上一篇我们部署了kubernetes的master集群,参考:二进制搭建kubernetes多master集群【三、配置k8s master及高可用】
本文在以下主机上操作部署k8s node
k8s-node1:192.168.80.10
k8s-node2:192.168.80.11
k8s-node3:192.168.80.12
以下kubeadm和kubectl命令操作都是在k8s-master1上执行的。
kubernetes work 节点运行如下组件:
- docker
- kubelet
- kube-proxy
- flannel
docker和flannel部署参考:二进制搭建kubernetes多master集群【二、配置flannel网络】 、 docker-ce安装
一、安装依赖包
yum install -y epel-release wget conntrack ipvsadm ipset jq iptables curl sysstat libseccomp && /usr/sbin/modprobe ip_vs
二、部署kubelet组件
kublet 运行在每个 worker 节点上,接收 kube-apiserver 发送的请求,管理 Pod 容器,执行交互式命令,如 exec、run、logs 等。
kublet 启动时自动向 kube-apiserver 注册节点信息,内置的 cadvisor 统计和监控节点的资源使用情况。
为确保安全,本文档只开启接收 https 请求的安全端口,对请求进行认证和授权,拒绝未授权的访问(如 apiserver、heapster)。
1、下载和分发kubelet二进制文件
wget https://dl.k8s.io/v1.12.3/kubernetes-server-linux-amd64.tar.gztar -xzvf kubernetes-server-linux-amd64.tar.gzcp kubernetes/server/bin/cp kubelet kube-proxy /usr/local/binscp ?kubelet kube-proxy k8s-node2:/usr/local/binscp ?kubelet kube-proxy k8s-node3:/usr/local/bin
2、创建kubelet bootstrap kubeconfig文件 (k8s-master1上执行)
#创建 tokenexport BOOTSTRAP_TOKEN=$(kubeadm token create ??--description kubelet-bootstrap-token ??--groups system:bootstrappers:k8s-master1 ??--kubeconfig ~/.kube/config)# 设置集群参数kubectl config set-cluster kubernetes ??--certificate-authority=/etc/kubernetes/cert/ca.pem ??--embed-certs=true ??--server=https://114.67.81.105:8443 \ ?--kubeconfig=kubelet-bootstrap-k8s-master1.kubeconfig# 设置客户端认证参数kubectl config set-credentials kubelet-bootstrap ??--token=${BOOTSTRAP_TOKEN} ??--kubeconfig=kubelet-bootstrap-k8s-master1.kubeconfig# 设置上下文参数kubectl config set-context default ??--cluster=kubernetes ??--user=kubelet-bootstrap ??--kubeconfig=kubelet-bootstrap-k8s-master1.kubeconfig# 设置默认上下文kubectl config use-context default --kubeconfig=kubelet-bootstrap-k8s-master1.kubeconfig
- kubelet bootstrap kubeconfig文件创建三次,分别把k8s-master1改成k8s-master2、k8s-master3。
- 证书中写入 Token 而非证书,证书后续由 controller-manager 创建。
3、查看 kubeadm 为各节点创建的 token:
[root@k8s-master1 ~]# kubeadm token list --kubeconfig ~/.kube/configTOKEN ????????????????????TTL ??????EXPIRES ????????????????????USAGES ??????????????????DESCRIPTION ??????????????EXTRA GROUPS8w6j3n.ruh4ne95icbae4ie ??23h ??????2018-12-21T20:42:29+08:00 ??authentication,signing ??kubelet-bootstrap-token ??system:bootstrappers:k8s-master3e7n0o5.1y8sjblh43z8ftz1 ??23h ??????2018-12-21T20:41:53+08:00 ??authentication,signing ??kubelet-bootstrap-token ??system:bootstrappers:k8s-master2ydbwyk.yz8e97df5d5u2o70 ??22h ??????2018-12-21T19:28:43+08:00 ??authentication,signing ??kubelet-bootstrap-token ??system:bootstrappers:k8s-master1
- 创建的 token 有效期为 1 天,超期后将不能再被使用,且会被 kube-controller-manager 的 tokencleaner 清理(如果启用该 controller 的话);
- kube-apiserver 接收 kubelet 的 bootstrap token 后,将请求的 user 设置为 system:bootstrap:,group 设置为 system:bootstrappers;
查看各 token 关联的 Secret:(红色的为创建生成的token)
