openeuler24.03部署k8s1.32.7高可用集群(三主三从)_openeuler 24.03使用containerd部署kubernetes
1. 方案概述
1.1 方案介绍
基于欧拉操作系统的开源高可用容器云解决方案,采用欧拉服务器操作系统 openEuler 24.03 作为操作系统的安全底座,运行 Kubernetes 进行容器应用管理和监控,通过 Haproxy + Keepalived 实现高可用负载均衡访问 kubernetes API 接口,具备高度的可扩展性和容错性,能够自动进行容器的调度和恢复,确保应用的高可用性和稳定性。该解决方案包括了多种开源工具和技术,可以帮助企业实现应用的自动化部署、扩展、监控和日志管理,降低IT成本,并通过多种插件和扩展机制,方便地进行功能扩展和定制,满足企业不同的需求。Kubeadm是一个简单易用的安装工具,可用于快速搭建Kubernetes集群,目前是比较方便和推荐的方式。
1.2 方案架构图
2.方案环境
2.1 操作系统环境
openEuler-24.03-LTS-x86_64-dvd.iso
2.2 硬件环境
自行准备5台具有2核CPU和4GB以上内存的服务器,硬盘大于50G,系统为openEuler-24.03,确保机器能够访问互联网。
安装配置信息如下表所示:
3.方案部署
3.1 主机初始化
对所有主机进行初始化操作
3.1.1 配置IP
master1节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.11/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
master2节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.12/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
master3节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.13/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
node01节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.14/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
node02节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.15/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
node03节点:
nmcli connection modify \"ens33\" ipv4.method manual ipv4.addresses 192.168.48.16/24 ipv4.gateway 192.168.48.2 ipv4.dns \"223.5.5.5 114.114.114.114 8.8.8.8\" && nmcli connection down \"ens33\" && nmcli connection up \"ens33\"
3.1.2 设置主机名
根据不同主机的角色,设置相应主机名
master1节点:
hostnamectl set-hostname master1
master2节点:
hostnamectl set-hostname master2
master3节点:
hostnamectl set-hostname master3
node01节点:
hostnamectl set-hostname node01
node02节点:
hostnamectl set-hostname node02
node03节点:
hostnamectl set-hostname node03
3.1.3 设置域名解析
所有节点都配置hosts解析
cat >> /etc/hosts <<EOF192.168.48.11 master1192.168.48.12 master2192.168.48.13 master3192.168.48.14 node01192.168.48.15 node02192.168.48.16 node03EOF
3.1.4 关闭防火墙
所有节点都关闭防火墙
systemctl disable --now firewalld
3.1.5 禁用SELinux
所有节点都禁用SELinux
setenforce 0sed -i \'s#SELINUX=enforcing#SELINUX=disabled#g\' /etc/sysconfig/selinuxsed -i \'s#SELINUX=enforcing#SELINUX=disabled#g\' /etc/selinux/config
3.1.6 禁用swap
所有节点关闭Swap分区:
swapoff -ased -ri \'s/.*swap.*/#&/\' /etc/fstab
3.1.7 配置yum源
所有节点配置Docker和默认yum源:
# 换成阿里源sed -i \'s|http://repo.openeuler.org|https://mirrors.jxust.edu.cn/openeuler/|g\' /etc/yum.repos.d/openEuler.repoyum clean all && yum makecache# 安装docker-ce依赖dnf install -y device-mapper-persistent-data lvm2# 添加 docker-ce源 openEuler24.03 对标centos9dnf config-manager --add-repo https://mirrors.aliyun.com/docker-ce/linux/centos/docker-ce.reposed -i \'s+download.docker.com+mirrors.aliyun.com/docker-ce+\' /etc/yum.repos.d/docker-ce.reposed -i \'s+\\$releasever+9+g\' /etc/yum.repos.d/docker-ce.repodnf makecache
3.1.8 安装常用的工具
所有节点安装一些常用的工具:
dnf install wget jq psmisc vim net-tools telnet git bash-completion -y
