Deploy a Production Ready Kubernetes Cluster
 
 
 
 
 
Go to file
k8s-infra-cherrypick-robot d80686acb0
[release-2.26] Refactor and expand download_hash.py (#11538)
* download_hash.py: generalized and data-driven

The script is currently limited to one hardcoded URL for kubernetes
related binaries, and a fixed set of architectures.

The solution is three-fold:
1. Use an url template dictionary for each download -> this allow to easily
   add support for new downloads.
2. Source the architectures to search from the existing data
3. Enumerate the existing versions in the data and start searching from
   the last one until no newer version is found (newer in the version
   order sense, irrespective of actual age)

* download_hash.py: support for 'multi-hash' file + runc

runc upstream does not provide one hash file per assets in their
releases, but one file with all the hashes.
To handle this (and/or any arbitrary format from upstreams), add a
dictionary mapping the name of the download to a lambda function which
transform the file provided by upstream into a dictionary of hashes,
keyed by architecture.

* download_hash: argument handling with argparse

Allow the script to be called with a list of components, to only
download new versions checksums for those.
By default, we get new versions checksums for all supported (by the
script) components.

* download_hash: propagate new patch versions to all archs

* download_hash: add support for 'simple hash' components

* download_hash: support 'multi-hash' components

* download_hash: document missing support

* download_hash: use persistent session

This allows to reuse http connection and be more efficient.
From rough measuring it saves around 25-30% of execution time.

* download_hash: cache request for 'multi-hash' files

This avoid re-downloading the same file for different arch and
re-parsing it

* download_hash: document usage

---------

Co-authored-by: Max Gautier <mg@max.gautier.name>
2024-09-16 08:39:14 +01:00
.github fix auto bump PR is blocked by label (#11256) 2024-05-31 06:28:48 -07:00
.gitlab-ci [CI] Add a CI job to test cluster upgrading, and fix bug of testcases_run.sh (#11458) 2024-08-29 15:47:32 +01:00
contrib Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
docs Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
extra_playbooks Do not use ‘yes/no’ for boolean values (#11472) 2024-08-28 06:30:56 +01:00
inventory Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
library Adds support for Ansible collections (#9582) 2023-03-27 02:25:55 -07:00
logo pre-commit autocorrected files (#9750) 2023-02-06 01:35:16 -08:00
meta Upgrade ansible-core to 2.16.4 (#10984) 2024-03-14 02:12:45 -07:00
playbooks Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
plugins/modules kube.py support kubeconfig (#9982) 2023-04-14 00:14:40 -07:00
roles boostrap-os: use import_tasks instead of symlinks (#11508) 2024-09-05 08:24:49 +01:00
scripts [release-2.26] Refactor and expand download_hash.py (#11538) 2024-09-16 08:39:14 +01:00
test-infra Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
tests Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
.ansible-lint Feat: dependabot initial config (#11084) 2024-04-25 01:34:39 -07:00
.ansible-lint-ignore Decouple kubespray-defaults from download (#10626) 2023-12-11 16:56:17 +01:00
.editorconfig Add .editorconfig file (#6307) 2020-06-29 12:39:59 -07:00
.gitattributes add gen_docs_sidebar.sh result, mark docs/_sidebar.md as a generated file 2024-05-17 15:09:54 +02:00
.gitignore bin: improve manage-offline-container-images script (#10857) 2024-02-17 19:34:29 -08:00
.gitlab-ci.yml CI: rework pipeline: short/extended based on labels (#11324) 2024-07-01 03:25:36 -07:00
.gitmodules Remove submodules 2016-03-04 16:14:01 +01:00
.md_style.rb pre-commit: adjust mardownlint default, md fixes 2024-05-28 13:26:49 +02:00
.mdlrc pre-commit: adjust mardownlint default, md fixes 2024-05-28 13:26:49 +02:00
.nojekyll Publish docs with docsify (#4193) 2019-02-07 04:52:08 -08:00
.pre-commit-config.yaml Bugfix/code inspection. (#11384) 2024-08-02 03:43:54 -07:00
.yamllint Do not use ‘yes/no’ for boolean values (#11472) 2024-08-28 06:30:56 +01:00
CHANGELOG.md project: fix galaxy ansible-lint rule (#10277) 2023-07-07 00:01:04 -07:00
CNAME pre-commit autocorrected files (#9750) 2023-02-06 01:35:16 -08:00
CONTRIBUTING.md Upgrade ansible (#10190) 2023-06-26 03:15:45 -07:00
Dockerfile chore(Dockerfile): best practices (#10708) 2023-12-13 17:40:53 +01:00
LICENSE pre-commit autocorrected files (#9750) 2023-02-06 01:35:16 -08:00
Makefile Mitogen: deprecate the use of mitogen and remove coverage from CI (#8147) 2021-11-05 00:57:52 -07:00
OWNERS pre-commit autocorrected files (#9750) 2023-02-06 01:35:16 -08:00
OWNERS_ALIASES Adding myself (VannTen) as approver (#11483) 2024-08-29 10:30:29 +01:00
README.md Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
RELEASE.md add step for k8s upgrade on release process (#11321) 2024-06-23 23:34:57 -07:00
SECURITY_CONTACTS Update security contacts file (#9235) 2022-08-30 22:43:00 -07:00
Vagrantfile Drop support for RHEL 7 / CentOS 7 (#11246) 2024-09-05 07:41:01 +01:00
_config.yml Add .editorconfig file (#6307) 2020-06-29 12:39:59 -07:00
ansible.cfg Increase ansible timeout to 300 (#11354) 2024-07-10 19:19:24 -07:00
cluster.yml Adds support for Ansible collections (#9582) 2023-03-27 02:25:55 -07:00
code-of-conduct.md Update code-of-conduct.md 2017-12-20 14:12:38 -05:00
galaxy.yml Bugfix/code inspection. (#11384) 2024-08-02 03:43:54 -07:00
index.html Add logo folders (#4515) 2019-04-12 11:00:47 -07:00
pipeline.Dockerfile CI: rework pipeline: short/extended based on labels (#11324) 2024-07-01 03:25:36 -07:00
recover-control-plane.yml Fix playbook names for galaxy (#10021) 2023-04-24 07:09:02 -07:00
remove-node.yml Fix playbook names for galaxy (#10021) 2023-04-24 07:09:02 -07:00
requirements.txt Bugfix/code inspection. (#11384) 2024-08-02 03:43:54 -07:00
reset.yml Adds support for Ansible collections (#9582) 2023-03-27 02:25:55 -07:00
run.rc Upgrade ansible (#10190) 2023-06-26 03:15:45 -07:00
scale.yml pre-commit: apply autofixes hooks and fix the rest manually 2024-05-28 13:26:44 +02:00
setup.cfg library files added to setup.cfg (#5274) 2019-11-11 03:59:41 -08:00
setup.py Add pbr build configuration 2017-08-18 12:56:01 +02:00
upgrade-cluster.yml Fix playbook names for galaxy (#10021) 2023-04-24 07:09:02 -07:00

