kubernetes环境搭建

安装方式

  • minikube:一个用于快速搭建单节点kubernets的工具
  • kubeadm:用于快速搭建kubernets集群的工具
  • 二进制包:从官网上下载每一个组件的二进制包,依次去安装,更容易理解kubernets的组件

环境规划 Centos7

master: 192.168.248.10 2核2G

node1: 192.168.248.11 2核2G

node2: 192.168.248.12 2核2G

 

以下3台都需要配置

1.配置hosts文件

2.关闭防火墙selinux
 setenforce 0
 sed -i 's/SELINUX=enforcing/SELINUX=disabled/g' /etc/selinux/config

3.时间同步
#master节点
vim /etc/chrony.conf
server ntp1.aliyun.com iburst 
allow 192.168.168.0/24 
systemctl restart chronyd 
#node节点 
vim /etc/chrony.conf 
server 192.168.248.10 iburst 
systemctl restart chronyd


4.关闭sawp分区
swapoff -a
注释掉 /etc/fstab 文件中的 swap配置

5.修改内核参数
vim /etc/sysctl.d/kubernetes.conf
net.bridge.bridge-nf-call-ip6tables = 1
net.bridge.bridge-nf-call-iptables = 1
net.ipv4.ip_forward = 1

#重载配置
sysctl -p 

#加载网桥过滤模块
modprobe br_netfilter

#查看网桥过滤模块是否加载成功
lsmod | grep br_netfilter

6.配置ipvs功能
在kubernetes中service有两种代理模型,一种基于iptables,一种基于ipvs,两者相比ipvs性能明显要高一些,如果需要使用要手动载入ipvs模块
yum -y install ipset ipvsadm

cat  <<EOF >  /etc/sysconfig/modules/ipvs.modules
#!/bin/bash
modprobe -- ip_vs
modprobe -- ip_vs_rr
modprobe -- ip_vs_wrr
modprobe -- ip_vs_sh
modprobe -- nf_conntrack_ipv4
EOF

chmod +x /etc/sysconfig/modules/ipvs.modules

/bin/bash /etc/sysconfig/modules/ipvs.modules

lsmod | grep -e ip_vs -e nf_conntrack_ipv4

7.重启服务器

 

 

安装docker

#安装docker源
cd /etc/yum.repos.d/
curl -o docker-ce.repo https://mirrors.tuna.tsinghua.edu.cn/docker-ce/linux/centos/docker-ce.repo

# 查看镜像源中所支持的docker版本
yum list docker-ce --showduplicates

# 安装特定版本的docker-ce
# 必须指定 --setopt=obsoletes=0,否则yum会自动安装更高的版本
yum -y install --setopt=onsoletes=0 docker-ce-18.06.3.ce-3.el7


# 添加配置文件,docker在默认情况下使用Cgroup Driver为cgroupfs,而kubernets推荐使用systemd来代替cgroupfs
mkdir /etc/docker

cat <<EOF > /etc/docker/daemon.json
{
    "exec-opts" : ["native.cgroupdriver=systemd"],
    "registry-mirrors" : ["https://kn0t2bca.mirror.aliyuncs.com"]
}
EOF

#启动docker
systemctl start docker 
systemctl enable docker

 

安装kubernetes组件

#切换到国内镜像源
vim /etc/yum.repos.d/kubernetes.repo
[kubernetes]
name = Kubernetes
baseurl = http://mirrors.aliyun.com/kubernetes/yum/repos/kubernetes-el7-x86_64
enabled = 1
gpgcheck = 0
repo_gpgcheck = 0
gpgkey = http://mirrors.aliyun.com/kubernetes/yum/doc/yum-key.gpg
         http://mirrors.aliyun.com/kubernetes/yum/doc/rpm-package-key.gpg
         
#安装kubeadm、kubelet和kubectl
yum -y install --setopt=obsoletes=0 kubeadm-1.17.4-0 kubelet-1.17.4-0 kubectl-1.17.4-0

#配置kubelet的cgroup
vim /etc/sysconfig/kubelet
KUBELET_CGROUP_ARGS="--cgroup-driver=systemd"
KUBE_PROXY_MODE="ipvs"

#设置kubelet开机自启
systemctl enable kubelet

 