3.1.9 配置NTP时间同步
所有节点时间同步,同步后date查看和自己的主机时间是否一致。
sed -i \'3 s/^/# /\' /etc/chrony.confsed -i \'4 a server ntp.aliyun.com iburst\' /etc/chrony.confsystemctl restart chronyd.servicesystemctl enable chronyd.servicechronyc sources
3.1.10 配置网络
cat > /etc/NetworkManager/conf.d/calico.conf << EOF[keyfile]unmanaged-devices=interface-name:cali*;interface-name:tunl*EOFsystemctl restart NetworkManager# 参数解释# 这个参数用于指定不由 NetworkManager 管理的设备。它由以下两个部分组成# interface-name:cali*# 表示以 \"cali\" 开头的接口名称被排除在 NetworkManager 管理之外。例如,\"cali0\", \"cali1\" 等接口不受 NetworkManager 管理。# interface-name:tunl*# 表示以 \"tunl\" 开头的接口名称被排除在 NetworkManager 管理之外。例如,\"tunl0\", \"tunl1\" 等接口不受 NetworkManager 管理。通过使用这个参数,可以将特定的接口排除在 NetworkManager 的管理范围之外,以便其他工具或进程可以独立地管理和配置这些接口
3.1.11 优化资源限制参数
所有节点配置
ulimit -SHn 65535cat >> /etc/security/limits.conf << EOF* soft nofile 100000* hard nofile 100000* soft nproc 65535* hard nproc 65535* soft memlock unlimited* hard memlock unlimitedEOF
3.1.12 安装ipv相关工具
yum -y install ipvsadm ipset sysstat conntrack libseccompcat >> /etc/modules-load.d/ipvs.conf <<EOFip_vsip_vs_lcip_vs_wlcip_vs_rrip_vs_wrrip_vs_lblcip_vs_lblcrip_vs_dhip_vs_ship_vs_foip_vs_nqip_vs_sedip_vs_ftpip_vs_shnf_conntrackip_tablesip_setxt_setipt_setipt_rpfilteript_REJECTipipEOF# 加载模块,设置重启生效systemctl restart systemd-modules-load.service# 查看已加载模块lsmod | grep --color=auto -e ip_vs -e nf_conntrack
3.1.13 优化内核参数
sed -i \'/net.ipv4.ip_forward/d\' /etc/sysctl.confcat < /etc/sysctl.d/k8s.confnet.ipv4.ip_forward = 1net.bridge.bridge-nf-call-iptables = 1net.bridge.bridge-nf-call-ip6tables = 1fs.may_detach_mounts = 1net.ipv4.conf.all.route_localnet = 1vm.overcommit_memory=1vm.panic_on_oom=0fs.inotify.max_user_watches=89100fs.file-max=52706963fs.nr_open=52706963net.netfilter.nf_conntrack_max=2310720net.ipv4.tcp_keepalive_time = 600net.ipv4.tcp_keepalive_probes = 3net.ipv4.tcp_keepalive_intvl =15net.ipv4.tcp_max_tw_buckets = 36000net.ipv4.tcp_tw_reuse = 1net.ipv4.tcp_max_orphans = 327680net.ipv4.tcp_orphan_retries = 3net.ipv4.tcp_syncookies = 1net.ipv4.tcp_max_syn_backlog = 16384net.ipv4.ip_conntrack_max = 65536net.ipv4.tcp_max_syn_backlog = 16384net.ipv4.tcp_timestamps = 0net.core.somaxconn = 16384EOFsysctl --system
3.1.14 master1配置免密钥
安装过程中,生成配置文件和证书均在master1上操作,所以master1节点需要免密钥登录其他节点之后将文件传送到其他节点。
编写一个免密配置脚本free-ssh.sh
vim free-ssh.sh
#!/bin/bash# 安装 sshpass(如果未安装)if ! command -v sshpass &> /dev/null; then echo \"正在安装 sshpass...\" dnf install -y sshpass || { echo \"安装 sshpass 失败,请检查网络或手动安装!\" exit 1 }fi# 定义目标主机和密码IP_LIST=(\"192.168.48.11\" \"192.168.48.14\" \"192.168.48.15\")SSH_PASS=\"elysia123.\"# 批量配置免密登录for HOST in \"${IP_LIST[@]}\"; do echo \"正在配置 $HOST ...\" sshpass -p \"$SSH_PASS\" ssh-copy-id -o StrictHostKeyChecking=no -o ConnectTimeout=5 root@\"$HOST\" &> /dev/null # 检查是否成功 if [ $? -eq 0 ]; then echo \"$HOST 配置成功!\" else echo \"$HOST 配置失败,请检查网络或密码!\" fidone
执行脚本:
chmod +x free-ssh.sh sh free-ssh.sh
3.2 Docker部署
3.2.1 Docker作为Runtime
所有节点都安装docker-ce
dnf install -y docker-ce
由于新版Kubelet建议使用systemd,因此把Docker的CgroupDriver也改成systemd:
另外配置docker加速器;
cat > /etc/docker/daemon.json << \'EOF\'{ \"registry-mirrors\": [ \"https://jsrg2e0s.mirror.aliyuncs.com\", \"https://docker.m.daocloud.io\", \"https://docker.nju.edu.cn\", \"https://docker.anyhub.us.kg\", \"https://dockerhub.jobcher.com\", \"https://dockerhub.icu\", \"https://docker.ckyl.me\", \"https://registry.docker-cn.com\" ], \"exec-opts\": [\"native.cgroupdriver=systemd\"], \"log-driver\": \"json-file\", \"log-opts\": { \"max-size\": \"100m\", \"max-file\": \"3\" }, \"storage-driver\": \"overlay2\", \"live-restore\": true}EOF
3.2.2 安装部署cri-docker
注意:K8s从1.24版本后不支持docker了,所以这里需要用cri-dockererd。
下载地址:https://github.com/Mirantis/cri-dockerd/releases/
#1、下载 cri-dockermkdir k8s && cd k8swget -c https://github.com/Mirantis/cri-dockerd/releases/download/v0.3.16/cri-dockerd-0.3.16-3.fc35.x86_64.rpm#2、安装 cri-dockerdnf install -y cri-dockerd-0.3.16-3.fc35.x86_64.rpm#修改cri-docker 服务文件 /usr/lib/systemd/system/cri-docker.service#ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://ExecStart=/usr/bin/cri-dockerd --pod-infra-container-image=registry.aliyuncs.com/google_containers/pause:3.9 --container-runtime-endpoint fd://#3、启动 cri-dockersystemctl daemon-reloadsystemctl restart docker cri-docker.socket cri-dockersystemctl enable docker cri-docker
3.2.3 K8S软件安装
#1、配置kubernetes源#添加阿里云YUM软件源cat < /etc/sysconfig/kubelet <<EOFKUBELET_EXTRA_ARGS=\"--cgroup-driver=systemd\"EOF#设置kubelet为开机自启动即可,由于没有生成配置文件,集群初始化后自动启动systemctl enable kubelet#-------------------------
3.3 高可用配置
采用的是KeepAlived和HAProxy实现的高可用,所以需要安装KeepAlived和HAProxy。KeepAlived和HAProxy的节点可以和Master在同一个节点,也可以在不同的节点。
3.3.1 安装软件
所有Master节点通过yum安装HAProxy和KeepAlived:
yum install keepalived haproxy -y
3.3.2 配置haproxy
所有Master节点配置HAProxy(详细配置可参考HAProxy官方文档,所有Master节点的HAProxy配置相同):
vim haproxy.sh
#!/bin/bashexport APISERVER_SRC_PORT=6443export APISERVER_DEST_PORT=16443export MASTER1_ADDRESS=192.168.48.11export MASTER2_ADDRESS=192.168.48.12export MASTER3_ADDRESS=192.168.48.13export APISERVER_VIP=192.168.48.10cat > /etc/haproxy/haproxy.cfg << EOFglobal log 127.0.0.1 local2 info # 日志输出到本地syslog的local2设备,级别为info chroot /var/lib/haproxy # 安全隔离目录 pidfile /var/run/haproxy.pid # PID文件路径 user haproxy # 运行用户 group haproxy # 运行组 daemon # 以守护进程运行 maxconn 100000 # 最大连接数 stats socket /var/lib/haproxy/haproxy.sock mode 600 level admin # 管理统计socketdefaults log global # 继承全局日志配置 option dontlognull # 不记录空连接日志 option http-server-close # 允许HTTP连接复用 option forwardfor # 添加X-Forwarded-For头 option redispatch # 连接失败时重新分配 retries 3 # 失败重试次数 timeout http-request 10s # HTTP请求超时 timeout queue 1m # 请求排队超时 timeout connect 10s # 连接后端超时 timeout client 1m # 客户端超时 timeout server 1m # 服务端超时 timeout http-keep-alive 10s # Keep-Alive超时 timeout check 