[root@k8s-master1 ~]# kubectl get secrets ?-n kube-systemNAME ????????????????????????????????????????????TYPE ?????????????????????????????????DATA ??AGEattachdetach-controller-token-z2w72 ?????????????kubernetes.io/service-account-token ??3 ?????119mbootstrap-signer-token-hz8dr ????????????????????kubernetes.io/service-account-token ??3 ?????119mbootstrap-token-8w6j3n ??????????????????????????bootstrap.kubernetes.io/token ????????7 ?????20mbootstrap-token-e7n0o5 ??????????????????????????bootstrap.kubernetes.io/token ????????7 ?????20mbootstrap-token-ydbwyk ??????????????????????????bootstrap.kubernetes.io/token ????????7 ?????93mcertificate-controller-token-bjhbq ??????????????kubernetes.io/service-account-token ??3 ?????119mclusterrole-aggregation-controller-token-qkqxg ??kubernetes.io/service-account-token ??3 ?????119mcronjob-controller-token-v7vz5 ??????????????????kubernetes.io/service-account-token ??3 ?????119mdaemon-set-controller-token-7khdh ???????????????kubernetes.io/service-account-token ??3 ?????119mdefault-token-nwqsr ?????????????????????????????kubernetes.io/service-account-token ??3 ?????119m
4、分发bootstrap kubeconfig文件
[root@k8s-master1 ~]# scp kubelet-bootstrap-k8s-master1.kubeconfig k8s-node1:/etc/kubernetes/cert/kubelet-bootstrap.kubeconfig[root@k8s-master1 ~]# scp kubelet-bootstrap-k8s-master2.kubeconfig k8s-node2:/etc/kubernetes/cert/kubelet-bootstrap.kubeconfig[root@k8s-master1 ~]# scp kubelet-bootstrap-k8s-master3.kubeconfig k8s-node3:/etc/kubernetes/cert/kubelet-bootstrap.kubeconfig
5、创建和分发kubelet参数配置文件
从 v1.10 开始,kubelet 部分参数需在配置文件中配置,kubelet --help
会提示:
DEPRECATED: This parameter should be set via the config file specified by the Kubelet‘s --config flag
创建 kubelet 参数配置模板文件:(红色字体改成对应node主机ip)
cat > kubelet.config.json <<EOF{ ?"kind": "KubeletConfiguration", ?"apiVersion": "kubelet.config.k8s.io/v1beta1", ?"authentication": { ???"x509": { ?????"clientCAFile": "/etc/kubernetes/cert/ca.pem" ???}, ???"webhook": { ?????"enabled": true, ?????"cacheTTL": "2m0s" ???}, ???"anonymous": { ?????"enabled": false ???} ?}, ?"authorization": { ???"mode": "Webhook", ???"webhook": { ?????"cacheAuthorizedTTL": "5m0s", ?????"cacheUnauthorizedTTL": "30s" ???} ?}, ?"address": "192.168.80.10", ?"port": 10250, ?"readOnlyPort": 0, ?"cgroupDriver": "cgroupfs", ?"hairpinMode": "promiscuous-bridge", ?"serializeImagePulls": false, ?"featureGates": { ???"RotateKubeletClientCertificate": true, ???"RotateKubeletServerCertificate": true ?}, ?"clusterDomain": "cluster.local."", ?"clusterDNS": ["10.254.0.2"]}EOF
- address:API 监听地址,不能为 127.0.0.1,否则 kube-apiserver、heapster 等不能调用 kubelet 的 API;
- readOnlyPort=0:关闭只读端口(默认 10255),等效为未指定;
- authentication.anonymous.enabled:设置为 false,不允许匿名?访问 10250 端口;
- authentication.x509.clientCAFile:指定签名客户端证书的 CA 证书,开启 HTTP 证书认证;
- authentication.webhook.enabled=true:开启 HTTPs bearer token 认证;
- 对于未通过 x509 证书和 webhook 认证的请求(kube-apiserver 或其他客户端),将被拒绝,提示 Unauthorized;
- authroization.mode=Webhook:kubelet 使用 SubjectAccessReview API 查询 kube-apiserver 某 user、group 是否具有操作资源的权限(RBAC);
- featureGates.RotateKubeletClientCertificate、featureGates.RotateKubeletServerCertificate:自动 rotate 证书,证书的有效期取决于 kube-controller-manager 的 --experimental-cluster-signing-duration 参数;
- 需要 root 账户运行;
为各节点创建和分发 kubelet 配置文件:
scp kubelet.config.json k8s-node1:/etc/kubernetes/cert/kubelet.config.jsonscp kubelet.config.json k8s-node2:/etc/kubernetes/cert/kubelet.config.jsonscp kubelet.config.json k8s-node3:/etc/kubernetes/cert/kubelet.config.json
