You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

454 lines
17 KiB

  1. # Kubernetes on Openstack with Terraform
  2. Provision a Kubernetes cluster with [Terraform](https://www.terraform.io) on
  3. Openstack.
  4. ## Status
  5. This will install a Kubernetes cluster on an Openstack Cloud. It should work on
  6. most modern installs of OpenStack that support the basic services.
  7. ### Known compatible public clouds
  8. - [Auro](https://auro.io/)
  9. - [Betacloud](https://www.betacloud.io/)
  10. - [CityCloud](https://www.citycloud.com/)
  11. - [DreamHost](https://www.dreamhost.com/cloud/computing/)
  12. - [ELASTX](https://elastx.se/)
  13. - [EnterCloudSuite](https://www.entercloudsuite.com/)
  14. - [FugaCloud](https://fuga.cloud/)
  15. - [OVH](https://www.ovh.com/)
  16. - [Rackspace](https://www.rackspace.com/)
  17. - [Ultimum](https://ultimum.io/)
  18. - [VexxHost](https://vexxhost.com/)
  19. - [Zetta](https://www.zetta.io/)
  20. ### Known incompatible public clouds
  21. - T-Systems / Open Telekom Cloud: requires `wait_until_associated`
  22. ## Approach
  23. The terraform configuration inspects variables found in
  24. [variables.tf](variables.tf) to create resources in your OpenStack cluster.
  25. There is a [python script](../terraform.py) that reads the generated`.tfstate`
  26. file to generate a dynamic inventory that is consumed by the main ansible script
  27. to actually install kubernetes and stand up the cluster.
  28. ### Networking
  29. The configuration includes creating a private subnet with a router to the
  30. external net. It will allocate floating IPs from a pool and assign them to the
  31. hosts where that makes sense. You have the option of creating bastion hosts
  32. inside the private subnet to access the nodes there. Alternatively, a node with
  33. a floating IP can be used as a jump host to nodes without.
  34. ### Kubernetes Nodes
  35. You can create many different kubernetes topologies by setting the number of
  36. different classes of hosts. For each class there are options for allocating
  37. floating IP addresses or not.
  38. - Master nodes with etcd
  39. - Master nodes without etcd
  40. - Standalone etcd hosts
  41. - Kubernetes worker nodes
  42. Note that the Ansible script will report an invalid configuration if you wind up
  43. with an even number of etcd instances since that is not a valid configuration. This
  44. restriction includes standalone etcd nodes that are deployed in a cluster along with
  45. master nodes with etcd replicas. As an example, if you have three master nodes with
  46. etcd replicas and three standalone etcd nodes, the script will fail since there are
  47. now six total etcd replicas.
  48. ### GlusterFS
  49. The Terraform configuration supports provisioning of an optional GlusterFS
  50. shared file system based on a separate set of VMs. To enable this, you need to
  51. specify:
  52. - the number of Gluster hosts (minimum 2)
  53. - Size of the non-ephemeral volumes to be attached to store the GlusterFS bricks
  54. - Other properties related to provisioning the hosts
  55. Even if you are using Container Linux by CoreOS for your cluster, you will still
  56. need the GlusterFS VMs to be based on either Debian or RedHat based images.
  57. Container Linux by CoreOS cannot serve GlusterFS, but can connect to it through
  58. binaries available on hyperkube v1.4.3_coreos.0 or higher.
  59. ## Requirements
  60. - [Install Terraform](https://www.terraform.io/intro/getting-started/install.html)
  61. - [Install Ansible](http://docs.ansible.com/ansible/latest/intro_installation.html)
  62. - you already have a suitable OS image in Glance
  63. - you already have a floating IP pool created
  64. - you have security groups enabled
  65. - you have a pair of keys generated that can be used to secure the new hosts
  66. ## Module Architecture
  67. The configuration is divided into three modules:
  68. - Network
  69. - IPs
  70. - Compute
  71. The main reason for splitting the configuration up in this way is to easily
  72. accommodate situations where floating IPs are limited by a quota or if you have
  73. any external references to the floating IP (e.g. DNS) that would otherwise have
  74. to be updated.
