kubernetes1.9 手动安装
一、创建TLS证书和秘钥:
1、安装 CFSSL:
wget https://pkg.cfssl.org/R1.2/cfssl_linux-amd64 chmod +x cfssl_linux-amd64 mv cfssl_linux-amd64 /usr/local/bin/cfssl wget https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64 chmod +x cfssljson_linux-amd64 mv cfssljson_linux-amd64 /usr/local/bin/cfssljson wget https://pkg.cfssl.org/R1.2/cfssl-certinfo_linux-amd64 chmod +x cfssl-certinfo_linux-amd64 mv cfssl-certinfo_linux-amd64 /usr/local/bin/cfssl-certinfo export PATH=/usr/local/bin:$PATH
2、创建 CA 配置文件:
mkdir /root/ssl cd /root/ssl cfssl print-defaults config > config.json cfssl print-defaults csr > csr.json
# 根据config.json文件的格式创建如下的ca-config.json文件
# 过期时间设置成了 87600h
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
cat > ca-config.json <<EOF { "signing": { "default": { "expiry": "87600h" }, "profiles": { "kubernetes": { "usages": [ "signing", "key encipherment", "server auth", "client auth" ], "expiry": "87600h" } } } } EOF
3、创建 CA 证书签名请求:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
cat > ca-csr.json <<EOF { "CN": "kubernetes", "key": { "algo": "rsa", "size": 2048 }, "names": [ { "C": "CN", "ST": "BeiJing", "L": "BeiJing", "O": "k8s", "OU": "System" } ] } EOF
4、生成 CA 证书和私钥:
$ cfssl gencert -initca ca-csr.json | cfssljson -bare ca $ ls ca* ca-config.json ca.csr ca-csr.json ca-key.pem ca.pem
5、创建 kubernetes 证书:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
cat > kubernetes-csr.json <<EOF { "CN": "kubernetes", "hosts": [ "127.0.0.1", "192.168.73.61", "192.168.73.62", "192.168.73.63", "10.254.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.cluster", "kubernetes.default.svc.cluster.local" ], "key": { "algo": "rsa", "size": 2048 }, "names": [ { "C": "CN", "ST": "BeiJing", "L": "BeiJing", "O": "k8s", "OU": "System" } ] } EOF
6、生成 kubernetes 证书和私钥:
$ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes kubernetes-csr.json | cfssljson -bare kubernetes $ ls kubernetes* kubernetes.csr kubernetes-csr.json kubernetes-key.pem kubernetes.pem
7、创建 admin 证书
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
cat > admin-csr.json <<EOF { "CN": "admin", "hosts": [], "key": { "algo": "rsa", "size": 2048 }, "names": [ { "C": "CN", "ST": "BeiJing", "L": "BeiJing", "O": "system:masters", "OU": "System" } ] } EOF
8、生成 admin 证书和私钥:
$ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes admin-csr.json | cfssljson -bare admin $ ls admin* admin.csr admin-csr.json admin-key.pem admin.pem
9、创建 kube-proxy 证书:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
cat > kube-proxy-csr.json <<EOF { "CN": "system:kube-proxy", "hosts": [], "key": { "algo": "rsa", "size": 2048 }, "names": [ { "C": "CN", "ST": "BeiJing", "L": "BeiJing", "O": "k8s", "OU": "System" } ] } EOF
10、生成 kube-proxy 客户端证书和私钥:
$ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes kube-proxy-csr.json | cfssljson -bare kube-proxy $ ls kube-proxy* kube-proxy.csr kube-proxy-csr.json kube-proxy-key.pem kube-proxy.pem
校验证书:
$ openssl x509 -noout -text -in kubernetes.pem Certificate: Data: Version: 3 (0x2) Serial Number: 6a:10:a0:d1:dc:43:c5:0a:a3:4f:d7:7e:d5:b8:3b:40:36:dc:71:40 Signature Algorithm: sha256WithRSAEncryption Issuer: C=CN, ST=BeiJing, L=BeiJing, O=k8s, OU=System, CN=kubernetes Validity Not Before: Feb 6 07:59:00 2018 GMT Not After : Feb 4 07:59:00 2028 GMT Subject: C=CN, ST=BeiJing, L=BeiJing, O=k8s, OU=System, CN=kubernetes Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b3:91:7d:a9:24:4d:5b:18:5a:ba:ad:e5:1f:e6: 7f:8b:3e:38:d6:b9:21:0e:d6:32:83:b5:1d:16:9f: 5f:13:5c:43:a8:ef:46:24:f6:70:47:9e:a8:00:32: 9a:18:e6:dd:18:a2:a5:9c:22:31:fe:17:ba:64:65: 86:3d:63:d4:d3:94:95:a9:56:2f:6c:66:ce:12:a9: 4e:e8:51:c1:c7:ed:91:13:f8:c4:05:4b:2b:4c:da: e8:d6:9e:b6:8e:27:3e:cd:a5:ea:bd:00:bf:84:4a: c5:ed:18:7b:ae:d8:fc:17:de:4c:98:3f:81:2c:56: d9:0a:a1:1f:73:18:58:a7:14:ee:9f:60:a7:38:b5: 63:b8:15:84:a6:e0:de:73:f3:e4:ac:20:1b:8b:26: 02:1a:28:b1:dc:d9:ed:c4:04:88:ca:6d:9c:aa:fb: 3a:26:7d:cb:2d:4b:86:1b:2a:d5:8c:4d:62:9a:ea: 7c:56:a7:44:5b:af:13:83:e6:6f:c2:61:d0:a0:58: 6c:e6:43:dd:9b:a1:26:a7:ef:8f:a5:7c:3c:79:23: bc:dc:1d:2f:6b:63:d5:c7:4a:92:db:20:b0:66:81: ac:85:0c:04:2c:17:e5:02:f2:41:cd:44:76:87:e3: 45:91:aa:f3:fb:62:8a:de:14:fe:07:75:79:9f:ce: d9:3b ...................
分发证书:
将生成的证书和秘钥文件(后缀名为.pem)拷贝到所有机器的 /etc/kubernetes/ssl 目录下备用; mkdir -p /etc/kubernetes/ssl cp *.pem /etc/kubernetes/ssl
scp *.pem root@192.168.78.62:/etc/kubernetes/ssl
scp *.pem root@192.168.78.63:/etc/kubernetes/ssl
二、安装配置高可用etcd:
1、下载安装etcd
1、修改host文件及修改主机名: 192.168.73.61 k8s-master 192.168.73.62 k8s-node1 192.168.73.63 k8s-node2
hostnamectl set-hostname k8s-master
hostnamectl set-hostname k8s-node1
hostnamectl set-hostname k8s-node2
2、下载安装etd:
wget https://github.com/coreos/etcd/releases/download/v3.3.0/etcd-v3.3.0-linux-amd64.tar.gz
tar zxvf etcd-v3.3.0-linux-amd64.tar.gz
cp etcd-v3.3.0-linux-amd64/etcd* /usr/local/bin/
mkdir /var/lib/etcd #etcd的数据目录
mkdir /etc/etcd #etcd的配置文件目录
2、编写etcd的配置文件/etc/etcd/etcd.conf:
k8s-master:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
# [member] ETCD_NAME=infra1 ETCD_DATA_DIR="/var/lib/etcd" ETCD_LISTEN_PEER_URLS="https://192.168.73.61:2380" ETCD_LISTEN_CLIENT_URLS="https://192.168.73.61:2379" #[cluster] ETCD_INITIAL_ADVERTISE_PEER_URLS="https://192.168.73.61:2380" ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster" ETCD_ADVERTISE_CLIENT_URLS="https://192.168.73.61:2379"
k8s-node1:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
# [member] ETCD_NAME=infra2 ETCD_DATA_DIR="/var/lib/etcd" ETCD_LISTEN_PEER_URLS="https://192.168.73.62:2380" ETCD_LISTEN_CLIENT_URLS="https://192.168.73.62:2379" #[cluster] ETCD_INITIAL_ADVERTISE_PEER_URLS="https://192.168.73.62:2380" ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster" ETCD_ADVERTISE_CLIENT_URLS="https://192.168.73.62:2379"
k8s-node2:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
