资讯专栏INFORMATION COLUMN

kubeadm部署k8s1.9高可用集群--4部署master节点

tomlingtm / 1907人阅读

摘要:部署节点节点包含的组件本文档介绍部署一个三节点高可用集群的步骤,分别命名为安装在每台主机安装。出现如下错误解决办法启动参数增加参数增加在物理机上可能并不会出现该问题。至此一个完整的高可用集群搭建完毕。

部署master节点

kubernetes master 节点包含的组件:

kube-apiserver

kube-scheduler

kube-controller-manager

本文档介绍部署一个三节点高可用 master 集群的步骤,分别命名为k8s-host1k8s-host2k8s-host3

k8s-host1:172.16.120.154

k8s-host2:172.16.120.155

k8s-host3:172.16.120.156

安装docker

在每台主机安装docker。建议使用docker v1.12 , 但是 v1.11, v1.13 and 17.03 也可以正常工作. 版本 17.06+ 可能工作, 但是没有被k8s团队测试过。
PS:kubelet设置的cgroup driver应该和Docker设置的cgroup driver一致。这边统一为systemd。

</>复制代码

  1. yum install -y docker
  2. systemctl enable docker && systemctl start docker
安装kubeadm, kubelet 和 kubectl

</>复制代码

  1. cat < /etc/yum.repos.d/kubernetes.repo
  2. [kubernetes]
  3. name=Kubernetes
  4. baseurl=https://packages.cloud.google.com/yum/repos/kubernetes-el7-x86_64
  5. enabled=1
  6. gpgcheck=1
  7. repo_gpgcheck=1
  8. gpgkey=https://packages.cloud.google.com/yum/doc/yum-key.gpg https://packages.cloud.google.com/yum/doc/rpm-package-key.gpg
  9. EOF
  10. setenforce 0
  11. yum install -y kubelet kubeadm kubectl
  12. systemctl enable kubelet && systemctl start kubelet

通过运行命令setenforce 0 禁用selinux,主要为了允许容器可以访问主机文件系统和pod networks的需要。

Some users on RHEL/CentOS 7 have reported issues with traffic being routed incorrectly due to iptables being bypassed。所以需要执行下面命令:

</>复制代码

  1. cat < /etc/sysctl.d/k8s.conf
  2. net.bridge.bridge-nf-call-ip6tables = 1
  3. net.bridge.bridge-nf-call-iptables = 1
  4. EOF
  5. sysctl --system
安装master kubeadm init

</>复制代码

  1. kubeadm init --apiserver-advertise-address=172.16.120.200 --pod-network-cidr=192.168.0.0/16

apiserver-advertise-address该参数一般指定为haproxy+keepalived 的vip。

pod-network-cidr 主要是在搭建pod network(calico)时候需要在init时候指定。

出现如下错误:

</>复制代码

  1. [root@k8s-node04 ~]# kubeadm init --apiserver-advertise-address=172.16.120.200 --pod-network-cidr=192.168.0.0/16
  2. [init] Using Kubernetes version: v1.9.0
  3. [init] Using Authorization modes: [Node RBAC]
  4. [preflight] Running pre-flight checks.
  5. [WARNING FileExisting-crictl]: crictl not found in system path
  6. [preflight] Some fatal errors occurred:
  7. [ERROR Swap]: running with swap on is not supported. Please disable swap
  8. [preflight] If you know what you are doing, you can make a check non-fatal with `--ignore-preflight-errors=...`

