRc4fUV1sGSsG6II84MMlEg-4ttACLGq3AE
  2. certificatesigningrequest "node-csr-0bi8ZxaLgRc4fUV1sGSsG6II84MMlEg-4ttACLGq3AE" approved
  3. $ kubectl get nodes
  4. NAME STATUS AGE VERSION
  5. 172.16.138.171 Ready 6s v1.7.16

自动生成了 kubelet kubeconfig 文件和公私钥

  1. $ ls -l /etc/kubernetes/kubelet.kubeconfig
  2. -rw------- root root Apr : /etc/kubernetes/kubelet.kubeconfig
  3. $ ls -l /etc/kubernetes/ssl/kubelet*
  4. -rw-r--r-- root root Apr : /etc/kubernetes/ssl/kubelet-client.crt
  5. -rw------- root root Apr : /etc/kubernetes/ssl/kubelet-client.key
  6. -rw-r--r-- root root Apr : /etc/kubernetes/ssl/kubelet.crt
  7. -rw------- root root Apr : /etc/kubernetes/ssl/kubelet.key

假如你更新kubernetes的证书,只要没有更新token.csv,当重启kubelet后,该node就会自动加入到kuberentes集群中,而不会重新发送certificaterequest,也不需要在master节点上执行kubectl certificate approve操作。前提是不要删除node节点上的/etc/kubernetes/ssl/kubelet*/etc/kubernetes/kubelet.kubeconfig文件。否则kubelet启动时会提示找不到证书而失败。

注意:如果启动kubelet的时候见到证书相关的报错,有个trick可以解决这个问题,可以将master节点上的~/.kube/config文件(该文件在安装kubectl命令行工具这一步中将会自动生成)拷贝到node节点的/etc/kubernetes/kubelet.kubeconfig位置,这样就不需要通过CSR,当kubelet启动后就会自动加入的集群中。

配置 kube-proxy

安装conntrack

  1. yum install -y conntrack-tools

创建 kube-proxy 的service配置文件

文件路径/usr/lib/systemd/system/kube-proxy.service

  1. [Unit]
  2. Description=Kubernetes Kube-Proxy Server
  3. Documentation=https://github.com/GoogleCloudPlatform/kubernetes
  4. After=network.target
  5.  
  6. [Service]
  7. EnvironmentFile=-/etc/kubernetes/config
  8. EnvironmentFile=-/etc/kubernetes/proxy
  9. ExecStart=/usr/local/bin/kube-proxy \
  10. $KUBE_LOGTOSTDERR \
  11. $KUBE_LOG_LEVEL \
  12. $KUBE_MASTER \
  13. $KUBE_PROXY_ARGS
  14. Restart=on-failure
  15. LimitNOFILE=
  16.  
  17. [Install]
  18. WantedBy=multi-user.target

kube-proxy配置文件/etc/kubernetes/proxy

  1. ###
  2. # kubernetes proxy config
  3.  
  4. # default config should be adequate
  5.  
  6. # Add your own!
  7. KUBE_PROXY_ARGS="--bind-address=172.16.138.171 --hostname-override=172.16.138.171 --kubeconfig=/etc/kubernetes/kube-proxy.kubeconfig --cluster-cidr=10.254.0.0/16"
  • --hostname-override 参数值必须与 kubelet 的值一致,否则 kube-proxy 启动后会找不到该 Node,从而不会创建任何 iptables 规则;
  • kube-proxy 根据 --cluster-cidr 判断集群内部和外部流量,指定 --cluster-cidr--masquerade-all 选项后 kube-proxy 才会对访问 Service IP 的请求做 SNAT;
  • --kubeconfig 指定的配置文件嵌入了 kube-apiserver 的地址、用户名、证书、秘钥等请求和认证信息;
  • 预定义的 RoleBinding cluster-admin 将User system:kube-proxy 与 Role system:node-proxier 绑定,该 Role 授予了调用 kube-apiserver Proxy 相关 API 的权限;

启动 kube-proxy

  1. systemctl daemon-reload
  2. systemctl enable kube-proxy
  3. systemctl start kube-proxy
  4. systemctl status kube-proxy

