免费资源网 – https://freexyz.cn/
基础环境配置
确保每个节点上 MAC 地址和 product_uuid 的唯一性 您可以使用命令 ip link 或 ifconfig -a 来获取网络接口的 MAC 地址 可以使用 sudo cat /sys/class/dmi/id/product_uuid 命令对 product_uuid 校验一般来讲,硬件设备会拥有唯一的地址,但是有些虚拟机的地址可能会重复。Kubernetes 使用这些值来唯一确定集群中的节点。 如果这些值在每个节点上不唯一,可能会导致安装失败。
编辑hostsmaster和worker都需要编辑
[root@master-all ~]# cat /etc/hosts 192.168.230.202 master-all 192.168.230.203 Node-1关闭Swap(交换分区)master和worker都需要执行
临时关闭
[root@master-all ~]# swapoff -a永久关闭,需重启
[root@master-all ~]# sed -i s/(.*[[:space:]]swap[[:space:]].*)/#1/g /etc/fstab 关闭selinuxmaster和worker都需要执行
临时关闭
[root@master-all ~]# setenforce 0永久关闭,需重启
[root@master-all ~]# sed -i s/(^SELINUX=).*/1disabled/ /etc/selinux/config 关闭防火墙master和worker都需要执行
[root@master-all ~]# systemctl stop firewalld && systemctl disable firewalld 修改系统参数master和worker都需要编辑
[root@master-all ~]# vim /etc/sysctl.d/k8s.conf net.bridge.bridge-nf-call-ip6tables = 1net.bridge.bridge-nf-call-iptables =1 net.ipv4.ip_forward = 1 [root@master-all ~]# modprobe br_netfilter [root@master-all ~]# sysctl -p /etc/sysctl.d/k8s.conf 安装Dockermaster和worker都需要安装
[root@master-all ~]# yum -y install docker [root@master-all ~]# systemctl enable docker && systemctl start docker Created symlink from /etc/systemd/system/multi-user.target.wants/docker.service to /usr/lib/systemd/system/docker.service.此处使用阿里云镜像站
[root@Node-1 ~]# vim /etc/docker/daemon.json { “registry-mirrors”: [“https://n275i9sm.mirror.aliyuncs.com”] } [root@master-all ~]# systemctl daemon-reload[root@master-all ~]# systemctl restart docker 安装k8s组件配置国内源repo文件/etc/yum.repos.d/kubernetes.repo
[root@master-all ~]# vim /etc/yum.repos.d/kubernetes.repo [kubernetes] name=Kubernetes baseurl=http://mirrors.aliyun.com/kubernetes/yum/repos/kubernetes-el7-x86_64 enabled=1 gpgcheck=1 repo_gpgcheck=1 gpgkey=http://mirrors.aliyun.com/kubernetes/yum/doc/yum-key.gpg http://mirrors.aliyun.com/kubernetes/yum/doc/rpm-package-key.gpgexclude=kube*安装Kubernetes组件
–disableexcludes=kubernetes
只从指定repo中获取 [root@master-all ~]# yum -y install kubelet kubeadm kubectl –disableexcludes=kubernetes [root@master-all ~]# systemctl enable kubelet && systemctl start kubeletMaster安装
获取初始化文件
[root@master-all ~]# kubeadm config print init-defaults > kubeadm-init.yaml [root@master-all ~]# vim kubeadm-init.yaml将advertiseAddress: 1.2.3.4修改为本机IP地址
将imageRepository: k8s.gcr.io修改为imageRepository: registry.cn-hangzhou.aliyuncs.com/google_contAIners apiVersion: kubeadm.k8s.io/v1beta2 bootstrapTokens:– groups: – system:bootstrappers:kubeadm:default-node-token token: abcdef.0123456789abcdef ttl: 24h0m0s usages: – signing – authenticationkind: InitConfiguration localAPIEndpoint:advertiseAddress: 192.168.230.202 bindPort: 6443nodeRegistration:criSocket: /var/run/dockershim.sock name: master-all taints: – effect: NoSchedule key: node-role.kubernetes.io/master —apiServer: timeoutForControlPlane: 4m0s apiVersion: kubeadm.k8s.io/v1beta2 certificatesDir: /etc/kubernetes/pki clusterName: kubernetes controllerManager: {} dns: type: CoreDNS etcd:local: dataDir: /var/lib/etcdimageRepository: registry.cn-hangzhou.aliyuncs.com/google_containers kind: ClusterConfiguration kubernetesVersion: v1.18.0 networking:dnsDomain: cluster.local serviceSubnet: 10.96.0.0/12scheduler: {}拉取images镜像
[root@master-all ~]# kubeadm config images pull –config kubeadm-init.yaml W0411 17:59:25.394894 1717 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io] [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/kube-apiserver:v1.18.0 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/kube-controller-manager:v1.18.0 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/kube-scheduler:v1.18.0 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/kube-proxy:v1.18.0 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/pause:3.2 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/etcd:3.4.3-0 [config/images] Pulled registry.cn-hangzhou.aliyuncs.com/google_containers/coredns:1.6.7初始化
