前文我搭建了一主两从的Kubernetes集群,然而还是存在一个问题,没有达到高可用的目标,如果Master节点呈现问题,整个集群将会瘫痪,所以高可用的要害动作在于多Master节点,并且部署过程要比单Master节点集群要简单很多。
思考再三,鉴于我理论部署过程中呈现的问题泛滥(天知道我经验了什么),我还是决定在本文只形容部署过程,即怎么做,力求照着本文能胜利部署出一套高可用的Kubernetes集群;至于为什么?
的问题我留在下一篇文章作为闲聊。
本次高可用计划架构图如下:
须要用到haproxy和keepalived组件提供Master节点高可用。
筹备工作
机器角色 | IP |
---|---|
master | 10.128.2.53 |
master | 10.128.2.52 |
master | 10.11.0.220 |
node | 10.128.1.187 |
node | 10.11.7.94 |
node | 10.11.0.181 |
node | 10.11.7.125 |
所有机器须要依照上文Kubeadm疾速部署Kubernetes集群中筹备工作环节进行设置,此外须要非凡留神的几点如下:
hostname设置
须要设置hosts
文件和hostname
## vi /etc/hosts10.128.2.53 kubernetes-master0110.128.2.52 kubernetes-master0210.11.0.220 kubernetes-master0310.128.1.187 kubernetes-node0110.11.7.94 kubernetes-node0210.11.0.181 kubernetes-node0310.11.7.125 kubernetes-node0410.128.2.111 kubernetes-vip
hostnamectl set-hostname kubernetes-master01......
10.128.2.111 kubernetes-vip
是通过keepalived实现的vip地址。
节点互信
须要设置Master三节点间互信以及Master免登录Node节点,参考前文。
装置ipvs
ipvs是kube-proxy实现负载平衡的一种技术实现,默认的实现形式是iptables,后文再详述。
- 装置软件
yum install ipvsadm ipset sysstat conntrack libseccomp -y
- 加载模块
cat > /etc/sysconfig/modules/ipvs.modules <<EOF#!/bin/bashmodprobe -- ip_vsmodprobe -- ip_vs_rrmodprobe -- ip_vs_wrrmodprobe -- ip_vs_shmodprobe -- nf_conntrackmodprobe -- ip_tablesmodprobe -- ip_setmodprobe -- xt_setmodprobe -- ipt_setmodprobe -- ipt_rpfiltermodprobe -- ipt_REJECTmodprobe -- ipipEOF
配置重启主动加载
所有节点执行
chmod 755 /etc/sysconfig/modules/ipvs.modules && bash /etc/sysconfig/modules/ipvs.modules && lsmod | grep -e ip_vs -e nf_conntrack
kubeadm、kubelet、kubectl装置
配置源
cat > /etc/yum.repos.d/kubernetes.repo <<EOF[kubernetes]name=Kubernetesbaseurl=http://mirrors.aliyun.com/kubernetes/yum/repos/kubernetes-el7-x86_64/enabled=1gpgcheck=1repo_gpgcheck=1gpgkey=http://mirrors.aliyun.com/kubernetes/yum/doc/yum-key.gpg http://mirrors.aliyun.com/kubernetes/yum/doc/rpm-package-key.gpgEOF#重建yum缓存,输出y增加证书认证yum makecache fast
本次装置最新的1.20.4版本
先配置kubeletcggroupDriver
为systemd
,这是官网倡议的,这里有个有意思的中央后文再说
cat > /var/lib/kubelet/config.yaml <<EOFapiVersion: kubelet.config.k8s.io/v1beta1kind: KubeletConfigurationcgroupDriver: systemdEOF
所有节点装置
yum install -y kubelet-1.20.4 kubeadm-1.20.4 kubectl-1.20.4systemctl enable kubelet && systemctl start kubelet && systemctl status kubelet
集群搭建
首先是装置高可用组件haproxy和keepalived,这里我应用docker形式,3个Master节点都需装置。
haproxy装置
- 创立配置文件
haproxy.cfg
vim /etc/haproxy/haproxy.cfg
节点信息局部按本人的理论状况批改:
#---------------------------------------------------------------------# Example configuration for a possible web application. See the# full configuration options online.## https://www.haproxy.org/download/2.1/doc/configuration.txt# https://cbonte.github.io/haproxy-dconv/2.1/configuration.html##---------------------------------------------------------------------#---------------------------------------------------------------------# Global settings#---------------------------------------------------------------------global # to have these messages end up in /var/log/haproxy.log you will # need to: # # 1) configure syslog to accept network log events. This is done # by adding the '-r' option to the SYSLOGD_OPTIONS in # /etc/sysconfig/syslog # # 2) configure local2 events to go to the /var/log/haproxy.log # file. A line like the following can be added to # /etc/sysconfig/syslog # # local2.* /var/log/haproxy.log # log 127.0.0.1 local2# chroot /var/lib/haproxy pidfile /var/run/haproxy.pid maxconn 4000# user haproxy# group haproxy # daemon # turn on stats unix socket stats socket /var/lib/haproxy/stats#---------------------------------------------------------------------# common defaults that all the 'listen' and 'backend' sections will# use if not designated in their block#---------------------------------------------------------------------defaults mode http log global option httplog option dontlognull option http-server-close option forwardfor except 127.0.0.0/8 option redispatch retries 3 timeout http-request 10s timeout queue 1m