1.规划
192.168.100.102------>Master[kube-apiserver、kube-controller-manager、kube-scheduler]
Node[kubelet、kube-proxy]
192.168.100.103------>Node1[kubelet、kube-proxy]
192.168.100.104------>Node2[kubelet、kube-proxy]
注:这里的集群我们使用 https 来部署。
2.配置互信
|
1
2
3
4
5
6
7
|
192.168.100.102 Master
192.168.100.103 Node1
192.168.100.104 Node2
|
3.安装Ansible
|
1
2
3
4
5
6
|
[node]
192.168.100.103
192.168.100.104
|
4.关闭 SELinux 和 Firewall
5.安装 docker
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
Docker version 17.06.2-ce, build cec0b72
192.168.100.104 | SUCCESS | rc=0 >>
Docker version 17.06.2-ce, build cec0b72
192.168.100.103 | SUCCESS | rc=0 >>
Docker version 17.06.2-ce, build cec0b72
|
6.安装开源PKI工具箱----CFSSL
|
1
2
3
4
5
6
7
8
9
10
11
|
Version: 1.2.0
Revision: dev
Runtime: go1.6
|
7.安装 Etcd 键值存储系统
|
1
2
3
4
5
6
7
8
9
10
11
12
13
|
etcd Version: 3.2.9
Git SHA: f1d7dd8
Go Version: go1.8.4
Go OS
/Arch
: linux
/amd64
etcdctl version: 3.2.9
API version: 2
|
8.安装 Kubernetes 容器集群管理系统
9.安装 flanneld[为容器提供网络服务]
10.创建 SSL 证书
A. 创建 CA(Certificate Authority)
a. 创建配置文件(注:这里证书签名为10年)
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
{
"signing"
: {
"default"
: {
"expiry"
:
"87600h"
},
"profiles"
: {
"kubernetes"
: {
"usages"
: [
"signing"
,
"key encipherment"
,
"server auth"
,
"client auth"
],
"expiry"
:
"87600h"
}
}
}
}
EOF
|
b. 创建 CA 证书签名请求
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
{
"CN"
:
"kubernetes"
,
"key"
: {
"algo"
:
"rsa"
,
"size"
: 2048
},
"names"
: [
{
"C"
:
"CN"
,
"ST"
:
"BeiJing"
,
"L"
:
"BeiJing"
,
"O"
:
"k8s"
,
"OU"
:
"System"
}
]
}
EOF
|
c. 生成 CA 证书和私钥
|
1
2
3
4
5
6
7
|
[INFO] generating a new CA key and certificate from CSR
[INFO] generate received request
[INFO] received CSR
[INFO] generating key: rsa-2048
[INFO] encoded CSR
[INFO] signed certificate with serial number 364190696737289470871577587903292790301152267546
|
B. 创建 Kubernetes 证书
a.创建 Kubernetes 证书签名请求
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|
{
"CN"
:
"kubernetes"
,
"hosts"
: [
"127.0.0.1"
,
"localhost"
,
"10.254.0.1"
,
"192.168.100.102"
,
"192.168.100.103"
,
"192.168.100.104"
,
"kubernetes"
,
"kubernetes.default"
,
"kubernetes.default.svc"
,
"kubernetes.default.svc.cluster"
,
"kubernetes.default.svc.cluster.local"
],
"key"
: {
"algo"
:
"rsa"
,
"size"
: 2048
},
"names"
: [
{
"C"
:
"CN"
,
"ST"
:
"BeiJing"
,
"L"
:
"BeiJing"
,
"O"
:
"k8s"
,
"OU"
:
"System"
}
]
}
EOF
|
b.生成 Kubernetes 证书和私钥
|
1
2
3
4
5
6
|
[INFO] generate received request
[INFO] received CSR
[INFO] generating key: rsa-2048
[INFO] encoded CSR
[INFO] signed certificate with serial number 562624490776452851974857846236319432028751121504
|
注:出现的 WARNING 是因为 hosts 字段未设置域名,这里我们就是要给kubernetes的IP生成证书,所以可以忽略该警告。
c.查看所生成的证书
|
1
2
|
kubernetes.csr kubernetes_csr.json kubernetes-key.pem kubernetes.pem
|
C. 创建 Admin 证书
a.创建 Admin 证书签名请求
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
|
{
"CN"
:
"admin"
,
"hosts"
: [],
"key"
: {
"algo"
:
"rsa"
,
"size"
: 2048
},
"names"
: [
{
"C"
:
"CN"
,
"ST"
:
"BeiJing"
,
"L"
:
"BeiJing"
,
"O"
:
"system:masters"
,
"OU"
:
"System"
}
]
}
EOF
|
注:OU 指定该证书的 Group 为 system:masters,kubelet 使用该证书访问 kube-apiserver 时 ,由于证书被 CA 签名,所以认证通过,同时由于证书用户组为经过预授权的 system:masters,所以被授予访问所有 API 的权限。
b.生成 Admin 证书和私钥
|
1
2
3
4
5
6
|
[INFO] generate received request
[INFO] received CSR
[INFO] generating key: rsa-2048
[INFO] encoded CSR
[INFO] signed certificate with serial number 98602736507310427106587925783522327459817057634
|
c.查看所生成的证书
|
1
2
|
admin.csr admin_csr.json admin-key.pem admin.pem
|
D. 创建 Kube-Proxy 证书
