Bootkube is a helper tool for launching self-hosted Kubernetes clusters.
When launched, bootkube will act as a temporary Kubernetes control-plane (api-server, scheduler, controller-manager), which operates long enough to bootstrap a replacement self-hosted control-plane.
Additionally, bootkube can be used to generate all of the necessary assets for use in bootstrapping a new cluster. These assets can then be modified to support any additional configuration options.
If you are interested in the design and details see the Kubernetes self-hosted design document which provides an architecture overview.
Bootkube has two main commands: render
and start
Bootkube can be used to render all of the assets necessary for bootstrapping a self-hosted Kubernetes cluster. This includes generation of TLS assets, Kubernetes object manifests, and a kubeconfig to connect to the bootstrapped cluster.
To see available options, run:
bootkube render --help
Example:
bootkube render --asset-dir=my-cluster
The resulting assets can be inspected / modified in the generated asset-dir.
To start bootkube use the start
subcommand.
To see available options, run:
bootkube start --help
Example:
bootkube start --asset-dir=my-cluster
First, clone the repo into the proper location in your $GOPATH:
go get -u github.com/kubernetes-incubator/bootkube
cd $GOPATH/src/github.com/kubernetes-incubator/bootkube
Then, to build:
make
And optionally, to install into $GOPATH/bin:
make install
Running make run-single
or make run-multi
resets the single-node or multi-node Vagrant environments, respectively, in the background while compiling bootkube and provisions the fresh VM with bootkube when compilation is complete. This is intended to speed up iteration.
The basic test suite should run automatically on PRs. It can be re-run by commenting to the PR: rktbot run tests
. To whitelist an external contributor's PR temporarily, one can use the ok to test
command.
More extensive self-hosted etcd testing can be run by commenting: rktbot run etcd tests
. The maintainers will be responsible for determining if this is needed and should pass as it may contain experimental or flaky tests.
If changes are made to the checkpointer code you must run a third type of test: rktbot run checkpointer tests
This repository includes scripts for running the Kubernetes conformance tests agains the hack/single-node and hack/multi-node launched clusters.
To run the conformance tests:
make conformance-single
or
make conformance-multi
- Document, test, and create best practice around disaster recovery
- Work upstream to resolve the long-term self-hosted bootstrapping
- Self-host other components like etcd and networking to prove the model
- Get the concept of kubelet checkpointing upstreamed
- Prove out the self-hosted model on all new releases of k8s and different platforms
- Document best-practices for upgrades and upstream the idea of a upgradable daemonset
Want to contribute to bootkube? Have Questions? We are looking for active participation from the community
You can find us at the bootkube channel on Kubernetes slack
bootkube is under the Apache 2.0 license. See the LICENSE file for details.