我是靠谱客的博主 深情马里奥,最近开发中收集的这篇文章主要介绍Kubernetes v1.14.0 之 kube-controller-manager部署,觉得挺不错的,现在分享给大家,希望可以做个参考。

概述

1、 kube-controller-manager准备

默认kube-controller-manager 部署在kube-apiserver部署的服务器上面服务器的配置等在这就不在列出来
二进制文件以及包含在kube-apiserver一起所以不在进行二进制的下载跟分发

2、生成kube-controller-manager访问kube-apiserver 证书

cat << EOF | tee /apps/work/k8s/cfssl/k8s/k8s_controller_manager.json
{
  "CN": "system:kube-controller-manager",
  "hosts": [""], 
  "key": {
    "algo": "rsa",
    "size": 2048
  },
  "names": [
    {
      "C": "CN",
      "ST": "GuangDong",
      "L": "GuangZhou",
      "O": "system:kube-controller-manager",
      "OU": "Kubernetes-manual"
    }
  ]
}
EOF

## 生成 Kubernetes Controller Manager 证书和私钥
cfssl gencert 
    -ca=/apps/work/k8s/cfssl/pki/k8s/k8s-ca.pem 
    -ca-key=/apps/work/k8s/cfssl/pki/k8s/k8s-ca-key.pem 
    -config=/apps/work/k8s/cfssl/ca-config.json 
    -profile=kubernetes 
    /apps/work/k8s/cfssl/k8s/k8s_controller_manager.json | 
    cfssljson -bare /apps/work/k8s/cfssl/pki/k8s/k8s_controller_manager

3、创建kube_controller_manager.kubeconfig

cd /apps/work/k8s/kubernetes/server/config
kubectl config set-cluster kubernetes 
   --certificate-authority=/apps/work/k8s/cfssl/pki/k8s/k8s-ca.pem 
   --embed-certs=true 
   --server=https://192.168.3.10:5443 
   --kubeconfig=kube_controller_manager.kubeconfig

kubectl config set-credentials system:kube-controller-manager 
   --client-certificate=/apps/work/k8s/cfssl/pki/k8s/k8s_controller_manager.pem 
   --embed-certs=true 
   --client-key=/apps/work/k8s/cfssl/pki/k8s/k8s_controller_manager-key.pem 
   --kubeconfig=kube_controller_manager.kubeconfig

kubectl config set-context kubernetes 
   --cluster=kubernetes 
   --user=system:kube-controller-manager 
   --kubeconfig=kube_controller_manager.kubeconfig

kubectl config use-context kubernetes --kubeconfig=kube_controller_manager.kubeconfig
说明:--server=https://192.168.3.10:5443  为每台kube-apiserver IP加端口不使用vip ip 连接

4、kube-controller-manager 一些特殊参数的说明

service-account-private-key-file 参数必须与 kube-apiserver 参数service-account-key-file 配对不然自动签发证书会失败没权限
cluster-cidr 参数docker 集群网段 service-cluster-ip-range 参数k8s 集群网段
node-cidr-mask-size k8s node 节点子网

5、创建kube-controller-manager 启动配置 所有服务器配置一样

说明: --address不能是服务器ip如果写服务器的ip kubectl get cs 就会报错
cd /apps/work/k8s/kubernetes/server/conf
vi kube-controller-manager
KUBE_CONTROLLER_MANAGER_OPTS="--logtostderr=false 
--leader-elect=true 
--address=0.0.0.0 
--service-cluster-ip-range=10.64.0.0/16 
--cluster-cidr=10.48.0.0/12 
--node-cidr-mask-size=24 
--cluster-name=kubernetes 
--allocate-node-cidrs=true 
--kubeconfig=/apps/kubernetes/config/kube_controller_manager.kubeconfig 
--authentication-kubeconfig=/apps/kubernetes/config/kube_controller_manager.kubeconfig 
--authorization-kubeconfig=/apps/kubernetes/config/kube_controller_manager.kubeconfig 
--use-service-account-credentials=true 
--client-ca-file=/apps/kubernetes/ssl/k8s/k8s-ca.pem 
--requestheader-client-ca-file=/apps/kubernetes/ssl/k8s/k8s-ca.pem 
--node-monitor-grace-period=40s 
--node-monitor-period=5s 
--pod-eviction-timeout=5m0s 
--terminated-pod-gc-threshold=50 
--alsologtostderr=true 
--cluster-signing-cert-file=/apps/kubernetes/ssl/k8s/k8s-ca.pem 
--cluster-signing-key-file=/apps/kubernetes/ssl/k8s/k8s-ca-key.pem  
--deployment-controller-sync-period=10s 
--experimental-cluster-signing-duration=86700h0m0s 
--enable-garbage-collector=true 
--root-ca-file=/apps/kubernetes/ssl/k8s/k8s-ca.pem 
--service-account-private-key-file=/apps/kubernetes/ssl/k8s/k8s-ca-key.pem 
--feature-gates=RotateKubeletServerCertificate=true,RotateKubeletClientCertificate=true 
--controllers=*,bootstrapsigner,tokencleaner 
--horizontal-pod-autoscaler-use-rest-clients=true 
--horizontal-pod-autoscaler-sync-period=10s 
--flex-volume-plugin-dir=/apps/kubernetes/kubelet-plugins/volume 
--tls-cert-file=/apps/kubernetes/ssl/k8s/k8s_controller_manager.pem 
--tls-private-key-file=/apps/kubernetes/ssl/k8s/k8s_controller_manager-key.pem 
--kube-api-qps=100 
--kube-api-burst=100 
--log-dir=/apps/kubernetes/log 
--v=2"