  75. You can force your existing IPs by modifying the compute variables in
  76. `kubespray.tf` as follows:
  77. ```
  78. k8s_master_fips = ["151.101.129.67"]
  79. k8s_node_fips = ["151.101.129.68"]
  80. ```
  81. ## Terraform
  82. Terraform will be used to provision all of the OpenStack resources with base software as appropriate.
  83. ### Configuration
  84. #### Inventory files
  85. Create an inventory directory for your cluster by copying the existing sample and linking the `hosts` script (used to build the inventory based on Terraform state):
  86. ```ShellSession
  87. $ cp -LRp contrib/terraform/openstack/sample-inventory inventory/$CLUSTER
  88. $ cd inventory/$CLUSTER
  89. $ ln -s ../../contrib/terraform/openstack/hosts
  90. $ ln -s ../../contrib
  91. ```
  92. This will be the base for subsequent Terraform commands.
  93. #### OpenStack access and credentials
  94. No provider variables are hardcoded inside `variables.tf` because Terraform
  95. supports various authentication methods for OpenStack: the older script and
  96. environment method (using `openrc`) as well as a newer declarative method, and
  97. different OpenStack environments may support Identity API version 2 or 3.
  98. These are examples and may vary depending on your OpenStack cloud provider,
  99. for an exhaustive list on how to authenticate on OpenStack with Terraform
  100. please read the [OpenStack provider documentation](https://www.terraform.io/docs/providers/openstack/).
  101. ##### Declarative method (recommended)
  102. The recommended authentication method is to describe credentials in a YAML file `clouds.yaml` that can be stored in:
  103. * the current directory
  104. * `~/.config/openstack`
  105. * `/etc/openstack`
  106. `clouds.yaml`:
  107. ```
  108. clouds:
  109. mycloud:
  110. auth:
  111. auth_url: https://openstack:5000/v3
  112. username: "username"
  113. project_name: "projectname"
  114. project_id: projectid
  115. user_domain_name: "Default"
  116. password: "password"
  117. region_name: "RegionOne"
  118. interface: "public"
  119. identity_api_version: 3
  120. ```
  121. If you have multiple clouds defined in your `clouds.yaml` file you can choose
  122. the one you want to use with the environment variable `OS_CLOUD`:
  123. ```
  124. export OS_CLOUD=mycloud
  125. ```
  126. ##### Openrc method
  127. When using classic environment variables, Terraform uses default `OS_*`
  128. environment variables. A script suitable for your environment may be available
  129. from Horizon under *Project* -> *Compute* -> *Access & Security* -> *API Access*.
  130. With identity v2:
  131. ```
  132. source openrc
  133. env | grep OS
  134. OS_AUTH_URL=https://openstack:5000/v2.0
  135. OS_PROJECT_ID=projectid
  136. OS_PROJECT_NAME=projectname
  137. OS_USERNAME=username
  138. OS_PASSWORD=password
  139. OS_REGION_NAME=RegionOne
  140. OS_INTERFACE=public
  141. OS_IDENTITY_API_VERSION=2
  142. ```
  143. With identity v3:
  144. ```
  145. source openrc
  146. env | grep OS
  147. OS_AUTH_URL=https://openstack:5000/v3
  148. OS_PROJECT_ID=projectid
  149. OS_PROJECT_NAME=username
  150. OS_PROJECT_DOMAIN_ID=default
  151. OS_USERNAME=username
  152. OS_PASSWORD=password
  153. OS_REGION_NAME=RegionOne
  154. OS_INTERFACE=public
  155. OS_IDENTITY_API_VERSION=3
  156. OS_USER_DOMAIN_NAME=Default
  157. ```
  158. Terraform does not support a mix of DomainName and DomainID, choose one or the
  159. other:
  160. ```
  161. * provider.openstack: You must provide exactly one of DomainID or DomainName to authenticate by Username
  162. ```
  163. ```
  164. unset OS_USER_DOMAIN_NAME
  165. export OS_USER_DOMAIN_ID=default
  166. or
  167. unset OS_PROJECT_DOMAIN_ID
  168. set OS_PROJECT_DOMAIN_NAME=Default
  169. ```
  170. #### Cluster variables
  171. The construction of the cluster is driven by values found in
  172. [variables.tf](variables.tf).