README.md

Deploy a Production Ready Kubernetes Cluster

Kubernetes Logo

If you have questions, check the documentation at kubespray.io and join us on the kubernetes slack, channel #kubespray. You can get your invite here

  • Can be deployed on AWS, GCE, Azure, OpenStack, vSphere, Equinix Metal (bare metal), Oracle Cloud Infrastructure (Experimental), or Baremetal
  • Highly available cluster
  • Composable (Choice of the network plugin for instance)
  • Supports most popular Linux distributions
  • Continuous integration tests

Quick Start

Below are several ways to use Kubespray to deploy a Kubernetes cluster.

Ansible

Usage

Install Ansible according to Ansible installation guide then run the following steps:

# Copy ``inventory/sample`` as ``inventory/mycluster``
cp -rfp inventory/sample inventory/mycluster

# Update Ansible inventory file with inventory builder
declare -a IPS=(10.10.1.3 10.10.1.4 10.10.1.5)
CONFIG_FILE=inventory/mycluster/hosts.yaml python3 contrib/inventory_builder/inventory.py ${IPS[@]}

# Review and change parameters under ``inventory/mycluster/group_vars``
cat inventory/mycluster/group_vars/all/all.yml
cat inventory/mycluster/group_vars/k8s_cluster/k8s-cluster.yml

# Clean up old Kubernetes cluster with Ansible Playbook - run the playbook as root
# The option `--become` is required, as for example cleaning up SSL keys in /etc/,
# uninstalling old packages and interacting with various systemd daemons.
# Without --become the playbook will fail to run!
# And be mind it will remove the current kubernetes cluster (if it's running)!
ansible-playbook -i inventory/mycluster/hosts.yaml  --become --become-user=root reset.yml

# Deploy Kubespray with Ansible Playbook - run the playbook as root
# The option `--become` is required, as for example writing SSL keys in /etc/,
# installing packages and interacting with various systemd daemons.
# Without --become the playbook will fail to run!
ansible-playbook -i inventory/mycluster/hosts.yaml  --become --become-user=root cluster.yml

Note: When Ansible is already installed via system packages on the control node, Python packages installed via sudo pip install -r requirements.txt will go to a different directory tree (e.g. /usr/local/lib/python2.7/dist-packages on Ubuntu) from Ansible's (e.g. /usr/lib/python2.7/dist-packages/ansible still on Ubuntu). As a consequence, the ansible-playbook command will fail with:

ERROR! no action detected in task. This often indicates a misspelled module name, or incorrect module path.

This likely indicates that a task depends on a module present in requirements.txt.

One way of addressing this is to uninstall the system Ansible package then reinstall Ansible via pip, but this not always possible and one must take care regarding package versions. A workaround consists of setting the ANSIBLE_LIBRARY and ANSIBLE_MODULE_UTILS environment variables respectively to the ansible/modules and ansible/module_utils subdirectories of the pip installation location, which is the Location shown by running pip show [package] before executing ansible-playbook.