6、创建kube-controller-manager.service 启动文件

cd /apps/work/k8s/kubernetes/
vim kube-controller-manager.service 
[Unit]
Description=Kubernetes Controller Manager
Documentation=https://github.com/kubernetes/kubernetes

[Service]
LimitNOFILE=1024000
LimitNPROC=1024000
LimitCORE=infinity
LimitMEMLOCK=infinity
EnvironmentFile=-/apps/kubernetes/conf/kube-controller-manager
ExecStart=/apps/kubernetes/bin/kube-controller-manager $KUBE_CONTROLLER_MANAGER_OPTS
Restart=on-failure
RestartSec=5
User=k8s

[Install]
WantedBy=multi-user.target

7、分发kube-controller-manager 配置文件启动文件

说明:  使用ansible 分发时kube_controller_manager.kubeconfig  server=https://192.168.3.10:5443 可以使用参数进行分发
server=https://{{ ansible_ssh_host }}:5443 这样就不用每次修改修改 ansible_ssh_host 参数就是连接远程服务器ip
 分发 kube_controller_manager.kubeconfig 
 ansible -i host master -m  template -a "src=server/config/kube_controller_manager.kubeconfig dest=/apps/kubernetes/config owner=k8s group=root mode=644" 
分发:kube-controller-manager
ansible -i host master -m copy -a "src=server/conf/kube-controller-manager dest=/apps/kubernetes/conf owner=k8s group=root mode=644"
分发:kube-controller-manager.service
ansible -i host master -m copy -a "src=kube-controller-manager.service dest=/usr/lib/systemd/system/kube-controller-manager.service"

8、启动kube-controller-manager

ansible -i host master -m shell -a "systemctl daemon-reload"
ansible -i host master -m shell -a "systemctl enable kube-controller-manager"
ansible -i host master -m shell -a "systemctl start kube-controller-manager"
ansible -i host master -m shell -a "systemctl status kube-controller-manager"

9、查看kube-controller-manager 是否配置成功

kubectl get cs
[root@jenkins bin]# kubectl get cs
NAME                 STATUS    MESSAGE             ERROR
controller-manager   Healthy   ok                  
scheduler            Healthy   ok                  
etcd-4               Healthy   {"health":"true"}   
etcd-3               Healthy   {"health":"true"}   
etcd-5               Healthy   {"health":"true"}   
etcd-0               Healthy   {"health":"true"}   
etcd-1               Healthy   {"health":"true"}   
etcd-2               Healthy   {"health":"true"}   

10 、配置 kube-controller-manager,kubelet 、kube-scheduler 访问kube-api 用户授权

授予 kubernetes API 的权限
kubectl create clusterrolebinding controller-node-clusterrolebing --clusterrole=system:kube-controller-manager  --user=system:kube-controller-manager
kubectl create clusterrolebinding scheduler-node-clusterrolebing  --clusterrole=system:kube-scheduler --user=system:kube-scheduler
kubectl create clusterrolebinding controller-manager:system:auth-delegator --user system:kube-controller-manager --clusterrole system:auth-delegator
授予 kubernetes 证书访问 kubelet API 的权限
kubectl create clusterrolebinding --user system:serviceaccount:kube-system:default kube-system-cluster-admin --clusterrole cluster-admin
kubectl create clusterrolebinding kubelet-node-clusterbinding --clusterrole=system:node --group=system:nodes
kubectl create clusterrolebinding kube-apiserver:kubelet-apis --clusterrole=system:kubelet-api-admin --user kubernetes

下一篇: Kubernetes 生产环境安装部署 基于 Kubernetes v1.14.0 之 kubelet部署

转载于:https://blog.51cto.com/juestnow/2405113

最后

以上就是深情马里奥为你收集整理的Kubernetes v1.14.0 之 kube-controller-manager部署的全部内容,希望文章能够帮你解决Kubernetes v1.14.0 之 kube-controller-manager部署所遇到的程序开发问题。

如果觉得靠谱客网站的内容还不错,欢迎将靠谱客网站推荐给程序员好友。

本图文内容来源于网友提供,作为学习参考使用,或来自网络收集整理,版权属于原作者所有。
点赞(55)

评论列表共有 0 条评论

立即
投稿
返回
顶部