At present, many edge computing container open source projects have a default prerequisite for use: users need to prepare a standard or specific tool to build a Kubernetes cluster in advance, and then use specific tools or other methods to deploy in the cluster deployment corresponding components to experience edge capabilities. This undoubtedly raises the threshold of user experience edge capabilities, and there are many restrictions on use, making it difficult for users to get started. Simply organize, there will probably be the following problems:
The threshold is too high
Too restrictive
Adding edge nodes is more troublesome
Poor automation
In response to the above problems, in order to lower the threshold for users to use the edge Kubernetes cluster and make the edge Kubernetes cluster capable of production, we designed a one-click solution to deploy an edge Kubernetes cluster, completely shielding the installation details, so that users can have a zero-threshold experience Edge capacity.
One-click
Two kinds of installation creation
Support online installation;
Can be used in production
Zero learning cost
We studied the source code of Kubeadm and found that we can borrow Kubeadm to create native Kubernetes clusters, join nodes, and workflow ideas to deploy edge Kubernetes clusters with one click, and perform the installation steps step by step. This is exactly what we want for a simple, flexible, and low learning cost deployment solution. So we stood on the shoulders of giants, used Kubedam’s ideas, reused Kubeadm’s source code, and designed the following solution.
Among them, the part of
Kubeadm init cluster/join node
completely reuses the source code of kubadm, and all the logic is exactly the same as Kubeadm.
This program has the following advantages:
Fully compatible with Kubeadm
We just stand on the shoulders of Kubeadm, set some configuration parameters required by the edge cluster before Kubeadm init/join, initialize the Master or Node nodes automatically, and install the container runtime. After the completion of Kubeadm init/join, the CNI network plug-in was installed and the corresponding edge capability components were deployed.
We quoted the Kubeadm source code in the way of Go Mod. During the whole process, we did not modify the source code of Kubeadm one line. It is completely native and ready to upgrade to a higher version of Kubeadm in the future.
One-click, easy to use, flexible and automated
The edgeadm init cluster and join node completely retain the original parameters and process of Kubeadm init/join, but automatically initialize the node and install the container when running, you can use the edgeadm --enable-edge=fasle
parameter to install the native one-click For Kubernetes clusters, you can also use the edgeadm --enable-edge=true
parameter to install an edge Kubernetes cluster with one click.
You can join any node as long as you can access the node where the Kube-apiserver is located, or you can join the master. Join master also continues the Kubeadm approach. To build highly available nodes, you can directly use join master to expand Master nodes when needed to achieve high availability.
No learning cost, exactly the same as using kubeadm
Because the Kubeadm init cluster/join node
part completely reuses the source code of kubadm, all logic is exactly the same as Kubeadm, completely retaining the usage habits of kubeadm and all flag parameters, and the usage is exactly the same as that of kubeadm, without any new learning cost , The user can customize the edge Kubernetes cluster according to the parameters of Kubeadm or use kubeadm.config.
Edge node security enhancement
With the help of Kubernetes Node Authentication mechanism, we have enabled NodeRestriction access plugin to ensure that each node has a unique identity and only has a minimal set of permissions. Even if an edge node is compromised, other edge nodes cannot be operated.
For Kubelet, we also enable the Kubelet configuration certificate rotation mechanism by default. When the Kubelet certificate is about to expire, a new secret key will be automatically generated , And apply for a new certificate from the Kubernetes API. Once the new certificate is available, it will be used to authenticate the connection with the Kubernetes API.
Follow kubeadm’s minimum requirements, master && node minimum 2C2G, disk space Not less than 1G;
Warning: Provide clean machines as much as possible to avoid installation errors caused by other factors.
If there is a container service on the machine, it may be cleaned up during the installation process, please confirm carefully before executing it
Currently supports amd64 and arm64 two systems;
Other systems can compile edgeadm and make corresponding system installation packages by themselves, please refer to 5. Customize Kubernetes static installation package
Supported Kubernetes version: greater than or equal to v1.18, the provided installation package only provides Kubernetes v1.18.2 version;
For other Kubernetes versions, please refer to 5. Customize the Kubernetes static installation package and make it yourself.
Choose installation package according to your installation node CPU architecture [amd64, arm64]
arch=amd64 version=v0.3.0 && rm -rf edgeadm-linux-* && wget https://superedge-1253687700.cos.ap-guangzhou.myqcloud.com/$version/$arch/edgeadm-linux-$arch-$version.tgz && tar -xzvf edgeadm-linux-* && cd edgeadm-linux-$arch-$version && ./edgeadm
The installation package is about 200M. For detailed information about the installation package, please refer to 5. Custom Kubernetes static installation package.