验证

我们创建一个nginx的service试一下集群是否可用。

  1. $ kubectl run nginx --replicas= --labels="run=load-balancer-example" --image=index.tenxcloud.com/xjimmy/nginx:1.9. --port=
  2. deployment "nginx" created
  3. $ kubectl expose deployment nginx --type=NodePort --name=example-service
  4. service "example-service" exposed
  5. $ kubectl describe svc example-service
  6. Name: example-service
  7. Namespace: default
  8. Labels: run=load-balancer-example
  9. Annotations: <none>
  10. Selector: run=load-balancer-example
  11. Type: NodePort
  12. IP: 10.254.173.196
  13. Port: <unset> /TCP
  14. NodePort: <unset> /TCP
  15. Endpoints: 172.17.0.2:,172.17.0.3:
  16. Session Affinity: None
  17. Events: <none>
  18. $ curl 10.254.173.196:
  19. <!DOCTYPE html>
  20. <html>
  21. <head>
  22. <title>Welcome to nginx!</title>
  23. <style>
  24. body {
  25. width: 35em;
  26. margin: auto;
  27. font-family: Tahoma, Verdana, Arial, sans-serif;
  28. }
  29. </style>
  30. </head>
  31. <body>
  32. <h1>Welcome to nginx!</h1>
  33. <p>If you see this page, the nginx web server is successfully installed and
  34. working. Further configuration is required.</p>
  35.  
  36. <p>For online documentation and support please refer to
  37. <a href="http://nginx.org/">nginx.org</a>.<br/>
  38. Commercial support is available at
  39. <a href="http://nginx.com/">nginx.com</a>.</p>
  40.  
  41. <p><em>Thank you for using nginx.</em></p>
  42. </body>
  43. </html>

8、安装kubedns插件

官方的yaml文件目录:kubernetes/cluster/addons/dns

该插件直接使用kubernetes部署,官方的配置文件中包含以下镜像:

  1. gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.
  2. gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.
  3. gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.

我clone了上述镜像,上传到我的私有镜像仓库:

  1. harbor.suixingpay.com/kube1./k8s-dns-kube-dns-amd64:1.14.
  2. harbor.suixingpay.com/kube1./k8s-dns-sidecar-amd64:1.14.
  3. harbor.suixingpay.com/kube1./k8s-dns-dnsmasq-nanny-amd64:1.14.

以下yaml配置文件中使用的是私有镜像仓库中的镜像。

  1. kubedns-cm.yaml
  2. kubedns-sa.yaml
  3. kubedns-controller.yaml
  4. kubedns-svc.yaml

系统预定义的 RoleBinding

预定义的 RoleBinding system:kube-dns 将 kube-system 命名空间的 kube-dns ServiceAccount 与 system:kube-dns Role 绑定, 该 Role 具有访问 kube-apiserver DNS 相关 API 的权限;

  1. $ kubectl get clusterrolebindings system:kube-dns -o yaml
  2. apiVersion: rbac.authorization.k8s.io/v1beta1
  3. kind: ClusterRoleBinding
  4. metadata:
  5. annotations:
  6. rbac.authorization.kubernetes.io/autoupdate: "true"
  7. creationTimestamp: --10T02::04Z
  8. labels:
  9. kubernetes.io/bootstrapping: rbac-defaults
  10. name: system:kube-dns
  11. resourceVersion: ""
  12. selfLink: /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/system%3Akube-dns
  13. uid: 3b753e98-53f8-11e8-9a54-00505693535c
  14. roleRef:
  15. apiGroup: rbac.authorization.k8s.io
  16. kind: ClusterRole
  17. name: system:kube-dns
  18. subjects:
  19. - kind: ServiceAccount
  20. name: kube-dns
  21. namespace: kube-system

kubedns-controller.yaml 中定义的 Pods 时使用了 kubedns-sa.yaml 文件定义的 kube-dns ServiceAccount,所以具有访问 kube-apiserver DNS 相关 API 的权限。

配置 kube-dns ServiceAccount

无需配置

配置 kube-dns 服务

  1. # Copyright The Kubernetes Authors.
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14.  
  15. # __MACHINE_GENERATED_WARNING__
  16.  
  17. apiVersion: v1
  18. kind: Service
  19. metadata:
  20. name: kube-dns
  21. namespace: kube-system
  22. labels:
  23. k8s-app: kube-dns
  24. kubernetes.io/cluster-service: "true"
  25. addonmanager.kubernetes.io/mode: Reconcile
  26. kubernetes.io/name: "KubeDNS"
  27. spec:
  28. selector:
  29. k8s-app: kube-dns
  30. clusterIP: 10.254.0.2
  31. ports:
  32. - name: dns
  33. port:
  34. protocol: UDP
  35. - name: dns-tcp
  36. port:
  37. protocol: TCP
  • spec.clusterIP = 10.254.0.2,即明确指定了 kube-dns Service IP,这个 IP 需要和 kubelet 的 --cluster-dns 参数值一致;