  173. For your cluster, edit `inventory/$CLUSTER/cluster.tf`.
  174. |Variable | Description |
  175. |---------|-------------|
  176. |`cluster_name` | All OpenStack resources will use the Terraform variable`cluster_name` (default`example`) in their name to make it easier to track. For example the first compute resource will be named`example-kubernetes-1`. |
  177. |`network_name` | The name to be given to the internal network that will be generated |
  178. |`dns_nameservers`| An array of DNS name server names to be used by hosts in the internal subnet. |
  179. |`floatingip_pool` | Name of the pool from which floating IPs will be allocated |
  180. |`external_net` | UUID of the external network that will be routed to |
  181. |`flavor_k8s_master`,`flavor_k8s_node`,`flavor_etcd`, `flavor_bastion`,`flavor_gfs_node` | Flavor depends on your openstack installation, you can get available flavor IDs through `openstack flavor list` |
  182. |`image`,`image_gfs` | Name of the image to use in provisioning the compute resources. Should already be loaded into glance. |
  183. |`ssh_user`,`ssh_user_gfs` | The username to ssh into the image with. This usually depends on the image you have selected |
  184. |`public_key_path` | Path on your local workstation to the public key file you wish to use in creating the key pairs |
  185. |`number_of_k8s_masters`, `number_of_k8s_masters_no_floating_ip` | Number of nodes that serve as both master and etcd. These can be provisioned with or without floating IP addresses|
  186. |`number_of_k8s_masters_no_etcd`, `number_of_k8s_masters_no_floating_ip_no_etcd` | Number of nodes that serve as just master with no etcd. These can be provisioned with or without floating IP addresses |
  187. |`number_of_etcd` | Number of pure etcd nodes |
  188. |`number_of_k8s_nodes`, `number_of_k8s_nodes_no_floating_ip` | Kubernetes worker nodes. These can be provisioned with or without floating ip addresses. |
  189. |`number_of_bastions` | Number of bastion hosts to create. Scripts assume this is really just zero or one |
  190. |`number_of_gfs_nodes_no_floating_ip` | Number of gluster servers to provision. |
  191. | `gfs_volume_size_in_gb` | Size of the non-ephemeral volumes to be attached to store the GlusterFS bricks |
  192. |`supplementary_master_groups` | To add ansible groups to the masters, such as `kube-node` for tainting them as nodes, empty by default. |
  193. |`supplementary_node_groups` | To add ansible groups to the nodes, such as `kube-ingress` for running ingress controller pods, empty by default. |
  194. |`bastion_allowed_remote_ips` | List of CIDR allowed to initiate a SSH connection, `["0.0.0.0/0"]` by default |
  195. |`worker_allowed_ports` | List of ports to open on worker nodes, `[{ "protocol" = "tcp", "port_range_min" = 30000, "port_range_max" = 32767, "remote_ip_prefix" = "0.0.0.0/0"}]` by default |
  196. #### Terraform state files
  197. In the cluster's inventory folder, the following files might be created (either by Terraform
  198. or manually), to prevent you from pushing them accidentally they are in a
  199. `.gitignore` file in the `terraform/openstack` directory :
