e5d353d0a7
* Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> |
||
---|---|---|
.github | ||
contrib | ||
docs | ||
extra_playbooks | ||
inventory | ||
library | ||
roles | ||
scripts | ||
tests | ||
.gitignore | ||
.gitlab-ci.yml | ||
.gitmodules | ||
.yamllint | ||
ansible.cfg | ||
cluster.yml | ||
code-of-conduct.md | ||
CONTRIBUTING.md | ||
LICENSE | ||
OWNERS | ||
README.md | ||
RELEASE.md | ||
requirements.txt | ||
reset.yml | ||
scale.yml | ||
setup.cfg | ||
setup.py | ||
upgrade-cluster.yml | ||
Vagrantfile |
Deploy a production ready kubernetes cluster
If you have questions, join us on the kubernetes slack, channel #kubespray.
- Can be deployed on AWS, GCE, Azure, OpenStack or Baremetal
- High available cluster
- Composable (Choice of the network plugin for instance)
- Support most popular Linux distributions
- Continuous integration tests
To deploy the cluster you can use :
kubespray-cli
Ansible usual commands and inventory builder
vagrant by simply running vagrant up
(for tests purposes)
- Requirements
- Kubespray vs ...
- Getting started
- Ansible inventory and tags
- Integration with existing ansible repo
- Deployment data variables
- DNS stack
- HA mode
- Network plugins
- Vagrant install
- CoreOS bootstrap
- Debian Jessie setup
- Downloaded artifacts
- Cloud providers
- OpenStack
- AWS
- Azure
- vSphere
- Large deployments
- Upgrades basics
- Roadmap
Supported Linux distributions
- Container Linux by CoreOS
- Debian Jessie
- Ubuntu 16.04
- CentOS/RHEL 7
Note: Upstart/SysV init based OS types are not supported.
Versions of supported components
kubernetes v1.8.3
etcd v3.2.4
flanneld v0.8.0
calico v2.5.0
canal (given calico/flannel versions)
contiv v1.0.3
weave v2.0.1
docker v1.13 (see note)
rkt v1.21.0 (see Note 2)
Note: kubernetes doesn't support newer docker versions. Among other things kubelet currently breaks on docker's non-standard version numbering (it no longer uses semantic versioning). To ensure auto-updates don't break your cluster look into e.g. yum versionlock plugin or apt pin).
Note 2: rkt support as docker alternative is limited to control plane (etcd and kubelet). Docker is still used for Kubernetes cluster workloads and network plugins' related OS services. Also note, only one of the supported network plugins can be deployed for a given single cluster.
Requirements
- Ansible v2.4 (or newer) and python-netaddr is installed on the machine that will run Ansible commands
- Jinja 2.9 (or newer) is required to run the Ansible Playbooks
- The target servers must have access to the Internet in order to pull docker images.
- The target servers are configured to allow IPv4 forwarding.
- Your ssh key must be copied to all the servers part of your inventory.
- The firewalls are not managed, you'll need to implement your own rules the way you used to. in order to avoid any issue during deployment you should disable your firewall.
Network plugins
You can choose between 4 network plugins. (default: calico
, except Vagrant uses flannel
)
-
flannel: gre/vxlan (layer 2) networking.
-
calico: bgp (layer 3) networking.
-
canal: a composition of calico and flannel plugins.
-
contiv: supports vlan, vxlan, bgp and Cisco SDN networking. This plugin is able to apply firewall policies, segregate containers in multiple network and bridging pods onto physical networks.
-
weave: Weave is a lightweight container overlay network that doesn't require an external K/V database cluster.
(Please refer toweave
troubleshooting documentation).
The choice is defined with the variable kube_network_plugin
. There is also an
option to leverage built-in cloud provider networking instead.
See also Network checker.
Community docs and resources
- kubernetes.io/docs/getting-started-guides/kubespray/
- kubespray, monitoring and logging by @gregbkr
- Deploy Kubernetes w/ Ansible & Terraform by @rsmitty
- Deploy a Kubernetes Cluster with Kubespray (video)
Tools and projects on top of Kubespray
CI Tests
CI/end-to-end tests sponsored by Google (GCE), DigitalOcean, teuto.net (openstack). See the test matrix for details.