6、创建和分发kubelet systemd unit文件 (红色字体改成对应node主机ip)
[root@k8s-node1 ~]# cat /etc/systemd/system/kubelet.service [Unit]Description=Kubernetes KubeletDocumentation=https://github.com/GoogleCloudPlatform/kubernetesAfter=docker.serviceRequires=docker.service[Service]WorkingDirectory=/var/lib/kubeletExecStart=/usr/local/bin/kubelet ??--bootstrap-kubeconfig=/etc/kubernetes/cert/kubelet-bootstrap.kubeconfig ??--cert-dir=/etc/kubernetes/cert ??--kubeconfig=/etc/kubernetes/cert/kubelet.kubeconfig ??--config=/etc/kubernetes/cert/kubelet.config.json ??--hostname-override=192.168.80.10 ??--pod-infra-container-image=registry.cn-hangzhou.aliyuncs.com/google_containers/pause-amd64:3.1 ??--allow-privileged=true ??--alsologtostderr=true ??--logtostderr=false ??--log-dir=/var/log/kubernetes ??--v=2Restart=on-failureRestartSec=5[Install]WantedBy=multi-user.target
- 如果设置了
--hostname-override
选项,则kube-proxy
也需要设置该选项,否则会出现找不到 Node 的情况; --bootstrap-kubeconfig
:指向 bootstrap kubeconfig 文件,kubelet 使用该文件中的用户名和 token 向 kube-apiserver 发送 TLS Bootstrapping 请求;- K8S approve kubelet 的 csr 请求后,在
--cert-dir
目录创建证书和私钥文件,然后写入--kubeconfig
文件;
为各节点创建和分发 kubelet systemd unit 文件:
scp /etc/systemd/system/kubelet.service k8s-node2:/etc/systemd/system/kubelet.servicescp /etc/systemd/system/kubelet.service k8s-node3:/etc/systemd/system/kubelet.service
7、Bootstrap Token Auth和授予权限
kublet 启动时查找配置的 --kubeletconfig 文件是否存在,如果不存在则使用 --bootstrap-kubeconfig 向 kube-apiserver 发送证书签名请求 (CSR)。
kube-apiserver 收到 CSR 请求后,对其中的 Token 进行认证(事先使用 kubeadm 创建的 token),认证通过后将请求的 user 设置为 system:bootstrap:,group 设置为 system:bootstrappers,这一过程称为 Bootstrap Token Auth。
默认情况下,这个 user 和 group 没有创建 CSR 的权限,kubelet 启动失败,错误日志如下:
sudo journalctl -u kubelet -a |grep -A 2 ‘certificatesigningrequests‘May 06 06:42:36 kube-node1 kubelet[26986]: F0506 06:42:36.314378 ??26986 server.go:233] failed to run Kubelet: cannot create certificate signing request: certificatesigningrequests.certificates.k8s.io is forbidden: User "system:bootstrap:lemy40" cannot create certificatesigningrequests.certificates.k8s.io at the cluster scopeMay 06 06:42:36 kube-node1 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/n/aMay 06 06:42:36 kube-node1 systemd[1]: kubelet.service: Failed with result ‘exit-code‘.
解决办法是:创建一个 clusterrolebinding,将 group system:bootstrappers 和 clusterrole system:node-bootstrapper 绑定:
[root@k8s-master1 ~]# ?kubectl create clusterrolebinding kubelet-bootstrap --clusterrole=system:node-bootstrapper --group=system:bootstrappers
8、启动kubelet服务
mkdir -p /var/log/kubernetes && mkdir -p /var/lib/kubeletsystemctl daemon-reload systemctl enable kubelet systemctl restart kubelet
- 关闭 swap 分区,否则 kubelet 会启动失败;
- 必须先创建工作和日志目录;
kubelet 启动后使用 --bootstrap-kubeconfig 向 kube-apiserver 发送 CSR 请求,当这个 CSR 被 approve 后,kube-controller-manager 为 kubelet 创建 TLS 客户端证书、私钥和 --kubeletconfig 文件。
注意:kube-controller-manager 需要配置 --cluster-signing-cert-file
和 --cluster-signing-key-file
参数,才会为 TLS Bootstrap 创建证书和私钥。
- 三个 work 节点的 csr 均处于 pending 状态;
此时kubelet的进程有,但是监听端口还未启动,需要进行下面步骤!