解决办法:
1:kubelet启动参数增加--fail-swap-on=false

</>复制代码

  1. [Service]
  2. Environment="KUBELET_KUBECONFIG_ARGS=--bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf"
  3. Environment="KUBELET_SYSTEM_PODS_ARGS=--pod-manifest-path=/etc/kubernetes/manifests --allow-privileged=true"
  4. Environment="KUBELET_NETWORK_ARGS=--network-plugin=cni --cni-conf-dir=/etc/cni/net.d --cni-bin-dir=/opt/cni/bin"
  5. Environment="KUBELET_DNS_ARGS=--cluster-dns=10.96.0.10 --cluster-domain=cluster.local"
  6. Environment="KUBELET_AUTHZ_ARGS=--authorization-mode=Webhook --client-ca-file=/etc/kubernetes/pki/ca.crt"
  7. Environment="KUBELET_CADVISOR_ARGS=--cadvisor-port=0"
  8. Environment="KUBELET_CGROUP_ARGS=--cgroup-driver=systemd"
  9. Environment="KUBELET_CERTIFICATE_ARGS=--rotate-certificates=true --cert-dir=/var/lib/kubelet/pki"
  10. Environment="KUBELET_SWAP_ARGS=--fail-swap-on=false"
  11. ExecStart=
  12. ExecStart=/usr/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_SYSTEM_PODS_ARGS $KUBELET_NETWORK_ARGS $KUBELET_DNS_ARGS $KUBELET_AUTHZ_ARGS $KUBELET_CADVISOR_ARGS $KUBELET_CGROUP_ARGS $KUBELET_CERTIFICATE_ARGS $KUBELET_EXTRA_ARGS $KUBELET_SWAP_ARGS

2:kubeadm init 参数增加ignore-preflight-errors

</>复制代码

  1. kubeadm init --apiserver-advertise-address=172.16.120.200 --pod-network-cidr=192.168.0.0/16 --ignore-preflight-errors "Swap"

3:在物理机上可能并不会出现该问题。

最终安装成功

</>复制代码

  1. [root@k8s-host1 manifests]# kubeadm init --apiserver-advertise-address=172.16.120.200 --pod-network-cidr=192.168.0.0/16 --ignore-preflight-errors "Swap"
  2. [init] Using Kubernetes version: v1.9.0
  3. [init] Using Authorization modes: [Node RBAC]
  4. [preflight] Running pre-flight checks.
  5. [WARNING Swap]: running with swap on is not supported. Please disable swap
  6. [WARNING FileExisting-crictl]: crictl not found in system path
  7. [preflight] Starting the kubelet service
  8. [certificates] Generated ca certificate and key.
  9. [certificates] Generated apiserver certificate and key.
  10. [certificates] apiserver serving cert is signed for DNS names [k8s-host1 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 172.16.120.200]
  11. [certificates] Generated apiserver-kubelet-client certificate and key.
  12. [certificates] Generated sa key and public key.
  13. [certificates] Generated front-proxy-ca certificate and key.
  14. [certificates] Generated front-proxy-client certificate and key.
  15. [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki"
  16. [kubeconfig] Wrote KubeConfig file to disk: "admin.conf"
  17. [kubeconfig] Wrote KubeConfig file to disk: "kubelet.conf"
  18. [kubeconfig] Wrote KubeConfig file to disk: "controller-manager.conf"
  19. [kubeconfig] Wrote KubeConfig file to disk: "scheduler.conf"
  20. [controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml"
  21. [controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml"
  22. [controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml"
  23. [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml"
  24. [init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests".
  25. [init] This might take a minute or longer if the control plane images have to be pulled.
  26. [apiclient] All control plane components are healthy after 30.002346 seconds
  27. [uploadconfig] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace
  28. [markmaster] Will mark node k8s-host1 as master by adding a label and a taint
  29. [markmaster] Master k8s-host1 tainted and labelled with key/value: node-role.kubernetes.io/master=""
  30. [bootstraptoken] Using token: 26ea24.cb987cb5cf6f29a6
  31. [bootstraptoken] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials
  32. [bootstraptoken] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token
  33. [bootstraptoken] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster
  34. [bootstraptoken] Creating the "cluster-info" ConfigMap in the "kube-public" namespace
  35. [addons] Applied essential addon: kube-dns
  36. [addons] Applied essential addon: kube-proxy
  37. Your Kubernetes master has initialized successfully!
  38. To start using your cluster, you need to run the following as a regular user:
  39. mkdir -p $HOME/.kube
  40. sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
  41. sudo chown $(id -u):$(id -g) $HOME/.kube/config
  42. You should now deploy a pod network to the cluster.
  43. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
  44. https://kubernetes.io/docs/concepts/cluster-administration/addons/
  45. You can now join any number of machines by running the following on each node
  46. as root:
  47. kubeadm join --token 26ea24.cb987cb5cf6f29a6 172.16.120.200:6443 --discovery-token-ca-cert-hash sha256:a2d5e0391695bb122d4a43dc951f93934a2aaa1360e00556401a49ea0ec2bdab