10s # 健康检查超时 maxconn 100000 # 每个进程最大连接数listen kubernetes-apiserver bind ${APISERVER_VIP}:${APISERVER_DEST_PORT} mode tcp # TCP模式(非HTTP) option tcplog # 记录TCP日志 log global # 继承全局日志 balance roundrobin # 轮询负载均衡算法 server master1 ${MASTER1_ADDRESS}:6443 check inter 3s rise 5 fall 2 server master2 ${MASTER2_ADDRESS}:6443 check inter 3s rise 5 fall 2 server master3 ${MASTER3_ADDRESS}:6443 check inter 3s rise 5 fall 2listen stats mode http # HTTP模式(统计页面) bind *:1080 # 监听所有IP的1080端口 stats enable # 启用统计页面 log global # 继承全局日志 stats refresh 5s # 页面自动刷新间隔 stats realm HAProxy\\ Statistics # 认证域提示信息 stats uri /haproxyadmin?stats # 统计页面URI stats auth admin:admin # 登录凭据(用户名:密码)EOF
执行脚本:
chmod +x haproxy.shsh haproxy.sh
3.3.3 允许绑定不存在地址
允许服务绑定一个本机不存在的IP地址
cat >> /etc/sysctl.conf << EOFnet.ipv4.ip_nonlocal_bind = 1EOFsysctl --system
3.3.4 开启 haproxy
systemctl enable --now haproxysystemctl status haproxy
3.3.5 配置keepalived
所有Master节点配置KeepAlived,由于KeepAlived需要配置自身的IP地址和网卡名称,因此每个
KeepAlived节点的配置不一样。
这里使用脚本自动生成配置文件,不再为每个节点单独配置/etc/keepalived/keepalived.conf,注意,这里master1为主master节点,其他为备master节点。也就是说,在k8s的master节点都健康的情况下,虚拟IP(VIP)一般在master1节点的ens33网卡上。
vim keepalived.sh
#!/bin/bash# =============================================# Keepalived 自动配置脚本# 功能:根据当前节点IP自动配置MASTER/BACKUP角色# 版本:1.1# =============================================# ----------------------------# 网络配置部分# ----------------------------# 获取本机IP地址(适配不同Linux发行版)export IP_ADDRESS=$(ip -o -4 addr show dev ens33 | awk \'{print $4}\' | cut -d\'/\' -f1)# 集群配置参数export MASTER_IP=\"192.168.48.11\" # 主Master节点固定IPexport APISERVER_VIP=\"192.168.48.10\" # 虚拟IP(VIP)export INTERFACE=\"ens33\" # 监听的网卡名称# ----------------------------# 角色判断逻辑# ----------------------------if [[ \"$IP_ADDRESS\" == \"$MASTER_IP\" ]]; then # 主节点配置 ROLE=\"MASTER\" PRIORITY=200 # 主节点需要最高优先级 echo \"[INFO] 当前节点被指定为MASTER节点 (优先级: ${PRIORITY})\"else # 备份节点配置 ROLE=\"BACKUP\" PRIORITY=100 # 备份节点优先级应低于MASTER echo \"[INFO] 当前节点被指定为BACKUP节点 (优先级: ${PRIORITY})\"fi# ----------------------------# 生成Keepalived配置文件# ----------------------------cat > /etc/keepalived/keepalived.conf <<EOF# =========================================# Keepalived 主配置文件# 自动生成时间:$(date)# 当前节点角色:${ROLE}# =========================================global_defs { router_id LVS_DEVEL_$(hostname) # 使用主机名作为唯一标识 script_user root # 脚本执行用户 enable_script_security # 启用脚本安全模式}# HAProxy健康检查脚本定义vrrp_script check_haproxy { script \"killall -0 haproxy\" # 检查haproxy进程是否存在 interval 1 # 检查间隔(秒) weight -20 # 检查失败时优先级降低值 fall 3 # 连续3次失败视为故障 rise 2 # 连续2次成功恢复}# VRRP实例配置vrrp_instance VI_1 { state ${ROLE} # 实例角色(MASTER/BACKUP) interface ${INTERFACE} # 绑定的物理网卡 virtual_router_id 100 # 虚拟路由ID(集群内必须一致) priority ${PRIORITY} # 选举优先级(值越大优先级越高) advert_int 1 # 通告间隔(秒) # 认证配置 authentication { auth_type PASS # 认证类型(PASS/AH) auth_pass 1111 # 认证密码(集群内必须一致) } # 虚拟IP配置 virtual_ipaddress { ${APISERVER_VIP} dev ${INTERFACE} label ${INTERFACE}:1 # VIP绑定到网卡 } # 跟踪脚本 track_script { check_haproxy # 关联健康检查脚本 }}EOF# ----------------------------# 后续操作提示# ----------------------------echo \"[SUCCESS] Keepalived配置已生成: /etc/keepalived/keepalived.conf\"echo \"[NOTICE] 请执行以下命令启动服务:\"echo \" systemctl restart keepalived && systemctl enable keepalived\"echo \"[TIP] 检查VIP是否绑定: ip addr show ${INTERFACE}\"