9、approve kubelet csr请求
可以手动或自动 approve CSR 请求。推荐使用自动的方式,因为从 v1.8 版本开始,可以自动轮转approve csr 后生成的证书。
手动approve csr请求
查看 CSR 列表:
[root@k8s-master1 ~]# kubectl get csrNAME ??????????????????????????????????????????????????AGE ??REQUESTOR ????????????????CONDITIONnode-csr-P7XcQAc2yNlXn1pUmQFxXNCdGyyt8ccVuW3bmoUZiK4 ??30m ??system:bootstrap:e7n0o5 ??Pendingnode-csr-gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAM ??79m ??system:bootstrap:ydbwyk ??Pendingnode-csr-u2sVzVkFYnMxPIYWjXHbqRJROtTZBYzA1s2vATPLzyo ??30m ??system:bootstrap:8w6j3n ??Pending
approve CSR
[root@k8s-master1 ~]# kubectl certificate approve node-csr-gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAMcertificatesigningrequest.certificates.k8s.io "node-csr gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAM" approved
查看 Approve 结果:
[root@k8s-master1 ~]# kubectl describe csr node-csr-gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAMName: ??????????????node-csr-gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAMLabels: ????????????<none>Annotations: ???????<none>CreationTimestamp: ?Thu, 20 Dec 2018 19:55:39 +0800Requesting User: ???system:bootstrap:ydbwykStatus: ????????????Approved,IssuedSubject: ????????Common Name: ???system:node:192.168.80.10 ????????Serial Number: ??????????Organization: ??system:nodesEvents: ?<none>
Requesting User
:请求 CSR 的用户,kube-apiserver 对它进行认证和授权;Subject
:请求签名的证书信息;- 证书的 CN 是 system:node:kube-node2, Organization 是 system:nodes,kube-apiserver 的 Node 授权模式会授予该证书的相关权限;
自动approve csr请求
创建三个 ClusterRoleBinding,分别用于自动 approve client、renew client、renew server 证书:
[root@k8s-master1 ~]# cat > csr-crb.yaml <<EOF # Approve all CSRs for the group "system:bootstrappers" kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: ??name: auto-approve-csrs-for-group subjects: - kind: Group ??name: system:bootstrappers ??apiGroup: rbac.authorization.k8s.io roleRef: ??kind: ClusterRole ??name: system:certificates.k8s.io:certificatesigningrequests:nodeclient ??apiGroup: rbac.authorization.k8s.io--- # To let a node of the group "system:nodes" renew its own credentials kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: ??name: node-client-cert-renewal subjects: - kind: Group ??name: system:nodes ??apiGroup: rbac.authorization.k8s.io roleRef: ??kind: ClusterRole ??name: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient ??apiGroup: rbac.authorization.k8s.io---# A ClusterRole which instructs the CSR approver to approve a node requesting a# serving cert matching its client cert.kind: ClusterRoleapiVersion: rbac.authorization.k8s.io/v1metadata: ?name: approve-node-server-renewal-csrrules:- apiGroups: ["certificates.k8s.io"] ?resources: ["certificatesigningrequests/selfnodeserver"] ?verbs: ["create"]--- # To let a node of the group "system:nodes" renew its own server credentials kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: ??name: node-server-cert-renewal subjects: - kind: Group ??name: system:nodes ??apiGroup: rbac.authorization.k8s.io roleRef: ??kind: ClusterRole ??name: approve-node-server-renewal-csr ??apiGroup: rbac.authorization.k8s.ioEOF
- auto-approve-csrs-for-group:自动 approve node 的第一次 CSR; 注意第一次 CSR 时,请求的 Group 为 system:bootstrappers;
- node-client-cert-renewal:自动 approve node 后续过期的 client 证书,自动生成的证书 Group 为 system:nodes;
- node-server-cert-renewal:自动 approve node 后续过期的 server 证书,自动生成的证书 Group 为 system:nodes;
生效配置:
[root@k8s-master1 ~]# kubectl apply -f csr-crb.yaml
查看kubelet情况
等待一段时间(1-10 分钟),三个节点的 CSR 都被自动 approve:
[root@k8s-master1 ~]# kubectl get csrNAME ??????????????????????????????????????????????????AGE ??REQUESTOR ????????????????CONDITIONnode-csr-P7XcQAc2yNlXn1pUmQFxXNCdGyyt8ccVuW3bmoUZiK4 ??35m ??system:bootstrap:e7n0o5 ??Approved,Issuednode-csr-gD18nmcyPUNWNyDQvCo2BMYiiA4K59BNkclFRWv1SAM ??84m ??system:bootstrap:ydbwyk ??Approved,Issuednode-csr-u2sVzVkFYnMxPIYWjXHbqRJROtTZBYzA1s2vATPLzyo ??35m ??system:bootstrap:8w6j3n ??Approved,Issued
所有节点均 ready:
[root@k8s-master1 ~]# kubectl get nodesNAME ???????????STATUS ??ROLES ???AGE ??VERSION192.168.80.10 ??Ready ???<none> ??69m ??v1.12.3192.168.80.11 ??Ready ???<none> ??36m ??v1.12.3192.168.80.12 ??Ready ???<none> ??36m ??v1.12.3
二进制搭建kubernetes多master集群【四、配置k8s node】
原文地址:https://www.cnblogs.com/harlanzhang/p/10152508.html