PS 需要记下 kubeadm join --token 26ea24.cb987cb5cf6f29a6 172.16.120.200:6443 --discovery-token-ca-cert-hash sha256:a2d5e0391695bb122d4a43dc951f93934a2aaa1360e00556401a49ea0ec2bdab,便于以后node加入到k8s集群中。

将kube-apiserver指向上一节部署的etcd集群

首先需要将上节生成的etcd ca等证书cp到mater主机的/etc/etcd/ssl/下

默认kubeadm安装了一个etcd节点,非集群,非加密,所以我们必须对kube-apiserver.yaml做修改。
修改后的kube-apiserver.yaml:

</>复制代码

  1. apiVersion: v1
  2. kind: Pod
  3. metadata:
  4. annotations:
  5. scheduler.alpha.kubernetes.io/critical-pod: ""
  6. labels:
  7. component: kube-apiserver
  8. tier: control-plane
  9. name: kube-apiserver
  10. namespace: kube-system
  11. spec:
  12. containers:
  13. - command:
  14. - kube-apiserver
  15. - --allow-privileged=true
  16. - --requestheader-username-headers=X-Remote-User
  17. - --requestheader-group-headers=X-Remote-Group
  18. - --requestheader-extra-headers-prefix=X-Remote-Extra-
  19. - --service-cluster-ip-range=10.96.0.0/12
  20. - --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt
  21. - --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
  22. - --enable-bootstrap-token-auth=true
  23. - --service-account-key-file=/etc/kubernetes/pki/sa.pub
  24. - --tls-cert-file=/etc/kubernetes/pki/apiserver.crt
  25. - --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt
  26. - --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key
  27. - --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt
  28. - --insecure-port=0
  29. - --admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota
  30. - --requestheader-allowed-names=front-proxy-client
  31. - --advertise-address=172.16.120.200
  32. - --client-ca-file=/etc/kubernetes/pki/ca.crt
  33. - --secure-port=6443
  34. - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
  35. - --tls-private-key-file=/etc/kubernetes/pki/apiserver.key
  36. - --authorization-mode=Node,RBAC
  37. - --etcd-servers=https://172.16.120.151:2379,https://172.16.120.152:2379,https://172.16.120.153:2379
  38. - --etcd-cafile=/etc/etcd/ssl/ca.pem
  39. - --etcd-certfile=/etc/etcd/ssl/etcd.pem
  40. - --etcd-keyfile=/etc/etcd/ssl/etcd-key.pem
  41. image: gcr.io/google_containers/kube-apiserver-amd64:v1.9.0
  42. livenessProbe:
  43. failureThreshold: 8
  44. httpGet:
  45. host: 172.16.120.200
  46. path: /healthz
  47. port: 6443
  48. scheme: HTTPS
  49. initialDelaySeconds: 15
  50. timeoutSeconds: 15
  51. name: kube-apiserver
  52. resources:
  53. requests:
  54. cpu: 250m
  55. volumeMounts:
  56. - mountPath: /etc/kubernetes/pki
  57. name: k8s-certs
  58. readOnly: true
  59. - mountPath: /etc/ssl/certs
  60. name: ca-certs
  61. readOnly: true
  62. - mountPath: /etc/pki
  63. name: ca-certs-etc-pki
  64. readOnly: true
  65. - mountPath: /etc/etcd/ssl
  66. name: ca-certs-etc-etcd-ssl
  67. readOnly: true
  68. hostNetwork: true
  69. volumes:
  70. - hostPath:
  71. path: /etc/kubernetes/pki
  72. type: DirectoryOrCreate
  73. name: k8s-certs
  74. - hostPath:
  75. path: /etc/ssl/certs
  76. type: DirectoryOrCreate
  77. name: ca-certs
  78. - hostPath:
  79. path: /etc/pki
  80. type: DirectoryOrCreate
  81. name: ca-certs-etc-pki
  82. - hostPath:
  83. path: /etc/etcd/ssl
  84. type: DirectoryOrCreate
  85. name: ca-certs-etc-etcd-ssl
  86. status: {}