准备集群镜像

# 在安装kubernetes集群之前,必须提前准备好集群需要的镜像,可以通过以下命令查看
kubeadm config images list

#下载镜像
#此镜像在kubernetes的仓库中,由于网络原因,无法连接,下面通过了一种方法代替
images=(
    kube-apiserver:v1.17.4
    kube-controller-manager:v1.17.4
    kube-scheduler:v1.17.4
    kube-proxy:v1.17.4
    pause:3.1
    etcd:3.4.3-0
    coredns:1.6.5
)

for imageName in ${images[@]};do 
    docker pull registry.cn-hangzhou.aliyuncs.com/google_containers/$imageName
    docker tag registry.cn-hangzhou.aliyuncs.com/google_containers/$imageName k8s.gcr.io/$imageName
    docker rmi registry.cn-hangzhou.aliyuncs.com/google_containers/$imageName
done

 

集群初始化

下面操作只需要在master上执行即可

#创建集群
[root@master ~]# kubeadm init --kubernetes-version=v1.17.4 --pod-network-cidr=10.244.0.0/16 --service-cidr=10.96.0.0/12 --apiserver-advertise-address=192.168.248.10
.............

You should now deploy a pod network to the cluster.
Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
  https://kubernetes.io/docs/concepts/cluster-administration/addons/

Then you can join any number of worker nodes by running the following on each as root:

kubeadm join 192.168.248.10:6443 --token epdgo0.xui34va7u2yfppmx \
    --discovery-token-ca-cert-hash sha256:85b336094393db232206802247c4b09b20ee9dab5c2fe4cca841d00e605a6d8b 
#将node节点加入集群
[root@node1 ~]# kubeadm join 192.168.248.10:6443 --token epdgo0.xui34va7u2yfppmx     --discovery-token-ca-cert-hash sha256:85b336094393db232206802247c4b09b20ee9dab5c2fe4cca841d00e605a6d8b
[root@node2 ~]# kubeadm join 192.168.248.10:6443 --token epdgo0.xui34va7u2yfppmx     --discovery-token-ca-cert-hash sha256:85b336094393db232206802247c4b09b20ee9dab5c2fe4cca841d00e605a6d8b

# 创建必要的文件
mkdir -p $HOME/.kube
cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
chown $(id -u):$(id -g) $HOME/.kube/config

#查看node信息
[root@master ~]# kubectl  get node
NAME     STATUS     ROLES    AGE   VERSION
master   NotReady   master   95s   v1.17.4
node1    NotReady   <none>   38s   v1.17.4
node2    NotReady   <none>   34s   v1.17.4

 

 

安装网络插件

kubernetes支持多种网络插件,比如flannel、calico、canal等,本次使用flannel

 

