You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

168 lines
7.2 KiB

  1. # HA endpoints for K8s
  2. The following components require a highly available endpoints:
  3. * etcd cluster,
  4. * kube-apiserver service instances.
  5. The latter relies on a 3rd side reverse proxy, like Nginx or HAProxy, to
  6. achieve the same goal.
  7. ## Etcd
  8. The etcd clients (kube-api-masters) are configured with the list of all etcd peers. If the etcd-cluster has multiple instances, it's configured in HA already.
  9. ## Kube-apiserver
  10. K8s components require a loadbalancer to access the apiservers via a reverse
  11. proxy. Kubespray includes support for an nginx-based proxy that resides on each
  12. non-master Kubernetes node. This is referred to as localhost loadbalancing. It
  13. is less efficient than a dedicated load balancer because it creates extra
  14. health checks on the Kubernetes apiserver, but is more practical for scenarios
  15. where an external LB or virtual IP management is inconvenient. This option is
  16. configured by the variable `loadbalancer_apiserver_localhost` (defaults to
  17. `True`. Or `False`, if there is an external `loadbalancer_apiserver` defined).
  18. You may also define the port the local internal loadbalancer uses by changing,
  19. `loadbalancer_apiserver_port`. This defaults to the value of
  20. `kube_apiserver_port`. It is also important to note that Kubespray will only
  21. configure kubelet and kube-proxy on non-master nodes to use the local internal
  22. loadbalancer.
  23. If you choose to NOT use the local internal loadbalancer, you will need to
  24. configure your own loadbalancer to achieve HA. Note that deploying a
  25. loadbalancer is up to a user and is not covered by ansible roles in Kubespray.
  26. By default, it only configures a non-HA endpoint, which points to the
  27. `access_ip` or IP address of the first server node in the `kube_control_plane` group.
  28. It can also configure clients to use endpoints for a given loadbalancer type.
  29. The following diagram shows how traffic to the apiserver is directed.
  30. ![Image](figures/loadbalancer_localhost.png?raw=true)
  31. Note: Kubernetes master nodes still use insecure localhost access because
  32. there are bugs in Kubernetes <1.5.0 in using TLS auth on master role
  33. services. This makes backends receiving unencrypted traffic and may be a
  34. security issue when interconnecting different nodes, or maybe not, if those
  35. belong to the isolated management network without external access.
  36. A user may opt to use an external loadbalancer (LB) instead. An external LB
  37. provides access for external clients, while the internal LB accepts client
  38. connections only to the localhost.
  39. Given a frontend `VIP` address and `IP1, IP2` addresses of backends, here is
  40. an example configuration for a HAProxy service acting as an external LB:
  41. ```raw
  42. listen kubernetes-apiserver-https
  43. bind <VIP>:8383
  44. mode tcp
  45. option log-health-checks
  46. timeout client 3h
  47. timeout server 3h
  48. server master1 <IP1>:6443 check check-ssl verify none inter 10000
  49. server master2 <IP2>:6443 check check-ssl verify none inter 10000
  50. balance roundrobin
  51. ```
  52. Note: That's an example config managed elsewhere outside of Kubespray.
  53. And the corresponding example global vars for such a "cluster-aware"
  54. external LB with the cluster API access modes configured in Kubespray:
  55. ```yml
  56. apiserver_loadbalancer_domain_name: "my-apiserver-lb.example.com"
  57. loadbalancer_apiserver:
  58. address: <VIP>
  59. port: 8383
  60. ```
  61. Note: The default kubernetes apiserver configuration binds to all interfaces,
  62. so you will need to use a different port for the vip from that the API is
  63. listening on, or set the `kube_apiserver_bind_address` so that the API only
  64. listens on a specific interface (to avoid conflict with haproxy binding the
  65. port on the VIP address)
  66. This domain name, or default "lb-apiserver.kubernetes.local", will be inserted
  67. into the `/etc/hosts` file of all servers in the `k8s_cluster` group and wired
  68. into the generated self-signed TLS/SSL certificates as well. Note that
  69. the HAProxy service should as well be HA and requires a VIP management, which
  70. is out of scope of this doc.