执行脚本:
chmod +x keepalived.shsh keepalived.sh
3.3.6 开启 keepalived
systemctl enable --now keepalivedsystemctl status keepalived
3.4 K8S集群配置
3.4.1 K8S集群初始化
只在master1节点上操作,创建初始化文件 kubeadm-init.yaml
kubeadm config print init-defaults > kubeadm-init.yaml
vim kubeadm-init.yaml修改如下配置:- advertiseAddress:为控制平面地址,( Master 主机 IP )advertiseAddress: 1.2.3.4修改为 advertiseAddress: 192.168.48.11- criSocket:为 containerd 的 socket 文件地址criSocket: unix:///var/run/containerd/containerd.sock修改为 criSocket: unix:///var/run/cri-dockerd.sock- name: node 修改node为 master1name: node修改为 name: master1- imageRepository:阿里云镜像代理地址,否则拉取镜像会失败imageRepository: registry.k8s.io修改为:imageRepository: registry.aliyuncs.com/google_containers- kubernetesVersion:为 k8s 版本kubernetesVersion: 1.32.0修改为:kubernetesVersion: 1.32.7注意:一定要配置镜像代理,否则会由于防火墙问题导致集群安装失败文件末尾增加启用ipvs功能---apiVersion: kubeproxy.config.k8s.io/v1alpha1kind: KubeProxyConfigurationmode: ipvs
根据配置文件启动 kubeadm 初始化 k8s
kubeadm init --config=kubeadm-init.yaml --upload-certs --v=6
#以下为成功输出Your Kubernetes control-plane has initialized successfully!To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/configAlternatively, if you are the root user, you can run: export KUBECONFIG=/etc/kubernetes/admin.confYou should now deploy a pod network to the cluster.Run \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/You can now join any number of control-plane nodes running the following command on each as root: kubeadm join 192.168.48.10:16443 --token abcdef.0123456789abcdef \\ --discovery-token-ca-cert-hash sha256:22c8a8a58a99b311d5c0ec8226fa13c4ce44ec62b784bda930ea92c31b41e207 \\ --control-plane --certificate-key bc9ff7662cb9e3d01fc7f9ee35f3cadc878df3bce55ead7344a12c6261485f81Please note that the certificate-key gives access to cluster sensitive data, keep it secret!As a safeguard, uploaded-certs will be deleted in two hours; If necessary, you can use\"kubeadm init phase upload-certs --upload-certs\" to reload certs afterward.Then you can join any number of worker nodes by running the following on each as root:kubeadm join 192.168.48.10:16443 --token abcdef.0123456789abcdef \\ --discovery-token-ca-cert-hash sha256:22c8a8a58a99b311d5c0ec8226fa13c4ce44ec62b784bda930ea92c31b41e207
3.4.2 配置kubectl
只在master1上操作
mkdir -p $HOME/.kubesudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/configsudo chown $(id -u):$(id -g) $HOME/.kube/config
3.4.3 配置证书
把主master1节点证书分别复制到其他2个master节点
