6f97687d19
* robust handling of API server SANs for 2.8 branch * use apiserver_loadbalancer_domain_name if it is defined, according to PR 3977 |
||
---|---|---|
.github | ||
contrib | ||
docs | ||
extra_playbooks | ||
inventory | ||
library | ||
roles | ||
scripts | ||
tests | ||
.gitignore | ||
.gitlab-ci.yml | ||
.gitmodules | ||
.yamllint | ||
ansible.cfg | ||
cluster.yml | ||
code-of-conduct.md | ||
CONTRIBUTING.md | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
mitogen.yaml | ||
OWNERS | ||
OWNERS_ALIASES | ||
README.md | ||
RELEASE.md | ||
remove-node.yml | ||
requirements.txt | ||
reset.yml | ||
scale.yml | ||
SECURITY_CONTACTS | ||
setup.cfg | ||
setup.py | ||
upgrade-cluster.yml | ||
Vagrantfile |
Deploy a Production Ready Kubernetes Cluster
If you have questions, join us on the kubernetes slack, channel #kubespray. You can get your invite here
- Can be deployed on AWS, GCE, Azure, OpenStack, vSphere, Oracle Cloud Infrastructure (Experimental), or Baremetal
- Highly available cluster
- Composable (Choice of the network plugin for instance)
- Supports most popular Linux distributions
- Continuous integration tests
Quick Start
To deploy the cluster you can use :
Current release
2.8.2
Ansible
Ansible version
Ansible v2.7.0 is failing and/or produce unexpected results due to ansible/ansible/issues/46600
Usage
# Install dependencies from ``requirements.txt``
sudo pip install -r requirements.txt
# Copy ``inventory/sample`` as ``inventory/mycluster``
cp -rfp inventory/sample inventory/mycluster
# Update Ansible inventory file with inventory builder
declare -a IPS=(10.10.1.3 10.10.1.4 10.10.1.5)
CONFIG_FILE=inventory/mycluster/hosts.ini python3 contrib/inventory_builder/inventory.py ${IPS[@]}
# Review and change parameters under ``inventory/mycluster/group_vars``
cat inventory/mycluster/group_vars/all/all.yml
cat inventory/mycluster/group_vars/k8s-cluster/k8s-cluster.yml
# Deploy Kubespray with Ansible Playbook - run the playbook as root
# The option `-b` is required, as for example writing SSL keys in /etc/,
# installing packages and interacting with various systemd daemons.
# Without -b the playbook will fail to run!
ansible-playbook -i inventory/mycluster/hosts.ini --become --become-user=root cluster.yml
Note: When Ansible is already installed via system packages on the control machine, other python packages installed via sudo pip install -r requirements.txt
will go to a different directory tree (e.g. /usr/local/lib/python2.7/dist-packages
on Ubuntu) from Ansible's (e.g. /usr/lib/python2.7/dist-packages/ansible
still on Ubuntu).
As a consequence, ansible-playbook
command will fail with:
ERROR! no action detected in task. This often indicates a misspelled module name, or incorrect module path.
probably pointing on a task depending on a module present in requirements.txt (i.e. "unseal vault").
One way of solving this would be to uninstall the Ansible package and then, to install it via pip but it is not always possible.
A workaround consists of setting ANSIBLE_LIBRARY
and ANSIBLE_MODULE_UTILS
environment variables respectively to the ansible/modules
and ansible/module_utils
subdirectories of pip packages installation location, which can be found in the Location field of the output of pip show [package]
before executing ansible-playbook
.
Vagrant
For Vagrant we need to install python dependencies for provisioning tasks. Check if Python and pip are installed:
python -V && pip -V
If this returns the version of the software, you're good to go. If not, download and install Python from here https://www.python.org/downloads/source/ Install the necessary requirements
sudo pip install -r requirements.txt
vagrant up
Documents
- Requirements
- Kubespray vs ...
