K 8 S 1:etcdクラスタの配備

5117 ワード

1、dockerのインストール
# yum install -y yum-utils device-mapper-persistent-data lvm2 
# yum-config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo
# yum install docker-ce
     
# cat << EOF > /etc/docker/daemon.json
{
	"registry-mirrors": [ "https://registry.docker-cn.com"], 
	"insecure-registries":["192.168.0.210:5000"]
}
# systemctl start docker 
# systemctl enable docker

2、証明書生成ツールcfsslをインストールし、証明書を生成し、certificateを実行する.sh証明書の生成
# wget https://pkg.cfssl.org/R1.2/cfssl_linux-amd64
# wget https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64
# wget https://pkg.cfssl.org/R1.2/cfssl-certinfo_linux-amd64
# chmod +x cfssl_linux-amd64 cfssljson_linux-amd64 cfssl-certinfo_linux-amd64 
# mv cfssl_linux-amd64 /usr/local/bin/cfssl
# mv cfssljson_linux-amd64 /usr/local/bin/cfssljson
# mv cfssl-certinfo_linux-amd64 /usr/bin/cfssl-certinfo
certificate.sh
#             ,  Docker     :397834690  (             ,  )
cat > ca-config.json < ca-csr.json < server-csr.json < admin-csr.json < kube-proxy-csr.json <

3、etcdを/opt/kubernetesというディレクトリにインストールし、ディレクトリを作成する
# mkdir -p /opt/kubernetes/{bin,cfg,ssl}

4、etcdバイナリファイルを/opt/kubernetes/binに移動
# mv ~/etcd-v3.2.12-linux-amd64/etcd* /opt/kubernetes/bin

5、構成ファイルの作成
# vim /opt/kubernetes/bin/cfg/etcd
#[Member]
ETCD_NAME="etcd01"
ETCD_DATA_DIR="/var/lib/etcd/default.etcd"
ETCD_LISTEN_PEER_URLS="https://192.168.1.20:2380"    #  IP
ETCD_LISTEN_CLIENT_URLS="https://192.168.1.20:2379"  #  IP

#[Clustering]
ETCD_INITIAL_ADVERTISE_PEER_URLS="https://192.168.1.20:2380"   #  IP
ETCD_ADVERTISE_CLIENT_URLS="https://192.168.1.20:2379"         #  IP
ETCD_INITIAL_CLUSTER="etcd01=https://192.168.1.20:2380,etcd02=https://192.168.1.22:2380,etcd03=https://192.168.1.23:2380"
ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster"
ETCD_INITIAL_CLUSTER_STATE="new"

6、証明書ファイルをsslディレクトリにコピーする
mv ~/ssl/server*pem /opt/kubernetes/ssl/
mv ~/ssl/ca*pem /opt/kubernetes/ssl/

7、etcdはsystemctl管理ツールに加入する
# vim /usr/lib/systemd/system/etcd.service
[Unit]
Description=Etcd Server
After=network.target
After=network-online.target
Wants=network-online.target

[Service]
Type=notify
EnvironmentFile=-/opt/kubernetes/cfg/etcd
ExecStart=/opt/kubernetes/bin/etcd \
--name=${ETCD_NAME} \
--data-dir=${ETCD_DATA_DIR} \
--listen-peer-urls=${ETCD_LISTEN_PEER_URLS} \
--listen-client-urls=${ETCD_LISTEN_CLIENT_URLS},http://127.0.0.1:2379 \
--advertise-client-urls=${ETCD_ADVERTISE_CLIENT_URLS} \
--initial-advertise-peer-urls=${ETCD_INITIAL_ADVERTISE_PEER_URLS} \
--initial-cluster=${ETCD_INITIAL_CLUSTER} \
--initial-cluster-token=${ETCD_INITIAL_CLUSTER} \
--initial-cluster-state=new \
--cert-file=/opt/kubernetes/ssl/server.pem \
--key-file=/opt/kubernetes/ssl/server-key.pem \
--peer-cert-file=/opt/kubernetes/ssl/server.pem \
--peer-key-file=/opt/kubernetes/ssl/server-key.pem \
--trusted-ca-file=/opt/kubernetes/ssl/ca.pem \
--peer-trusted-ca-file=/opt/kubernetes/ssl/ca.pem
Restart=on-failure
LimitNOFILE=65536

[Install]
WantedBy=multi-user.target

8、etcdを起動する
# systemctl start etcd
# systemctl enable etcd

9、nodeノードを配置し、変更するだけで、以下のファイルでよい
# vim /opt/kubernetes/bin/cfg/etcd
#[Member]
ETCD_NAME="etcd02"             #node  
ETCD_DATA_DIR="/var/lib/etcd/default.etcd"
ETCD_LISTEN_PEER_URLS="https://192.168.1.22:2380"    #node  
ETCD_LISTEN_CLIENT_URLS="https://192.168.1.22:2379"   #node  

#[Clustering]
ETCD_INITIAL_ADVERTISE_PEER_URLS="https://192.168.1.22:2380"   #node  
ETCD_ADVERTISE_CLIENT_URLS="https://192.168.1.22:2379"          #node  
ETCD_INITIAL_CLUSTER="etcd01=https://192.168.1.20:2380,etcd02=https://192.168.1.22:2380,etcd03=https://192.168.1.23:2380"
ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster"
ETCD_INITIAL_CLUSTER_STATE="new"

10、クラスタ状態の表示:cdから/opt/kubernetes/sslディレクトリ、以下の文を実行する
# /opt/kubernetes/bin/etcdctl \
--ca-file=ca.pem --cert-file=server.pem --key-file=server-key.pem \
--endpoints="https://192.168.1.20:2379,https://192.168.1.22:2379,https://192.168.1.23:2379" cluster-health
member 2cec3559c840a575 is healthy: got healthy result from https://192.168.1.23:2379
member 4276776ed46b3a34 is healthy: got healthy result from https://192.168.1.22:2379
member 5b439a22b5a51b6f is healthy: got healthy result from https://192.168.1.20:2379
cluster is healthy