configure-helper.sh 45 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196
  1. #!/bin/bash
  2. # Copyright 2016 The Kubernetes Authors.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. # This script is for configuring kubernetes master and node instances. It is
  16. # uploaded in the manifests tar ball.
  17. # TODO: this script duplicates templating logic from cluster/saltbase/salt
  18. # using sed. It should use an actual template parser on the manifest
  19. # files.
  20. set -o errexit
  21. set -o nounset
  22. set -o pipefail
  23. function config-ip-firewall {
  24. echo "Configuring IP firewall rules"
  25. # The GCI image has host firewall which drop most inbound/forwarded packets.
  26. # We need to add rules to accept all TCP/UDP/ICMP packets.
  27. if iptables -L INPUT | grep "Chain INPUT (policy DROP)" > /dev/null; then
  28. echo "Add rules to accept all inbound TCP/UDP/ICMP packets"
  29. iptables -A INPUT -w -p TCP -j ACCEPT
  30. iptables -A INPUT -w -p UDP -j ACCEPT
  31. iptables -A INPUT -w -p ICMP -j ACCEPT
  32. fi
  33. if iptables -L FORWARD | grep "Chain FORWARD (policy DROP)" > /dev/null; then
  34. echo "Add rules to accept all forwarded TCP/UDP/ICMP packets"
  35. iptables -A FORWARD -w -p TCP -j ACCEPT
  36. iptables -A FORWARD -w -p UDP -j ACCEPT
  37. iptables -A FORWARD -w -p ICMP -j ACCEPT
  38. fi
  39. }
  40. function create-dirs {
  41. echo "Creating required directories"
  42. mkdir -p /var/lib/kubelet
  43. mkdir -p /etc/kubernetes/manifests
  44. if [[ "${KUBERNETES_MASTER:-}" == "false" ]]; then
  45. mkdir -p /var/lib/kube-proxy
  46. fi
  47. }
  48. # Formats the given device ($1) if needed and mounts it at given mount point
  49. # ($2).
  50. function safe-format-and-mount() {
  51. device=$1
  52. mountpoint=$2
  53. # Format only if the disk is not already formatted.
  54. if ! tune2fs -l "${device}" ; then
  55. echo "Formatting '${device}'"
  56. mkfs.ext4 -F -E lazy_itable_init=0,lazy_journal_init=0,discard "${device}"
  57. fi
  58. mkdir -p "${mountpoint}"
  59. echo "Mounting '${device}' at '${mountpoint}'"
  60. mount -o discard,defaults "${device}" "${mountpoint}"
  61. }
  62. # Local ssds, if present, are mounted at /mnt/disks/ssdN.
  63. function ensure-local-ssds() {
  64. for ssd in /dev/disk/by-id/google-local-ssd-*; do
  65. if [ -e "${ssd}" ]; then
  66. ssdnum=`echo ${ssd} | sed -e 's/\/dev\/disk\/by-id\/google-local-ssd-\([0-9]*\)/\1/'`
  67. ssdmount="/mnt/disks/ssd${ssdnum}/"
  68. mkdir -p ${ssdmount}
  69. safe-format-and-mount "${ssd}" ${ssdmount}
  70. echo "Mounted local SSD $ssd at ${ssdmount}"
  71. chmod a+w ${ssdmount}
  72. else
  73. echo "No local SSD disks found."
  74. fi
  75. done
  76. }
  77. # Installs logrotate configuration files
  78. function setup-logrotate() {
  79. mkdir -p /etc/logrotate.d/
  80. cat >/etc/logrotate.d/docker-containers <<EOF
  81. /var/lib/docker/containers/*/*-json.log {
  82. rotate 5
  83. copytruncate
  84. missingok
  85. notifempty
  86. compress
  87. maxsize 10M
  88. daily
  89. dateext
  90. dateformat -%Y%m%d-%s
  91. create 0644 root root
  92. }
  93. EOF
  94. # Configuration for k8s services that redirect logs to /var/log/<service>.log
  95. # files. Whenever logrotate is ran, this config will:
  96. # * rotate the log file if its size is > 100Mb OR if one day has elapsed
  97. # * save rotated logs into a gzipped timestamped backup
  98. # * log file timestamp (controlled by 'dateformat') includes seconds too. this
  99. # ensures that logrotate can generate unique logfiles during each rotation
  100. # (otherwise it skips rotation if 'maxsize' is reached multiple times in a
  101. # day).
