前文我搭建了一主两从的Kubernetes集群,然而还是存在一个问题,没有达到高可用的目标,如果Master节点呈现问题,整个集群将会瘫痪,所以高可用的要害动作在于多Master节点,并且部署过程要比单Master节点集群要简单很多。

思考再三,鉴于我理论部署过程中呈现的问题泛滥(天知道我经验了什么),我还是决定在本文只形容部署过程,即怎么做,力求照着本文能胜利部署出一套高可用的Kubernetes集群;至于为什么?的问题我留在下一篇文章作为闲聊。

本次高可用计划架构图如下:

须要用到haproxy和keepalived组件提供Master节点高可用。

筹备工作

机器角色IP
master10.128.2.53
master10.128.2.52
master10.11.0.220
node10.128.1.187
node10.11.7.94
node10.11.0.181
node10.11.7.125

所有机器须要依照上文Kubeadm疾速部署Kubernetes集群中筹备工作环节进行设置,此外须要非凡留神的几点如下:

hostname设置

须要设置hosts文件和hostname

## vi /etc/hosts10.128.2.53 kubernetes-master0110.128.2.52 kubernetes-master0210.11.0.220 kubernetes-master0310.128.1.187 kubernetes-node0110.11.7.94 kubernetes-node0210.11.0.181 kubernetes-node0310.11.7.125 kubernetes-node0410.128.2.111 kubernetes-vip
hostnamectl set-hostname kubernetes-master01......

10.128.2.111 kubernetes-vip是通过keepalived实现的vip地址。

节点互信

须要设置Master三节点间互信以及Master免登录Node节点,参考前文。

装置ipvs

ipvs是kube-proxy实现负载平衡的一种技术实现,默认的实现形式是iptables,后文再详述。

  • 装置软件
yum install ipvsadm ipset sysstat conntrack libseccomp -y
  • 加载模块
cat > /etc/sysconfig/modules/ipvs.modules <<EOF#!/bin/bashmodprobe -- ip_vsmodprobe -- ip_vs_rrmodprobe -- ip_vs_wrrmodprobe -- ip_vs_shmodprobe -- nf_conntrackmodprobe -- ip_tablesmodprobe -- ip_setmodprobe -- xt_setmodprobe -- ipt_setmodprobe -- ipt_rpfiltermodprobe -- ipt_REJECTmodprobe -- ipipEOF

配置重启主动加载

所有节点执行
chmod 755 /etc/sysconfig/modules/ipvs.modules && bash /etc/sysconfig/modules/ipvs.modules && lsmod | grep -e ip_vs -e nf_conntrack

kubeadm、kubelet、kubectl装置

配置源

cat > /etc/yum.repos.d/kubernetes.repo <<EOF[kubernetes]name=Kubernetesbaseurl=http://mirrors.aliyun.com/kubernetes/yum/repos/kubernetes-el7-x86_64/enabled=1gpgcheck=1repo_gpgcheck=1gpgkey=http://mirrors.aliyun.com/kubernetes/yum/doc/yum-key.gpg http://mirrors.aliyun.com/kubernetes/yum/doc/rpm-package-key.gpgEOF#重建yum缓存,输出y增加证书认证yum makecache fast

本次装置最新的1.20.4版本

先配置kubeletcggroupDriversystemd,这是官网倡议的,这里有个有意思的中央后文再说

cat > /var/lib/kubelet/config.yaml <<EOFapiVersion: kubelet.config.k8s.io/v1beta1kind: KubeletConfigurationcgroupDriver: systemdEOF

所有节点装置

yum install -y kubelet-1.20.4 kubeadm-1.20.4 kubectl-1.20.4systemctl enable kubelet && systemctl start kubelet && systemctl status kubelet

集群搭建

首先是装置高可用组件haproxy和keepalived,这里我应用docker形式,3个Master节点都需装置。

haproxy装置

  • 创立配置文件haproxy.cfg
vim /etc/haproxy/haproxy.cfg

节点信息局部按本人的理论状况批改:

#---------------------------------------------------------------------# Example configuration for a possible web application.  See the# full configuration options online.##   https://www.haproxy.org/download/2.1/doc/configuration.txt#   https://cbonte.github.io/haproxy-dconv/2.1/configuration.html##---------------------------------------------------------------------#---------------------------------------------------------------------# Global settings#---------------------------------------------------------------------global    # to have these messages end up in /var/log/haproxy.log you will    # need to:    #    # 1) configure syslog to accept network log events.  This is done    #    by adding the '-r' option to the SYSLOGD_OPTIONS in    #    /etc/sysconfig/syslog    #    # 2) configure local2 events to go to the /var/log/haproxy.log    #   file. A line like the following can be added to    #   /etc/sysconfig/syslog    #    #    local2.*                       /var/log/haproxy.log    #    log         127.0.0.1 local2#    chroot      /var/lib/haproxy    pidfile     /var/run/haproxy.pid    maxconn     4000#    user        haproxy#    group       haproxy    # daemon    # turn on stats unix socket    stats socket /var/lib/haproxy/stats#---------------------------------------------------------------------# common defaults that all the 'listen' and 'backend' sections will# use if not designated in their block#---------------------------------------------------------------------defaults    mode                    http    log                     global    option                  httplog    option                  dontlognull    option http-server-close    option forwardfor       except 127.0.0.0/8    option                  redispatch    retries                 3    timeout http-request    10s    timeout queue           1m    timeout connect         10s    timeout client          1m    timeout server          1m    timeout http-keep-alive 10s    timeout check           10s    maxconn                 3000#---------------------------------------------------------------------# main frontend which proxys to the backends#---------------------------------------------------------------------frontend  kubernetes-apiserver    mode tcp    bind *:9443  ## 监听9443端口    # bind *:443 ssl # To be completed ....    acl url_static       path_beg       -i /static /images /javascript /stylesheets    acl url_static       path_end       -i .jpg .gif .png .css .js    default_backend             kubernetes-apiserver#---------------------------------------------------------------------# round robin balancing between the various backends#---------------------------------------------------------------------backend kubernetes-apiserver    mode        tcp  # 模式tcp    balance     roundrobin  # 采纳轮询的负载算法# k8s-apiservers backend  # 配置apiserver,端口6443 server kubernetes-master01 10.128.2.53:6443 check server kubernetes-master02 10.128.2.52:6443 check server kubernetes-master03 10.11.0.220:6443 check

