The Kubernetes example shows how to use Matchbox to network boot and provision a 3 node Kubernetes v1.8.4 cluster. This example uses Terraform and a module provided by Typhoon to describe cluster resources. kubernetes-incubator/bootkube is run once to bootstrap the Kubernetes control plane.
Follow the getting started tutorial to learn about matchbox and set up an environment that meets the requirements:
If you prefer to provision QEMU/KVM VMs on your local Linux machine, set up the matchbox development environment.
sudo ./scripts/devnet create
Clone the matchbox project and take a look at the cluster examples.
$ git clone https://github.com/coreos/matchbox.git $ cd matchbox/examples/terraform/bootkube-install
terraform.tfvars.example file to
provider.tf references your matchbox credentials.
matchbox_http_endpoint = "http://matchbox.example.com:8080" matchbox_rpc_endpoint = "matchbox.example.com:8081" ssh_authorized_key = "ADD ME" cluster_name = "demo" container_linux_version = "1576.4.0" container_linux_channel = "stable"
Provide an ordered list of controller names, MAC addresses, and domain names. Provide an ordered list of worker names, MAC addresses, and domain names.
controller_names = ["node1"] controller_macs = ["52:54:00:a1:9c:ae"] controller_domains = ["node1.example.com"] worker_names = ["node2", "node3"] worker_macs = ["52:54:00:b2:2f:86", "52:54:00:c3:61:77"] worker_domains = ["node2.example.com", "node3.example.com"]
assets_dir for generated manifests and a DNS name which you've setup to resolves to controller(s) (e.g. round-robin). Worker nodes and your kubeconfig will communicate via this endpoint.
k8s_domain_name = "cluster.example.com" asset_dir = "assets"
cached-container-linux-install profile will PXE boot and install Container Linux from matchbox assets. If you have not populated the assets cache, use the
container-linux-install profile to use public images (slower).
You may set certain optional variables to override defaults. Set
networking to either "flannel" or "calico" to set the networking provider. Check upstream for the full list of options.
# Optional (defaults) # cached_install = "false" # install_disk = "/dev/sda" # container_linux_oem = "" # networking = "flannel"
The default is to create a Kubernetes cluster with 1 controller and 2 workers as an example, but check
multi-controller.tfvars.example for an example which defines 3 controllers and 1 worker.
source Terraform module.
$ terraform get --update
Plan and apply to create the resources on Matchbox.
$ terraform plan Plan: 37 to add, 0 to change, 0 to destroy.
Terraform will configure matchbox with profiles (e.g.
bootkube-worker) and add groups to match machines by MAC address to a profile. These resources declare that each machine should PXE boot and install Container Linux to disk.
node1 will provision itself as a controller, while
node3 provision themselves as workers.
The module referenced in
cluster.tf will also generate bootkube assets to
assets_dir (exactly like the bootkube binary would). These assets include Kubernetes bootstrapping and control plane manifests as well as a kubeconfig you can use to access the cluster.
$ terraform apply module.cluster.null_resource.copy-secrets.0: Still creating... (5m0s elapsed) module.cluster.null_resource.copy-secrets.1: Still creating... (5m0s elapsed) module.cluster.null_resource.copy-secrets.2: Still creating... (5m0s elapsed) ... module.cluster.null_resource.bootkube-start: Still creating... (8m40s elapsed) ... Apply complete! Resources: 37 added, 0 changed, 0 destroyed.
You can now move on to the "Machines" section. Apply will loop until it can successfully copy the kubeconfig and etcd TLS assets to each node and start the one-time Kubernetes bootstrapping process on a controller. In practice, you may see
apply fail if it connects before the disk install has completed. Run terraform apply until it reconciles successfully.
Power on each machine (with PXE boot device on next boot). Machines should network boot, install Container Linux to disk, reboot, and provision themselves as bootkube controllers or workers.
$ ipmitool -H node1.example.com -U USER -P PASS chassis bootdev pxe $ ipmitool -H node1.example.com -U USER -P PASS power on
For local QEMU/KVM development, create the QEMU/KVM VMs.
$ sudo ./scripts/libvirt create $ sudo ./scripts/libvirt [start|reboot|shutdown|poweroff|destroy]
Install kubectl on your laptop. Use the generated kubeconfig to access the Kubernetes cluster. Verify that the cluster is accessible and that the apiserver, scheduler, and controller-manager are running as pods.
$ export KUBECONFIG=assets/auth/kubeconfig $ kubectl get nodes NAME STATUS AGE VERSION node1.example.com Ready 11m v1.8.4 node2.example.com Ready 11m v1.8.4 node3.example.com Ready 11m v1.8.4 $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system checkpoint-installer-p8g8r 1/1 Running 1 13m kube-system kube-apiserver-s5gnx 1/1 Running 1 41s kube-system kube-controller-manager-3438979800-jrlnd 1/1 Running 1 13m kube-system kube-controller-manager-3438979800-tkjx7 1/1 Running 1 13m kube-system kube-dns-4101612645-xt55f 4/4 Running 4 13m kube-system kube-flannel-pl5c2 2/2 Running 0 13m kube-system kube-flannel-r9t5r 2/2 Running 3 13m kube-system kube-flannel-vfb0s 2/2 Running 4 13m kube-system kube-proxy-cvhmj 1/1 Running 0 13m kube-system kube-proxy-hf9mh 1/1 Running 1 13m kube-system kube-proxy-kpl73 1/1 Running 1 13m kube-system kube-scheduler-694795526-1l23b 1/1 Running 1 13m kube-system kube-scheduler-694795526-fks0b 1/1 Running 1 13m kube-system pod-checkpointer-node1.example.com 1/1 Running 2 10m
Install important cluster addons.