# [member] ETCD_NAME=infra3 ETCD_DATA_DIR="/var/lib/etcd" ETCD_LISTEN_PEER_URLS="https://192.168.73.63:2380" ETCD_LISTEN_CLIENT_URLS="https://192.168.73.63:2379" #[cluster] ETCD_INITIAL_ADVERTISE_PEER_URLS="https://192.168.73.63:2380" ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster" ETCD_ADVERTISE_CLIENT_URLS="https://192.168.73.63:2379"
3、编写etcd的启动文件/usr/lib/systemd/system/etcd.service:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Etcd Server After=network.target After=network-online.target Wants=network-online.target Documentation=https://github.com/coreos [Service] Type=notify WorkingDirectory=/var/lib/etcd/ EnvironmentFile=-/etc/etcd/etcd.conf ExecStart=/usr/local/bin/etcd \ --name ${ETCD_NAME} \ --cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ --peer-cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --peer-key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ --trusted-ca-file=/etc/kubernetes/ssl/ca.pem \ --peer-trusted-ca-file=/etc/kubernetes/ssl/ca.pem \ --initial-advertise-peer-urls ${ETCD_INITIAL_ADVERTISE_PEER_URLS} \ --listen-peer-urls ${ETCD_LISTEN_PEER_URLS} \ --listen-client-urls ${ETCD_LISTEN_CLIENT_URLS},http://127.0.0.1:2379 \ --advertise-client-urls ${ETCD_ADVERTISE_CLIENT_URLS} \ --initial-cluster-token ${ETCD_INITIAL_CLUSTER_TOKEN} \ --initial-cluster infra1=https://192.168.73.61:2380,infra2=https://192.168.73.62:2380,infra3=https://192.168.73.63:2380 \ --initial-cluster-state new \ --data-dir=${ETCD_DATA_DIR} Restart=on-failure RestartSec=5 LimitNOFILE=65536 [Install] WantedBy=multi-user.target
4、启动etcd及检查:
1、启动:
systemctl daemon-reload systemctl enable etcd systemctl start etcd systemctl status etcd
2、检查:
$ etcdctl --ca-file=/etc/kubernetes/ssl/ca.pem --cert-file=/etc/kubernetes/ssl/kubernetes.pem --key-file=/etc/kubernetes/ssl/kubernetes-key.pem cluster-health
member 52908acb5b27845e is healthy: got healthy result from https://192.168.73.63:2379
member 5d00203b8ec1e6c4 is healthy: got healthy result from https://192.168.73.62:2379
member d47f2b47509db50a is healthy: got healthy result from https://192.168.73.61:2379
cluster is healthy
三、在master上安装 kubectl及生成配置文件
1、下载安装kubectl:
wget https://dl.k8s.io/v1.9.2/kubernetes-client-linux-amd64.tar.gz tar -xzvf kubernetes-client-linux-amd64.tar.gz cp kubernetes/client/bin/kube* /usr/bin/ chmod a+x /usr/bin/kube*
2、创建 kubectl kubeconfig 文件:
export KUBE_APISERVER="https://192.168.73.61:6443" # 设置集群参数 kubectl config set-cluster kubernetes \ --certificate-authority=/etc/kubernetes/ssl/ca.pem \ --embed-certs=true \ --server=${KUBE_APISERVER} # 设置客户端认证参数 kubectl config set-credentials admin \ --client-certificate=/etc/kubernetes/ssl/admin.pem \ --embed-certs=true \ --client-key=/etc/kubernetes/ssl/admin-key.pem # 设置上下文参数 kubectl config set-context kubernetes \ --cluster=kubernetes \ --user=admin # 设置默认上下文 kubectl config use-context kubernetes
3、创建 TLS Bootstrapping Token:
export BOOTSTRAP_TOKEN=$(head -c 16 /dev/urandom | od -An -t x | tr -d ' ') cat > token.csv <<EOF ${BOOTSTRAP_TOKEN},kubelet-bootstrap,10001,"system:kubelet-bootstrap" EOF