- Getting started
- Ansible inventory and tags
- Integration with existing ansible repo
- Deployment data variables
- DNS stack
- HA mode
- Network plugins
- Vagrant install
- CoreOS bootstrap
- Debian Jessie setup
- openSUSE setup
- Downloaded artifacts
- Cloud providers
- OpenStack
- AWS
- Azure
- vSphere
- Large deployments
- Upgrades basics
- Roadmap
Supported Linux Distributions
- Container Linux by CoreOS
- Debian Buster, Jessie, Stretch, Wheezy
- Ubuntu 16.04, 18.04
- CentOS/RHEL 7
- Fedora 28
- Fedora/CentOS Atomic
- openSUSE Leap 42.3/Tumbleweed
Note: Upstart/SysV init based OS types are not supported.
Supported Components
- Core
- kubernetes v1.12.7
- etcd v3.2.24
- docker v18.06 (see note)
- rkt v1.21.0 (see Note 2)
- cri-o v1.11.5 (experimental: see CRI-O Note. Only on centos based OS)
- Network Plugin
- Application
- cephfs-provisioner v2.1.0-k8s1.11
- cert-manager v0.5.2
- coredns v1.2.6
- ingress-nginx v0.21.0
Note: The list of validated docker versions was updated to 1.11.1, 1.12.1, 1.13.1, 17.03, 17.06, 17.09, 18.06. The kubelet might break on docker's non-standard version numbering (it no longer uses semantic versioning). To ensure auto-updates don't break your cluster look into e.g. yum versionlock plugin or apt pin).
Note 2: rkt support as docker alternative is limited to control plane (etcd and kubelet). Docker is still used for Kubernetes cluster workloads and network plugins' related OS services. Also note, only one of the supported network plugins can be deployed for a given single cluster.
Requirements
- Ansible v2.5 (or newer) and python-netaddr is installed on the machine that will run Ansible commands
- Jinja 2.9 (or newer) is required to run the Ansible Playbooks
- The target servers must have access to the Internet in order to pull docker images. Otherwise, additional configuration is required (See Offline Environment)
- The target servers are configured to allow IPv4 forwarding.
- Your ssh key must be copied to all the servers part of your inventory.
- The firewalls are not managed, you'll need to implement your own rules the way you used to. in order to avoid any issue during deployment you should disable your firewall.
- If kubespray is ran from non-root user account, correct privilege escalation method
should be configured in the target servers. Then the
ansible_become
flag or command parameters--become or -b
should be specified.
Network Plugins
You can choose between 6 network plugins. (default: calico
, except Vagrant uses flannel
)
-
flannel: gre/vxlan (layer 2) networking.
-
calico: bgp (layer 3) networking.
-
canal: a composition of calico and flannel plugins.
-
cilium: layer 3/4 networking (as well as layer 7 to protect and secure application protocols), supports dynamic insertion of BPF bytecode into the Linux kernel to implement security services, networking and visibility logic.
-
contiv: supports vlan, vxlan, bgp and Cisco SDN networking. This plugin is able to apply firewall policies, segregate containers in multiple network and bridging pods onto physical networks.
-
weave: Weave is a lightweight container overlay network that doesn't require an external K/V database cluster. (Please refer to
weave
troubleshooting documentation). -
kube-router: Kube-router is a L3 CNI for Kubernetes networking aiming to provide operational simplicity and high performance: it uses IPVS to provide Kube Services Proxy (if setup to replace kube-proxy), iptables for network policies, and BGP for ods L3 networking (with optionally BGP peering with out-of-cluster BGP peers). It can also optionally advertise routes to Kubernetes cluster Pods CIDRs, ClusterIPs, ExternalIPs and LoadBalancerIPs.
-
multus: Multus is a meta CNI plugin that provides multiple network interface support to pods. For each interface Multus delegates CNI calls to secondary CNI plugins such as Calico, macvlan, etc.
The choice is defined with the variable kube_network_plugin
. There is also an
option to leverage built-in cloud provider networking instead.
See also Network checker.
Community docs and resources
- kubernetes.io/docs/getting-started-guides/kubespray/
- kubespray, monitoring and logging by @gregbkr
- Deploy Kubernetes w/ Ansible & Terraform by @rsmitty
- Deploy a Kubernetes Cluster with Kubespray (video)
Tools and projects on top of Kubespray
CI Tests
CI/end-to-end tests sponsored by Google (GCE) See the test matrix for details.