配置kube-dns Deployment

  1. # Copyright The Kubernetes Authors.
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14.  
  15. # Should keep target in cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
  16. # in sync with this file.
  17.  
  18. # __MACHINE_GENERATED_WARNING__
  19.  
  20. apiVersion: extensions/v1beta1
  21. kind: Deployment
  22. metadata:
  23. name: kube-dns
  24. namespace: kube-system
  25. labels:
  26. k8s-app: kube-dns
  27. kubernetes.io/cluster-service: "true"
  28. addonmanager.kubernetes.io/mode: Reconcile
  29. spec:
  30. # replicas: not specified here:
  31. # . In order to make Addon Manager do not reconcile this replicas parameter.
  32. # . Default is .
  33. # . Will be tuned in real time if DNS horizontal auto-scaling is turned on.
  34. strategy:
  35. rollingUpdate:
  36. maxSurge: %
  37. maxUnavailable:
  38. selector:
  39. matchLabels:
  40. k8s-app: kube-dns
  41. template:
  42. metadata:
  43. labels:
  44. k8s-app: kube-dns
  45. annotations:
  46. scheduler.alpha.kubernetes.io/critical-pod: ''
  47. spec:
  48. tolerations:
  49. - key: "CriticalAddonsOnly"
  50. operator: "Exists"
  51. volumes:
  52. - name: kube-dns-config
  53. configMap:
  54. name: kube-dns
  55. optional: true
  56. containers:
  57. - name: kubedns
  58. image: harbor.suixingpay.com/kube1./k8s-dns-kube-dns-amd64:1.14.
  59. resources:
  60. # TODO: Set memory limits when we've profiled the container for large
  61. # clusters, then set request = limit to keep this container in
  62. # guaranteed class. Currently, this container falls into the
  63. # "burstable" category so the kubelet doesn't backoff from restarting it.
  64. limits:
  65. memory: 170Mi
  66. requests:
  67. cpu: 100m
  68. memory: 70Mi
  69. livenessProbe:
  70. httpGet:
  71. path: /healthcheck/kubedns
  72. port:
  73. scheme: HTTP
  74. initialDelaySeconds:
  75. timeoutSeconds:
  76. successThreshold:
  77. failureThreshold:
  78. readinessProbe:
  79. httpGet:
  80. path: /readiness
  81. port:
  82. scheme: HTTP
  83. # we poll on pod startup for the Kubernetes master service and
  84. # only setup the /readiness HTTP server once that's available.
  85. initialDelaySeconds:
  86. timeoutSeconds:
  87. args:
  88. - --domain=cluster.local.
  89. - --dns-port=
  90. - --config-dir=/kube-dns-config
  91. - --v=
  92. #__PILLAR__FEDERATIONS__DOMAIN__MAP__
  93. env:
  94. - name: PROMETHEUS_PORT
  95. value: ""
  96. ports:
  97. - containerPort:
  98. name: dns-local
  99. protocol: UDP
  100. - containerPort:
  101. name: dns-tcp-local
  102. protocol: TCP
  103. - containerPort:
  104. name: metrics
  105. protocol: TCP
  106. volumeMounts:
  107. - name: kube-dns-config
  108. mountPath: /kube-dns-config
  109. - name: dnsmasq
  110. image: harbor.suixingpay.com/kube1./k8s-dns-dnsmasq-nanny-amd64:1.14.
  111. livenessProbe:
  112. httpGet:
  113. path: /healthcheck/dnsmasq
  114. port:
  115. scheme: HTTP
  116. initialDelaySeconds:
  117. timeoutSeconds:
  118. successThreshold:
  119. failureThreshold:
  120. args:
  121. - -v=
  122. - -logtostderr
  123. - -configDir=/etc/k8s/dns/dnsmasq-nanny
  124. - -restartDnsmasq=true
  125. - --
  126. - -k
  127. - --cache-size=
  128. - --log-facility=-
  129. - --server=/cluster.local./127.0.0.1#
  130. - --server=/in-addr.arpa/127.0.0.1#
  131. - --server=/ip6.arpa/127.0.0.1#
  132. ports:
  133. - containerPort:
  134. name: dns
  135. protocol: UDP
  136. - containerPort:
  137. name: dns-tcp
  138. protocol: TCP
  139. # see: https://github.com/kubernetes/kubernetes/issues/29055 for details
  140. resources:
  141. requests:
  142. cpu: 150m
  143. memory: 20Mi
  144. volumeMounts:
  145. - name: kube-dns-config
  146. mountPath: /etc/k8s/dns/dnsmasq-nanny
  147. - name: sidecar
  148. image: harbor.suixingpay.com/kube1./k8s-dns-sidecar-amd64:1.14.
  149. livenessProbe:
  150. httpGet:
  151. path: /metrics
  152. port:
  153. scheme: HTTP
  154. initialDelaySeconds:
  155. timeoutSeconds:
  156. successThreshold:
  157. failureThreshold:
  158. args:
  159. - --v=
  160. - --logtostderr
  161. - --probe=kubedns,127.0.0.1:,kubernetes.default.svc.cluster.local.,,A
  162. - --probe=dnsmasq,127.0.0.1:,kubernetes.default.svc.cluster.local.,,A
  163. ports:
  164. - containerPort:
  165. name: metrics
  166. protocol: TCP
  167. resources:
  168. requests:
  169. memory: 20Mi
  170. cpu: 10m
  171. dnsPolicy: Default # Don't use cluster DNS.
  172. serviceAccountName: kube-dns
  • 使用系统已经做了 RoleBinding 的 kube-dns ServiceAccount,该账户具有访问 kube-apiserver DNS 相关 API 的权限;

