kubernetes Node节点部署(四)
一、部署kubelet1.1、二进制包准备 将软件包从linux-node1复制到linux-node2中去 [[email?protected] ~]# cd /usr/local/src/kubernetes/server/bin/ [[email?protected]-node1 bin]# cp kubelet kube-proxy /opt/kubernetes/bin/ [[email?protected]-node1 bin]# scp kubelet kube-proxy 192.168.56.12:/opt/kubernetes/bin/ [[email?protected]-node1 bin]# scp kubelet kube-proxy 192.168.56.13:/opt/kubernetes/bin/ 1.2、创建角色绑定 [[email?protected] ~]# kubectl create clusterrolebinding kubelet-bootstrap --clusterrole=system:node-bootstrapper --user=kubelet-bootstrap clusterrolebinding "kubelet-bootstrap" created 1.3、创建 kubelet bootstrapping kubeconfig 文件 设置集群参数 [[email?protected] ~]# kubectl config set-cluster kubernetes --certificate-authority=/opt/kubernetes/ssl/ca.pem --embed-certs=true --server=https://192.168.56.11:6443 --kubeconfig=bootstrap.kubeconfig Cluster "kubernetes" set. ? 1.4、设置客户端认证参数 [[email?protected] ssl]# kubectl config set-credentials kubelet-bootstrap > --token=d192434528f7576911ac9d333a982d93 > --kubeconfig=bootstrap.kubeconfig User "kubelet-bootstrap" set. ? 注:d192434528f7576911ac9d333a982d93 根据实际情况填写,可以通过cat /opt/kubernetes/ssl/bootstrap-token.csv 查看 1.5、设置上下文参数 [[email?protected] ~]# kubectl config set-context default --cluster=kubernetes --user=kubelet-bootstrap --kubeconfig=bootstrap.kubeconfig Context "default" created. ? 1.6、选择默认上下文 [[email?protected] ~]# kubectl config use-context default --kubeconfig=bootstrap.kubeconfig Switched to context "default". [[email?protected]-node1 kubernetes]# cp bootstrap.kubeconfig /opt/kubernetes/cfg [[email?protected]-node1 kubernetes]# scp bootstrap.kubeconfig 192.168.56.12:/opt/kubernetes/cfg [[email?protected]-node1 kubernetes]# scp bootstrap.kubeconfig 192.168.56.13:/opt/kubernetes/cfg ? 1.7、部署kubelet 1.设置CNI支持(所有节点执行) [[email?protected] ~]# mkdir -p /etc/cni/net.d [[email?protected]-node2 ~]# vim /etc/cni/net.d/10-default.conf { "name": "flannel","type": "flannel","delegate": { "bridge": "docker0","isDefaultGateway": true,"mtu": 1400 } } [[email?protected] ssl]# scp /etc/cni/net.d/10-default.conf 192.168.56.12:/etc/cni/net.d/ ?
? 1.8、创建kubelet目录(所有节点执行) [[email?protected] ~]# mkdir /var/lib/kubelet
? 1.9、创建kubelet服务配置(每个节点执行) [[email?protected] ~]# vim /usr/lib/systemd/system/kubelet.service [Unit] Description=Kubernetes Kubelet Documentation=https://github.com/GoogleCloudPlatform/kubernetes After=docker.service Requires=docker.service [Service] WorkingDirectory=/var/lib/kubelet ExecStart=/opt/kubernetes/bin/kubelet --address=192.168.56.12 --hostname-override=192.168.56.12 --pod-infra-container-image=mirrorgooglecontainers/pause-amd64:3.0 --experimental-bootstrap-kubeconfig=/opt/kubernetes/cfg/bootstrap.kubeconfig --kubeconfig=/opt/kubernetes/cfg/kubelet.kubeconfig --cert-dir=/opt/kubernetes/ssl --network-plugin=cni --cni-conf-dir=/etc/cni/net.d --cni-bin-dir=/opt/kubernetes/bin/cni --cluster-dns=10.1.0.2 --cluster-domain=cluster.local. --hairpin-mode hairpin-veth --allow-privileged=true --fail-swap-on=false --logtostderr=true --v=2 --logtostderr=false --log-dir=/opt/kubernetes/log Restart=on-failure RestartSec=5 ? 注:修改每个节点对应的ip 1.10.启动Kubelet [[email?protected] ~]# systemctl daemon-reload [[email?protected]-node2 ~]# systemctl enable kubelet [[email?protected]-node2 ~]# systemctl start kubelet ? 只在node节点上启动? ,master不用启动 1.11、查看csr请求 注意是在linux-node1上执行。 [[email?protected] ssl]# kubectl get csr NAME AGE REQUESTOR CONDITION node-csr-JvaaEZ211tAksrMkeWzInQroN1O4s8rKqqwT9RC4ubA 1m kubelet-bootstrap Pending node-csr-lcMGqB_XHi4lQIKZr2oRdseQ4_IVn-lZx3_SmLLd1i0 1m kubelet-bootstrap Pending ? 