If downloading the installation package is slow, you can directly check the corresponding SuperEdge version, download
edgeadm-linux-amd64/arm64-*.0.tgz
, and Decompression is the same.One-click installation of the edge independent Kubernetes cluster function is supported starting from SuperEdge-v0.3.0-beta.0, pay attention to
./edgeadm init --kubernetes-version=1.18.2 --image-repository superedge.tencentcloudcr.com/superedge --service-cidr=10.96.0.0/12 --pod-network-cidr=192.168.0.0/16 --install-pkg-path ./kube-linux-*.tar.gz --apiserver-cert-extra-sans=<Master public IP> --apiserver-advertise-address=<master Intranet IP> --enable-edge=true -v=6
On:
–enable-edge=true: Whether to deploy edge capability components, the default is true
–enable-edge=false means to install a native Kubernetes cluster, which is exactly the same as the cluster built by kubeadm;
–install-pkg-path: The address of the Kubernetes static installation package
The value of –install-pkg-path can be the path on the machine or the network address (for example: http://xxx/xxx/kube-linux-arm64/amd64-*.tar.gz, which can be encrypted without wget You can), pay attention to use the Kubernetes static installation package that matches the machine system;
–apiserver-cert-extra-sans: kube-apiserver certificate extension address
–image-repository: image repository address
If superedge.tencentcloudcr.com/superedge is slower, you can switch to other accelerated mirror warehouses, as long as you can pull down kube-apiserver, kube-controller-manager, kube-scheduler, kube-proxy, etcd, pause, etc. mirrors.
Other parameters have the same meaning as Kubeadm and can be configured according to kubeadm’s requirements.
You can also use kubeadm.config to configure the original parameters of kubeadm, and create an edge Kubernetes cluster through
edgeadm init --config kubeadm.config --install-pkg-path ./kube-linux-*.tar.gz
.
If there is no problem during execution and the cluster is successfully initialized, the following content will be output:
Your Kubernetes control-plane has initialized successfully!
To start using your cluster, you need to run the following as a regular user:
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
sudo chown $(id -u):$(id -g) $HOME/.kube/config
You should now deploy a pod network to the cluster.
Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
https://kubernetes.io/docs/concepts/cluster-administration/addons/
Then you can join any number of worker nodes by running the following on each as root:
edgeadm join xxx.xxx.xxx.xxx:xxx --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx
--install-pkg-path <Path of edgeadm kube-* install package>
If there is a problem during the execution, the corresponding error message will be returned directly and the initialization of the cluster will be interrupted. You can use the ./edgeadm reset
command to roll back the initialization operation of the cluster.
To enable non-root users to run kubectl, run the following commands, which are also part of the edgeadm init output:
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
sudo chown $(id -u):$(id -g) $HOME/.kube/config
If you are the root user, you can run:
export KUBECONFIG=/etc/kubernetes/admin.conf
Note that the ./edgeadm join
command that saves the output of ./edgeadm init
will be used when adding node nodes later.
The validity period of the token is the same as kubeadm 24h
, after expiration, you can use ./edgeadm token create
to create a new token.
The value generation of –discovery-token-ca-cert-hash is also the same as kubeadm, which can be generated by executing the following command on the master node.
openssl x509 -pubkey -in /etc/kubernetes/pki/ca.crt | openssl rsa -pubin -outform der 2>/dev/null | openssl dgst -sha256 -hex | sed 's/^.* //'
Execute <2>. Download the edgeadm static installation package
on the edge node, or upload the edgeadm static installation package to the edge node by other means, and then execute the following command:
./edgeadm join <Master public/Intranet IP or domain>:Port --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx
--install-pkg-path <edgeadm Kube-*Static installation package address/FTP path>
--enable-edge=true
On:
<Master public/Intranet IP or domain>: the address where the node accesses the Kube-apiserver service.
You can change the address of the Kube-apiserver service prompted by the
edgeadm init
to the node to be replaced byMaster node public network IP/Master node internal network IP/domain name
depending on the situation, depending on whether you want the node to access Kube through the external network or the internal network -apiserver service.