cp token.csv /etc/kubernetes/
scp token.csv root@192.168.73.62:/etc/kubernetes/
scp token.csv root@192.168.73.63:/etc/kubernetes/
4、创建 kubelet bootstrapping kubeconfig 文件:
cd /etc/kubernetes export KUBE_APISERVER="https://192.168.73.61:6443" # 设置集群参数 kubectl config set-cluster kubernetes \ --certificate-authority=/etc/kubernetes/ssl/ca.pem \ --embed-certs=true \ --server=${KUBE_APISERVER} \ --kubeconfig=bootstrap.kubeconfig # 设置客户端认证参数 kubectl config set-credentials kubelet-bootstrap \ --token=${BOOTSTRAP_TOKEN} \ --kubeconfig=bootstrap.kubeconfig # 设置上下文参数 kubectl config set-context default \ --cluster=kubernetes \ --user=kubelet-bootstrap \ --kubeconfig=bootstrap.kubeconfig # 设置默认上下文 kubectl config use-context default --kubeconfig=bootstrap.kubeconfig
5、创建 kube-proxy kubeconfig 文件:
export KUBE_APISERVER="https://192.168.73.61:6443" # 设置集群参数 kubectl config set-cluster kubernetes \ --certificate-authority=/etc/kubernetes/ssl/ca.pem \ --embed-certs=true \ --server=${KUBE_APISERVER} \ --kubeconfig=kube-proxy.kubeconfig # 设置客户端认证参数 kubectl config set-credentials kube-proxy \ --client-certificate=/etc/kubernetes/ssl/kube-proxy.pem \ --client-key=/etc/kubernetes/ssl/kube-proxy-key.pem \ --embed-certs=true \ --kubeconfig=kube-proxy.kubeconfig # 设置上下文参数 kubectl config set-context default \ --cluster=kubernetes \ --user=kube-proxy \ --kubeconfig=kube-proxy.kubeconfig # 设置默认上下文 kubectl config use-context default --kubeconfig=kube-proxy.kubeconfig
6、分发 kubeconfig 文件:
scp bootstrap.kubeconfig kube-proxy.kubeconfig root@192.168.73.62:/etc/kubernetes/
scp bootstrap.kubeconfig kube-proxy.kubeconfig root@192.168.73.63:/etc/kubernetes/
四、在master安装kube-apiserver,kube-scheduler,kube-controller-manager
1、下载最新的二进制文件:
wget https://dl.k8s.io/v1.9.2/kubernetes-server-linux-amd64.tar.gz
tar -xzvf kubernetes-server-linux-amd64.tar.gz
cd kubernetes
tar -xzvf kubernetes-src.tar.gz
cp -r server/bin/{kube-apiserver,kube-controller-manager,kube-scheduler,kubectl,kube-proxy,kubelet} /usr/local/bin/
2、配置和启动kube-apiserver:
1)、配置文件:/usr/lib/systemd/system/kube-apiserver.service
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Kubernetes API Service Documentation=https://github.com/GoogleCloudPlatform/kubernetes After=network.target After=etcd.service [Service] EnvironmentFile=-/etc/kubernetes/config EnvironmentFile=-/etc/kubernetes/apiserver ExecStart=/usr/local/bin/kube-apiserver \ $KUBE_LOGTOSTDERR \ $KUBE_LOG_LEVEL \ $KUBE_ETCD_SERVERS \ $KUBE_API_ADDRESS \ $KUBE_API_PORT \ $KUBELET_PORT \ $KUBE_ALLOW_PRIV \ $KUBE_SERVICE_ADDRESSES \ $KUBE_ADMISSION_CONTROL \ $KUBE_API_ARGS Restart=on-failure Type=notify LimitNOFILE=65536 [Install] WantedBy=multi-user.target
2)、配置文件:/etc/kubernetes/config
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
