Rancher高可用部署


機器准備

        30.128  四層代理服務器   節點上需要安裝rke kubectl helm nginx

                     128節點需要和其它三個節點建立ssh互信實現免密登錄 rke是通過ssh登錄來遠程操作其它節點的

                     128主機名設置為cf.rancher.com

        30.110  k8s-node1

        30.112  k8s-node2

        30.113  k8s-node3

                  110,112,113三個節點通過rke部署一個k8s集群 這個集群只用來運行Rancher Server實現Rancher Server的高可用

rke安裝k8s

           安裝     rke up --config=./rancher-cluster.yml

           卸載    rke remove --config=./rancher-cluster.yml

nodes:
  - address: 192.168.30.110
    user: admin
    role: [controlplane,worker,etcd]
  - address: 192.168.30.129
    user: admin
    role: [controlplane,worker,etcd]
  - address: 192.168.30.133
    user: admin
    role: [controlplane,worker,etcd]

services:
  etcd:
    snapshot: true
    creation: 6h
    retention: 24h

ingress:
  provider: nginx
  options:
    use-forwarded-headers: "true"
rancher-cluster.yml

    

    mkdir ~/.kube
    cp kube_config_rancher-cluster.yml ~/.kube/config

   

    表示k8s集群安裝成功

Helm安裝rancher

       helm repo add rancher-stable http://rancher-mirror.oss-cn-beijing.aliyuncs.com/server-charts/stable

       kubectl create namespace cattle-system

       kubectl apply --validate=false -f https://github.com/jetstack/cert-manager/releases/download/v0.15.0/cert-manager.crds.yaml

       kubectl create namespace cert-manager

       helm repo add jetstack https://charts.jetstack.io

       helm repo update

       helm install  cert-manager jetstack/cert-manager  --namespace cert-manager  --version v0.15.0

       

       helm install rancher rancher-stable/rancher  --namespace cattle-system  --set hostname=cf.rancher.com

       nginx中證書對應的域名需要與hostname選項匹配,否則ingress將無法代理訪問Rancher

      

      

 Nginx配置反向代理訪問RancherUI

     在128節點上配置

      [admin conf.d]$ nginx -v
              nginx version: nginx/1.18.0

      1.配置主機名

      

      2.生成自簽名證書

#!/bin/bash -e

help ()
{
    echo  ' ================================================================ '
    echo  ' --ssl-domain: 生成ssl證書需要的主域名,如不指定則默認為www.rancher.local,如果是ip訪問服務,則可忽略;'
    echo  ' --ssl-trusted-domain: 如果想多個域名訪問,則添加擴展域名(SSL_TRUSTED_DOMAIN),多個擴展域名用逗號隔開;'
    echo  ' --ssl-size: ssl加密位數,默認2048;'
    echo  ' --ssl-cn: 國家代碼(2個字母的代號),默認CN;'
    echo  ' 使用示例:'
    echo  ' ./create_self-signed-cert.sh --ssl-domain=www.test.com --ssl-trusted-domain=www.test2.com \ '
    echo  ' --ssl-trusted-ip=1.1.1.1,2.2.2.2,3.3.3.3 --ssl-size=2048 --ssl-date=3650'
    echo  ' ================================================================'
}

case "$1" in
    -h|--help) help; exit;;
esac

if [[ $1 == '' ]];then
    help;
    exit;
fi

CMDOPTS="$*"
for OPTS in $CMDOPTS;
do
    key=$(echo ${OPTS} | awk -F"=" '{print $1}' )
    value=$(echo ${OPTS} | awk -F"=" '{print $2}' )
    case "$key" in
        --ssl-domain) SSL_DOMAIN=$value ;;
        --ssl-trusted-ip) SSL_TRUSTED_IP=$value ;;
        --ssl-trusted-domain) SSL_TRUSTED_DOMAIN=$value ;;
        --ssl-size) SSL_SIZE=$value ;;
        --ssl-date) SSL_DATE=$value ;;
        --ca-date) CA_DATE=$value ;;
        --ssl-cn) CN=$value ;;
    esac
done

# CA相關配置
CA_DATE=${CA_DATE:-3650}
CA_KEY=${CA_KEY:-cakey.pem}
CA_CERT=${CA_CERT:-cacerts.pem}
CA_DOMAIN=cattle-ca

# ssl相關配置
SSL_CONFIG=${SSL_CONFIG:-$PWD/openssl.cnf}
SSL_DOMAIN=${SSL_DOMAIN:-'www.rancher.local'}
SSL_DATE=${SSL_DATE:-3650}
SSL_SIZE=${SSL_SIZE:-2048}