执行所有定义文件

  1. $ pwd
  2. /root/kubedns
  3. $ ls *.yaml
  4. kubedns-cm.yaml kubedns-controller.yaml kubedns-sa.yaml kubedns-svc.yaml
  5. $ kubectl create -f .
    configmap "kube-dns" created
    deployment "kube-dns" created
    serviceaccount "kube-dns" created
    service "kube-dns" create

检查 kubedns 功能

新建一个 Deployment

  1. $ cat my-nginx.yaml
  2. apiVersion: extensions/v1beta1
  3. kind: Deployment
  4. metadata:
  5. name: my-nginx
  6. spec:
  7. replicas:
  8. template:
  9. metadata:
  10. labels:
  11. run: my-nginx
  12. spec:
  13. containers:
  14. - name: my-nginx
  15. image: index.tenxcloud.com/xjimmy/nginx:1.9.
  16. ports:
  17. - containerPort:

Export 该 Deployment, 生成 my-nginx 服务

  1. $ kubectl expose deploy my-nginx
  2. $ kubectl get services --all-namespaces |grep my-nginx
  3. default my-nginx 10.254.89.137 <none> /TCP 5s

创建另一个 Pod,查看 /etc/resolv.conf 是否包含 kubelet 配置的 --cluster-dns--cluster-domain,是否能够将服务 my-nginx 解析到 Cluster IP 10.254.89.137

  1. $ kubectl get pods --all-namespaces
  2. NAMESPACE     NAME                        READY     STATUS    RESTARTS   AGE
    default       my-nginx-3466650801-bngns   1/1       Running   0          1h
    default       my-nginx-3466650801-q8gmv   1/1       Running   0          1h
    default       nginx-608366207-621q4       1/1       Running   0          22h
    default       nginx-608366207-84z2w       1/1       Running   0          22h
    kube-system   kube-dns-1041264494-l5lkl   3/3       Running   0          1h

  3. $ kubectl get services --all-namespaces
    NAMESPACE     NAME              CLUSTER-IP       EXTERNAL-IP   PORT(S)         AGE
    default       example-service   10.254.173.196   <nodes>       80:31498/TCP    20h
    default       kubernetes        10.254.0.1       <none>        443/TCP         1d
    default       my-nginx          10.254.89.137    <none>        80/TCP          3m
    kube-system   kube-dns          10.254.0.2       <none>        53/UDP,53/TCP   6m
  4. $ kubectl exec my-nginx--bngns -i -t -- /bin/bash
  5. root@my-nginx--bngns:~# cat /etc/resolv.conf
  6. nameserver 10.254.0.2
  7. search default.svc.cluster.local svc.cluster.local cluster.local
  8. options ndots:
  9. root@my-nginx--bngns:~# ping my-nginx
  10. PING my-nginx.default.svc.cluster.local (10.254.89.137): data bytes
  11. ^C--- my-nginx.default.svc.cluster.local ping statistics ---
  12. packets transmitted, packets received, % packet loss
  13. root@my-nginx--bngns:~# ping kubernetes
  14. PING kubernetes.default.svc.cluster.local (10.254.0.1): data bytes
  15. ^C--- kubernetes.default.svc.cluster.local ping statistics ---
  16. packets transmitted, packets received, % packet loss
  17. root@my-nginx--bngns:~# ping example-service
  18. PING example-service.default.svc.cluster.local (10.254.173.196): data bytes
  19. ^C--- example-service.default.svc.cluster.local ping statistics ---
  20. packets transmitted, packets received, % packet loss

从结果来看,service名称可以正常解析。

注意:直接ping ClusterIP是ping不通的,ClusterIP是根据IPtables路由到服务的endpoint上,只有结合ClusterIP加端口才能访问到对应的服务。

9、安装dashboard插件

官方文件目录:https://github.com/kubernetes/kubernetes/tree/master/cluster/addons/dashboard

我们使用的文件如下:

  1. $ ls *.yaml
  2. dashboard-controller.yaml dashboard-service.yaml dashboard-rbac.yaml

由于 kube-apiserver 启用了 RBAC 授权,而官方源码目录的 dashboard-controller.yaml 没有定义授权的 ServiceAccount,所以后续访问 API server 的 API 时会被拒绝,web中提示:

  1. orbidden ()
  2.  
  3. User "system:serviceaccount:kube-system:default" cannot list jobs.batch in the namespace "default". (get jobs.batch)

增加了一个dashboard-rbac.yaml文件,定义一个名为 dashboard 的 ServiceAccount,然后将它和 Cluster Role view 绑定,如下:

  1. apiVersion: v1
  2. kind: ServiceAccount
  3. metadata:
  4. name: dashboard
  5. namespace: kube-system
  6.  
  7. ---
  8.  
  9. kind: ClusterRoleBinding
  10. apiVersion: rbac.authorization.k8s.io/v1beta1
  11. metadata:
  12. name: dashboard
  13. subjects:
  14. - kind: ServiceAccount
  15. name: dashboard
  16. namespace: kube-system
  17. roleRef:
  18. kind: ClusterRole
  19. name: cluster-admin
  20. apiGroup: rbac.authorization.k8s.io

然后使用kubectl apply -f dashboard-rbac.yaml创建。

配置dashboard-service

  1. apiVersion: v1
  2. kind: Service
  3. metadata:
  4. name: kubernetes-dashboard
  5. namespace: kube-system
  6. labels:
  7. k8s-app: kubernetes-dashboard
  8. kubernetes.io/cluster-service: "true"
  9. addonmanager.kubernetes.io/mode: Reconcile
  10. spec:
  11. type: NodePort
  12. selector:
  13. k8s-app: kubernetes-dashboard
  14. ports:
  15. - port:
  16. targetPort:

配置dashboard-controller

  1. apiVersion: extensions/v1beta1
  2. kind: Deployment
  3. metadata:
  4. name: kubernetes-dashboard
  5. namespace: kube-system
  6. labels:
  7. k8s-app: kubernetes-dashboard
  8. kubernetes.io/cluster-service: "true"
  9. addonmanager.kubernetes.io/mode: Reconcile
  10. spec:
  11. selector:
  12. matchLabels:
  13. k8s-app: kubernetes-dashboard
  14. template:
  15. metadata:
  16. labels:
  17. k8s-app: kubernetes-dashboard
  18. annotations:
  19. scheduler.alpha.kubernetes.io/critical-pod: ''
  20. spec:
  21. serviceAccountName: dashboard
  22. containers:
  23. - name: kubernetes-dashboard
  24. image: harbor.suixingpay.com/kube1./kubernetes-dashboard-amd64:v1.6.0
  25. resources:
  26. limits:
  27. cpu: 100m
  28. memory: 50Mi
  29. requests:
  30. cpu: 100m
  31. memory: 50Mi
  32. ports:
  33. - containerPort:
  34. livenessProbe:
  35. httpGet:
  36. path: /
  37. port:
  38. initialDelaySeconds:
  39. timeoutSeconds:
  40. tolerations:
  41. - key: "CriticalAddonsOnly"
  42. operator: "Exists"

执行所有定义文件

  1. $ pwd
  2. /root/kubedashboard
  3. $ ls *.yaml
  4. dashboard-controller.yaml dashboard-service.yaml
  5. $ kubectl create -f .
  6. service "kubernetes-dashboard" created
  7. deployment "kubernetes-dashboard" created

检查执行结果

查看分配的 NodePort

  1. $ kubectl get services kubernetes-dashboard -n kube-system
  2. NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE
  3. kubernetes-dashboard 10.254.166.88 <nodes> :/TCP 14s
  • NodePort 31304映射到 dashboard pod 80端口;

检查 controller

  1. $ kubectl get deployment kubernetes-dashboard -n kube-system
  2. NAME DESIRED CURRENT UP-TO-DATE AVAILABLE AGE
  3. kubernetes-dashboard 20s
  4. $ kubectl get pods -n kube-system | grep dashboard
  5. kubernetes-dashboard--34tbz / Running 25s

访问dashboard

有以下三种方式:

  • kubernetes-dashboard 服务暴露了 NodePort,可以使用 http://NodeIP:nodePort 地址访问 dashboard
  • 通过 API server 访问 dashboard(https 6443端口和http 8080端口方式)
  • 通过 kubectl proxy 访问 dashboard

通过 kubectl proxy 访问 dashboard

启动代理

  1. $ kubectl proxy --address='172.16.138.171' --port= --accept-hosts='^*$'
  2. Starting to serve on 172.16.138.171:
  • 需要指定 --accept-hosts 选项,否则浏览器访问 dashboard 页面时提示 “Unauthorized”;

浏览器访问 URL:http://172.16.138.171:8086/ui 自动跳转到:http://172.16.138.171:8086/api/v1/namespaces/kube-system/services/kubernetes-dashboard/proxy/#!/overview?namespace=default

通过 API server 访问dashboard

获取集群服务地址列表

  1. $ kubectl cluster-info
  2. Kubernetes master is running at https://172.16.138.171:6443
  3. KubeDNS is running at https://172.16.138.171:6443/api/v1/namespaces/kube-system/services/kube-dns/proxy
  4. kubernetes-dashboard is running at https://172.16.138.171:6443/api/v1/namespaces/kube-system/services/kubernetes-dashboard/proxy
  5.  
  6. To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.

