标签(空格分隔): kubernetes系列node
- 一: kubernetes 高可用简介
- 二: kubernetes 高可用部署
高可用架构(扩容多Master架构) Kubernetes做为容器集群系统,经过健康检查+重启策略实现了Pod故障自我修复能力,经过调度算法实现将Pod分布式部署,并保持预期副本数,根据Node失效状态自动在其余Node拉起Pod,实现了应用层的高可用性。 针对Kubernetes集群,高可用性还应包含如下两个层面的考虑:Etcd数据库的高可用性和Kubernetes Master组件的高可用性。而Etcd咱们已经采用3个节点组建集群实现高可用,本节将对Master节点高可用进行说明和实施。 Master节点扮演着总控中心的角色,经过不断与工做节点上的Kubelet进行通讯来维护整个集群的健康工做状态。若是Master节点故障,将没法使用kubectl工具或者API作任何集群管理。 Master节点主要有三个服务kube-apiserver、kube-controller-mansger和kube-scheduler,其中kube-controller-mansger和kube-scheduler组件自身经过选择机制已经实现了高可用,因此Master高可用主要针对kube-apiserver组件,而该组件是以HTTP API提供服务,所以对他高可用与Web服务器相似,增长负载均衡器对其负载均衡便可,而且可水平扩容。
以前步骤参考: https://blog.51cto.com/flyfish225/2504511 在node04.flyfish 节点上面部署docker 2.1 解压二进制包 tar zxvf docker-19.03.9.tgz mv docker/* /usr/bin
2.2 systemd管理docker cat > /usr/lib/systemd/system/docker.service << EOF [Unit] Description=Docker Application Container Engine Documentation=https://docs.docker.com After=network-online.target firewalld.service Wants=network-online.target [Service] Type=notify ExecStart=/usr/bin/dockerd ExecReload=/bin/kill -s HUP $MAINPID LimitNOFILE=infinity LimitNPROC=infinity LimitCORE=infinity TimeoutStartSec=0 Delegate=yes KillMode=process Restart=on-failure StartLimitBurst=3 StartLimitInterval=60s [Install] WantedBy=multi-user.target EOF
2.3 建立配置文件 mkdir /etc/docker cat > /etc/docker/daemon.json << EOF { "registry-mirrors": ["https://b9pmyelo.mirror.aliyuncs.com"] } EOF registry-mirrors 阿里云镜像加速器
2.4 启动并设置开机启动 systemctl daemon-reload systemctl start docker systemctl enable docker
部署Master2 Node(192.168.100.14) Master2 与已部署的Master1全部操做一致。因此咱们只需将Master1全部K8s文件拷贝过来,再修改下服务器IP和主机名启动便可。 1. 建立etcd证书目录 在Master2建立etcd证书目录: mkdir -p /opt/etcd/ssl
2. 拷贝文件(Master1操做) 拷贝Master1上全部K8s文件和etcd证书到Master2: scp -r /opt/kubernetes root@192.168.100.14:/opt scp -r /opt/cni/ root@192.168.100.14:/opt scp -r /opt/etcd/ssl root@192.168.100.14:/opt/etcd scp /usr/lib/systemd/system/kube* root@192.168.100.14:/usr/lib/systemd/system scp /usr/bin/kubectl root@192.168.100.14:/usr/bin
3. 删除证书文件 删除kubelet证书和kubeconfig文件: rm -f /opt/kubernetes/cfg/kubelet.kubeconfig rm -f /opt/kubernetes/ssl/kubelet*
4. 修改配置文件IP和主机名 修改apiserver、kubelet和kube-proxy配置文件为本地IP: vim /opt/kubernetes/cfg/kube-apiserver.conf ... --bind-address=192.168.100.14 \ --advertise-address=192.168.100.14 \ ... vim /opt/kubernetes/cfg/kubelet.conf --hostname-override=node04.flyfish vim /opt/kubernetes/cfg/kube-proxy-config.yml hostnameOverride: node04.flyfish
5. 启动设置开机启动 systemctl daemon-reload systemctl start kube-apiserver systemctl start kube-controller-manager systemctl start kube-scheduler systemctl start kubelet systemctl start kube-proxy systemctl enable kube-apiserver systemctl enable kube-controller-manager systemctl enable kube-scheduler systemctl enable kubelet systemctl enable kube-proxy
kubectl get cs
7. 批准kubelet证书申请 在node01.flyfish 节点 上面 批准受权 kubectl get csr kubectl certificate approve node-csr-fyeyjxpS4JMpC2QvfmLOyeBbYUiMoYTSTGQETWVlqD4
kubectl get node
kube-apiserver高可用架构图:
在node05.flyfish 与node07.flyfish 上面部署 nginx 与keepalive 注意在 node06.flyfish 上面部署了vmware harbor yum install epel-release -y yum install nginx keepalived -y
