Kubernetes做爲容器集羣系統,經過健康檢查+重啓策略實現了Pod故障自我修復能力,經過調度算法實現將Pod分佈式部署,並保持預期副本數,根據Node失效狀態自動在其餘Node拉起Pod,實現了應用層的高可用性。 node
針對Kubernetes集羣,高可用性還應包含如下兩個層面的考慮:Etcd數據庫的高可用性和Kubernetes Master組件的高可用性。 而Etcd咱們已經採用3個節點組建集羣實現高可用,本節將對Master節點高可用進行說明和實施。linux
Master節點扮演着總控中心的角色,經過不斷與工做節點上的Kubelet和kube-proxy進行通訊來維護整個集羣的健康工做狀態。若是Master節點故障,將沒法使用kubectl工具或者API作任何集羣管理。nginx
Master節點主要有三個服務kube-apiserver、kube-controller-manager和kube-scheduler,其中kube-controller-manager和kube-scheduler組件自身經過選擇機制已經實現了高可用,因此Master高可用主要針對kube-apiserver組件,而該組件是以HTTP API提供服務,所以對他高可用與Web服務器相似,增長負載均衡器對其負載均衡便可,而且可水平擴容。git
多Master架構圖:算法
同上,再也不贅述。 shell
Master2 與已部署的Master1全部操做一致。因此咱們只需將Master1全部K8s文件拷貝過來,再修改下服務器IP和主機名啓動便可。 數據庫
在Master2建立etcd證書目錄:bootstrap
mkdir -p /opt/etcd/ssl
拷貝Master1上全部K8s文件和etcd證書到Master2:api
scp -r /opt/kubernetes root@192.168.31.74:/opt scp -r /opt/cni/ root@192.168.31.74:/opt scp -r /opt/etcd/ssl root@192.168.31.74:/opt/etcd scp /usr/lib/systemd/system/kube* root@192.168.31.74:/usr/lib/systemd/system scp /usr/bin/kubectl root@192.168.31.74:/usr/bin
刪除kubelet證書和kubeconfig文件:bash
rm -f /opt/kubernetes/cfg/kubelet.kubeconfig rm -f /opt/kubernetes/ssl/kubelet*
修改apiserver、kubelet和kube-proxy配置文件爲本地IP:
vi /opt/kubernetes/cfg/kube-apiserver.conf ... --bind-address=192.168.31.74 \ --advertise-address=192.168.31.74 \ ... vi /opt/kubernetes/cfg/kubelet.conf --hostname-override=k8s-master2 vi /opt/kubernetes/cfg/kube-proxy-config.yml hostnameOverride: k8s-master2
systemctl daemon-reload systemctl start kube-apiserver systemctl start kube-controller-manager systemctl start kube-scheduler systemctl start kubelet systemctl start kube-proxy systemctl enable kube-apiserver systemctl enable kube-controller-manager systemctl enable kube-scheduler systemctl enable kubelet systemctl enable kube-proxy
kubectl get cs NAME STATUS MESSAGE ERROR scheduler Healthy ok controller-manager Healthy ok etcd-1 Healthy {"health":"true"} etcd-2 Healthy {"health":"true"} etcd-0 Healthy {"health":"true"}
kubectl get csr NAME AGE SIGNERNAME REQUESTOR CONDITION node-csr-JYNknakEa_YpHz797oKaN-ZTk43nD51Zc9CJkBLcASU 85m kubernetes.io/kube-apiserver-client-kubelet kubelet-bootstrap Pending kubectl certificate approve node-csr-JYNknakEa_YpHz797oKaN-ZTk43nD51Zc9CJkBLcASU kubectl get node NAME STATUS ROLES AGE VERSION k8s-master Ready <none> 34h v1.18.3 k8s-master2 Ready <none> 83m v1.18.3 k8s-node1 Ready <none> 33h v1.18.3 k8s-node2 Ready <none> 33h v1.18.3
若是你在學習中遇到問題或者文檔有誤可聯繫阿良~ 微信: init1024
kube-apiserver高可用架構圖:
yum install epel-release -y yum install nginx keepalived -y
cat > /etc/nginx/nginx.conf << "EOF" user nginx; worker_processes auto; error_log /var/log/nginx/error.log; pid /run/nginx.pid; include /usr/share/nginx/modules/*.conf; events { worker_connections 1024; } # 四層負載均衡,爲兩臺Master apiserver組件提供負載均衡 stream { log_format main '$remote_addr $upstream_addr - [$time_local] $status $upstream_bytes_sent'; access_log /var/log/nginx/k8s-access.log main; upstream k8s-apiserver { server 192.168.31.71:6443; # Master1 APISERVER IP:PORT server 192.168.31.74:6443; # Master2 APISERVER IP:PORT } server { listen 6443; proxy_pass k8s-apiserver; } } http { log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; include /etc/nginx/mime.types; default_type application/octet-stream; server { listen 80 default_server; server_name _; location / { } } } EOF