[root@master-all ~]# kubeadm init –config kubeadm-init.yaml W0411 18:00:39.037355 2000 configset.go:202] WARNING: kubeadm cannot validate component configs forAPI groups [kubelet.config.k8s.io kubeproxy.config.k8s.io] [init] Using Kubernetes version: v1.18.0[preflight] Running pre-flight checks [preflight] Pulling images requiredforsetting up a Kubernetes cluster [preflight] This might take a minuteor two, depending on the speed ofyour internet connection [preflight] You can also performthis action in beforehand using kubeadm config images pull[kubelet-start] Writing kubelet environment file with flags to file“/var/lib/kubelet/kubeadm-flags.env”[kubelet-start] Writing kubelet configuration to file“/var/lib/kubelet/config.yaml”[kubelet-start] Starting the kubelet [certs] Using certificateDir folder“/etc/kubernetes/pki” [certs] Generating “ca” certificate and key [certs] Generating “apiserver” certificate andkey [certs] apiserver serving certis signed for DNS names [master-all kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.230.202] [certs] Generating “apiserver-kubelet-client” certificate and key [certs] Generating “front-proxy-ca” certificate andkey [certs] Generating“front-proxy-client” certificate and key [certs] Generating “etcd/ca”certificateand key [certs] Generating “etcd/server” certificate andkey [certs] etcd/server serving certis signed for DNS names [master-all localhost] and IPs [192.168.230.202 127.0.0.1 ::1] [certs] Generating“etcd/peer” certificate and key [certs] etcd/peer serving cert is signed forDNS names [master-all localhost]and IPs [192.168.230.202 127.0.0.1 ::1] [certs] Generating “etcd/healthcheck-client” certificate and key [certs] Generating “apiserver-etcd-client” certificate andkey [certs] Generating“sa” key and public key [kubeconfig] Using kubeconfig folder “/etc/kubernetes” [kubeconfig] Writing “admin.conf” kubeconfig file [kubeconfig] Writing “kubelet.conf”kubeconfig file [kubeconfig] Writing“controller-manager.conf”kubeconfig file [kubeconfig] Writing“scheduler.conf” kubeconfig file [control-plane] Using manifest folder “/etc/kubernetes/manifests” [control-plane] Creating static Pod manifest for “kube-apiserver”[control-plane] Creating static Pod manifestfor “kube-controller-manager” W0411 18:00:41.149242 2000 manifests.go:225] the default kube-apiserver authorization-mode is “Node,RBAC”; using “Node,RBAC”[control-plane] Creating static Pod manifestfor “kube-scheduler” W0411 18:00:41.149789 2000 manifests.go:225] the defaultkube-apiserver authorization-modeis “Node,RBAC”; using “Node,RBAC” [etcd] Creating static Pod manifest for local etcd in “/etc/kubernetes/manifests” [wait-control-plane] Waiting for the kubelet to boot up the control plane asstatic Podsfrom directory “/etc/kubernetes/manifests”. This can take up to 4m0s [apiclient] All control plane components are healthy after15.004506seconds [upload-config] Storing the configuration usedin ConfigMap “kubeadm-config” in the “kube-system”Namespace [kubelet] Creating a ConfigMap“kubelet-config-1.18” in namespace kube-system with the configuration for the kubelets inthe cluster [upload-certs] Skipping phase. Please see –upload-certs [mark-control-plane] Marking the node master-allas control-plane by adding the label “node-role.kubernetes.io/master=”[mark-control-plane] Marking the node master-allas control-plane byadding the taints [node-role.kubernetes.io/master:NoSchedule] [bootstrap-token] Using token: abcdef.0123456789abcdef [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to get nodes [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to post CSRsin order fornodes to get long term certificate credentials [bootstrap-token] configured