注意添加了以下四项:

</>复制代码

  1. --etcd-cafile=/etc/etcd/ssl/ca.pem
  2. --etcd-certfile=/etc/etcd/ssl/etcd.pem
  3. --etcd-keyfile=/etc/etcd/ssl/etcd-key.pem
  4. --etcd-servers=https://172.16.120.151:2379,https://172.16.120.152:2379,https://172.16.120.153:2379
  5. # 以及挂载
  6. - mountPath: /etc/etcd/ssl
  7. name: ca-certs-etc-etcd-ssl
  8. readOnly: true
  9. - hostPath:
  10. path: /etc/etcd/ssl
  11. type: DirectoryOrCreate
  12. name: ca-certs-etc-etcd-ssl
确认第一台master三大组件都成功启动

</>复制代码

  1. kubectl get componentstatuses
  2. NAME STATUS MESSAGE ERROR
  3. controller-manager Healthy ok
  4. scheduler Healthy ok
  5. etcd-1 Healthy {"health": "true"}
  6. etcd-0 Healthy {"health": "true"}
  7. etcd-2 Healthy {"health": "true"}
安装其他主机

我一般的做法是,依旧使用kubeadm init --apiserver-advertise-address=172.16.120.200 --pod-network-cidr=192.168.0.0/16 --ignore-preflight-errors "Swap"
主要目的是下载k8s相关组件docker镜像等,其实就是让kubeadm把容易忽略的工作都做了。

然后将第一台/etc/kubernetes/下所有文件拷贝到其他master主机对应目录下,直至其他机器master三大组件启动成功。

至此一个完整的master高可用集群搭建完毕。

文章版权归作者所有,未经允许请勿转载,若此文章存在违规行为,您可以联系管理员删除。

转载请注明本文地址:https://www.ucloud.cn/yun/27177.html

相关文章

  • kubeadm部署k8s1.9可用集群--4部署master节点

    摘要:部署节点节点包含的组件本文档介绍部署一个三节点高可用集群的步骤,分别命名为安装在每台主机安装。出现如下错误解决办法启动参数增加参数增加在物理机上可能并不会出现该问题。至此一个完整的高可用集群搭建完毕。 部署master节点 kubernetes master 节点包含的组件: kube-apiserver kube-scheduler kube-controller-manager ...

    animabear 评论0 收藏0
  • kubeadm部署k8s1.9可用集群--4部署master节点

    摘要:部署节点节点包含的组件本文档介绍部署一个三节点高可用集群的步骤,分别命名为安装在每台主机安装。出现如下错误解决办法启动参数增加参数增加在物理机上可能并不会出现该问题。至此一个完整的高可用集群搭建完毕。 部署master节点 kubernetes master 节点包含的组件: kube-apiserver kube-scheduler kube-controller-manager ...

    Zoom 评论0 收藏0
  • kubeadm部署k8s1.9可用集群--1集群概述

    摘要:集群概述整个集群包括大部分集群节点节点集群主要作为集群和网络的数据存储。集群组件版本集群机器主从从后续计划用替换。 前言 k8s部署的方式多种多样,除去各家云厂商提供的工具,在bare metal中,也有二进制部署和一系列的自动化部署工具(kubeadm,kubespary,rke等)。具体二进制部署大家可以参考宋总的系列文章。而rke是由rancher提供的工具,由于刚刚出来,有不少...

    DrizzleX 评论0 收藏0
  • kubeadm部署k8s1.9可用集群--1集群概述

    摘要:集群概述整个集群包括大部分集群节点节点集群主要作为集群和网络的数据存储。集群组件版本集群机器主从从后续计划用替换。 前言 k8s部署的方式多种多样,除去各家云厂商提供的工具,在bare metal中,也有二进制部署和一系列的自动化部署工具(kubeadm,kubespary,rke等)。具体二进制部署大家可以参考宋总的系列文章。而rke是由rancher提供的工具,由于刚刚出来,有不少...

    willin 评论0 收藏0

发表评论

0条评论

tomlingtm

|高级讲师

TA的文章

阅读更多
最新活动
阅读需要支付1元查看
<