### # kubernetes system config # # The following values are used to configure various aspects of all # kubernetes services, including # # kube-apiserver.service # kube-controller-manager.service # kube-scheduler.service # kubelet.service # kube-proxy.service # logging to stderr means we get it in the systemd journal KUBE_LOGTOSTDERR="--logtostderr=true" # journal message level, 0 is debug KUBE_LOG_LEVEL="--v=0" # Should this cluster be allowed to run privileged docker containers KUBE_ALLOW_PRIV="--allow-privileged=true" # How the controller-manager, scheduler, and proxy find the apiserver KUBE_MASTER="--master=http://192.168.73.71:8080"
3)、配置文件:/etc/kubernetes/apiserver
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
### ## kubernetes system config ## ## The following values are used to configure the kube-apiserver ## # ## The address on the local server to listen to. KUBE_API_ADDRESS="--advertise-address=192.168.73.71 --bind-address=192.168.73.71 --insecure-bind-address=192.168.73.71" # ## The port on the local server to listen on. #KUBE_API_PORT="--port=8080" # ## Port minions listen on #KUBELET_PORT="--kubelet-port=10250" # ## Comma separated list of nodes in the etcd cluster KUBE_ETCD_SERVERS="--etcd-servers=https://192.168.73.71:2379,https://192.168.73.72:2379,https://192.168.73.73:2379" # ## Address range to use for services KUBE_SERVICE_ADDRESSES="--service-cluster-ip-range=10.254.0.0/16" # ## default admission control policies KUBE_ADMISSION_CONTROL="--admission-control=ServiceAccount,NamespaceLifecycle,NamespaceExists,LimitRanger,ResourceQuota" # ## Add your own! KUBE_API_ARGS="--authorization-mode=Node,RBAC --runtime-config=rbac.authorization.k8s.io/v1beta1 --kubelet-https=true --enable-bootstrap-token-auth --token-auth-file=/etc/kubernetes/token.csv --service-node-port-range=30000-32767 --tls-cert-file=/etc/kubernetes/ssl/kubernetes.pem --tls-private-key-file=/etc/kubernetes/ssl/kubernetes-key.pem --client-ca-file=/etc/kubernetes/ssl/ca.pem --service-account-key-file=/etc/kubernetes/ssl/ca-key.pem --etcd-cafile=/etc/kubernetes/ssl/ca.pem --etcd-certfile=/etc/kubernetes/ssl/kubernetes.pem --etcd-keyfile=/etc/kubernetes/ssl/kubernetes-key.pem --enable-swagger-ui=true --apiserver-count=3 --audit-log-maxage=30 --audit-log-maxbackup=3 --audit-log-maxsize=100 --audit-log-path=/var/lib/audit.log --event-ttl=1h"
4)、启动 kube-apiserver
systemctl daemon-reload systemctl enable kube-apiserver systemctl start kube-apiserver systemctl status kube-apiserver
3、配置和启动 kube-controller-manager:
1)、配置文件:/usr/lib/systemd/system/kube-controller-manager.service
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Kubernetes Controller Manager Documentation=https://github.com/GoogleCloudPlatform/kubernetes [Service] EnvironmentFile=-/etc/kubernetes/config EnvironmentFile=-/etc/kubernetes/controller-manager ExecStart=/usr/local/bin/kube-controller-manager \ $KUBE_LOGTOSTDERR \ $KUBE_LOG_LEVEL \ $KUBE_MASTER \ $KUBE_CONTROLLER_MANAGER_ARGS Restart=on-failure LimitNOFILE=65536 [Install] WantedBy=multi-user.target
2)、配置文件:/etc/kubernetes/controller-manager
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