RBAC rules to allow the csrapprover controller automatically approve CSRsfroma Node Bootstrap Token [bootstrap-token] configured RBAC rules to allow certificate rotationfor all node client certificates inthe cluster [bootstrap-token] Creating the“cluster-info” ConfigMap in the “kube-public” namespace [kubelet-finalize] Updating “/etc/kubernetes/kubelet.conf” to point to a rotatable kubelet client certificate andkey [addons] Applied essential addon: CoreDNS [addons] Applied essential addon: kube-proxy Your Kubernetes control-plane has initialized successfully! To start using your cluster, you need to run the followingas a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config You should now deploy a pod network to the cluster. Run“kubectl apply -f [podnetwork].yaml”with oneof the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/Then you can join any numberof worker nodes by running the following on each as root: kubeadm join 192.168.230.202:6443 –token abcdef.0123456789abcdef –discovery-token-ca-cert-hash sha256:d3cfcef4ced07d6f648074a15026599db6671a780f9032ec425c3fa75fce8bda如需清除缓存可执行:
kubeadm reset拷贝授权文件
[root@master-all ~]# mkdir -p $HOME/.kube [root@master-all ~]# sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config [root@master-all ~]# sudo chown $(id -u):$(id -g) $HOME/.kube/config网络配置
下载calico配置
需要注意的是, calico.yaml中的IP和kubeadm-init.yaml需要保持一致, 要么初始化前修改kubeadm-init.yaml, 要么初始化后修改calico.yaml. [root@master-all ~]# wget https://docs.projectcalico.org/v3.11/manifests/calico.yaml [root@master-all ~]# vim calico.yaml value: “10.96.0.0/12”开始安装
[root@master-all ~]# kubectl apply -f calico.yaml configmap/calico-config created customresourcedefinition.apiextensions.k8s.io/felixconfigurations.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/ipamblocks.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/blockaffinities.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/ipamhandles.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/ipamconfigs.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/bgppeers.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/bgpconfigurations.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/ippools.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/hostendpoints.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/clusterinformations.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/globalnetworkpolicies.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/globalnetworksets.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/networkpolicies.crd.projectcalico.org created customresourcedefinition.apiextensions.k8s.io/networksets.crd.projectcalico.org created clusterrole.rbac.authorization.k8s.io/calico-kube-controllers created clusterrolebinding.rbac.authorization.k8s.io/calico-kube-controllers created clusterrole.rbac.authorization.k8s.io/calico-node created clusterrolebinding.rbac.authorization.k8s.io/calico-node created daemonset.apps/calico-node created serviceaccount/calico-node created deployment.apps/calico-kube-controllers created serviceaccount/calico-kube-controllers created等待几分钟后查看Node网络状态
[root@master-all ~]# kubectl get nodes NAME STATUS ROLES AGE VERSION master-all Ready master 12m v1.18.1 [root@master-all ~]# kubectl get pod -o wide –all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kube-system calico-kube-controllers-75d56dfc47-6hxnj 1/1 Running 0 10m 10.109.177.70 master-all<none> <none> kube-system calico-node-tpz8m 1/1 Running 1 10m 192.168.230.202 master-all <none> <none>kube-system coredns-546565776c-4pdj9 1/1 Running 2 12m 10.109.177.71 master-all<none> <none>kube-system coredns-546565776c-6bcw8 1/1 Running 2 12m 10.109.177.72 master-all<none> <none>kube-system etcd-master-all 1/1 Running 2 12m 192.168.230.202 master-all<none> <none>kube-system kube-apiserver-master-all 1/1 Running 2 12m 192.168.230.202 master-all<none> <none>kube-system kube-controller-manager-master-all 1/1 Running 1 12m 192.168.230.202 master-all<none> <none>kube-system kube-proxy-ln9kx 1/1 Running 2 12m 192.168.230.202 master-all<none> <none>kube-system kube-scheduler-master-all 1/1 Running 2 12m 192.168.230.202 master-all<none> <none>Node Worker节点