# 下面还是在master节点执行即可,插件使用的事DaemonSet的控制器,它会在每个节点上运行

# 获取fannel的配置文件
wget https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yaml

如果下载不到的报错 连接失败,可以直接使用
vi  kube-flannel.yaml
---
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
  name: psp.flannel.unprivileged
  annotations:
    seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default
    seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default
    apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default
    apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
spec:
  privileged: false
  volumes:
  - configMap
  - secret
  - emptyDir
  - hostPath
  allowedHostPaths:
  - pathPrefix: "/etc/cni/net.d"
  - pathPrefix: "/etc/kube-flannel"
  - pathPrefix: "/run/flannel"
  readOnlyRootFilesystem: false
  # Users and groups
  runAsUser:
    rule: RunAsAny
  supplementalGroups:
    rule: RunAsAny
  fsGroup:
    rule: RunAsAny
  # Privilege Escalation
  allowPrivilegeEscalation: false
  defaultAllowPrivilegeEscalation: false
  # Capabilities
  allowedCapabilities: ['NET_ADMIN', 'NET_RAW']
  defaultAddCapabilities: []
  requiredDropCapabilities: []
  # Host namespaces
  hostPID: false
  hostIPC: false
  hostNetwork: true
  hostPorts:
  - min: 0
    max: 65535
  # SELinux
  seLinux:
    # SELinux is unused in CaaSP
    rule: 'RunAsAny'
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: flannel
rules:
- apiGroups: ['extensions']
  resources: ['podsecuritypolicies']
  verbs: ['use']
  resourceNames: ['psp.flannel.unprivileged']
- apiGroups:
  - ""
  resources:
  - pods
  verbs:
  - get
- apiGroups:
  - ""
  resources:
  - nodes
  verbs:
  - list
  - watch
- apiGroups:
  - ""
  resources:
  - nodes/status
  verbs:
  - patch
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: flannel
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: flannel
subjects:
- kind: ServiceAccount
  name: flannel
  namespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:
  name: flannel
  namespace: kube-system
---
kind: ConfigMap
apiVersion: v1
metadata:
  name: kube-flannel-cfg
  namespace: kube-system
  labels:
    tier: node
    app: flannel
data:
  cni-conf.json: |
    {
      "name": "cbr0",
      "cniVersion": "0.3.1",
      "plugins": [
        {
          "type": "flannel",
          "delegate": {
            "hairpinMode": true,
            "isDefaultGateway": true
          }
        },
        {
          "type": "portmap",
          "capabilities": {
            "portMappings": true
          }
        }
      ]
    }
  net-conf.json: |
    {
      "Network": "10.244.0.0/16",
      "Backend": {
        "Type": "vxlan"
      }
    }
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
  name: kube-flannel-ds
  namespace: kube-system
  labels:
    tier: node
    app: flannel
spec:
  selector:
    matchLabels:
      app: flannel
  template:
    metadata:
      labels:
        tier: node
        app: flannel
    spec:
      affinity:
        nodeAffinity:
          requiredDuringSchedulingIgnoredDuringExecution:
            nodeSelectorTerms:
            - matchExpressions:
              - key: kubernetes.io/os
                operator: In
                values:
                - linux
      hostNetwork: true
      priorityClassName: system-node-critical
      tolerations:
      - operator: Exists
        effect: NoSchedule
      serviceAccountName: flannel
      initContainers:
      - name: install-cni
        image: quay.io/coreos/flannel:v0.13.1-rc1
        command:
        - cp
        args:
        - -f
        - /etc/kube-flannel/cni-conf.json
        - /etc/cni/net.d/10-flannel.conflist
        volumeMounts:
        - name: cni
          mountPath: /etc/cni/net.d
        - name: flannel-cfg
          mountPath: /etc/kube-flannel/
      containers:
      - name: kube-flannel
        image: quay.io/coreos/flannel:v0.13.1-rc1
        command:
        - /opt/bin/flanneld
        args:
        - --ip-masq
        - --kube-subnet-mgr
        resources:
          requests:
            cpu: "100m"
            memory: "50Mi"
          limits:
            cpu: "100m"
            memory: "50Mi"
        securityContext:
          privileged: false
          capabilities:
            add: ["NET_ADMIN", "NET_RAW"]
        env:
        - name: POD_NAME
          valueFrom:
            fieldRef:
              fieldPath: metadata.name
        - name: POD_NAMESPACE
          valueFrom:
            fieldRef:
              fieldPath: metadata.namespace
        volumeMounts:
        - name: run
          mountPath: /run/flannel
        - name: flannel-cfg
          mountPath: /etc/kube-flannel/
      volumes:
      - name: run
        hostPath:
          path: /run/flannel
      - name: cni
        hostPath:
          path: /etc/cni/net.d
      - name: flannel-cfg
        configMap:
          name: kube-flannel-cfg



# 使用配置文件启动flannel
[root@master ~]# kubectl apply  -f kube-flannel.yml

# 稍等一会在次查看集群
[root@master ~]# kubectl  get node
NAME     STATUS   ROLES    AGE     VERSION
master   Ready    master   8m56s   v1.17.4
node1    Ready    <none>   8m34s   v1.17.4
node2    Ready    <none>   3m52s   v1.17.4

 

集群测试

# 创建一个nginx服务
kubectl create deployment nginx --image=nginx:1.14-alpine

# 暴露端口 --type=NodePort让集群之外的浏览器可以访问
kubectl expose deploy nginx --port=80 --target-port=80 --type=NodePort

kubectl  get pod,svc
NAME                         READY   STATUS    RESTARTS   AGE
pod/nginx-6867cdf567-lh6vv   1/1     Running   1          9h