timeout connect 10s timeout client 1m timeout server 1m timeout http-keep-alive 10s timeout check 10s maxconn 3000#---------------------------------------------------------------------# main frontend which proxys to the backends#---------------------------------------------------------------------frontend kubernetes-apiserver mode tcp bind *:9443 ## 监听9443端口 # bind *:443 ssl # To be completed .... acl url_static path_beg -i /static /images /javascript /stylesheets acl url_static path_end -i .jpg .gif .png .css .js default_backend kubernetes-apiserver#---------------------------------------------------------------------# round robin balancing between the various backends#---------------------------------------------------------------------backend kubernetes-apiserver mode tcp # 模式tcp balance roundrobin # 采纳轮询的负载算法# k8s-apiservers backend # 配置apiserver,端口6443 server kubernetes-master01 10.128.2.53:6443 check server kubernetes-master02 10.128.2.52:6443 check server kubernetes-master03 10.11.0.220:6443 check
配置文件复制到其余Master节点
scp /etc/haproxy/haproxy.cfg root@kubernetes-master02:/etc/haproxyscp /etc/haproxy/haproxy.cfg root@kubernetes-master03:/etc/haproxy
最初docker启动,
docker run -d --name=haproxy --net=host -v /etc/haproxy:/usr/local/etc/haproxy:ro -v /var/lib/haproxy:/var/lib/haproxy haproxy:2.3.6
装置keepalived
装置keepalived消耗了我不少工夫,其中碰到问题挺多的,当然也和以前没应用过keepalived无关。keepalived同样须要3个Master节点都装置,并且稍有不同。
同样的,首先创立配置文件:
vim /etc/keepalived/keepalived.conf
查看网卡信息:
ip addr
内容如下:
global_defs { script_user root enable_script_security}vrrp_script chk_haproxy { script "/bin/bash -c 'if [[ $(netstat -nlp | grep 9443) ]]; then exit 0; else exit 1; fi'" # haproxy 检测脚本,这里须要依据本人理论状况判断 interval 2 # 每2秒执行一次检测 weight 11 # 权重变动}vrrp_instance VI_1 { interface ens192 # 此处通过ip addr命令依据理论填写 state MASTER # backup节点设为BACKUP virtual_router_id 51 # id设为雷同,示意是同一个虚构路由组 priority 100 #初始权重 #这里须要留神,我的3个Master节点不在同一个网段,不配置会呈现多个Master节点的脑裂景象,值依据以后节点状况,配置其余2个节点 unicast_peer { 10.128.2.53 10.128.2.52 } virtual_ipaddress { 10.128.2.111 # vip 虚构ip } authentication { auth_type PASS auth_pass password } track_script { chk_haproxy } notify "/container/service/keepalived/assets/notify.sh"}
最初docker运行就好了:
docker run --cap-add=NET_ADMIN --cap-add=NET_BROADCAST --cap-add=NET_RAW --net=host --volume /etc/keepalived/keepalived.conf:/container/service/keepalived/assets/keepalived.conf -d osixia/keepalived:2.0.20 --copy-service
Kubernetes集群初始化
以下操作都在kubernetes-master01节点上执行
本次仍然应用kubeadm来实现集群的组建工作,新建kubeadm的集群配置文件kubeadm.yaml,前文中kube-proxy采纳了ipvs,也须要进行配置申明:
cat >> kubeadm.yaml <<EOFapiVersion: kubeadm.k8s.io/v1beta2kind: ClusterConfigurationkubernetesVersion: v1.20.2imageRepository: registry.cn-hangzhou.aliyuncs.com/google_containerscontrolPlaneEndpoint: "kubernetes-vip:9443"networking: dnsDomain: cluster.local podSubnet: 192.168.0.0/16 serviceSubnet: 10.211.0.0/12---apiVersion: kubeproxy.config.k8s.io/v1alpha1kind: KubeProxyConfigurationmode: ipvsEOF
执行初始化命令:
kubeadm init --config kubeadm.yaml --upload-certs
胜利后执行:
mkdir -p $HOME/.kubesudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/configsudo chown $(id -u):$(id -g) $HOME/.kube/config
并记住节点退出集群的命令:
kubeadm join kubernetes-vip:9443 --token 6dntoh.syhp7vi2j7ikv5uv \ --discovery-token-ca-cert-hash sha256:250115fad0a4b6852a919dbba4222ac65bc64843c660363ab119606ff8819d0a \ --control-plane --certificate-key 7bd1bc54ee1fdbffcbfb17f93b32496cb93c0688523f7d5fe414cefd48fb05fekubeadm join kubernetes-vip:9443 --token 6dntoh.syhp7vi2j7ikv5uv \ --discovery-token-ca-cert-hash sha256:250115fad0a4b6852a919dbba4222ac65bc64843c660363ab119606ff8819d0a
装置calico组件并执行:
wget https://docs.projectcalico.org/v3.8/manifests/calico.yamlkubectl apply -f calico.yaml
接下来依据后面的节点退出命令,把残余的master节点和node节点退出集群,确认状态失常:
至此高可用集群也就搭建好了。
集群测试
集群搭建结束,咱们须要做一下破坏性测试来验证高可用性,前文keepalived配置文件中咱们配置的检测脚本是查看9443端口的状况,所以测试的计划也很简略,只须要进行haproxy运行并查看keepalived的日志即可,后果如下:
能够很分明的看到切换的过程。
本文至此完结了,是一篇纯过程性的总结,下一篇会就Kubernetes高可用集群部署过程中的问题和背地的原理做一些总结。