### # The following values are used to configure the kubernetes controller-manager # defaults from config and apiserver should be adequate # Add your own! KUBE_CONTROLLER_MANAGER_ARGS="--address=127.0.0.1 --service-cluster-ip-range=10.254.0.0/16 --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/ssl/ca.pem --cluster-signing-key-file=/etc/kubernetes/ssl/ca-key.pem --service-account-private-key-file=/etc/kubernetes/ssl/ca-key.pem --root-ca-file=/etc/kubernetes/ssl/ca.pem --leader-elect=true"
3)、启动 kube-controller-manager
systemctl daemon-reload systemctl enable kube-controller-manager systemctl start kube-controller-manager systemctl status kube-controller-manager
4、配置和启动 kube-scheduler
1)、配置文件:/usr/lib/systemd/system/kube-scheduler.service
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Kubernetes Scheduler Plugin Documentation=https://github.com/GoogleCloudPlatform/kubernetes [Service] EnvironmentFile=-/etc/kubernetes/config EnvironmentFile=-/etc/kubernetes/scheduler ExecStart=/usr/local/bin/kube-scheduler \ $KUBE_LOGTOSTDERR \ $KUBE_LOG_LEVEL \ $KUBE_MASTER \ $KUBE_SCHEDULER_ARGS Restart=on-failure LimitNOFILE=65536 [Install] WantedBy=multi-user.target
2)、配置文件:/etc/kubernetes/scheduler
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
### # kubernetes scheduler config # default config should be adequate # Add your own! KUBE_SCHEDULER_ARGS="--leader-elect=true --address=127.0.0.1"
3)、启动 kube-scheduler
systemctl daemon-reload systemctl enable kube-scheduler systemctl start kube-scheduler systemctl status kube-scheduler
5、验证功能:
$ kubectl get componentstatuses
NAME STATUS MESSAGE ERROR
controller-manager Healthy ok
scheduler Healthy ok
etcd-0 Healthy {"health":"true"}
etcd-1 Healthy {"health":"true"}
etcd-2 Healthy {"health":"true"}
五、在所有节点安装flannel网络插件
1、安装(没有对版本有特殊要求):
1、yum安装:
yum install -y flannel
2、二进制包安装:
wget https://github.com/coreos/flannel/releases/download/v0.10.0/flannel-v0.10.0-linux-amd64.tar.gz
tar zxvf flannel-v0.10.0-linux-amd64.tar.gz
mkdir /usr/libexec/flannel/
cp mk-docker-opts.sh /usr/libexec/flannel/
cp flanneld /usr/local/bin
2、配置和启动fannel:
1)、配置文件 /usr/lib/systemd/system/flanneld.service
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Flanneld overlay address etcd agent After=network.target After=network-online.target Wants=network-online.target After=etcd.service Before=docker.service [Service] Type=notify EnvironmentFile=/etc/sysconfig/flanneld EnvironmentFile=-/etc/sysconfig/docker-network ExecStart=/usr/local/bin/flanneld \ -etcd-endpoints=${FLANNEL_ETCD_ENDPOINTS} \ -etcd-prefix=${FLANNEL_ETCD_PREFIX} \ $FLANNEL_OPTIONS ExecStartPost=/usr/libexec/flannel/mk-docker-opts.sh -k DOCKER_NETWORK_OPTIONS -d /run/flannel/docker Restart=on-failure [Install] WantedBy=multi-user.target RequiredBy=docker.service
2)、配置文件 /etc/sysconfig/flanneld
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