scp /etc/kubernetes/pki/ca.* root@master2:/etc/kubernetes/pki/scp /etc/kubernetes/pki/ca.* root@master3:/etc/kubernetes/pki/scp /etc/kubernetes/pki/sa.* root@master2:/etc/kubernetes/pki/scp /etc/kubernetes/pki/sa.* root@master3:/etc/kubernetes/pki/scp /etc/kubernetes/pki/front-proxy-ca.* root@master2:/etc/kubernetes/pki/scp /etc/kubernetes/pki/front-proxy-ca.* root@master3:/etc/kubernetes/pki/scp /etc/kubernetes/pki/etcd/ca.* root@master2:/etc/kubernetes/pki/etcd/scp /etc/kubernetes/pki/etcd/ca.* root@master3:/etc/kubernetes/pki/etcd/scp /etc/kubernetes/admin.conf root@master2:/etc/kubernetes/scp /etc/kubernetes/admin.conf root@master3:/etc/kubernetes/把主master01节点证书分别复制到其他 node节点scp /etc/kubernetes/admin.conf root@node01:/etc/kubernetes/scp /etc/kubernetes/admin.conf root@node02:/etc/kubernetes/
3.4.5 其他master节点加入集群
分别在master1 和 master2 上执行:kubeadm join 192.168.48.10:16443 --token abcdef.0123456789abcdef \\ --discovery-token-ca-cert-hash sha256:22c8a8a58a99b311d5c0ec8226fa13c4ce44ec62b784bda930ea92c31b41e207 \\ --control-plane --certificate-key bc9ff7662cb9e3d01fc7f9ee35f3cadc878df3bce55ead7344a12c6261485f81 \\--cri-socket unix:///var/run/cri-dockerd.sock本文使用docker 需要添加 --cri-socket unix:///var/run/cri-dockerd.sock# 配置kubectlmkdir -p $HOME/.kubesudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/configsudo chown $(id -u):$(id -g) $HOME/.kube/config
3.4.6 node节点加入集群
在node01,node02,node03上执行
kubeadm join 192.168.48.10:16443 --token abcdef.0123456789abcdef \\ --discovery-token-ca-cert-hash sha256:22c8a8a58a99b311d5c0ec8226fa13c4ce44ec62b784bda930ea92c31b41e207 \\--cri-socket unix:///var/run/cri-dockerd.sock
3.4.7 查看集群状态
[root@master1 ~]# kubectl get nodesNAME STATUS ROLES AGE VERSIONmaster1 Ready control-plane 164m v1.32.7master2 Ready control-plane 151m v1.32.7master3 Ready control-plane 150m v1.32.7node01 Ready 149m v1.32.7node02 Ready 148m v1.32.7node03 Ready 148m v1.32.7# 查看容器运行时[root@master1 ~]# kubectl describe node | grep Runtime Container Runtime Version: docker://28.3.2 Container Runtime Version: docker://28.3.2 Container Runtime Version: docker://28.3.2 Container Runtime Version: docker://28.3.2 Container Runtime Version: docker://28.3.2 Container Runtime Version: docker://28.3.2
3.5 K8S集群网络插件使用
3.5.1 下载calico.yaml
只在master1上操作,此次可能需要科学上网
curl -O -L https://raw.githubusercontent.com/projectcalico/calico/v3.29.0/manifests/calico.yaml
3.5.2 拉取镜像
查看安装calico需要的镜像
[root@master1 3.29]# grep -i image: calico.yaml image: docker.io/calico/cni:v3.29.0 image: docker.io/calico/cni:v3.29.0 image: docker.io/calico/node:v3.29.0 image: docker.io/calico/node:v3.29.0 image: docker.io/calico/kube-controllers:v3.29.0
提前拉取这三个镜像:
image: docker.io/calico/cni:v3.29.0image: docker.io/calico/node:v3.29.0image: docker.io/calico/kube-controllers:v3.29.0
docker pull docker.io/calico/cni:v3.29.0docker pull docker.io/calico/node:v3.29.0docker pull docker.io/calico/kube-controllers:v3.29.0
3.5.3 部署calico网络
