Kubernetes 从 1.5 开始,通过 kops 或者 kube-up.sh 部署的集群会自动部署一个高可用的系统,包括

  • Etcd 集群模式
  • kube-apiserver 负载均衡
  • kube-controller-manager、kube-scheduler 和 cluster-autoscaler 自动选主(有且仅有一个运行实例)

如下图所示

集群高可用 - 图1

注意:以下步骤假设每台机器上 Kubelet 和 Docker 已配置并处于正常运行状态。

Etcd 集群

安装 cfssl

  1. # On all etcd nodes
  2. curl -o /usr/local/bin/cfssl https://pkg.cfssl.org/R1.2/cfssl_linux-amd64
  3. curl -o /usr/local/bin/cfssljson https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64
  4. chmod +x /usr/local/bin/cfssl*

生成 CA certs:

  1. # SSH etcd0
  2. mkdir -p /etc/kubernetes/pki/etcd
  3. cd /etc/kubernetes/pki/etcd
  4. cat >ca-config.json <<EOF
  5. {
  6. "signing": {
  7. "default": {
  8. "expiry": "43800h"
  9. },
  10. "profiles": {
  11. "server": {
  12. "expiry": "43800h",
  13. "usages": [
  14. "signing",
  15. "key encipherment",
  16. "server auth",
  17. "client auth"
  18. ]
  19. },
  20. "client": {
  21. "expiry": "43800h",
  22. "usages": [
  23. "signing",
  24. "key encipherment",
  25. "client auth"
  26. ]
  27. },
  28. "peer": {
  29. "expiry": "43800h",
  30. "usages": [
  31. "signing",
  32. "key encipherment",
  33. "server auth",
  34. "client auth"
  35. ]
  36. }
  37. }
  38. }
  39. }
  40. EOF
  41. cat >ca-csr.json <<EOF
  42. {
  43. "CN": "etcd",
  44. "key": {
  45. "algo": "rsa",
  46. "size": 2048
  47. }
  48. }
  49. EOF
  50. cfssl gencert -initca ca-csr.json | cfssljson -bare ca -
  51. # generate client certs
  52. cat >client.json <<EOF
  53. {
  54. "CN": "client",
  55. "key": {
  56. "algo": "ecdsa",
  57. "size": 256
  58. }
  59. }
  60. EOF
  61. cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=client client.json | cfssljson -bare client

生成 etcd server/peer certs

  1. # Copy files to other etcd nodes
  2. mkdir -p /etc/kubernetes/pki/etcd
  3. cd /etc/kubernetes/pki/etcd
  4. scp root@<etcd0-ip-address>:/etc/kubernetes/pki/etcd/ca.pem .
  5. scp root@<etcd0-ip-address>:/etc/kubernetes/pki/etcd/ca-key.pem .
  6. scp root@<etcd0-ip-address>:/etc/kubernetes/pki/etcd/client.pem .
  7. scp root@<etcd0-ip-address>:/etc/kubernetes/pki/etcd/client-key.pem .
  8. scp root@<etcd0-ip-address>:/etc/kubernetes/pki/etcd/ca-config.json .
  9. # Run on all etcd nodes
  10. cfssl print-defaults csr > config.json
  11. sed -i '0,/CN/{s/example\.net/'"$PEER_NAME"'/}' config.json
  12. sed -i 's/www\.example\.net/'"$PRIVATE_IP"'/' config.json
  13. sed -i 's/example\.net/'"$PUBLIC_IP"'/' config.json
  14. cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=server config.json | cfssljson -bare server
  15. cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=peer config.json | cfssljson -bare peer