  71. There is a special case for an internal and an externally configured (not with
  72. Kubespray) LB used simultaneously. Keep in mind that the cluster is not aware
  73. of such an external LB and you need no to specify any configuration variables
  74. for it.
  75. Note: TLS/SSL termination for externally accessed API endpoints' will **not**
  76. be covered by Kubespray for that case. Make sure your external LB provides it.
  77. Alternatively you may specify an externally load balanced VIPs in the
  78. `supplementary_addresses_in_ssl_keys` list. Then, kubespray will add them into
  79. the generated cluster certificates as well.
  80. Aside of that specific case, the `loadbalancer_apiserver` considered mutually
  81. exclusive to `loadbalancer_apiserver_localhost`.
  82. Access API endpoints are evaluated automatically, as the following:
  83. | Endpoint type | kube_control_plane | non-master | external |
  84. |------------------------------|--------------------|-------------------------|-----------------------|
  85. | Local LB (default) | `https://bip:sp` | `https://lc:nsp` | `https://m[0].aip:sp` |
  86. | Local LB + Unmanaged here LB | `https://bip:sp` | `https://lc:nsp` | `https://ext` |
  87. | External LB, no internal | `https://bip:sp` | `<https://lb:lp>` | `https://lb:lp` |
  88. | No ext/int LB | `https://bip:sp` | `<https://m[0].aip:sp>` | `https://m[0].aip:sp` |
  89. Where:
  90. * `m[0]` - the first node in the `kube_control_plane` group;
  91. * `lb` - LB FQDN, `apiserver_loadbalancer_domain_name`;
  92. * `ext` - Externally load balanced VIP:port and FQDN, not managed by Kubespray;
  93. * `lc` - localhost;
  94. * `bip` - a custom bind IP or localhost for the default bind IP '0.0.0.0';
  95. * `nsp` - nginx secure port, `loadbalancer_apiserver_port`, defers to `sp`;
  96. * `sp` - secure port, `kube_apiserver_port`;
  97. * `lp` - LB port, `loadbalancer_apiserver.port`, defers to the secure port;
  98. * `ip` - the node IP, defers to the ansible IP;
  99. * `aip` - `access_ip`, defers to the ip.
  100. A second and a third column represent internal cluster access modes. The last
  101. column illustrates an example URI to access the cluster APIs externally.
  102. Kubespray has nothing to do with it, this is informational only.
  103. As you can see, the masters' internal API endpoints are always
  104. contacted via the local bind IP, which is `https://bip:sp`.
  105. **Note** that for some cases, like healthchecks of applications deployed by
  106. Kubespray, the masters' APIs are accessed via the insecure endpoint, which
  107. consists of the local `kube_apiserver_insecure_bind_address` and
  108. `kube_apiserver_insecure_port`.
  109. ## Optional configurations
  110. ### ETCD with a LB
  111. In order to use an external loadbalancing (L4/TCP or L7 w/ SSL Passthrough VIP), the following variables need to be overridden in group_vars
  112. * `etcd_access_addresses`
  113. * `etcd_client_url`
  114. * `etcd_cert_alt_names`
  115. * `etcd_cert_alt_ips`
  116. #### Example of a VIP w/ FQDN
  117. ```yaml
  118. etcd_access_addresses: https://etcd.example.com:2379
  119. etcd_client_url: https://etcd.example.com:2379
  120. etcd_cert_alt_names:
  121. - "etcd.kube-system.svc.{{ dns_domain }}"
  122. - "etcd.kube-system.svc"
  123. - "etcd.kube-system"
  124. - "etcd"
  125. - "etcd.example.com" # This one needs to be added to the default etcd_cert_alt_names
  126. ```
  127. #### Example of a VIP w/o FQDN (IP only)
  128. ```yaml
  129. etcd_access_addresses: https://2.3.7.9:2379
  130. etcd_client_url: https://2.3.7.9:2379
  131. etcd_cert_alt_ips:
  132. - "2.3.7.9"
  133. ```