–enable-edge=true: Whether the added node is used as an edge node (whether to deploy edge capability components), the default is true
–enable-edge=false means join the native Kubernetes cluster node, which is exactly the same as the node joined by kubeadm;
If there are no exceptions in the execution process, the new node successfully joins the cluster, and the following will be output:
This node has joined the cluster:
* Certificate signing request was sent to apiserver and a response was received.
* The Kubelet was informed of the new secure connection details.
Run 'kubectl get nodes' on the control-plane to see this node join the cluster.
If there is a problem during the execution, the corresponding error message will be returned directly, and the addition of the node will be interrupted. You can use the ./edgeadm reset
command to roll back the operation of joining the node and rejoin.
Tip: If the edge node is joined, after the edge node joins successfully, the edge node will be labeled with a label:
superedge.io/edge-node=enable
, which is convenient for subsequent applications to use nodeSelector to select the application and schedule to the edge node;Native Kubernetes nodes, like kubeadm’s join, do not do anything.
Install Haproxy on the load balancing machine as the main entrance of the cluster:
Note: Replace
in the configuration file
# yum install -y haproxy
# cat << EOF >/etc/haproxy/haproxy.cfg
global
log 127.0.0.1 local2
chroot /var/lib/haproxy
pidfile /var/run/haproxy.pid
maxconn 4000
user haproxy
group haproxy
daemon
stats socket /var/lib/haproxy/stats
defaults
mode http
log global
option httplog
option dontlognull
option http-server-close
option forwardfor except 127.0.0.0/8
option redispatch
retries 3
timeout http-request 10s
timeout queue 1m
timeout connect 10s
timeout client 1m
timeout server 1m
timeout http-keep-alive 10s
timeout check 10s
maxconn 3000
frontend main *:5000
acl url_static path_beg -i /static /images /javascript /stylesheets
acl url_static path_end -i .jpg .gif .png .css .js
use_backend static if url_static
default_backend app
frontend kubernetes-apiserver
mode tcp
bind *:16443
option tcplog
default_backend kubernetes-apiserver
backend kubernetes-apiserver
mode tcp
balance roundrobin
server master-0 <master VIP>:6443 check # Here replace the master VIP with the user's own VIP
backend static
balance roundrobin
server static 127.0.0.1:4331 check
backend app
balance roundrobin
server app1 127.0.0.1:5001 check
server app2 127.0.0.1:5002 check
server app3 127.0.0.1:5003 check
server app4 127.0.0.1:5004 check
EOF
If the cluster has two masters, install Keepalived on both masters and perform the same operation:
Note:
Replace
in the configuration file In the keepalived.conf configuration file below, <master’s local public network IP> and <another master’s public network IP> are opposite in the configuration of the two masters. Don’t fill in the error.
# yum install -y keepalived
# cat << EOF >/etc/keepalived/keepalived.conf
! Configuration File for keepalived
global_defs {
smtp_connect_timeout 30
router_id LVS_DEVEL_EDGE_1
}
vrrp_script checkhaproxy{
script "/etc/keepalived/do_sth.sh"
interval 5
}
vrrp_instance VI_1 {
state BACKUP
interface eth0
nopreempt
virtual_router_id 51
priority 100
advert_int 1
authentication {
auth_type PASS
auth_pass aaa
}
virtual_ipaddress {
<master VIP> # Here replace the master VIP with the user's own VIP
}
unicast_src_ip <master Public IP>
unicast_peer {
<Public IP of other master nodes>
}
notify_master "/etc/keepalived/notify_action.sh MASTER"
notify_backup "/etc/keepalived/notify_action.sh BACKUP"
notify_fault "/etc/keepalived/notify_action.sh FAULT"
notify_stop "/etc/keepalived/notify_action.sh STOP"
garp_master_delay 1
garp_master_refresh 5
track_interface {
eth0
}
track_script {
checkhaproxy
}
}
EOF
Perform cluster initialization operations in one of the masters
./edgeadm init --control-plane-endpoint <Master VIP> --upload-certs --kubernetes-version=1.18.2 --image-repository superedge.tencentcloudcr.com/superedge --service-cidr=10.96.0.0/12 --pod-network-cidr=192.168.0.0/16 --apiserver-cert-extra-sans=<Domain or Public/Intranet IP of Master node> --install-pkg-path <edgeadm Kube-*Static installation package address/FTP path> -v=6
The meaning of the parameters is the same as
3. Use edgeadm to install edge Kubernetes cluster
, and others are the same as kubeadm, so I won’t explain it here;
If there are no exceptions during execution and the cluster is successfully initialized, the following content will be output:
Your Kubernetes control-plane has initialized successfully!