  200. * `.terraform`
  201. * `.tfvars`
  202. * `.tfstate`
  203. * `.tfstate.backup`
  204. You can still add them manually if you want to.
  205. ### Initialization
  206. Before Terraform can operate on your cluster you need to install the required
  207. plugins. This is accomplished as follows:
  208. ```ShellSession
  209. $ cd inventory/$CLUSTER
  210. $ terraform init ../../contrib/terraform/openstack
  211. ```
  212. This should finish fairly quickly telling you Terraform has successfully initialized and loaded necessary modules.
  213. ### Provisioning cluster
  214. You can apply the Terraform configuration to your cluster with the following command
  215. issued from your cluster's inventory directory (`inventory/$CLUSTER`):
  216. ```ShellSession
  217. $ terraform apply -var-file=cluster.tf ../../contrib/terraform/openstack
  218. ```
  219. if you chose to create a bastion host, this script will create
  220. `contrib/terraform/openstack/k8s-cluster.yml` with an ssh command for Ansible to
  221. be able to access your machines tunneling through the bastion's IP address. If
  222. you want to manually handle the ssh tunneling to these machines, please delete
  223. or move that file. If you want to use this, just leave it there, as ansible will
  224. pick it up automatically.
  225. ### Destroying cluster
  226. You can destroy your new cluster with the following command issued from the cluster's inventory directory:
  227. ```ShellSession
  228. $ terraform destroy -var-file=cluster.tf ../../contrib/terraform/openstack
  229. ```
  230. If you've started the Ansible run, it may also be a good idea to do some manual cleanup:
  231. * remove SSH keys from the destroyed cluster from your `~/.ssh/known_hosts` file
  232. * clean up any temporary cache files: `rm /tmp/$CLUSTER-*`
  233. ### Debugging
  234. You can enable debugging output from Terraform by setting
  235. `OS_DEBUG` to 1 and`TF_LOG` to`DEBUG` before running the Terraform command.
  236. ### Terraform output
  237. Terraform can output values that are useful for configure Neutron/Octavia LBaaS or Cinder persistent volume provisioning as part of your Kubernetes deployment:
  238. - `private_subnet_id`: the subnet where your instances are running is used for `openstack_lbaas_subnet_id`
  239. - `floating_network_id`: the network_id where the floating IP are provisioned is used for `openstack_lbaas_floating_network_id`
  240. ## Ansible
  241. ### Node access
  242. #### SSH
  243. Ensure your local ssh-agent is running and your ssh key has been added. This
  244. step is required by the terraform provisioner:
  245. ```
  246. $ eval $(ssh-agent -s)
  247. $ ssh-add ~/.ssh/id_rsa
  248. ```
  249. If you have deployed and destroyed a previous iteration of your cluster, you will need to clear out any stale keys from your SSH "known hosts" file ( `~/.ssh/known_hosts`).
  250. #### Bastion host
  251. Bastion access will be determined by:
  252. - Your choice on the amount of bastion hosts (set by `number_of_bastions` terraform variable).
  253. - The existence of nodes/masters with floating IPs (set by `number_of_k8s_masters`, `number_of_k8s_nodes`, `number_of_k8s_masters_no_etcd` terraform variables).
  254. If you have a bastion host, your ssh traffic will be directly routed through it. This is regardless of whether you have masters/nodes with a floating IP assigned.
  255. If you don't have a bastion host, but at least one of your masters/nodes have a floating IP, then ssh traffic will be tunneled by one of these machines.
  256. So, either a bastion host, or at least master/node with a floating IP are required.
  257. #### Test access
  258. Make sure you can connect to the hosts. Note that Container Linux by CoreOS will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`.