cat > /etc/nginx/nginx.conf << "EOF" user nginx; worker_processes auto; error_log /var/log/nginx/error.log; pid /run/nginx.pid; include /usr/share/nginx/modules/*.conf; events { worker_connections 1024; } # 四层负载均衡,为两台Master apiserver组件提供负载均衡 stream { log_format main '$remote_addr $upstream_addr - [$time_local] $status $upstream_bytes_sent'; access_log /var/log/nginx/k8s-access.log main; upstream k8s-apiserver { server 192.168.100.11:6443; # Master1 APISERVER IP:PORT server 192.168.100.14:6443; # Master2 APISERVER IP:PORT } server { listen 6443; proxy_pass k8s-apiserver; } } http { log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; include /etc/nginx/mime.types; default_type application/octet-stream; server { listen 80 default_server; server_name _; location / { } } } EOF
###3. keepalived配置文件(Nginx Master)nginx
cat > /etc/keepalived/keepalived.conf << EOF global_defs { notification_email { acassen@firewall.loc failover@firewall.loc sysadmin@firewall.loc } notification_email_from Alexandre.Cassen@firewall.loc smtp_server 127.0.0.1 smtp_connect_timeout 30 router_id NGINX_MASTER } vrrp_script check_nginx { script "/etc/keepalived/check_nginx.sh" } vrrp_instance VI_1 { state MASTER interface ens33 virtual_router_id 51 # VRRP 路由 ID实例,每一个实例是惟一的 priority 100 # 优先级,备服务器设置 90 advert_int 1 # 指定VRRP 心跳包通告间隔时间,默认1秒 authentication { auth_type PASS auth_pass 1111 } # 虚拟IP virtual_ipaddress { 192.168.100.100/24 } track_script { check_nginx } } EOF
vrrp_script:指定检查nginx工做状态脚本(根据nginx状态判断是否故障转移) virtual_ipaddress:虚拟IP(VIP)
检查nginx状态脚本: cat > /etc/keepalived/check_nginx.sh << "EOF" #!/bin/bash count=$(ps -ef |grep nginx |egrep -cv "grep|$$") if [ "$count" -eq 0 ];then exit 1 else exit 0 fi EOF chmod +x /etc/keepalived/check_nginx.sh
cat > /etc/keepalived/keepalived.conf << EOF global_defs { notification_email { acassen@firewall.loc failover@firewall.loc sysadmin@firewall.loc } notification_email_from Alexandre.Cassen@firewall.loc smtp_server 127.0.0.1 smtp_connect_timeout 30 router_id NGINX_BACKUP } vrrp_script check_nginx { script "/etc/keepalived/check_nginx.sh" } vrrp_instance VI_1 { state BACKUP interface ens33 virtual_router_id 51 # VRRP 路由 ID实例,每一个实例是惟一的 priority 90 advert_int 1 authentication { auth_type PASS auth_pass 1111 } virtual_ipaddress { 192.168.31.88/24 } track_script { check_nginx } } EOF
上述配置文件中检查nginx运行状态脚本: cat > /etc/keepalived/check_nginx.sh << "EOF" #!/bin/bash count=$(ps -ef |grep nginx |egrep -cv "grep|$$") if [ "$count" -eq 0 ];then exit 1 else exit 0 fi EOF chmod +x /etc/keepalived/check_nginx.sh 注:keepalived根据脚本返回状态码(0为工做正常,非0不正常)判断是否故障转移。
5. 启动并设置开机启动 systemctl daemon-reload systemctl start nginx systemctl start keepalived systemctl enable nginx systemctl enable keepalived
6. 查看keepalived工做状态 ip addr 在node05.flyfish 上面 有一个 虚拟VIP
7. Nginx+Keepalived高可用测试 关闭主节点Nginx,测试VIP是否漂移到备节点服务器。 杀掉node05.flyfish 的nginx pkill nginx 查看浮动IP 是否 飘到了node07.flyfish 节点
能够看到 浮动VIP 已经飘到了node07.flyfish 主机上面了
去任意一个k8s 节点查看 服务器VIP 是否可以 获取到kube-apiserver 的 信息 curl -k https://192.168.100.100:6443/version
检查 nignx 日志
虽然咱们增长了Master2和负载均衡器,可是咱们是从单Master架构扩容的,也就是说目前全部的Node组件链接都仍是Master1,若是不改成链接VIP走负载均衡器,那么Master仍是单点故障。 所以接下来就是要改全部Node组件配置文件,由原来192.168.100.11修改成192.168.100.100(VIP):
全部node 节点执行命令 sed -i 's#192.168.31.71:6443#192.168.31.88:6443#' /opt/kubernetes/cfg/* systemctl restart kubelet systemctl restart kube-proxy kubectl get node
至此 k8s 多节点master 集群配置完成