kubectl apply -f calico.yaml
这里要等待一段时间,5分钟左右吧,取决于你的网络环境。切记,科学上网后一定要及时关闭有关的http代理,因为k8s的apiserver也是通过http协议通信的,错误的http代理设置有可能导致集群通信异常。
3.5.4 检查
[root@master1 ~]# kubectl get nodesNAME STATUS ROLES AGE VERSIONmaster1 Ready control-plane 166m v1.32.7master2 Ready control-plane 154m v1.32.7master3 Ready control-plane 153m v1.32.7node01 Ready 152m v1.32.7node02 Ready 151m v1.32.7node03 Ready 151m v1.32.7[root@master1 ~]# kubectl get pod -n kube-system NAME READY STATUS RESTARTS AGEcalico-kube-controllers-5c58b547d5-4fv2t 1/1 Running 8 (98m ago) 139mcalico-node-4g6f4 1/1 Running 2 (99m ago) 139mcalico-node-7dkh5 1/1 Running 1 (98m ago) 139mcalico-node-86lgk 1/1 Running 0 139mcalico-node-f8r8d 1/1 Running 0 139mcalico-node-jb7xs 1/1 Running 4 (105m ago) 139mcalico-node-tznf4 1/1 Running 0 139mcoredns-6766b7b6bb-gh7zn 1/1 Running 4 (105m ago) 167mcoredns-6766b7b6bb-twg78 1/1 Running 4 (105m ago) 167metcd-master1 1/1 Running 4 (105m ago) 167metcd-master2 1/1 Running 2 (99m ago) 154metcd-master3 1/1 Running 1 (98m ago) 154mkube-apiserver-master1 1/1 Running 6 (98m ago) 167mkube-apiserver-master2 1/1 Running 3 (98m ago) 154mkube-apiserver-master3 1/1 Running 3 (98m ago) 154mkube-controller-manager-master1 1/1 Running 5 (99m ago) 167mkube-controller-manager-master2 1/1 Running 2 (99m ago) 154mkube-controller-manager-master3 1/1 Running 2 (98m ago) 154mkube-proxy-5wgsl 1/1 Running 4 (105m ago) 167mkube-proxy-j7fn6 1/1 Running 0 152mkube-proxy-nzjxr 1/1 Running 0 152mkube-proxy-st449 1/1 Running 2 (99m ago) 154mkube-proxy-vr22m 1/1 Running 0 152mkube-proxy-vtqss 1/1 Running 1 (98m ago) 154mkube-scheduler-master1 1/1 Running 4 (105m ago) 167mkube-scheduler-master2 1/1 Running 2 (99m ago) 154mkube-scheduler-master3 1/1 Running 2 (98m ago) 154m
node节点为ready,k8s核心组件全部running。
到此,k8s已经大致安装完毕了,还有常用组件比如helm,dashboard,Metrics-Server,ingress等按需求到官网安装即可。
4.方案验证
关闭任意master节点,vip漂移,k8s集群正常运行。
4.1 关闭master1节点
init 0
登录haproxy
http://192.168.48.10:1080/haproxyadmin?stats
用户:admin
密码:admin
4.2 验证VIP漂移
VIP漂移至其他master节点,本次为master3。
VIP漂移至master3:
[root@master3 ~]# ip a1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever2: ens33: mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:0c:29:c9:d5:e4 brd ff:ff:ff:ff:ff:ff inet 192.168.48.13/24 brd 192.168.48.255 scope global noprefixroute ens33 valid_lft forever preferred_lft forever inet 192.168.48.10/32 scope global ens33:1 valid_lft forever preferred_lft forever inet6 fe80::20c:29ff:fec9:d5e4/64 scope link noprefixroute valid_lft forever preferred_lft forever
4.3 验证高可用
master2节点验证:
[root@master2 ~]# kubectl get nodesNAME STATUS ROLES AGE VERSIONmaster1 NotReady control-plane 3h30m v1.32.7master2 Ready control-plane 3h18m v1.32.7master3 Ready control-plane 3h17m v1.32.7node01 Ready 3h15m v1.32.7node02 Ready 3h15m v1.32.7node03 Ready 3h15m v1.32.7
master1j节点状态为NotReady,符合预期,openeuler24.03,k8s1.32.7高可用集群(三主三从)部署完毕。