# Flanneld configuration options # etcd url location. Point this to the server where etcd runs FLANNEL_ETCD_ENDPOINTS="https://192.168.73.71:2379,https://192.168.73.72:2379,https://192.168.73.73:2379" # etcd config key. This is the configuration key that flannel queries # For address range assignment FLANNEL_ETCD_PREFIX="/kube-centos/network" # Any additional options that you want to pass FLANNEL_OPTIONS="-etcd-cafile=/etc/kubernetes/ssl/ca.pem -etcd-certfile=/etc/kubernetes/ssl/kubernetes.pem -etcd-keyfile=/etc/kubernetes/ssl/kubernetes-key.pem"
3)、在etcd中创建网络配置(在master配置就行)
etcdctl --endpoints=https://192.168.73.71:2379,https://192.168.73.72:2379,https://192.168.73.73:2379 \ --ca-file=/etc/kubernetes/ssl/ca.pem \ --cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ mkdir /kube-centos/network etcdctl --endpoints=https://192.168.73.71:2379,https://192.168.73.72:2379,https://192.168.73.73:2379 \ --ca-file=/etc/kubernetes/ssl/ca.pem \ --cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ mk /kube-centos/network/config '{"Network":"172.30.0.0/16","SubnetLen":24,"Backend":{"Type":"vxlan"}}'
4)、启动flannel
systemctl daemon-reload
systemctl enable flanneld
systemctl start flanneld
systemctl status flanneld
3、验证:
[root@k8s-master ~]# etcdctl --endpoints=${ETCD_ENDPOINTS} \ --ca-file=/etc/kubernetes/ssl/ca.pem \ --cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ ls /kube-centos/network/subnets /kube-centos/network/subnets/172.30.79.0-24 /kube-centos/network/subnets/172.30.47.0-24 /kube-centos/network/subnets/172.30.65.0-24
[root@k8s-master ~]# etcdctl --endpoints=${ETCD_ENDPOINTS} \ --ca-file=/etc/kubernetes/ssl/ca.pem \ --cert-file=/etc/kubernetes/ssl/kubernetes.pem \ --key-file=/etc/kubernetes/ssl/kubernetes-key.pem \ get /kube-centos/network/config {"Network":"172.30.0.0/16","SubnetLen":24,"Backend":{"Type":"vxlan"}}
六、在所有节点安装配置docker、kubelet、kube-proxy
1、修改配置及安装docker
1)、注释掉swap及创建目录:
对于1.8以上的版本,需要修改/etc/fstab将,swap系统注释掉(重启系统才能生效,不然kubelet)
mkdir /var/lib/kubele
2)、安装docker:
docker17.03 安装: yum remove docker docker-common container-selinux docker-selinux docker-engine #移除旧的docker yum install -y yum-utils yum-config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo yum makecache
yum install -y policycoreutils-python wget https://download.docker.com/linux/centos/7/x86_64/stable/Packages/docker-ce-selinux-17.03.2.ce-1.el7.centos.noarch.rpm rpm -ivh docker-ce-selinux-17.03.2.ce-1.el7.centos.noarch.rpm yum list docker-ce --showduplicates | sort -r #查看所有所有版本包 yum -y install docker-ce-17.03.2.ce
3)、配置文件:/usr/lib/systemd/system/docker.service:
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Docker Application Container Engine Documentation=https://docs.docker.com After=network-online.target firewalld.service Wants=network-online.target [Service] Type=notify EnvironmentFile=-/run/flannel/docker ExecStart=/usr/bin/dockerd --insecure-registry=192.168.78.4 \ --exec-opt native.cgroupdriver=systemd \ $OPTIONS \ $DOCKER_STORAGE_OPTIONS \ $DOCKER_NETWORK_OPTIONS \ $ADD_REGISTRY \ $BLOCK_REGISTRY \ $REGISTRIES ExecReload=/bin/kill -s HUP $MAINPID LimitNOFILE=infinity LimitNPROC=infinity LimitCORE=infinity TimeoutStartSec=0 Delegate=yes KillMode=process Restart=on-failure StartLimitBurst=3 StartLimitInterval=60s [Install] WantedBy=multi-user.target