  259. ```
  260. $ ansible -i inventory/$CLUSTER/hosts -m ping all
  261. example-k8s_node-1 | SUCCESS => {
  262. "changed": false,
  263. "ping": "pong"
  264. }
  265. example-etcd-1 | SUCCESS => {
  266. "changed": false,
  267. "ping": "pong"
  268. }
  269. example-k8s-master-1 | SUCCESS => {
  270. "changed": false,
  271. "ping": "pong"
  272. }
  273. ```
  274. If it fails try to connect manually via SSH. It could be something as simple as a stale host key.
  275. ### Configure cluster variables
  276. Edit `inventory/$CLUSTER/group_vars/all/all.yml`:
  277. - **bin_dir**:
  278. ```
  279. # Directory where the binaries will be installed
  280. # Default:
  281. # bin_dir: /usr/local/bin
  282. # For Container Linux by CoreOS:
  283. bin_dir: /opt/bin
  284. ```
  285. - and **cloud_provider**:
  286. ```
  287. cloud_provider: openstack
  288. ```
  289. Edit `inventory/$CLUSTER/group_vars/k8s-cluster/k8s-cluster.yml`:
  290. - Set variable **kube_network_plugin** to your desired networking plugin.
  291. - **flannel** works out-of-the-box
  292. - **calico** requires [configuring OpenStack Neutron ports](/docs/openstack.md) to allow service and pod subnets
  293. ```
  294. # Choose network plugin (calico, weave or flannel)
  295. # Can also be set to 'cloud', which lets the cloud provider setup appropriate routing
  296. kube_network_plugin: flannel
  297. ```
  298. - Set variable **resolvconf_mode**
  299. ```
  300. # Can be docker_dns, host_resolvconf or none
  301. # Default:
  302. # resolvconf_mode: docker_dns
  303. # For Container Linux by CoreOS:
  304. resolvconf_mode: host_resolvconf
  305. ```
  306. ### Deploy Kubernetes
  307. ```
  308. $ ansible-playbook --become -i inventory/$CLUSTER/hosts cluster.yml
  309. ```
  310. This will take some time as there are many tasks to run.
  311. ## Kubernetes
  312. ### Set up kubectl
  313. 1. [Install kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/) on your workstation
  314. 2. Add a route to the internal IP of a master node (if needed):
  315. ```
  316. sudo route add [master-internal-ip] gw [router-ip]
  317. ```
  318. or
  319. ```
  320. sudo route add -net [internal-subnet]/24 gw [router-ip]
  321. ```
  322. 3. List Kubernetes certificates & keys:
  323. ```
  324. ssh [os-user]@[master-ip] sudo ls /etc/kubernetes/ssl/
  325. ```
  326. 4. Get `admin`'s certificates and keys:
  327. ```
  328. ssh [os-user]@[master-ip] sudo cat /etc/kubernetes/ssl/admin-kube-master-1-key.pem > admin-key.pem
  329. ssh [os-user]@[master-ip] sudo cat /etc/kubernetes/ssl/admin-kube-master-1.pem > admin.pem
  330. ssh [os-user]@[master-ip] sudo cat /etc/kubernetes/ssl/ca.pem > ca.pem
  331. ```
  332. 5. Configure kubectl:
  333. ```ShellSession
  334. $ kubectl config set-cluster default-cluster --server=https://[master-internal-ip]:6443 \
  335. --certificate-authority=ca.pem
  336. $ kubectl config set-credentials default-admin \
  337. --certificate-authority=ca.pem \
  338. --client-key=admin-key.pem \
  339. --client-certificate=admin.pem
  340. $ kubectl config set-context default-system --cluster=default-cluster --user=default-admin
  341. $ kubectl config use-context default-system
  342. ```
  343. 7. Check it:
  344. ```
  345. kubectl version
  346. ```
  347. ## GlusterFS
  348. GlusterFS is not deployed by the standard`cluster.yml` playbook, see the
  349. [GlusterFS playbook documentation](../../network-storage/glusterfs/README.md)
  350. for instructions.
  351. Basically you will install Gluster as
  352. ```ShellSession
  353. $ ansible-playbook --become -i inventory/$CLUSTER/hosts ./contrib/network-storage/glusterfs/glusterfs.yml
  354. ```
  355. ## What's next
  356. Try out your new Kubernetes cluster with the [Hello Kubernetes service](https://kubernetes.io/docs/tasks/access-application-cluster/service-access-application-cluster/).