Kubernets二进制安装(16)之安装部署traefik(ingress)

K8S的DNS实现了服务在集群"内"被自动发现,如何使得服务在Kuberneters集群"外"被使用和访问呢,有二种方法

1)使用NodePort型的Service

​ 注意:无法使用kube-proxy的ipvs模型,只能使用iptables模型

2)使用Ingress资源

注意:Ingress只能调度并暴露7层应用,特指http和https协议,一般建议用在http协议上

Ingress是K8S API的标准资源类型之一,也是一种核心资源。它其实就是一组基于域名和URL路径,把用户的请求转发至指定Service资源的规则

可以将集群外部的请求流量,转发至集群内部,从而实现 “服务暴露”

Ingress控制器是能够为Ingress资源监听某套接字,然后根据Ingress规则匹配机制路由调度流量的一个组件

说白了,Ingress就是一个简化版的Nginx+ 一段go脚本而已

常用的Ingress控制器的实现软件:

Ingress-nginx

HAProxy

Traefik

同nginx相比,traefik能够自动感知后端容器变化,从而实现自动服务发现。

traefik部署在k8s上分为daemonset和deployment两种方式

daemonset能确定有哪些node在运行tracfik,所以可以确定的知道后端IP,但是不能方便的伸缩

deployment可以更方便的伸缩,但是不能确定有哪些node在运行traefik,所以不能确定的知道后端IP

一般部署两种不同类型的tracfik:

​ 面向内部(internal)服务的traefik,建议可以使用deployment的方式

​ 面向外部(external)服务的traefik,建议可以使用daemonset的方式

建议使用traffic-type标签

​ traffic-type: external

​ traffic-type: inernal

traefik相应地使用lableSelector

​ traffic-type=internal

​ traffic-type=external

1.在docker仓库中下载traefik镜像

在运维主机(mfyxw50.mfyxw.com)上执行如下命令

[root@mfyxw50 ~]# docker pull traefik:1.7.20-alpine

image-20200514163755140

2.对traefik进行打标签并上传至私有仓库

在运维主机(mfyxw50.mfyxw.com)上执行如下命令

[root@mfyxw50 ~]# docker images | grep traefik
[root@mfyxw50 ~]# docker tag 439e73a064c8 harbor.od.com/public/traefik:v1.7.2
[root@mfyxw50 ~]# docker login harbor.od.com
[root@mfyxw50 ~]# docker push harbor.od.com/public/traefik:v1.7.2

image-20200514163849585

3.登录网页版harbor.od.com查看是否上传成功

image-20200514164030879

4.提示traefik资源配置清单

在运维主机(mfyxw50.mfyxw.com)上执行如下命令

traefik的rbac.yaml资源配置清单

[root@mfyxw50 ~]# mkdir -p /data/k8s-yaml/traefik
[root@mfyxw50 ~]# cd /data/k8s-yaml/traefik
[root@mfyxw50 traefik]# cat > /data/k8s-yaml/traefik/rbac.yaml << EOF
apiVersion: v1
kind: ServiceAccount
metadata:
  name: traefik-ingress-controller
  namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
  name: traefik-ingress-controller
rules:
  - apiGroups:
      - ""
    resources:
      - services
      - endpoints
      - secrets
    verbs:
      - get
      - list
      - watch
  - apiGroups:
      - extensions
    resources:
      - ingresses
    verbs:
      - get
      - list
      - watch
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: traefik-ingress-controller
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: traefik-ingress-controller
subjects:
- kind: ServiceAccount
  name: traefik-ingress-controller
  namespace: kube-system
EOF

traefik的DaemonSet.yaml资源配置清单

[root@mfyxw50 traefik]# cat > /data/k8s-yaml/traefik/DaemonSet.yaml << EOF
apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
  name: traefik-ingress
  namespace: kube-system
  labels:
    k8s-app: traefik-ingress
spec:
  template:
    metadata:
      labels:
        k8s-app: traefik-ingress
        name: traefik-ingress
    spec:
      serviceAccountName: traefik-ingress-controller
      terminationGracePeriodSeconds: 60
      containers:
      - image: harbor.od.com/public/traefik:v1.7.2
        name: traefik-ingress
        ports:
        - name: controller
          containerPort: 80
          hostPort: 81
        - name: admin-web
          containerPort: 8080
        securityContext:
          capabilities:
            drop:
            - ALL
            add:
            - NET_BIND_SERVICE
        args:
        - --api
        - --kubernetes
        - --logLevel=INFO
        - --insecureskipverify=true
        - --kubernetes.endpoint=https://192.168.80.100:7443
        - --accesslog
        - --accesslog.filepath=/var/log/traefik_access.log
        - --traefiklog
        - --traefiklog.filepath=/var/log/traefik.log
        - --metrics.prometheus
EOF

