Skip to content

Latest commit

 

History

History
258 lines (163 loc) · 11 KB

dramatically-simplify-cluster-creation.md

File metadata and controls

258 lines (163 loc) · 11 KB

Proposal: Dramatically Simplify Kubernetes Cluster Creation

Luke Marsden & many others in SIG-cluster-lifecycle.

17th August 2016

This proposal aims to capture the latest consensus and plan of action of SIG-cluster-lifecycle. It should satisfy the first bullet point required by the feature description.

See also: this presentation to community hangout on 4th August 2016

Motivation

Kubernetes is hard to install, and there are many different ways to do it today. None of them are excellent. We believe this is hindering adoption.

Goals

Have one recommended, official, tested, "happy path" which will enable a majority of new and existing Kubernetes users to:

  • Kick the tires and easily turn up a new cluster on infrastructure of their choice

  • Get a reasonably secure, production-ready cluster, with reasonable defaults and a range of easily-installable add-ons

We plan to do so by improving and simplifying Kubernetes itself, rather than building lots of tooling which "wraps" Kubernetes by poking all the bits into the right place.

Scope of project

There are logically 3 steps to deploying a Kubernetes cluster:

  1. Provisioning: Getting some servers - these may be VMs on a developer's workstation, VMs in public clouds, or bare-metal servers in a user's data center.

  2. Install & Discovery: Installing the Kubernetes core components on those servers (kubelet, etc) - and bootstrapping the cluster to a state of basic liveness, including allowing each server in the cluster to discover other servers: for example teaching etcd servers about their peers, having TLS certificates provisioned, etc.

  3. Add-ons: Now that basic cluster functionality is working, installing add-ons such as DNS or a pod network (should be possible using kubectl apply).

Notably, this project is only working on dramatically improving 2 and 3 from the perspective of users typing commands directly into root shells of servers. The reason for this is that there are a great many different ways of provisioning servers, and users will already have their own preferences.

What's more, once we've radically improved the user experience of 2 and 3, it will make the job of tools that want to do all three much easier.

User stories

Phase I

In time to be an alpha feature in Kubernetes 1.4.

Note: the current plan is to deliver kubeadm which implements these stories as "alpha" packages built from master (after the 1.4 feature freeze), but which are capable of installing a Kubernetes 1.4 cluster.

  • Install: As a potential Kubernetes user, I can deploy a Kubernetes 1.4 cluster on a handful of computers running Linux and Docker by typing two commands on each of those computers. The process is so simple that it becomes obvious to me how to easily automate it if I so wish.

  • Pre-flight check: If any of the computers don't have working dependencies installed (e.g. bad version of Docker, too-old Linux kernel), I am informed early on and given clear instructions on how to fix it so that I can keep trying until it works.

  • Control: Having provisioned a cluster, I can gain user credentials which allow me to remotely control it using kubectl.

  • Install-addons: I can select from a set of recommended add-ons to install directly after installing Kubernetes on my set of initial computers with kubectl apply.

  • Add-node: I can add another computer to the cluster.

  • Secure: As an attacker with (presumed) control of the network, I cannot add malicious nodes I control to the cluster created by the user. I also cannot remotely control the cluster.

Phase II

In time for Kubernetes 1.5: Everything from Phase I as beta/stable feature, everything else below as beta feature in Kubernetes 1.5.

  • Upgrade: Later, when Kubernetes 1.4.1 or any newer release is published, I can upgrade to it by typing one other command on each computer.

  • HA: If one of the computers in the cluster fails, the cluster carries on working. I can find out how to replace the failed computer, including if the computer was one of the masters.

Top-down view: UX for Phase I items

We will introduce a new binary, kubeadm, which ships with the Kubernetes OS packages (and binary tarballs, for OSes without package managers).

laptop$ kubeadm --help
kubeadm: bootstrap a secure kubernetes cluster easily.

    /==========================================================\
    | KUBEADM IS ALPHA, DO NOT USE IT FOR PRODUCTION CLUSTERS! |
    |                                                          |
    | But, please try it out! Give us feedback at:             |
    | https://github.com/kubernetes/kubernetes/issues          |
    | and at-mention @kubernetes/sig-cluster-lifecycle         |
    \==========================================================/

Example usage:

    Create a two-machine cluster with one master (which controls the cluster),
    and one node (where workloads, like pods and containers run).

    On the first machine
    ====================
    master# kubeadm init master
    Your token is: <token>

    On the second machine
    =====================
    node# kubeadm join node --token=<token> <ip-of-master>

Usage:
  kubeadm [command]

Available Commands:
  init        Run this on the first server you deploy onto.
  join        Run this on other servers to join an existing cluster.
  user        Get initial admin credentials for a cluster.
  manual      Advanced, less-automated functionality, for power users.

Use "kubeadm [command] --help" for more information about a command.

Install

On first machine:

master# kubeadm init master
Initializing kubernetes master...  [done]
Cluster token: 73R2SIPM739TNZOA
Run the following command on machines you want to become nodes:
  kubeadm join node --token=73R2SIPM739TNZOA <master-ip>
You can now run kubectl here.

On N "node" machines:

node# kubeadm join node --token=73R2SIPM739TNZOA <master-ip>
Initializing kubernetes node...    [done]
Bootstrapping certificates...      [done]
Joined node to cluster, see 'kubectl get nodes' on master.

Note [done] would be colored green in all of the above.

Install: alternative for automated deploy

The user (or their config management system) creates a token and passes the same one to both init and join.

master# kubeadm init master --token=73R2SIPM739TNZOA
Initializing kubernetes master...  [done]
You can now run kubectl here.

Pre-flight check

master# kubeadm init master
Error: socat not installed. Unable to proceed.

Control

On master, after Install, kubectl is automatically able to talk to localhost:8080:

master# kubectl get pods
[normal kubectl output]

To mint new user credentials on the master:

master# kubeadm user create -o kubeconfig-bob bob

Waiting for cluster to become ready...       [done]
Creating user certificate for user...        [done]
Waiting for user certificate to be signed... [done]
Your cluster configuration file has been saved in kubeconfig.

laptop# scp <master-ip>:/root/kubeconfig-bob ~/.kubeconfig
laptop# kubectl get pods
[normal kubectl output]

Install-addons

Using CNI network as example:

master# kubectl apply --purge -f \
    https://git.io/kubernetes-addons/<X>.yaml
[normal kubectl apply output]

Add-node

Same as Install – "on node machines".

Secure

node# kubeadm join --token=GARBAGE node <master-ip>
Unable to join mesh network. Check your token.

Work streams – critical path – must have in 1.4 before feature freeze

  1. TLS bootstrapping - so that kubeadm can mint credentials for kubelets and users

    • Requires #25764 and auto-signing #30153 but does not require #30094.
    • @philips, @gtank & @yifan-gu
  2. Fix for #30515 - so that kubeadm can install a kubeconfig which kubelet then picks up

    • @smarterclayton

Work streams – can land after 1.4 feature freeze

  1. Debs and RPMs (and binaries?) - so that kubernetes can be installed in the first place

    • @mikedanese & @dgoodwin
  2. kubeadm implementation - the kubeadm CLI itself, will get bundled into "alpha" kubeadm packages

    • @lukemarsden & @errordeveloper
  3. Implementation of JWS server from #30707 - so that we can implement the simple UX with no dependencies

    • @jbeda & @philips?
  4. Documentation - so that new users can see this in 1.4 (even if it’s caveated with alpha/experimental labels and flags all over it)

    • @lukemarsden
  5. kubeadm alpha packages

    • @lukemarsden, @mikedanese, @dgoodwin

Nice to have

  1. Kubectl apply --purge - so that addons can be maintained using k8s infrastructure

    • @lukemarsden & @errordeveloper

kubeadm implementation plan

Based on @philips' comment here. The key point with this implementation plan is that it requires basically no changes to kubelet except #30515. It also doesn't require kubelet to do TLS bootstrapping - kubeadm handles that.

kubeadm init master

  1. User installs and configures kubelet to look for manifests in /etc/kubernetes/manifests
  2. API server CA certs are generated by kubeadm
  3. kubeadm generates pod manifests to launch API server and etcd
  4. kubeadm pushes replica set for prototype jsw-server and the JWS into API server with host-networking so it is listening on the master node IP
  5. kubeadm prints out the IP of JWS server and JWS token

kubeadm join node --token IP

  1. User installs and configures kubelet to have a kubeconfig at /var/lib/kubelet/kubeconfig but the kubelet is in a crash loop and is restarted by host init system
  2. kubeadm talks to jws-server on IP with token and gets the cacert, then talks to the apiserver TLS bootstrap API to get client cert, etc and generates a kubelet kubeconfig
  3. kubeadm places kubeconfig into /var/lib/kubelet/kubeconfig and waits for kubelet to restart
  4. Mission accomplished, we think.

See also