## 國家代碼(2個字母的代號),默認CN;
CN=${CN:-CN}

SSL_KEY=$SSL_DOMAIN.key
SSL_CSR=$SSL_DOMAIN.csr
SSL_CERT=$SSL_DOMAIN.crt

echo -e "\033[32m ---------------------------- \033[0m"
echo -e "\033[32m       | 生成 SSL Cert |       \033[0m"
echo -e "\033[32m ---------------------------- \033[0m"

if [[ -e ./${CA_KEY} ]]; then
    echo -e "\033[32m ====> 1. 發現已存在CA私鑰,備份"${CA_KEY}""${CA_KEY}"-bak,然后重新創建 \033[0m"
    mv ${CA_KEY} "${CA_KEY}"-bak
    openssl genrsa -out ${CA_KEY} ${SSL_SIZE}
else
    echo -e "\033[32m ====> 1. 生成新的CA私鑰 ${CA_KEY} \033[0m"
    openssl genrsa -out ${CA_KEY} ${SSL_SIZE}
fi

if [[ -e ./${CA_CERT} ]]; then
    echo -e "\033[32m ====> 2. 發現已存在CA證書,先備份"${CA_CERT}""${CA_CERT}"-bak,然后重新創建 \033[0m"
    mv ${CA_CERT} "${CA_CERT}"-bak
    openssl req -x509 -sha256 -new -nodes -key ${CA_KEY} -days ${CA_DATE} -out ${CA_CERT} -subj "/C=${CN}/CN=${CA_DOMAIN}"
else
    echo -e "\033[32m ====> 2. 生成新的CA證書 ${CA_CERT} \033[0m"
    openssl req -x509 -sha256 -new -nodes -key ${CA_KEY} -days ${CA_DATE} -out ${CA_CERT} -subj "/C=${CN}/CN=${CA_DOMAIN}"
fi

echo -e "\033[32m ====> 3. 生成Openssl配置文件 ${SSL_CONFIG} \033[0m"
cat > ${SSL_CONFIG} <<EOM
[req]
req_extensions = v3_req
distinguished_name = req_distinguished_name
[req_distinguished_name]
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
extendedKeyUsage = clientAuth, serverAuth
EOM

if [[ -n ${SSL_TRUSTED_IP} || -n ${SSL_TRUSTED_DOMAIN} ]]; then
    cat >> ${SSL_CONFIG} <<EOM
subjectAltName = @alt_names
[alt_names]
EOM
    IFS=","
    dns=(${SSL_TRUSTED_DOMAIN})
    dns+=(${SSL_DOMAIN})
    for i in "${!dns[@]}"; do
      echo DNS.$((i+1)) = ${dns[$i]} >> ${SSL_CONFIG}
    done

    if [[ -n ${SSL_TRUSTED_IP} ]]; then
        ip=(${SSL_TRUSTED_IP})
        for i in "${!ip[@]}"; do
          echo IP.$((i+1)) = ${ip[$i]} >> ${SSL_CONFIG}
        done
    fi
fi

echo -e "\033[32m ====> 4. 生成服務SSL KEY ${SSL_KEY} \033[0m"
openssl genrsa -out ${SSL_KEY} ${SSL_SIZE}

echo -e "\033[32m ====> 5. 生成服務SSL CSR ${SSL_CSR} \033[0m"
openssl req -sha256 -new -key ${SSL_KEY} -out ${SSL_CSR} -subj "/C=${CN}/CN=${SSL_DOMAIN}" -config ${SSL_CONFIG}

echo -e "\033[32m ====> 6. 生成服務SSL CERT ${SSL_CERT} \033[0m"
openssl x509 -sha256 -req -in ${SSL_CSR} -CA ${CA_CERT} \
    -CAkey ${CA_KEY} -CAcreateserial -out ${SSL_CERT} \
    -days ${SSL_DATE} -extensions v3_req \
    -extfile ${SSL_CONFIG}

echo -e "\033[32m ====> 7. 證書制作完成 \033[0m"
echo
echo -e "\033[32m ====> 8. 以YAML格式輸出結果 \033[0m"
echo "----------------------------------------------------------"
echo "ca_key: |"
cat $CA_KEY | sed 's/^/  /'
echo
echo "ca_cert: |"
cat $CA_CERT | sed 's/^/  /'
echo
echo "ssl_key: |"
cat $SSL_KEY | sed 's/^/  /'
echo
echo "ssl_csr: |"
cat $SSL_CSR | sed 's/^/  /'
echo
echo "ssl_cert: |"
cat $SSL_CERT | sed 's/^/  /'
echo

echo -e "\033[32m ====> 9. 附加CA證書到Cert文件 \033[0m"
cat ${CA_CERT} >> ${SSL_CERT}
echo "ssl_cert: |"
cat $SSL_CERT | sed 's/^/  /'
echo

echo -e "\033[32m ====> 10. 重命名服務證書 \033[0m"
echo "cp ${SSL_DOMAIN}.key tls.key"
cp ${SSL_DOMAIN}.key tls.key
echo "cp ${SSL_DOMAIN}.crt tls.crt"
cp ${SSL_DOMAIN}.crt tls.crt
create_self_signed_cert.sh

    ./create_self-signed-cert.sh --ssl-domain=cf.rancher.com --ssl-trusted-ip=192.168.30.128 --ssl-size=2048 --ssl-date=3650

