同样是部署在 10.4.7.21 10.4.7.22
首先还是签发证书,在 10.4.7.200 上面操作:
创建生成证书签名请求(csr)的JSON配置文件
cd /opt/certs
vi kubelet-csr.json
{
"CN": "k8s-kubelet",
"hosts": [
"127.0.0.1",
"10.4.7.10",
"10.4.7.21",
"10.4.7.22",
"10.4.7.23",
"10.4.7.24",
"10.4.7.25",
"10.4.7.26",
"10.4.7.27",
"10.4.7.28"
],
"key": {
"algo": "rsa",
"size": 2048
},
"names": [
{
"C": "CN",
"ST": "beijing",
"L": "beijing",
"O": "od",
"OU": "ops"
}
]
}
#### 尽量要把以后所有可能用到kubelet节点的 IP,都写在hosts段,以后若要添加kubelet节点就可以不用再重新签发证书。
cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=server kubelet-csr.json | cfssl-json -bare kubelet
拷贝证书至各运算节点,并创建配置
10.4.7.21 104.7.22 上面都操作(拷贝证书到相应的目录):
cd /opt/kubernetes/server/bin/cert
scp hdss7-200:/opt/certs/kubelet.pem .
scp hdss7-200:/opt/certs/kubelet-key.pem .
先在 10.4.7.21 上面操作:
给kubelet去创建一个 kubelet.kubeconfig的配置文件。(只需要一在台kubelet节点上创建即可)
创建配置,在/opt/kubernetes/server/bin/conf/ 下面,我们需要给kubelet 创建一个kube-config的配置文件,总共需要4步。
1、set-cluster
cd /opt/kubernetes/server/bin/conf/
kubectl config set-cluster myk8s \
--certificate-authority=/opt/kubernetes/server/bin/cert/ca.pem \
--embed-certs=true \
--server=https://10.4.7.10:7443 \
--kubeconfig=kubelet.kubeconfig
2、set-credentials
cd /opt/kubernetes/server/bin/conf/
kubectl config set-credentials k8s-node \
--client-certificate=/opt/kubernetes/server/bin/cert/client.pem \
--client-key=/opt/kubernetes/server/bin/cert/client-key.pem \
--embed-certs=true \
--kubeconfig=kubelet.kubeconfig
3、set-context
cd /opt/kubernetes/server/bin/conf/
kubectl config set-context myk8s-context \
--cluster=myk8s \
--user=k8s-node \
--kubeconfig=kubelet.kubeconfig
4、use-context
cd /opt/kubernetes/server/bin/conf/
kubectl config use-context myk8s-context --kubeconfig=kubelet.kubeconfig
创建k8s-node.yaml 配置文件
cd /opt/kubernetes/server/bin/conf/
vi k8s-node.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: k8s-node
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:node
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: k8s-node
创建一个k8s用户,这个用户叫做k8s-node,然后我们要给这个k8s-node授予一个集群的权限,让这个k8s-node用户,具有成为运算节点的权限。
cd /opt/kubernetes/server/bin/conf/
kubectl create -f k8s-node.yaml
kubectl get clusterrolebinding k8s-node
kubectl get clusterrolebinding k8s-node -o yaml
####+++++++++++
接下来在 10.4.7.22 上面操作:(直接拷贝10.4.7.21上面创建的kubelet.kubeconfig到10.4.7.22 /opt/kubernetes/server/bin/conf)
cd /opt/kubernetes/server/bin/conf
scp hdss7-21:/opt/kubernetes/server/bin/conf/kubelet.kubeconfig .
先前在10.4.7.21 上面创建的 集群角色绑定 资源,不用再创建了。
##########+++++++
准备 pause 基础镜像:(这个pause 镜像是谷歌开源的)
在 hdss7-200.host.com(10.4.7.200) 上面操作:
docker pull kubernetes/pause
docker tag f9d5de079539 harbor.od.com/public/pause:latest
docker push harbor.od.com/public/pause:latest
####+++++++
创建 kubelet启动脚本
在 10.4.7.21 10.4.7.22 上面操作:
cd /opt/kubernetes/server/bin
vim /opt/kubernetes/server/bin/kubelet.sh
#!/bin/sh
./kubelet \
--anonymous-auth=false \
--cgroup-driver systemd \
--cluster-dns 192.168.0.2 \
--cluster-domain cluster.local \
--runtime-cgroups=/systemd/system.slice \
--kubelet-cgroups=/systemd/system.slice \
--fail-swap-on="false" \
--client-ca-file ./cert/ca.pem \
--tls-cert-file ./cert/kubelet.pem \
--tls-private-key-file ./cert/kubelet-key.pem \
--hostname-override hdss7-21.host.com \
--image-gc-high-threshold 20 \
--image-gc-low-threshold 10 \
--kubeconfig ./conf/kubelet.kubeconfig \
--log-dir /data/logs/kubernetes/kube-kubelet \
--pod-infra-container-image harbor.od.com/public/pause:latest \
--root-dir /data/kubelet
#########++++++++
mkdir -p /data/logs/kubernetes/kube-kubelet /data/kubelet
chmod +x /opt/kubernetes/server/bin/kubelet.sh
--hostname-override hdss7-22.host.com \ ##10.4.7.22 这里,改成hdss7-22.host.com,其他都一样。
######++++++++
supervisor 配置:
先在 10.4.7.21 上面配置:
cd /etc/supervisord.d/
vi /etc/supervisord.d/kube-kubelet.ini
[program:kube-kubelet-7-21]
command=/opt/kubernetes/server/bin/kubelet.sh
numprocs=1
directory=/opt/kubernetes/server/bin
autostart=true
autorestart=true
startsecs=30
startretries=3
exitcodes=0,2
stopsignal=QUIT
stopwaitsecs=10
user=root
redirect_stderr=true
stdout_logfile=/data/logs/kubernetes/kube-kubelet/kubelet.stdout.log
stdout_logfile_maxbytes=64MB
stdout_logfile_backups=4
stdout_capture_maxbytes=1MB
stdout_events_enabled=false
#########++++++++=
supervisorctl update
######## 10.4.7.22
/etc/supervisord.d/kube-kubelet.ini [program:kube-kubelet-7-22]
查看node 节点是不是加的集群里了
kubectl get nodes
发现 ROLES 是空的,
10.4.7.21 或者 10.4.7.22 上面任意一台上面操作。
kubectl label node hdss7-21.host.com node-role.kubernetes.io/master=
kubectl label node hdss7-21.host.com node-role.kubernetes.io/node=
kubectl label node hdss7-22.host.com node-role.kubernetes.io/master=
kubectl label node hdss7-22.host.com node-role.kubernetes.io/node=