配置文件复制到其余Master节点

scp /etc/haproxy/haproxy.cfg root@kubernetes-master02:/etc/haproxyscp /etc/haproxy/haproxy.cfg root@kubernetes-master03:/etc/haproxy

最初docker启动,

docker run -d --name=haproxy --net=host  -v /etc/haproxy:/usr/local/etc/haproxy:ro -v /var/lib/haproxy:/var/lib/haproxy haproxy:2.3.6

装置keepalived

装置keepalived消耗了我不少工夫,其中碰到问题挺多的,当然也和以前没应用过keepalived无关。keepalived同样须要3个Master节点都装置,并且稍有不同。

同样的,首先创立配置文件:

vim /etc/keepalived/keepalived.conf

查看网卡信息:

ip addr

内容如下:

global_defs {   script_user root    enable_script_security}vrrp_script chk_haproxy {    script "/bin/bash -c 'if [[ $(netstat -nlp | grep 9443) ]]; then exit 0; else exit 1; fi'"  # haproxy 检测脚本,这里须要依据本人理论状况判断    interval 2  # 每2秒执行一次检测    weight 11 # 权重变动}vrrp_instance VI_1 {  interface ens192 # 此处通过ip addr命令依据理论填写  state MASTER # backup节点设为BACKUP  virtual_router_id 51 # id设为雷同,示意是同一个虚构路由组  priority 100 #初始权重  #这里须要留神,我的3个Master节点不在同一个网段,不配置会呈现多个Master节点的脑裂景象,值依据以后节点状况,配置其余2个节点  unicast_peer {        10.128.2.53        10.128.2.52  }  virtual_ipaddress {    10.128.2.111  # vip 虚构ip  }  authentication {    auth_type PASS    auth_pass password  }  track_script {      chk_haproxy  }  notify "/container/service/keepalived/assets/notify.sh"}

最初docker运行就好了:

docker run --cap-add=NET_ADMIN --cap-add=NET_BROADCAST --cap-add=NET_RAW --net=host --volume /etc/keepalived/keepalived.conf:/container/service/keepalived/assets/keepalived.conf -d osixia/keepalived:2.0.20 --copy-service

Kubernetes集群初始化

以下操作都在kubernetes-master01节点上执行

本次仍然应用kubeadm来实现集群的组建工作,新建kubeadm的集群配置文件kubeadm.yaml,前文中kube-proxy采纳了ipvs,也须要进行配置申明:

cat >> kubeadm.yaml <<EOFapiVersion: kubeadm.k8s.io/v1beta2kind: ClusterConfigurationkubernetesVersion: v1.20.2imageRepository: registry.cn-hangzhou.aliyuncs.com/google_containerscontrolPlaneEndpoint: "kubernetes-vip:9443"networking:  dnsDomain: cluster.local  podSubnet: 192.168.0.0/16  serviceSubnet: 10.211.0.0/12---apiVersion: kubeproxy.config.k8s.io/v1alpha1kind: KubeProxyConfigurationmode: ipvsEOF

执行初始化命令:

kubeadm init --config kubeadm.yaml --upload-certs

胜利后执行:

mkdir -p $HOME/.kubesudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/configsudo chown $(id -u):$(id -g) $HOME/.kube/config

并记住节点退出集群的命令:

kubeadm join kubernetes-vip:9443 --token 6dntoh.syhp7vi2j7ikv5uv \    --discovery-token-ca-cert-hash sha256:250115fad0a4b6852a919dbba4222ac65bc64843c660363ab119606ff8819d0a \    --control-plane --certificate-key 7bd1bc54ee1fdbffcbfb17f93b32496cb93c0688523f7d5fe414cefd48fb05fekubeadm join kubernetes-vip:9443 --token 6dntoh.syhp7vi2j7ikv5uv \    --discovery-token-ca-cert-hash sha256:250115fad0a4b6852a919dbba4222ac65bc64843c660363ab119606ff8819d0a

装置calico组件并执行:

wget https://docs.projectcalico.org/v3.8/manifests/calico.yamlkubectl apply -f calico.yaml

接下来依据后面的节点退出命令,把残余的master节点和node节点退出集群,确认状态失常:

至此高可用集群也就搭建好了。

集群测试

集群搭建结束,咱们须要做一下破坏性测试来验证高可用性,前文keepalived配置文件中咱们配置的检测脚本是查看9443端口的状况,所以测试的计划也很简略,只须要进行haproxy运行并查看keepalived的日志即可,后果如下:

能够很分明的看到切换的过程。

本文至此完结了,是一篇纯过程性的总结,下一篇会就Kubernetes高可用集群部署过程中的问题和背地的原理做一些总结。