浏览器访问 https://172.16.138.171:6443/api/v1/proxy/namespaces/kube-system/services/kubernetes-dashboard(浏览器会提示证书验证,因为通过加密通道,以改方式访问的话,需要提前导入证书到你的计算机中)。

如果你不想使用https的话,可以直接访问insecure port 8080端口:http://172.16.138.171:8080/api/v1/proxy/namespaces/kube-system/services/kubernetes-dashboard

10、安装heapster插件

准备YAML文件

  1. wget https://github.com/kubernetes/heapster/archive/v1.3.0.zip
  2. unzip v1.3.0.zip
  3. mv v1.3.0.zip heapster-1.3.

文件目录: heapster-1.3.0/deploy/kube-config/influxdb

  1. $ cd heapster-1.3./deploy/kube-config/influxdb
  2. $ ls *.yaml
  3. grafana-deployment.yaml grafana-service.yaml heapster-deployment.yaml heapster-service.yaml influxdb-deployment.yaml influxdb-service.yaml heapster-rbac.yaml

我们自己创建了heapster的rbac配置heapster-rbac.yaml

配置 grafana-deployment

grafana-deployment.yaml

  1. apiVersion: extensions/v1beta1
  2. kind: Deployment
  3. metadata:
  4. name: monitoring-grafana
  5. namespace: kube-system
  6. spec:
  7. replicas:
  8. template:
  9. metadata:
  10. labels:
  11. task: monitoring
  12. k8s-app: grafana
  13. spec:
  14. containers:
  15. - name: grafana
  16. image: harbor.suixingpay.com/kube1./heapster-grafana-amd64:v4.0.2
  17. ports:
  18. - containerPort:
  19. protocol: TCP
  20. volumeMounts:
  21. - mountPath: /var
  22. name: grafana-storage
  23. env:
  24. - name: INFLUXDB_HOST
  25. value: monitoring-influxdb
  26. - name: GRAFANA_PORT
  27. value: ""
  28. # The following env variables are required to make Grafana accessible via
  29. # the kubernetes api-server proxy. On production clusters, we recommend
  30. # removing these env variables, setup auth for grafana, and expose the grafana
  31. # service using a LoadBalancer or a public IP.
  32. - name: GF_AUTH_BASIC_ENABLED
  33. value: "false"
  34. - name: GF_AUTH_ANONYMOUS_ENABLED
  35. value: "true"
  36. - name: GF_AUTH_ANONYMOUS_ORG_ROLE
  37. value: Admin
  38. - name: GF_SERVER_ROOT_URL
  39. # If you're only using the API Server proxy, set this value instead:
  40. # value: /api/v1/proxy/namespaces/kube-system/services/monitoring-grafana/
  41. value: /
  42. volumes:
  43. - name: grafana-storage
  44. emptyDir: {}
  • 如果后续使用 kube-apiserver 或者 kubectl proxy 访问 grafana dashboard,则必须将 GF_SERVER_ROOT_URL 设置为 /api/v1/proxy/namespaces/kube-system/services/monitoring-grafana/,否则后续访问grafana时访问时提示找不到http://172.16.138.171:8086/api/v1/proxy/namespaces/kube-system/services/monitoring-grafana/api/dashboards/home 页面;

配置 heapster-deployment

heapster-deployment.yaml

  1. apiVersion: extensions/v1beta1
  2. kind: Deployment
  3. metadata:
  4. name: heapster
  5. namespace: kube-system
  6. spec:
  7. replicas:
  8. template:
  9. metadata:
  10. labels:
  11. task: monitoring
  12. k8s-app: heapster
  13. spec:
  14. containers:
  15. - name: heapster
  16. image: harbor.suixingpay.com/kube1./heapster-amd64:v1.3.0-beta.
  17. imagePullPolicy: IfNotPresent
  18. command:
  19. - /heapster
  20. - --source=kubernetes:https://kubernetes.default
  21. - --sink=influxdb:http://monitoring-influxdb:8086