NAME                 TYPE        CLUSTER-IP       EXTERNAL-IP   PORT(S)        AGE
service/kubernetes   ClusterIP   10.96.0.1        <none>        443/TCP        11h
service/nginx        NodePort    10.111.120.209   <none>        80:30317/TCP   9h

访问浏览器  nodeip:30317

 

资源管理

#命令式对象管理:直接使用命令去操作kubernets资源
kubectl run nginx-pod --image=nginx1.17.1 --pord=80

#命令式对象配置:通过命令配置和配置文件去操作kubernetes资源
kubectl create/patch -f nginx-pod.yml

#声明式对象配置:通过apply命令和配置文件去操作kubernetes资源
kubectl apply -f nginx-pod.yml
 

 

命令式对象管理

  • kubectl命令

    kubectl式kubernetes集群的命令行工具,通过它能够对集群本身进行管理,并能够在集群上进行容器化安装部署。kubectl命令语法

 

kubectl [command] [type] [name] [flags

 

command: 指定要对资源执行的操作,例如create,get,delete

type: 指定资源类型,比如deployment、pod、service

name: 指定资源名称,名称大小写敏感

flags: 指定额外的可选参数

# 查看所有pod
kubectl get pod

# 查看某个pod
kubectl get pod pod_name

# 产看某一个pod,以yaml格式展示结果
kubectl get pod pod_name -o yaml

 

下面以一个namespace/pod的创建和删除简单演示一下命令的使用

#创建一个namespace
kubectl create namespace dev

#获取namespace
kubectl get ns
NAME              STATUS   AGE
default           Active   17h
dev               Active   12s
kube-node-lease   Active   17h
kube-public       Active   17h
kube-system       Active   17h

#在dev下创建一个nginx的pod
kubectl run pod --image=nginx -n dev

#查看新创建的pod
kubectl get pod -n dev
NAME                   READY   STATUS    RESTARTS   AGE
pod-864f9875b9-4htwm   1/1     Running   0          50s

#删除指定pod
kubectl delete pod pod-864f9875b9-4htwm -n dev

#删除指定namespace
kubectl delete ns dev

 

命令式对象配置

命令式对象配置就是使用命令配合配置文件一起来操作kubernetes资源

1). 创建一个nginxpod.yml,内容如下

aipVersion: v1
kind: Namespace
metadata:
  name: dev
  
---
apiVersion: v1
kind: Pod
metadata:
  name: nginxpod
  namespace: dev
spec:
  containers:
  - name: nginx-containers
    image: nginx:1.17.1

 2).执行create命令,创建资源:

kubectl create -f nginxpod.yml

 3).执行get命令查看资源,发现创建了2个资源

kubectl  get -f nginxpod.yml 
NAME            STATUS   AGE
namespace/dev   Active   54s

NAME           READY   STATUS    RESTARTS   AGE
pod/nginxpod   1/1     Running   0          53s

 4).执行delete命令删除资源

kubectl delete -f nginxpod.yml

 命令式对象配置的操作资源,可以简单的认为: 命令 + yml配置文件(里面的命令需要各种参数)

 

声明式对象配置

声明式对象配置和命令式对象配置很相似,但是它只有一个命令apply

# 首先执一次kubectl apply -f nginxpod.yml发现创建了资源
kubectl apply -f nginxpod.yml
namespace/dev created
pod/nginxpod created

#再次执行,发现资源没有变动
kubectl apply -f nginxpod.yml
namespace/dev unchanged
pod/nginxpod unchanged

 

其实声明式对象配置就是使用apply描叙一个资源的最终状态(在yml中定义状态),使用apply操作资源:

如果资源不存在则创建,相当于kubectl create 如果资源存在则更新,相当于kubectl patch

扩展: kubcetl可以在node节点上运行吗?

kubect的运行是需要进行配置的,它的配置文件¥HOME/.kube,如果想要在node节点运行此命令,需要将master上的。kube文件复制到node节点上,即在master节点执行以下操作即可

scp -r HOME/.kube  node:HOME/

 

posted @ 2021-10-02 10:37  第七爻  阅读(135)  评论(0编辑  收藏  举报