最后运行 etcd,将如下的 yaml 配置写入每台 etcd 节点的 /etc/kubernetes/manifests/etcd.yaml 文件中,注意替换

  • <podname> 为 etcd 节点名称 (比如etcd0, etcd1etcd2
  • <etcd0-ip-address>, <etcd1-ip-address> and <etcd2-ip-address> 为 etcd 节点的内网 IP 地址
  1. cat >/etc/kubernetes/manifests/etcd.yaml <<EOF
  2. apiVersion: v1
  3. kind: Pod
  4. metadata:
  5. labels:
  6. component: etcd
  7. tier: control-plane
  8. name: <podname>
  9. namespace: kube-system
  10. spec:
  11. containers:
  12. - command:
  13. - etcd --name ${PEER_NAME} \
  14. - --data-dir /var/lib/etcd \
  15. - --listen-client-urls https://${PRIVATE_IP}:2379 \
  16. - --advertise-client-urls https://${PRIVATE_IP}:2379 \
  17. - --listen-peer-urls https://${PRIVATE_IP}:2380 \
  18. - --initial-advertise-peer-urls https://${PRIVATE_IP}:2380 \
  19. - --cert-file=/certs/server.pem \
  20. - --key-file=/certs/server-key.pem \
  21. - --client-cert-auth \
  22. - --trusted-ca-file=/certs/ca.pem \
  23. - --peer-cert-file=/certs/peer.pem \
  24. - --peer-key-file=/certs/peer-key.pem \
  25. - --peer-client-cert-auth \
  26. - --peer-trusted-ca-file=/certs/ca.pem \
  27. - --initial-cluster etcd0=https://<etcd0-ip-address>:2380,etcd1=https://<etcd1-ip-address>:2380,etcd1=https://<etcd2-ip-address>:2380 \
  28. - --initial-cluster-token my-etcd-token \
  29. - --initial-cluster-state new
  30. image: gcr.io/google_containers/etcd-amd64:3.1.0
  31. livenessProbe:
  32. httpGet:
  33. path: /health
  34. port: 2379
  35. scheme: HTTP
  36. initialDelaySeconds: 15
  37. timeoutSeconds: 15
  38. name: etcd
  39. env:
  40. - name: PUBLIC_IP
  41. valueFrom:
  42. fieldRef:
  43. fieldPath: status.hostIP
  44. - name: PRIVATE_IP
  45. valueFrom:
  46. fieldRef:
  47. fieldPath: status.podIP
  48. - name: PEER_NAME
  49. valueFrom:
  50. fieldRef:
  51. fieldPath: metadata.name
  52. volumeMounts:
  53. - mountPath: /var/lib/etcd
  54. name: etcd
  55. - mountPath: /certs
  56. name: certs
  57. hostNetwork: true
  58. volumes:
  59. - hostPath:
  60. path: /var/lib/etcd
  61. type: DirectoryOrCreate
  62. name: etcd
  63. - hostPath:
  64. path: /etc/kubernetes/pki/etcd
  65. name: certs
  66. EOF