node节点环境安装请参照 基础环境配置
添加node节点至master [root@Node-1 ~]# kubeadm join 192.168.230.202:6443 –token abcdef.0123456789abcdef –discovery-token-ca-cert-hash sha256:d3cfcef4ced07d6f648074a15026599db6671a780f9032ec425c3fa75fce8bda W0411 18:15:25.273383 1583 join.go:346] [preflight] WARNING: JoinControlPane.controlPlane settings will be ignored whencontrol-plane flagis notset. [preflight] Running pre-flight checks [WARNING Service-Kubelet]: kubelet serviceis not enabled, please run systemctl enable kubelet.service[preflight] Reading configurationfrom the cluster… [preflight] FYI: You can look at this config file with kubectl -n kube-system get cm kubeadm-config -oyaml [kubelet-start] Downloading configuration for the kubelet fromthe“kubelet-config-1.18” ConfigMap inthe kube-system namespace [kubelet-start] Writing kubelet configuration to file“/var/lib/kubelet/config.yaml”[kubelet-start] Writing kubelet environment file with flags to file“/var/lib/kubelet/kubeadm-flags.env”[kubelet-start] Starting the kubelet [kubelet-start] Waitingforthe kubelet to perform the TLS Bootstrap… This node has joined the cluster: * Certificate signing request was sent to apiserveranda response was received. * The Kubelet was informedof the new secure connection details. Run kubectl get nodes onthe control-plane to seethis node join the cluster.拷贝授权文件
[root@Node-1 ~]# mkdir -p $HOME/.kube [root@Node-1 ~]# cp -i /etc/kubernetes/kubelet.conf $HOME/.kube/config验证
[root@Node-1 ~]# kubectl get nodes NAME STATUS ROLES AGE VERSION master-all Ready master 16m v1.18.1 node-1 Ready <none> 113s v1.18.1遇到的问题
报错:
failed to run Kubelet: failed tocreate kubelet: misconfiguration: kubelet cgroup driver: “cgroupfs” is different from docker cgroup driver: “systemd”解决方法
[root@master-all ~]# sed -i s/(.*native.cgroupdriver=)systemd(.*)/1cgroupfs2/ /lib/systemd/system/docker.service [root@master-all ~]# systemctl daemon-reload [root@master-all ~]# systemctl restart docker报错:
[root@master-all ~]# kubectl get podThe connection to the server localhost:8080 was refused – did you specify the right host or port?解决方法:
[root@master-all ~]# mkdir -p $HOME/.kube [root@master-all ~]# cp -i /etc/kubernetes/admin.conf $HOME/.kube/config #如果非root用户需chown授权报错:
[root@Node-1 ~]# kubeadm join 192.168.230.101:6443 –token n3qdmn.btk974cnv1bfskbt > –discovery-token-ca-cert-hash sha256:859476404c5ed23aef3d78e3b8fc09684dde7fbf8ce0ad446774162ccec2e0d1 W031909:28:32.847414 24070 join.go:346] [preflight] WARNING: JoinControlPane.controlPlane settings will be ignored when control-plane flagis not set. [preflight] Running pre-flight checks [WARNING Service-Kubelet]: kubelet service is not enabled, please run systemctl enable kubelet.service error execution phase preflight: [preflight] Some fatal errors occurred: [ERROR FileContent–proc-sys-net-bridge-bridge-nf-call-iptables]: /proc/sys/net/bridge/bridge-nf-call-iptables contents are notset to 1 [ERROR FileContent–proc-sys-net-ipv4-ip_forward]: /proc/sys/net/ipv4/ip_forward contents are notset to 1 [preflight] If you know what you are doing, you can make a check non-fatal with `–ignore-preflight-errors=…` To see the stack trace ofthis error execute with –v=5or higher解决方法:
[root@Node-1 ~]# vim /etc/sysctl.d/k8s.conf net.bridge.bridge-nf-call-ip6tables = 1net.bridge.bridge-nf-call-iptables =1 net.ipv4.ip_forward = 1 [root@Node-1 ~]# sysctl -p /etc/sysctl.d/k8s.conf
免费资源网 – https://freexyz.cn/
© 版权声明
THE END
暂无评论内容