traefik的svc.yaml资源配置清单

[root@mfyxw50 traefik]# cat > /data/k8s-yaml/traefik/svc.yaml << EOF
kind: Service
apiVersion: v1
metadata:
  name: traefik-ingress-service
  namespace: kube-system
spec:
  selector:
    k8s-app: traefik-ingress
  ports:
    - protocol: TCP
      port: 80
      name: controller
    - protocol: TCP
      port: 8080
      name: admin-web
EOF

traefik的Ingress.yaml资源配置清单

[root@mfyxw50 traefik]# cat > /data/k8s-yaml/traefik/Ingress.yaml << EOF
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
  name: traefik-web-ui
  namespace: kube-system
  annotations:
    kubernetes.io/ingress.class: traefik
spec:
  rules:
  - host: traefik.od.com
    http:
      paths:
      - path: /
        backend:
          serviceName: traefik-ingress-service
          servicePort: 8080
EOF

5.应用yaml资源配置清单创建traefik

在master主机(mfyxw30.mfyxw.com或mfyxw40.mfyxw.com)任意一台执行

[root@mfyxw30 ~]# kubectl apply -f http://k8s-yaml.od.com/traefik/rbac.yaml
[root@mfyxw30 ~]# kubectl apply -f http://k8s-yaml.od.com/traefik/DaemonSet.yaml
[root@mfyxw30 ~]# kubectl apply -f http://k8s-yaml.od.com/traefik/svc.yaml
[root@mfyxw30 ~]# kubectl apply -f http://k8s-yaml.od.com/traefik/Ingress.yaml

image-20200514141914043

6.在DNS主机添加解析

在DNS服务器(mfyxw10.mfyxw.com)上执行

[root@mfyxw10 ~]# cat > /var/named/od.com.zone << EOF
\$ORIGIN od.com.
\$TTL 600   ; 10 minutes
@       IN  SOA dns.od.com.   dnsadmin.od.com. (
                             ;序号请加1,表示比之前版本要新
                             2020031305 ; serial
                             10800          ; refresh (3 hours)
                             900              ; retry (15 minutes)
                             604800         ; expire (1 week)
                             86400          ; minimum (1 day)
                              )
                      NS   dns.od.com.
\$TTL 60 ;  1 minute
dns             A          192.168.80.10
harbor          A          192.168.80.50   ;添加harbor记录
k8s-yaml        A          192.168.80.50
traefik         A          192.168.80.100
EOF

7.重启DNS服务使之生效

在DNS服务器(mfyxw10.mfyxw.com)上执行

[root@mfyxw10 ~]# systemctl restart named
[root@mfyxw10 ~]# ping traefik.od.com

image-20200514142609910

8.配置反向代理

在mfyxw10.mfyxw.com和mfyxw20.mfyxw.com二台主机上均需要配置

mfyxw10.mfyxw.com主机执行如下命令

[root@mfyxw10 ~]# cat > /etc/nginx/conf.d/od.com.conf << EOF
upstream default_backend_traefik {
    server 192.168.80.30:81    max_fails=3 fail_timeout=10s;
    server 192.168.80.40:81    max_fails=3 fail_timeout=10s;
}
server {
    server_name *.od.com;
  
    location / {
        proxy_pass http://default_backend_traefik;
        proxy_set_header Host \$http_host;
        proxy_set_header x-forwarded-for \$proxy_add_x_forwarded_for;
    }
}
EOF

image-20200514164834715

mfyxw20.mfyxw.com主机执行如下命令

[root@mfyxw20 ~]# cat > /etc/nginx/conf.d/od.com.conf << EOF
upstream default_backend_traefik {
    server 192.168.80.30:81    max_fails=3 fail_timeout=10s;
    server 192.168.80.40:81    max_fails=3 fail_timeout=10s;
}
server {
    server_name *.od.com;
  
    location / {
        proxy_pass http://default_backend_traefik;
        proxy_set_header Host \$http_host;
        proxy_set_header x-forwarded-for \$proxy_add_x_forwarded_for;
    }
}
EOF

image-20200514164819559

9.重启nginx,使之生效

在mfyxw10.mfyxw.com和mfyxw20.mfyxw.com二台主机上均需要执行

在mfyxw10.mfyxw.com主机上执行

[root@mfyxw10 ~]# nginx -s reload

image-20200514144151278

在mfyxw20.mfyxw.com主机上执行

[root@mfyxw20 ~]# nginx -s reload

image-20200514144203979

10.查看traefik的pod是否运行

在运维主机(mfyxw30.mfyxw.com和mfyxw40.mfyxw.com)任意一台执行如下命令即可

[root@mfyxw30 ~]# kubectl get pod -n kube-system -o wide

image-20200514164205801

11.打开浏览器访问http://traefik.od.com

image-20200514165630952

posted on 2020-05-14 16:58  杨枫哥  阅读(588)  评论(0编辑  收藏  举报