注意:以上方法需要每个 etcd 节点都运行 kubelet。如果不想使用 kubelet,还可以通过 systemd 的方式来启动 etcd:

```sh export ETCD_VERSION=v3.1.10 curl -sSL https://github.com/coreos/etcd/releases/download/${ETCD_VERSION}/etcd-${ETCD_VERSION}-linux-amd64.tar.gz | tar -xzv —strip-components=1 -C /usr/local/bin/ rm -rf etcd-$ETCD_VERSION-linux-amd64*

touch /etc/etcd.env echo “PEER_NAME=$PEER_NAME” >> /etc/etcd.env echo “PRIVATE_IP=$PRIVATE_IP” >> /etc/etcd.env

cat >/etc/systemd/system/etcd.service <<EOF [Unit] Description=etcd Documentation=https://github.com/coreos/etcd Conflicts=etcd.service Conflicts=etcd2.service

[Service] EnvironmentFile=/etc/etcd.env Type=notify Restart=always RestartSec=5s LimitNOFILE=40000 TimeoutStartSec=0

ExecStart=/usr/local/bin/etcd —name ${PEER_NAME} \ —data-dir /var/lib/etcd \ —listen-client-urls https://${PRIVATE_IP}:2379 \ —advertise-client-urls https://${PRIVATE_IP}:2379 \ —listen-peer-urls https://${PRIVATE_IP}:2380 \ —initial-advertise-peer-urls https://${PRIVATE_IP}:2380 \ —cert-file=/etc/kubernetes/pki/etcd/server.pem \ —key-file=/etc/kubernetes/pki/etcd/server-key.pem \ —client-cert-auth \ —trusted-ca-file=/etc/kubernetes/pki/etcd/ca.pem \ —peer-cert-file=/etc/kubernetes/pki/etcd/peer.pem \ —peer-key-file=/etc/kubernetes/pki/etcd/peer-key.pem \ —peer-client-cert-auth \ —peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.pem \ —initial-cluster etcd0=https://:2380,etcd1=https://:2380,etcd2=https://:2380 \ —initial-cluster-token my-etcd-token \ —initial-cluster-state new

[Install] WantedBy=multi-user.target EOF

systemctl daemon-reload systemctl start etcd

  1. <a name="kube-apiserver"></a>
  2. ## kube-apiserver
  3. 把 `kube-apiserver.yaml` 放到每台 Master 节点的 `/etc/kubernetes/manifests/`,并把相关的配置放到 `/srv/kubernetes/`,即可由 kubelet 自动创建并启动 apiserver:
  4. - basic_auth.csv - basic auth user and password
  5. - ca.crt - Certificate Authority cert
  6. - known_tokens.csv - tokens that entities (e.g. the kubelet) can use to talk to the apiserver
  7. - kubecfg.crt - Client certificate, public key
  8. - kubecfg.key - Client certificate, private key
  9. - server.cert - Server certificate, public key
  10. - server.key - Server certificate, private key
  11. > 注意:确保 kube-apiserver 配置 --etcd-quorum-read=true(v1.9 之后默认为 true)。
  12. <a name="kubeadm"></a>
  13. ### kubeadm
  14. 如果使用 kubeadm 来部署集群的话,可以按照如下步骤配置:
  15. ```sh
  16. # on master0
  17. # deploy master0
  18. cat >config.yaml <<EOF
  19. apiVersion: kubeadm.k8s.io/v1alpha2
  20. kind: MasterConfiguration
  21. kubernetesVersion: v1.11.0
  22. apiServerCertSANs:
  23. - "LOAD_BALANCER_DNS"
  24. api:
  25. controlPlaneEndpoint: "LOAD_BALANCER_DNS:LOAD_BALANCER_PORT"
  26. etcd:
  27. local:
  28. extraArgs:
  29. listen-client-urls: "https://127.0.0.1:2379,https://CP0_IP:2379"
  30. advertise-client-urls: "https://CP0_IP:2379"
  31. listen-peer-urls: "https://CP0_IP:2380"
  32. initial-advertise-peer-urls: "https://CP0_IP:2380"
  33. initial-cluster: "CP0_HOSTNAME=https://CP0_IP:2380"
  34. serverCertSANs:
  35. - CP0_HOSTNAME
  36. - CP0_IP
  37. peerCertSANs:
  38. - CP0_HOSTNAME
  39. - CP0_IP
  40. networking:
  41. # This CIDR is a Calico default. Substitute or remove for your CNI provider.
  42. podSubnet: "192.168.0.0/16"
  43. EOF
  44. kubeadm init --config=config.yaml
  45. # copy TLS certs to other master nodes
  46. CONTROL_PLANE_IPS="10.0.0.7 10.0.0.8"
  47. for host in ${CONTROL_PLANE_IPS}; do
  48. scp /etc/kubernetes/pki/ca.crt "${USER}"@$host:
  49. scp /etc/kubernetes/pki/ca.key "${USER}"@$host:
  50. scp /etc/kubernetes/pki/sa.key "${USER}"@$host:
  51. scp /etc/kubernetes/pki/sa.pub "${USER}"@$host:
  52. scp /etc/kubernetes/pki/front-proxy-ca.crt "${USER}"@$host:
  53. scp /etc/kubernetes/pki/front-proxy-ca.key "${USER}"@$host:
  54. scp /etc/kubernetes/pki/etcd/ca.crt "${USER}"@$host:etcd-ca.crt
  55. scp /etc/kubernetes/pki/etcd/ca.key "${USER}"@$host:etcd-ca.key
  56. scp /etc/kubernetes/admin.conf "${USER}"@$host:
  57. done
  58. # on other master nodes
  59. cat > kubeadm-config.yaml <<EOF
  60. apiVersion: kubeadm.k8s.io/v1alpha2
  61. kind: MasterConfiguration
  62. kubernetesVersion: v1.11.0
  63. apiServerCertSANs:
  64. - "LOAD_BALANCER_DNS"
  65. api:
  66. controlPlaneEndpoint: "LOAD_BALANCER_DNS:LOAD_BALANCER_PORT"
  67. etcd:
  68. local:
  69. extraArgs:
  70. listen-client-urls: "https://127.0.0.1:2379,https://CP1_IP:2379"
  71. advertise-client-urls: "https://CP1_IP:2379"
  72. listen-peer-urls: "https://CP1_IP:2380"
  73. initial-advertise-peer-urls: "https://CP1_IP:2380"
  74. initial-cluster: "CP0_HOSTNAME=https://CP0_IP:2380,CP1_HOSTNAME=https://CP1_IP:2380"
  75. initial-cluster-state: existing
  76. serverCertSANs:
  77. - CP1_HOSTNAME
  78. - CP1_IP
  79. peerCertSANs:
  80. - CP1_HOSTNAME
  81. - CP1_IP
  82. networking:
  83. # This CIDR is a calico default. Substitute or remove for your CNI provider.
  84. podSubnet: "192.168.0.0/16"
  85. EOF
  86. # move files
  87. mkdir -p /etc/kubernetes/pki/etcd
  88. mv /home/${USER}/ca.crt /etc/kubernetes/pki/
  89. mv /home/${USER}/ca.key /etc/kubernetes/pki/
  90. mv /home/${USER}/sa.pub /etc/kubernetes/pki/
  91. mv /home/${USER}/sa.key /etc/kubernetes/pki/
  92. mv /home/${USER}/front-proxy-ca.crt /etc/kubernetes/pki/
  93. mv /home/${USER}/front-proxy-ca.key /etc/kubernetes/pki/
  94. mv /home/${USER}/etcd-ca.crt /etc/kubernetes/pki/etcd/ca.crt
  95. mv /home/${USER}/etcd-ca.key /etc/kubernetes/pki/etcd/ca.key
  96. mv /home/${USER}/admin.conf /etc/kubernetes/admin.conf
  97. # Run the kubeadm phase commands to bootstrap the kubelet:
  98. kubeadm alpha phase certs all --config kubeadm-config.yaml
  99. kubeadm alpha phase kubelet config write-to-disk --config kubeadm-config.yaml
  100. kubeadm alpha phase kubelet write-env-file --config kubeadm-config.yaml
  101. kubeadm alpha phase kubeconfig kubelet --config kubeadm-config.yaml
  102. systemctl start kubelet
  103. # Add the node to etcd cluster
  104. CP0_IP=10.0.0.7
  105. CP0_HOSTNAME=cp0
  106. CP1_IP=10.0.0.8
  107. CP1_HOSTNAME=cp1
  108. KUBECONFIG=/etc/kubernetes/admin.conf kubectl exec -n kube-system etcd-${CP0_HOSTNAME} -- etcdctl --ca-file /etc/kubernetes/pki/etcd/ca.crt --cert-file /etc/kubernetes/pki/etcd/peer.crt --key-file /etc/kubernetes/pki/etcd/peer.key --endpoints=https://${CP0_IP}:2379 member add ${CP1_HOSTNAME} https://${CP1_IP}:2380
  109. kubeadm alpha phase etcd local --config kubeadm-config.yaml
  110. # Deploy the master components
  111. kubeadm alpha phase kubeconfig all --config kubeadm-config.yaml
  112. kubeadm alpha phase controlplane all --config kubeadm-config.yaml
  113. kubeadm alpha phase mark-master --config kubeadm-config.yaml

kube-apiserver 启动后,还需要为它们做负载均衡,可以使用云平台的弹性负载均衡服务或者使用 haproxy/lvs 等为 master 节点配置负载均衡。

kube-controller-manager 和 kube-scheduler

kube-controller manager 和 kube-scheduler 需要保证任何时刻都只有一个实例运行,需要一个选主的过程,所以在启动时要设置 --leader-elect=true,比如

  1. kube-scheduler --master=127.0.0.1:8080 --v=2 --leader-elect=true
  2. kube-controller-manager --master=127.0.0.1:8080 --cluster-cidr=10.245.0.0/16 --allocate-node-cidrs=true --service-account-private-key-file=/srv/kubernetes/server.key --v=2 --leader-elect=true

kube-scheduler.yamlkube-controller-manager.yaml 放到每台 master 节点的 /etc/kubernetes/manifests/ 即可。

kube-dns

kube-dns 可以通过 Deployment 的方式来部署,默认 kubeadm 会自动创建。但在大规模集群的时候,需要放宽资源限制,比如

  1. dns_replicas: 6
  2. dns_cpu_limit: 100m
  3. dns_memory_limit: 512Mi
  4. dns_cpu_requests 70m
  5. dns_memory_requests: 70Mi

另外,也需要给 dnsmasq 增加资源,比如增加缓存大小到 10000,增加并发处理数量 --dns-forward-max=1000 等。

kube-proxy

默认 kube-proxy 使用 iptables 来为 Service 作负载均衡,这在大规模时会产生很大的 Latency,可以考虑使用 IPVS 的替代方式(注意 IPVS 在 v1.9 中还是 beta 状态)。

另外,需要注意配置 kube-proxy 使用 kube-apiserver 负载均衡的 IP 地址:

  1. kubectl get configmap -n kube-system kube-proxy -o yaml > kube-proxym.yaml
  2. sed -i 's#server:.*#server: https://<masterLoadBalancerFQDN>:6443#g' kube-proxy-cm.yaml
  3. kubectl apply -f kube-proxy-cm.yaml --force
  4. # restart all kube-proxy pods to ensure that they load the new configmap
  5. kubectl delete pod -n kube-system -l k8s-app=kube-proxy

kubelet

kubelet 需要配置 kube-apiserver 负载均衡的 IP 地址

  1. sudo sed -i 's#server:.*#server: https://<masterLoadBalancerFQDN>:6443#g' /etc/kubernetes/kubelet.conf
  2. sudo systemctl restart kubelet

数据持久化

除了上面提到的这些配置,持久化存储也是高可用 Kubernetes 集群所必须的。

  • 对于公有云上部署的集群,可以考虑使用云平台提供的持久化存储,比如 aws ebs 或者 gce persistent disk
  • 对于物理机部署的集群,可以考虑使用 iSCSI、NFS、Gluster 或者 Ceph 等网络存储,也可以使用 RAID

参考文档