a.创建 kube-proxy 证书签名请求
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
|
{
"CN"
:
"system:kube-proxy"
,
"hosts"
: [],
"key"
: {
"algo"
:
"rsa"
,
"size"
: 2048
},
"names"
: [
{
"C"
:
"CN"
,
"ST"
:
"BeiJing"
,
"L"
:
"BeiJing"
,
"O"
:
"k8s"
,
"OU"
:
"System"
}
]
}
EOF
|
b.生成 kube-proxy 客户端证书和私钥
|
1
2
3
4
5
6
|
[INFO] generate received request
[INFO] received CSR
[INFO] generating key: rsa-2048
[INFO] encoded CSR
[INFO] signed certificate with serial number 15961203695365328046366272691608837430729281180
|
c.查看所生成的证书
|
1
2
|
kube-proxy.csr kube-proxy_csr.json kube-proxy-key.pem kube-proxy.pem
|
E. 创建 etcd 证书
a. 创建 etcd 证书签名请求
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
|
{
"CN"
:
"etcd"
,
"hosts"
: [
"127.0.0.1"
,
"localhost"
,
"192.168.100.102"
,
"192.168.100.103"
,
"192.168.100.104"
],
"key"
: {
"algo"
:
"rsa"
,
"size"
: 2048
},
"names"
: [
{
"C"
:
"CN"
,
"L"
:
"BeiJing"
,
"ST"
:
"BeiJing"
,
"O"
:
"k8s"
,
"OU"
:
"System"
}
]
}
EOF
|
b.生成 etcd 客户端证书和私钥
|
1
2
3
4
5
6
|
[INFO] generate received request
[INFO] received CSR
[INFO] generating key: rsa-2048
[INFO] encoded CSR
[INFO] signed certificate with serial number 168388022915225919243296361863710051151902347190
|
c.查看所生成的证书
|
1
2
|
etcd.csr etcd_csr.json etcd-key.pem etcd.pem
|
F.查看、验证并分发证书
a.查看所生成的证书
|
1
2
|
admin-key.pem admin.pem ca-key.pem ca.pem etcd-key.pem etcd.pem kube-proxy-key.pem kube-proxy.pem kubernetes-key.pem kubernetes.pem
|
b.校验证书
c.验证证书是否该CA签发
d.分发证书至所有 Node
e.配置使系统信任自签名证书
11.创建 kubeconfig 文件
A. 创建 TLS Bootstrapping Token
Token auth file:Token可以是任意的包涵128 bit的字符串,可使用安全的随机数发生器生成。
kubelet 首次启动时向 kube-apiserver 发送 TLS Bootstrapping 请求,kube-apiserver 验证 kubelet 请求中的 token 是否与它配置的 token 一致,如果一致则自动为 kubelet生成证书和秘钥。
|
1
2
3
4
5
|
${BOOTSTRAP_TOKEN},kubelet-bootstrap,10001,
"system:kubelet-bootstrap"
EOF
|
B. 将token.csv分发至所有 Node 的 /etc/kubernetes/ 目录
C. 创建 kubectl kubeconfig 文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
/root
--certificate-authority=
/etc/kubernetes/ssl/ca
.pem \
--embed-certs=
true
\
--server=${KUBE_APISERVER}
Cluster
"kubernetes"
set
.
--client-certificate=
/etc/kubernetes/ssl/admin
.pem \
--embed-certs=
true
\
--client-key=
/etc/kubernetes/ssl/admin-key
.pem
User
"admin"
set
.
--cluster=kubernetes \
--user=admin
Context
"kubernetes"
created.
Switched to context
"kubernetes"
.
|
该kubeconfig 文件在如下位置:
D.创建 kubelet kubeconfig 文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
--certificate-authority=
/etc/kubernetes/ssl/ca
.pem \
--embed-certs=
true
\
--server=${KUBE_APISERVER} \
--kubeconfig=bootstrap.kubeconfig
Cluster
"kubernetes"
set
.
--token=${BOOTSTRAP_TOKEN} \
--kubeconfig=bootstrap.kubeconfig
User
"kubelet-bootstrap"
set
.
--cluster=kubernetes \
--user=kubelet-bootstrap \
--kubeconfig=bootstrap.kubeconfig
Context
"default"
created.
Switched to context
"default"
.
|
E.创建 kube-proxy kubeconfig 文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
--certificate-authority=
/etc/kubernetes/ssl/ca
.pem \
--embed-certs=
true
\
--server=${KUBE_APISERVER} \
--kubeconfig=kube-proxy.kubeconfig
Cluster
"kubernetes"
set
.
--client-certificate=
/etc/kubernetes/ssl/kube-proxy
.pem \
--client-key=
/etc/kubernetes/ssl/kube-proxy-key
.pem \
--embed-certs=
true
\
--kubeconfig=kube-proxy.kubeconfig
User
"kube-proxy"
set
.
--cluster=kubernetes \
--user=kube-proxy \
--kubeconfig=kube-proxy.kubeconfig
Context
"default"
created.
Switched to context
"default"
.
|
F.分发至所有 node 节点
注:对看这篇文章的朋友表示抱歉,写得有点长,我又分篇了。
本文转自 结束的伤感 51CTO博客,原文链接:http://blog.51cto.com/wangzhijian/2044919