To start using your cluster, you need to run the following as a regular user:
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
sudo chown $(id -u):$(id -g) $HOME/.kube/config
You should now deploy a pod network to the cluster.
Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
https://kubernetes.io/docs/concepts/cluster-administration/addons/
You can now join any number of the control-plane node running the following command on each as root:
edgeadm join xxx.xxx.xxx.xxx:xxx --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx \
--control-plane --certificate-key xxxxxxxxxx
--install-pkg-path <Path of edgeadm kube-* install package>
Please note that the certificate-key gives access to cluster sensitive data, keep it secret!
As a safeguard, uploaded-certs will be deleted in two hours; If necessary, you can use
"edgeadm init phase upload-certs --upload-certs" to reload certs afterward.
Then you can join any number of worker nodes by running the following on each as root:
edgeadm join xxx.xxx.xxx.xxx:xxxx --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx
--install-pkg-path <Path of edgeadm kube-* install package>
If there is a problem during the execution, the corresponding error message will be directly returned, and the initialization of the cluster will be interrupted. Use the ./edgeadm reset
command to roll back the initialization operation of the cluster.
To enable non-root users to run kubectl, run the following commands, which are also part of the edgeadm init output:
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
sudo chown $(id -u):$(id -g) $HOME/.kube/config
If you are the root user, you can run:
export KUBECONFIG=/etc/kubernetes/admin.conf
Pay attention to the ./edgeadm join
command that saves the output of ./edgeadm init
, which is needed to add Master node and edge node later.
Record the ./edgeadm join
command output by ./edgeadm init
. You need this command to add the Master node and the edge node.
Execute the ./edgeadm join
command on another master
./edgeadm join xxx.xxx.xxx.xxx:xxx --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx \
--control-plane --certificate-key xxxxxxxxxx \
--install-pkg-path <Path of edgeadm kube-* install package>
If there are no exceptions in the execution process, the new master successfully joins the cluster, and the following content will be output:
This node has joined the cluster and a new control plane instance was created:
* Certificate signing request was sent to apiserver and approval was received.
* The Kubelet was informed of the new secure connection details.
* Control plane (master) label and taint were applied to the new node.
* The Kubernetes control plane instances scaled up.
* A new etcd member was added to the local/stacked etcd cluster.
To start administering your cluster from this node, you need to run the following as a regular user:
mkdir -p $HOME/.kube
sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
sudo chown $(id -u):$(id -g) $HOME/.kube/config
Run 'kubectl get nodes' to see this node join the cluster.
If there is a problem during the execution, the corresponding error message will be directly returned, and the addition of the node will be interrupted. Use the ./edgeadm reset
command to roll back the initialization of the cluster.
./edgeadm join xxx.xxx.xxx.xxx:xxxx --token xxxx \
--discovery-token-ca-cert-hash sha256:xxxxxxxxxx
--install-pkg-path <Path of edgeadm kube-* install package>
If there are no exceptions in the execution process, the new master successfully joins the cluster, and the following content will be output:
This node has joined the cluster:
* Certificate signing request was sent to apiserver and a response was received.
* The Kubelet was informed of the new secure connection details.
Run 'kubectl get nodes' on the control-plane to see this node join the cluster.
If there are exceptions during execution, the corresponding error message will be directly returned, and the initialization of the cluster will be interrupted. Use the ./edgeadm reset
command to roll back the initialization operation of the cluster.
kube-linux-arm64-v1.18.2.tar.gz ## Kubernetes static installation package for kube-v1.18.2
├── bin ## Binary directory
│ ├── conntrack ## Binary file for connection tracking
│ ├── kubectl ## kubectl for kube-v1.18.2
│ ├── kubelet ## kubelet for kube-v1.18.2
│ └── lite-apiserver ## The corresponding version of lite-apiserver
├── cni ## cin configuration
│ └── cni-plugins-linux-v0.8.3.tar.gz ## CNI plug-in binary compression package of v0.8.3
└── container ## Container runtime directory
└── docker-19.03-linux-arm64.tar.gz ## Docker 19.03 arm64 system installation script and installation package
There are two things you need to do to customize other Kubernetes versions:
binary directory
, the version needs to be greater than or equal to Kubernetes v1.18.0;To customize the Kubernetes static installation package and other systems, three things need to be done:
Was this page helpful?
Glad to hear from you! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.