     3. 配置nginx文件/etc/nginx/conf.d

    upstream rancher {
        server 192.168.30.110:80;
        server 192.168.30.129:80;
        server 192.168.30.133:80;
    }

    map $http_upgrade $connection_upgrade {
        default Upgrade;
        ''      close;
    }

    server {
        listen 443 ssl http2;
        server_name cf.rancher.com;
        ssl_certificate /home/admin/certs/tls.crt;
        ssl_certificate_key /home/admin/certs/tls.key;

        location / {
            proxy_set_header Host $host;
            proxy_set_header X-Forwarded-Proto $scheme;
            proxy_set_header X-Forwarded-Port $server_port;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass http://rancher;
            proxy_http_version 1.1;
            proxy_set_header Upgrade $http_upgrade;
            proxy_set_header Connection $connection_upgrade;
            # 這里將允許您在 Rancher UI 中打開命令行窗口時,窗口可以保留最多15分鍾。沒有這個參數時,默認值為1分鍾,一分鍾后在Rancher>中的shell會自動關閉。
            proxy_read_timeout 900s;
            proxy_buffering off;
        }
    }

    server {
        listen 80;
        server_name cf.rancher.com;
        return 301 https://$server_name$request_uri;
    }
nginx.conf

     4.重新啟動nginx

windows客戶端配置

      修改 c:\windows\system32\drivers\etc\hosts文件

      

     打開瀏覽器訪問(只能用域名訪問,不能用nginx服務器的IP訪問)

      

      

為Agent Pod添加主機別名(/etc/hosts)

        如果沒有內部DNS服務器而是通過添加/etc/hosts主機別名的方式指定的Rancher Server域名,那么不管通過哪種方式(自定義、導入、Host驅動等)創建K8S集群,K8S集群運行起來之后,因為cattle-cluster-agent Pod和cattle-node-agent pod無法通過DNS記錄找到Rancher Server URL,最終導致無法通信

  

      1.在local集群中執行以下命令為Rancher Server容器配置hosts

kubectl --kubeconfig=$kubeconfig -n cattle-system \
    patch deployments rancher --patch '{
        "spec": {
            "template": {
                "spec": {
                    "hostAliases": [
                        {
                            "hostnames":
                            [
                                "xxx.cnrancher.com"
                            ],
                                "ip": "192.168.1.100"
                        }
                    ]
                }
            }
        }
    }'
View Code

      2.cattle-cluster-agent Pod和cattle-node-agent pod需要在LOCAL集群初始化之后才會部署,所以先通過Rancher Server URL訪問Rancher Web UI進行初始化

      3.cattle-cluster-agent pod(local集群和業務集群均執行)

kubectl --kubeconfig=$kubeconfig -n cattle-system \
patch deployments cattle-cluster-agent --patch '{
    "spec": {
        "template": {
            "spec": {
                "hostAliases": [
                    {
                        "hostnames":
                        [
                            "demo.cnrancher.com"
                        ],
                            "ip": "192.168.1.100"
                    }
                ]
            }
        }
    }
}'
View Code

      4.cattle-node-agent pod(local集群和業務集群均執行)

kubectl --kubeconfig=$kubeconfig -n cattle-system \
patch  daemonsets cattle-node-agent --patch '{
    "spec": {
        "template": {
            "spec": {
                "hostAliases": [
                    {
                        "hostnames":
                        [
                            "xxx.rancher.com"
                        ],
                            "ip": "192.168.1.100"
                    }
                ]
            }
        }
    }
}'
View Code

自簽名證書

   

  1.將CA證書以pem格式復制到名為ca-additional.pem的文件中,並用kubectl在命名空間cattle-system中創建tls-ca-additional密文

      kubectl  -n cattle-system create secret generic tls-ca-additional --from-file=ca-additional.pem

  2.在Helm部署Rancher Server時,添加以下參數

      helm install rancher rancher-stable/rancher  --namespace cattle-system  --set hostname=cf.rancher.com  --set additionalTrustedCAs=true

使用自定義證書的完整部署步驟

        1.在負載均衡器上執行一鍵生成ssl自簽名證書腳本將自動生成tls.crt、tls.key、cacerts.pem三個文件。文件名稱不能修改。ca文件名稱必須是cacerts.pem

        

       2.使用kubectl在命名空間cattle-system中創建tls-ca secret 

          kubectl create namespace cattle-system

          kubectl -n cattle-system create secret generic tls-ca  --from-file=/home/admin/certs/cacerts.pem

      3.安裝Rancher server

         helm install rancher rancher-stable/rancher \
         --namespace cattle-system \
         --set hostname=cf.rancher.com \
        --set ingress.tls.source=secret \
        --set privateCA=true

       4.修改pod中的hosts解析

      

kubectl  -n cattle-system \
patch deployments rancher --patch '{
    "spec": {
        "template": {
            "spec": {
                "hostAliases": [
                    {
                        "hostnames":
                        [
                            "cf.rancher.com"
                        ],
                            "ip": "192.168.30.128"
                    }
                ]
            }
        }
    }
}'
View Code

       5.最終部署結果

    

     所有的pod都能正常運行起來


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM