设为首页 收藏本站
查看: 1263|回复: 0

[经验分享] ubuntu 16.04 kubernetes1.6安装(一k8s证书)

[复制链接]

尚未签到

发表于 2018-9-15 13:51:55 | 显示全部楼层 |阅读模式
  一、环境说明
  1、本环境使用系统版本ubuntu16.04
  2、环境服务器ip 192.168.15.132 192.168.15.133 192.168.15.134
  3、k8s的service ip子网为:10.254.0.0/16  dns的service ip设定为10.254.0.2  docker网络ip为10.253.0.0.0/16
  4、本环境参照一步步安装k8s
  5、k8s版本1.6.4
  二、证书制作
  注意:证书配置错误会导致后面很多验证错误,请自行注意,如果后续过程报证书错误,自行返回更新证书,再重启api control 等所有受错误证书影响的组件
  生成的 CA 证书和秘钥文件如下:
  ca-key.pem
  ca.pem
  kubernetes-key.pem
  kubernetes.pem
  kube-proxy.pem
  kube-proxy-key.pem
  admin.pem
  admin-key.pem
  使用证书的组件如下:
  etcd:使用 ca.pem、kubernetes-key.pem、kubernetes.pem;
  kube-apiserver:使用 ca.pem、kubernetes-key.pem、kubernetes.pem;
  kubelet:使用 ca.pem;
  kube-proxy:使用 ca.pem、kube-proxy-key.pem、kube-proxy.pem;
  kubectl:使用 ca.pem、admin-key.pem、admin.pem;
  1、下载cfssl工具
  wget https://pkg.cfssl.org/R1.2/cfssl_linux-amd64
  chmod +x cfssl_linux-amd64
  mv cfssl_linux-amd64 /usr/local/bin/cfssl
  wget https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64
  chmod +x cfssljson_linux-amd64
  mv cfssljson_linux-amd64 /usr/local/bin/cfssljson
  wget https://pkg.cfssl.org/R1.2/cfssl-certinfo_linux-amd64
  chmod +x cfssl-certinfo_linux-amd64
  mv cfssl-certinfo_linux-amd64 /usr/local/bin/cfssl-certinfo
  2、创建CA
  mkdir /root/ssl
  cd /root/ssl
  cfssl print-defaults config > config.json
  cfssl print-defaults csr > csr.json
  根据模板文件创建ca证书
  root@ubuntu132:~/ssl# cat ca-config.json
  {
  "signing": {
  "default": {
  "expiry": "87600h"
  },
  "profiles": {
  "kubernetes": {
  "usages": [
  "signing",
  "key encipherment",
  "server auth" ,
  "client auth"
  ],
  "expiry": "87600h"
  }
  }
  }
  }
  root@ubuntu132:~/ssl# cat ca-csr.json
  {
  "CN": "kubernetes",
  "key": {
  "algo": "rsa",
  "size": 2048
  },
  "names": [
  {
  "C": "CN",
  "L": "sichuan",
  "ST": "chengdu",
  "O": "K8S",
  "OU": "System"
  }
  ]
  }
  生成ca证书和私钥
  cfssl gencert -initca ca-csr.json | cfssljson -bare ca
  root@ubuntu132:~/ssl# ls ca*
  ca-config.json  ca.csr  ca-csr.json  ca-key.pem  ca.pem
  3、创建kubernetes证书
  root@ubuntu132:~/ssl# cat kubernetes-csr.json
  {
  "CN": "kubernetes",
  "hosts": [
  "127.0.0.1",
  "192.168.15.132",
  "192.168.15.133",
  "192.168.15.134",
  "127.0.0.1",
  "10.254.0.1",  #为k8s的service第一个ip,不能缺少
  "kubernetes",
  "kubernetes.default",
  "kubernetes.default.svc",
  "kubernetes.default.svc.cluster",
  "kubernetes.default.svc.cluster.local"
  ],
  "key": {
  "algo": "rsa",
  "size": 2048
  },
  "names": [
  {
  "C": "CN",
  "L": "sichuan",
  "ST": "chengdu",
  "O": "K8S",
  "OU": "System"
  }
  ]
  }
  root# cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes kubernetes-csr.json | cfssljson -bare kubernetes
  root@ubuntu132:~/ssl# ls kubernetes*