1.12、批准kubelet 的 TLS 证书请求 kubectl get csr|grep ‘Pending‘ | awk ‘NR>0{print $1}‘| xargs kubectl certificate approve 执行完毕后,查看节点状态已经是Ready的状态了 [[email?protected] ssl]# kubectl get node NAME STATUS ROLES AGE VERSION 192.168.56.12 Ready <none> 3m v1.10.1 192.168.56.13 Ready <none> 3m v1.10.1 ? 二、Kubernetes Proxy2.1、配置kube-proxy使用LVS(每个节点安装) yum install -y ipvsadm ipset conntrack ? 2.2、在master节点上创建 kube-proxy 证书请求 [[email?protected] ~]# cd /usr/local/src/ssl/ [[email?protected]-node1 ~]# vim kube-proxy-csr.json { "CN": "system:kube-proxy","hosts": [],"key": { "algo": "rsa","size": 2048 },"names": [ { "C": "CN","ST": "BeiJing","L": "BeiJing","O": "k8s","OU": "System" } ] } ? 2.3、生成证书 [[email?protected]~]# cfssl gencert -ca=/opt/kubernetes/ssl/ca.pem -ca-key=/opt/kubernetes/ssl/ca-key.pem -config=/opt/kubernetes/ssl/ca-config.json -profile=kubernetes kube-proxy-csr.json | cfssljson -bare kube-proxy ? 2.4、分发证书到所有Node节点 [[email?protected] ssl]# cp kube-proxy*.pem /opt/kubernetes/ssl/ [[email?protected]-node1 ssl]# scp kube-proxy*.pem 192.168.56.12:/opt/kubernetes/ssl/ [[email?protected]-node1 ssl]# scp kube-proxy*.pem 192.168.56.13:/opt/kubernetes/ssl/ ? 2.5、创建kube-proxy配置文件 [[email?protected] ~]# kubectl config set-cluster kubernetes --certificate-authority=/opt/kubernetes/ssl/ca.pem --embed-certs=true --server=https://192.168.56.11:6443 --kubeconfig=kube-proxy.kubeconfig Cluster "kubernetes" set. [[email?protected]-node2 ~]# kubectl config set-credentials kube-proxy --client-certificate=/opt/kubernetes/ssl/kube-proxy.pem --client-key=/opt/kubernetes/ssl/kube-proxy-key.pem --embed-certs=true --kubeconfig=kube-proxy.kubeconfig User "kube-proxy" set. [[email?protected]-node2 ~]# kubectl config set-context default --cluster=kubernetes --user=kube-proxy --kubeconfig=kube-proxy.kubeconfig Context "default" created. [[email?protected]-node2 ~]# kubectl config use-context default --kubeconfig=kube-proxy.kubeconfig Switched to context "default". ? 2.6、分发kubeconfig配置文件 [[email?protected] ssl]# cp kube-proxy.kubeconfig /opt/kubernetes/cfg/ [[email?protected]-node1 ~]# scp kube-proxy.kubeconfig 192.168.56.12:/opt/kubernetes/cfg/ [[email?protected]-node1 ~]# scp kube-proxy.kubeconfig 192.168.56.13:/opt/kubernetes/cfg/ ? 2.7、创建kube-proxy服务配置(每个节点执行) [[email?protected] bin]# mkdir /var/lib/kube-proxy [[email?protected]-node2 ~]# vim /usr/lib/systemd/system/kube-proxy.service [Unit] Description=Kubernetes Kube-Proxy Server Documentation=https://github.com/GoogleCloudPlatform/kubernetes After=network.target [Service] WorkingDirectory=/var/lib/kube-proxy ExecStart=/opt/kubernetes/bin/kube-proxy --bind-address=192.168.56.12 --hostname-override=192.168.56.12 --kubeconfig=/opt/kubernetes/cfg/kube-proxy.kubeconfig --masquerade-all --feature-gates=SupportIPVSProxyMode=true --proxy-mode=ipvs --ipvs-min-sync-period=5s --ipvs-sync-period=5s --ipvs-scheduler=rr --logtostderr=true --v=2 --logtostderr=false --log-dir=/opt/kubernetes/log Restart=on-failure RestartSec=5 LimitNOFILE=65536 [Install] WantedBy=multi-user.target ? 注:修改对应节点的ip 2.8、启动 [[email?protected] ~]# systemctl daemon-reload [[email?protected]-node2 ~]# systemctl enable kube-proxy [[email?protected]-node2 ~]# systemctl start kube-proxy 2.9、检查lvs状态 [[email?protected] ssl]# ipvsadm -L -n IP Virtual Server version 1.2.1 (size=4096) Prot LocalAddress:Port Scheduler Flags -> RemoteAddress:Port Forward Weight ActiveConn InActConn TCP 10.1.0.1:443 rr persistent 10800 -> 192.168.56.11:6443 Masq 1 0 0 如果你在两台实验机器都安装了kubelet和proxy服务,使用下面的命令可以检查状态: [[email?protected] ssl]# kubectl get node NAME STATUS ROLES AGE VERSION 192.168.56.12 Ready <none> 22m v1.10.1 192.168.56.13 Ready <none> 22m v1.10.1 (编辑:李大同) 【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! |