A simple way to ensure you get all the correct version of Ansible is to use the pre-built docker image from Quay. You will then need to use bind mounts to access the inventory and SSH key in the container, like this:

git checkout v2.25.0
docker pull quay.io/kubespray/kubespray:v2.25.0
docker run --rm -it --mount type=bind,source="$(pwd)"/inventory/sample,dst=/inventory \
  --mount type=bind,source="${HOME}"/.ssh/id_rsa,dst=/root/.ssh/id_rsa \
  quay.io/kubespray/kubespray:v2.25.0 bash
# Inside the container you may now run the kubespray playbooks:
ansible-playbook -i /inventory/inventory.ini --private-key /root/.ssh/id_rsa cluster.yml

Collection

See here if you wish to use this repository as an Ansible collection

Vagrant

For Vagrant we need to install Python dependencies for provisioning tasks. Check that Python and pip are installed:

python -V && pip -V

If this returns the version of the software, you're good to go. If not, download and install Python from here https://www.python.org/downloads/source/

Install Ansible according to Ansible installation guide then run the following step:

vagrant up

Documents

Supported Linux Distributions

Note: Upstart/SysV init based OS types are not supported.

Supported Components

Container Runtime Notes

  • The cri-o version should be aligned with the respective kubernetes version (i.e. kube_version=1.20.x, crio_version=1.20)

Requirements

  • Minimum required version of Kubernetes is v1.28
  • Ansible v2.14+, Jinja 2.11+ and python-netaddr is installed on the machine that will run Ansible commands
  • The target servers must have access to the Internet in order to pull docker images. Otherwise, additional configuration is required (See Offline Environment)
  • The target servers are configured to allow IPv4 forwarding.
  • If using IPv6 for pods and services, the target servers are configured to allow IPv6 forwarding.
  • The firewalls are not managed, you'll need to implement your own rules the way you used to. in order to avoid any issue during deployment you should disable your firewall.
  • If kubespray is run from non-root user account, correct privilege escalation method should be configured in the target servers. Then the ansible_become flag or command parameters --become or -b should be specified.

Hardware: These limits are safeguarded by Kubespray. Actual requirements for your workload can differ. For a sizing guide go to the Building Large Clusters guide.

  • Master
    • Memory: 1500 MB
  • Node
    • Memory: 1024 MB

Network Plugins

You can choose among ten network plugins. (default: calico, except Vagrant uses flannel)

  • flannel: gre/vxlan (layer 2) networking.

  • Calico is a networking and network policy provider. Calico supports a flexible set of networking options designed to give you the most efficient networking across a range of situations, including non-overlay and overlay networks, with or without BGP. Calico uses the same engine to enforce network policy for hosts, pods, and (if using Istio and Envoy) applications at the service mesh layer.

  • cilium: layer 3/4 networking (as well as layer 7 to protect and secure application protocols), supports dynamic insertion of BPF bytecode into the Linux kernel to implement security services, networking and visibility logic.

  • weave: Weave is a lightweight container overlay network that doesn't require an external K/V database cluster. (Please refer to weave troubleshooting documentation).

  • kube-ovn: Kube-OVN integrates the OVN-based Network Virtualization with Kubernetes. It offers an advanced Container Network Fabric for Enterprises.

  • kube-router: Kube-router is a L3 CNI for Kubernetes networking aiming to provide operational simplicity and high performance: it uses IPVS to provide Kube Services Proxy (if setup to replace kube-proxy), iptables for network policies, and BGP for ods L3 networking (with optionally BGP peering with out-of-cluster BGP peers). It can also optionally advertise routes to Kubernetes cluster Pods CIDRs, ClusterIPs, ExternalIPs and LoadBalancerIPs.

  • macvlan: Macvlan is a Linux network driver. Pods have their own unique Mac and Ip address, connected directly the physical (layer 2) network.

  • multus: Multus is a meta CNI plugin that provides multiple network interface support to pods. For each interface Multus delegates CNI calls to secondary CNI plugins such as Calico, macvlan, etc.

  • custom_cni : You can specify some manifests that will be applied to the clusters to bring you own CNI and use non-supported ones by Kubespray. See tests/files/custom_cni/README.md and tests/files/custom_cni/values.yamlfor an example with a CNI provided by a Helm Chart.

The network plugin to use is defined by the variable kube_network_plugin. There is also an option to leverage built-in cloud provider networking instead. See also Network checker.

Ingress Plugins

  • nginx: the NGINX Ingress Controller.

  • metallb: the MetalLB bare-metal service LoadBalancer provider.

Community docs and resources

Tools and projects on top of Kubespray

CI Tests

Build graphs

CI/end-to-end tests sponsored by: CNCF, Equinix Metal, OVHcloud, ELASTX.

See the test matrix for details.