  kubernetes.csr  kubernetes-csr.json  kubernetes-key.pem  kubernetes.pem
  3、生成admin证书
  root@ubuntu132:~/ssl# cat admin-csr.json
  {
  "CN": "admin",
  "hosts": [],
  "key": {
  "algo": "rsa",
  "size": 2048
  },
  "names": [
  {
  "C": "CN",
  "L": "sichuan",
  "ST": "chengdu",
  "O": "system:masters",
  "OU": "System"
  }
  ]
  }
  root# cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes admin-csr.json | cfssljson -bare admin
  root@ubuntu132:~/ssl# ls admin*
  admin.csr  admin-csr.json  admin-key.pem  admin.pem
  4、创建kube-proxy证书
  root@ubuntu132:~/ssl# cat kube-proxy-csr.json
  {
  "CN": "system:kube-proxy",
  "hosts": [],
  "key": {
  "algo": "rsa",
  "size": 2048
  },
  "names": [
  {
  "C": "CN",
  "L": "sichuan",
  "ST": "chengdu",
  "O": "K8S",
  "OU": "System"
  }
  ]
  }
  root# cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes kube-proxy-csr.json | cfssljson -bare kube-proxy
  5、校验证书
  root@ubuntu132:~/ssl# cat kube-proxy-csr.json
  {
  "CN": "system:kube-proxy",
  "hosts": [],
  "key": {
  "algo": "rsa",
  "size": 2048
  },
  "names": [
  {
  "C": "CN",
  "L": "sichuan",
  "ST": "chengdu",
  "O": "K8S",
  "OU": "System"
  }
  ]
  }
  root@ubuntu132:~/ssl# cfssl-certinfo -cert kubernetes.pem
  {
  "subject": {
  "common_name": "kubernetes",
  "country": "CN",
  "organization": "K8S",
  "organizational_unit": "System",
  "locality": "sichuan",
  "province": "chengdu",
  "names": [
  "CN",
  "chengdu",
  "sichuan",
  "K8S",
  "System",
  "kubernetes"
  ]
  },
  "issuer": {
  "common_name": "kubernetes",
  "country": "CN",
  "organization": "K8S",
  "organizational_unit": "System",
  "locality": "sichuan",
  "province": "chengdu",
  "names": [
  "CN",
  "chengdu",
  "sichuan",
  "K8S",
  "System",
  "kubernetes"
  ]
  },
  "serial_number": "21319328974437703439675516504278703829575637313",
  "sans": [
  "kubernetes",
  "kubernetes.default",
  "kubernetes.default.svc",
  "kubernetes.default.svc.cluster",
  "kubernetes.default.svc.cluster.local",
  "127.0.0.1",
  "192.168.15.132",
  "192.168.15.133",
  "192.168.15.134",
  "127.0.0.1",
  "10.254.0.1"
  ],
  "not_before": "2017-12-01T09:39:00Z",
  "not_after": "2027-11-29T09:39:00Z",
  "sigalg": "SHA256WithRSA",
  "authority_key_id": "F8:6C:92:4:47:47:26:B4:5B:F:49:65:C9:FD:BF:90:F:96:4D:92",
  "subject_key_id": "5C:9E:CF:98:85:1E:32:11:C9:17:BF:6D:98:4A:D9:24:6F:57:BD:D2",
  "pem": "-----BEGIN CERTIFICATE-----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\nsB/9ocHk7vzjyywja6JT\n-----END CERTIFICATE-----\n"
  }
  6、拷贝证书到所有节点
  mkdir -p /etc/kubernetes/ssl
  cp *.pem /etc/kubernetes/ssl


运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-583618-1-1.html 上篇帖子: Kubernetes插件部署 下篇帖子: ubuntu16 kubernetes1.6安装(三、etcd、flannel)
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表