cat > /etc/keepalived/keepalived.conf << EOF global_defs { notification_email { acassen@firewall.loc failover@firewall.loc sysadmin@firewall.loc } notification_email_from Alexandre.Cassen@firewall.loc smtp_server 127.0.0.1 smtp_connect_timeout 30 router_id NGINX_MASTER } vrrp_script check_nginx { script "/etc/keepalived/check_nginx.sh" } vrrp_instance VI_1 { state MASTER interface ens33 # 修改成實際網卡名 virtual_router_id 51 # VRRP 路由 ID實例,每一個實例是惟一的 priority 100 # 優先級,備服務器設置 90 advert_int 1 # 指定VRRP 心跳包通告間隔時間,默認1秒 authentication { auth_type PASS auth_pass 1111 } # 虛擬IP virtual_ipaddress { 192.168.31.88/24 } track_script { check_nginx } } EOF
vrrp_script:指定檢查nginx工做狀態腳本(根據nginx狀態判斷是否故障轉移)
檢查nginx狀態腳本:
cat > /etc/keepalived/check_nginx.sh << "EOF" #!/bin/bash count=$(ps -ef |grep nginx |egrep -cv "grep|$$") if [ "$count" -eq 0 ];then exit 1 else exit 0 fi EOF chmod +x /etc/keepalived/check_nginx.sh
cat > /etc/keepalived/keepalived.conf << EOF global_defs { notification_email { acassen@firewall.loc failover@firewall.loc sysadmin@firewall.loc } notification_email_from Alexandre.Cassen@firewall.loc smtp_server 127.0.0.1 smtp_connect_timeout 30 router_id NGINX_BACKUP } vrrp_script check_nginx { script "/etc/keepalived/check_nginx.sh" } vrrp_instance VI_1 { state BACKUP interface ens33 virtual_router_id 51 # VRRP 路由 ID實例,每一個實例是惟一的 priority 90 advert_int 1 authentication { auth_type PASS auth_pass 1111 } virtual_ipaddress { 192.168.31.88/24 } track_script { check_nginx } } EOF
上述配置文件中檢查nginx運行狀態腳本:
cat > /etc/keepalived/check_nginx.sh << "EOF" #!/bin/bash count=$(ps -ef |grep nginx |egrep -cv "grep|$$") if [ "$count" -eq 0 ];then exit 1 else exit 0 fi EOF chmod +x /etc/keepalived/check_nginx.sh
注:keepalived根據腳本返回狀態碼(0爲工做正常,非0不正常)判斷是否故障轉移。
systemctl daemon-reload systemctl start nginx systemctl start keepalived systemctl enable nginx systemctl enable keepalived
ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 00:0c:29:04:f7:2c brd ff:ff:ff:ff:ff:ff inet 192.168.31.80/24 brd 192.168.31.255 scope global noprefixroute ens33 valid_lft forever preferred_lft forever inet 192.168.31.88/24 scope global secondary ens33 valid_lft forever preferred_lft forever inet6 fe80::20c:29ff:fe04:f72c/64 scope link valid_lft forever preferred_lft forever
能夠看到,在ens33網卡綁定了192.168.31.88 虛擬IP,說明工做正常。
關閉主節點Nginx,測試VIP是否漂移到備節點服務器。
在Nginx Master執行 pkill nginx 在Nginx Backup,ip addr命令查看已成功綁定VIP。
找K8s集羣中任意一個節點,使用curl查看K8s版本測試,使用VIP訪問:
curl -k https://192.168.31.88:6443/version { "major": "1", "minor": "18", "gitVersion": "v1.18.3", "gitCommit": "2e7996e3e2712684bc73f0dec0200d64eec7fe40", "gitTreeState": "clean", "buildDate": "2020-05-20T12:43:34Z", "goVersion": "go1.13.9", "compiler": "gc", "platform": "linux/amd64" }
能夠正確獲取到K8s版本信息,說明負載均衡器搭建正常。該請求數據流程:curl -> vip(nginx) -> apiserver
經過查看Nginx日誌也能夠看到轉發apiserver IP:
tail /var/log/nginx/k8s-access.log -f 192.168.31.81 192.168.31.71:6443 - [30/May/2020:11:15:10 +0800] 200 422 192.168.31.81 192.168.31.74:6443 - [30/May/2020:11:15:26 +0800] 200 422
到此還沒結束,還有下面最關鍵的一步。
試想下,雖然咱們增長了Master2和負載均衡器,可是咱們是從單Master架構擴容的,也就是說目前全部的Node組件鏈接都仍是Master1,若是不改成鏈接VIP走負載均衡器,那麼Master仍是單點故障。
所以接下來就是要改全部Node組件配置文件,由原來192.168.31.71修改成192.168.31.88(VIP):
角色 | IP |
---|---|
k8s-master1 | 192.168.31.71 |
k8s-master2 | 192.168.31.74 |
k8s-node1 | 192.168.31.72 |
k8s-node2 | 192.168.31.73 |
也就是經過kubectl get node命令查看到的節點。
在上述全部Worker Node執行:
sed -i 's#192.168.31.71:6443#192.168.31.88:6443#' /opt/kubernetes/cfg/* systemctl restart kubelet systemctl restart kube-proxy
檢查節點狀態:
kubectl get node NAME STATUS ROLES AGE VERSION k8s-master Ready <none> 34h v1.18.3 k8s-master2 Ready <none> 101m v1.18.3 k8s-node1 Ready <none> 33h v1.18.3 k8s-node2 Ready <none> 33h v1.18.3
至此,一套完整的 Kubernetes 高可用集羣就部署完成了!
PS:若是你是在公有云上,通常都不支持keepalived,那麼你能夠直接用它們的負載均衡器產品(內網就行,還免費~),架構與上面同樣,直接負載均衡多臺Master kube-apiserver便可!