配置 influxdb-deployment

  1. $ # 导出镜像中的 influxdb 配置文件
  2. $ docker run --rm --entrypoint 'cat' -ti lvanneo/heapster-influxdb-amd64:v1.1.1 /etc/config.toml >config.toml.orig
  3. $ cp config.toml.orig config.toml
  4. $ # 修改:启用 admin 接口
  5. $ vim config.toml
  6. $ diff config.toml.orig config.toml
  7. 35c35
  8. < enabled = false
  9. ---
  10. > enabled = true
  11. $ # 将修改后的配置写入到 ConfigMap 对象中
  12. $ kubectl create configmap influxdb-config --from-file=config.toml -n kube-system
  13. configmap "influxdb-config" created
  14. $ # 将 ConfigMap 中的配置文件挂载到 Pod 中,达到覆盖原始配置的目的
  15. apiVersion: extensions/v1beta1
  16. kind: Deployment
  17. metadata:
  18. name: monitoring-influxdb
  19. namespace: kube-system
  20. spec:
  21. replicas:
  22. template:
  23. metadata:
  24. labels:
  25. task: monitoring
  26. k8s-app: influxdb
  27. spec:
  28. containers:
  29. - name: influxdb
  30. image: harbor.suixingpay.com/kube1./heapster-influxdb-amd64:v1.1.1
  31. volumeMounts:
  32. - mountPath: /data
  33. name: influxdb-storage
  34. - mountPath: /etc/config.toml
  35. name: influxdb-config
  36. volumes:
  37. - name: influxdb-storage
  38. emptyDir: {}
  39. - name: influxdb-config
  40. configMap:
  41. name: influxdb-config

配置 monitoring-influxdb Service

  1. apiVersion: v1
  2. kind: Service
  3. metadata:
  4. labels:
  5. task: monitoring
  6. # For use as a Cluster add-on (https://github.com/kubernetes/kubernetes/tree/master/cluster/addons)
  7. # If you are NOT using this as an addon, you should comment out this line.
  8. kubernetes.io/cluster-service: 'true'
  9. kubernetes.io/name: monitoring-influxdb
  10. name: monitoring-influxdb
  11. namespace: kube-system
  12. spec:
  13. type: NodePort
  14. ports:
  15. - port:
  16. targetPort:
  17. name: http
  18. - port:
  19. targetPort:
  20. name: admin
  21. selector:
  22. k8s-app: influxdb
  • 定义端口类型为 NodePort,额外增加了 admin 端口映射,用于后续浏览器访问 influxdb 的 admin UI 界面;

配置  heapster-rbac

  1. $ vim heapster-rbac.yaml
  2. apiVersion: v1
  3. kind: ServiceAccount
  4. metadata:
  5. name: heapster
  6. namespace: kube-system
  7.  
  8. ---
  9.  
  10. kind: ClusterRoleBinding
  11. apiVersion: rbac.authorization.k8s.io/v1beta1
  12. metadata:
  13. name: heapster
  14. subjects:
  15. - kind: ServiceAccount
  16. name: heapster
  17. namespace: kube-system
  18. roleRef:
  19. kind: ClusterRole
  20. name: cluster-admin
  21. apiGroup: rbac.authorization.k8s.io

执行所有定义文件

  1. $ pwd
  2. /root/heapster-1.3./deploy/kube-config/influxdb
    $ ls *.yaml
  3. grafana-service.yaml heapster-rbac.yaml influxdb-cm.yaml influxdb-service.yaml
  4. grafana-deployment.yaml heapster-deployment.yaml heapster-service.yaml influxdb-deployment.yaml
  5. $ kubectl create -f .
  6. deployment "monitoring-grafana" created
  7. service "monitoring-grafana" created
  8. deployment "heapster" created
  9. serviceaccount "heapster" created
  10. clusterrolebinding "heapster" created
  11. service "heapster" created
  12. configmap "influxdb-config" created
  13. deployment "monitoring-influxdb" created
  14. service "monitoring-influxdb" created

检查执行结果

检查 Deployment

  1. $ kubectl get deployments -n kube-system | grep -E 'heapster|monitoring'
  2. heapster 2m
  3. monitoring-grafana 2m
  4. monitoring-influxdb 2m

检查 Pods

  1. $ kubectl get pods -n kube-system | grep -E 'heapster|monitoring'
  2. heapster--gpg8v / Running 2m
  3. monitoring-grafana--9z89f / Running 2m
  4. monitoring-influxdb--lzrpc / Running 2m

CentOS上手工部署kubernetes集群的更多相关文章

  1. 在CentOS7上部署Kubernetes集群

    在CentOS7上部署Kubernetes集群 文/FCBusquest 2015-12-22 18:36:00 简介 Kubernetes(k8s)是Google开源的大规模容器集群管理系统, 本文 ...

  2. 使用kubeadm部署Kubernetes集群

    一.环境架构与部署准备 1.集群节点架构与各节点所需安装的服务如下图: 2.安装环境与软件版本: Master: 所需软件:docker-ce 17.03.kubelet1.11.1.kubeadm1 ...