4)、启动docker:
systemctl daemon-reload
systemctl enable docker
systemctl start docker
systemctl status docker
2、给kubelet赋予权限(主节点执行)
cd /etc/kubernetes kubectl create clusterrolebinding kubelet-bootstrap \ --clusterrole=system:node-bootstrapper \ --user=kubelet-bootstrap
3、分发kubelet和kube-proxy二进制文件
scp /root/kubernetes
/server/bin/{kube-proxy,kubelet} root@192.168.73.72:/usr/local/bin/
scp /root/kubernetes
/server/bin/{kube-proxy,kubelet} root@192.168.73.72:/usr/local/bin/
mkdir /var/lib/kubelet
4、配置和启动kubelet
1)、配置文件(把地址改为本机地址) :/usr/lib/systemd/system/kubelet.service
![](https://images.cnblogs.com/OutliningIndicators/ContractedBlock.gif)
[Unit] Description=Kubernetes Kubelet Documentation=https://github.com/GoogleCloudPlatform/kubernetes After=docker.service Requires=docker.service [Service] WorkingDirectory=/var/lib/kubelet ExecStart=/usr/local/bin/kubelet \ --address=192.168.78.71 \ --hostname-override=192.168.78.71 \ --pod-infra-container-image=docker.io/kubernetes/pause \ --experimental-bootstrap-kubeconfig=/etc/kubernetes/bootstrap.kubeconfig \ --kubeconfig=/etc/kubernetes/ssl/kubelet.kubeconfig \ --cert-dir=/etc/kubernetes/ssl \ --hairpin-mode promiscuous-bridge \ --allow-privileged=true \ --serialize-image-pulls=false \ --logtostderr=true \ --cgroup-driver=systemd \ --cluster_dns=10.254.0.2 \ --cluster_domain=cluster.local \ --v=2 Restart=on-failure RestartSec=5 [Install] WantedBy=multi-user.target
2)、启动kublet
systemctl daemon-reload
systemctl enable kubelet
systemctl start kubelet
systemctl status kubelet
3)、通过 kublet 的 TLS 证书请求
kubelet 首次启动时向 kube-apiserver 发送证书签名请求,必须通过后 kubernetes 系统才会将该 Node 加入到集群。
1、查看未授权的请求:kubectl get csr
2、通过csr请求:
kubectl get csr | awk '/Pending/ {print $1}' | xargs kubectl certificate approve
$ kubectl get nodes
NAME STATUS ROLES AGE VERSION
192.168.73.71 Ready <none> 11m v1.9.2
192.168.73.72 Ready <none> 8m v1.9.2
192.168.73.73 Ready <none> 6m v1.9.2
5、配置启动 kube-proxy
1)、安装conntrack
yum install -y conntrack-tools
2)、配置文件(把地址改为本机地址):/usr/lib/systemd/system/kube-proxy.service
[Unit]
Description=Kubernetes Kube-Proxy Server
Documentation=https://github.com/GoogleCloudPlatform/kubernetes
After=network.target
[Service]
EnvironmentFile=-/etc/kubernetes/config
EnvironmentFile=-/etc/kubernetes/proxy
ExecStart=/usr/local/bin/kube-proxy \
--bind-address=192.168.73.71 \
--hostname-override=192.168.73.71
\
--kubeconfig=/etc/kubernetes/kube-proxy.kubeconfig \
--cluster-cidr=10.254.0.0/16
Restart=on-failure
LimitNOFILE=65536
[Install]
WantedBy=multi-user.target
3)、启动kube-proxy
systemctl daemon-reload systemctl enable kube-proxy systemctl start kube-proxy systemctl status kube-proxy
参考文档:https://jimmysong.io/kubernetes-handbook/