  3. 使用Rancher的RKE快速部署Kubernetes集群

    简要说明: 本文共涉及3台Ubuntu机器,1台RKE部署机器(192.168.3.161),2台Kubernetes集群机器(3.162和3.163). 先在Windows机器上,将rke_linu ...

  4. kubeadm部署Kubernetes集群

    Preface 通过kubeadm管理工具部署Kubernetes集群,相对离线包的二进制部署集群方式而言,更为简单与便捷.以下为个人学习总结: 两者区别在于前者部署方式使得大部分集群组件(Kube- ...

  5. 使用Kubespray部署Kubernetes集群

    转载请标明出处: http://blog.csdn.net/forezp/article/details/82730382 本文出自方志朋的博客 Kubespray是Google开源的一个部署生产级别 ...

  6. 和我一步步部署 kubernetes 集群

    和我一步步部署 kubernetes 集群 本系列文档介绍使用二进制部署最新 kubernetes v1.6.1 集群的所有步骤,而不是使用 kubeadm 等自动化方式来部署集群: 在部署的过程中, ...

  7. 二进制部署 Kubernetes 集群

    二进制部署 Kubernetes 集群   提供的几种Kubernetes部署方式 minikube Minikube是一个工具,可以在本地快速运行一个单点的Kubernetes,尝试Kubernet ...

  8. 基于TLS证书手动部署kubernetes集群(下)

    一.master节点组件部署 承接上篇文章--基于TLS证书手动部署kubernetes集群(上),我们已经部署好了etcd集群.flannel网络以及每个节点的docker,接下来部署master节 ...

  9. 高可用Kubernetes集群-15. 部署Kubernetes集群统一日志管理

    参考文档: Github:https://github.com/kubernetes/kubernetes/tree/master/cluster/addons/fluentd-elasticsear ...

随机推荐

  1. python的小练习

    # -*- coding: utf-8 -*- """练习:有1,2,3,4. 4个数能组成多少个互不相同且无重复数字的三位数,分别是多少?""&qu ...

  2. MySQL数据库实现分页查询的SQL语句写法!

    一:分页需求: 客户端通过传递start(页码),limit(每页显示的条数)两个参数去分页查询数据库表中的数据,那我们知道MySql数据库提供了分页的函数limit m,n,但是该函数的用法和我们的 ...

  3. Ionic3的http请求如何实现token验证,并且超时返回登录页

    要求 后台提供的接口,不能让人随便输入个链接就能访问,而是要加入一个token,token是动态的,每次访问的时候判断,有权限并且未过期的时候才可以访问接口. 后台的设计是 在登录的时候,首先要pos ...

  4. day3 python简介 IDE选择

    优势趋势基于c语言.c语言是编译底层语言,c跨平台需要重新编译,pyh可以直接使用c的库文件,比起c有绝对的开发效率目前为全球语言使用频率为第四名,第一java.从几年前第8名已超越php第6名. 擅 ...

  5. MT【287】余弦的线性组合

    (2017北大特优)在$\Delta ABC$中,$cos A+\sqrt{2}cos B+\sqrt{2}cos C$的最大值____ 解答 :2$cos A+\sqrt{2}cos B+\sqrt ...

  6. 【HDU - 4345 】Permutation(DP)

    BUPT2017 wintertraining(15) #8F 题意 1到n的排列,经过几次置换(也是一个排列)回到原来的排列,就是循环了. 现在给n(<=1000),求循环周期的所有可能数. ...

  7. 【BZOJ4316】小C的独立集(动态规划)

    [BZOJ4316]小C的独立集(动态规划) 题面 BZOJ 题解 考虑树的独立集求法 设\(f[i][0/1]\)表示\(i\)这个点一定不选,以及\(i\)这个点无所谓的最大值 转移\(f[u][ ...

  8. Nmap扫描常用参数

    TCP: nmap -sC -sS -sV -p 1-65535 -A -v -v -oX filename.xml -Pn ip 类似: nmap -sS -A -sV -vv -sC -PN -p ...

  9. luogu2605 基站选址 (线段树优化dp)

    设f[i][j]表示在第i个村庄建第j个基站的花费 那么有$f[i][j]=min\{f[k][j-1]+w[k,i]\}$,其中w[k,i]表示在k,i建基站,k,i中间的不能被满足的村庄的赔偿金之 ...

  10. 软件补丁问题(SPFA+位运算)

    洛谷P2761 1.考虑到所有的错误只有“修复,未修复”两种情况,所以可以用0,1标记压缩状态,采用位运算减少时空浪费. 又考虑到有修复时间的关系,将时间抽象成边,将状态抽象为点(设修复为0,未修复为 ...