  102. # * keep only 5 old (rotated) logs, and will discard older logs.
  103. local logrotate_files=( "kube-scheduler" "kube-proxy" "kube-apiserver" "kube-controller-manager" "kube-addons" )
  104. for file in "${logrotate_files[@]}" ; do
  105. cat > /etc/logrotate.d/${file} <<EOF
  106. /var/log/${file}.log {
  107. rotate 5
  108. copytruncate
  109. missingok
  110. notifempty
  111. compress
  112. maxsize 100M
  113. daily
  114. dateext
  115. dateformat -%Y%m%d-%s
  116. create 0644 root root
  117. }
  118. EOF
  119. done
  120. }
  121. # Finds the master PD device; returns it in MASTER_PD_DEVICE
  122. function find-master-pd {
  123. MASTER_PD_DEVICE=""
  124. if [[ ! -e /dev/disk/by-id/google-master-pd ]]; then
  125. return
  126. fi
  127. device_info=$(ls -l /dev/disk/by-id/google-master-pd)
  128. relative_path=${device_info##* }
  129. MASTER_PD_DEVICE="/dev/disk/by-id/${relative_path}"
  130. }
  131. # Mounts a persistent disk (formatting if needed) to store the persistent data
  132. # on the master -- etcd's data, a few settings, and security certs/keys/tokens.
  133. # safe-format-and-mount only formats an unformatted disk, and mkdir -p will
  134. # leave a directory be if it already exists.
  135. function mount-master-pd {
  136. find-master-pd
  137. if [[ -z "${MASTER_PD_DEVICE:-}" ]]; then
  138. return
  139. fi
  140. echo "Mounting master-pd"
  141. local -r pd_path="/dev/disk/by-id/google-master-pd"
  142. local -r mount_point="/mnt/disks/master-pd"
  143. # Format and mount the disk, create directories on it for all of the master's
  144. # persistent data, and link them to where they're used.
  145. mkdir -p "${mount_point}"
  146. safe-format-and-mount "${pd_path}" "${mount_point}"
  147. echo "Mounted master-pd '${pd_path}' at '${mount_point}'"
  148. # NOTE: These locations on the PD store persistent data, so to maintain
  149. # upgradeability, these locations should not change. If they do, take care
  150. # to maintain a migration path from these locations to whatever new
  151. # locations.
  152. # Contains all the data stored in etcd.
  153. mkdir -m 700 -p "${mount_point}/var/etcd"
  154. ln -s -f "${mount_point}/var/etcd" /var/etcd
  155. mkdir -p /etc/srv
  156. # Contains the dynamically generated apiserver auth certs and keys.
  157. mkdir -p "${mount_point}/srv/kubernetes"
  158. ln -s -f "${mount_point}/srv/kubernetes" /etc/srv/kubernetes
  159. # Directory for kube-apiserver to store SSH key (if necessary).
  160. mkdir -p "${mount_point}/srv/sshproxy"
  161. ln -s -f "${mount_point}/srv/sshproxy" /etc/srv/sshproxy
  162. if ! id etcd &>/dev/null; then
  163. useradd -s /sbin/nologin -d /var/etcd etcd
  164. fi
  165. chown -R etcd "${mount_point}/var/etcd"
  166. chgrp -R etcd "${mount_point}/var/etcd"
  167. }
  168. # After the first boot and on upgrade, these files exist on the master-pd
  169. # and should never be touched again (except perhaps an additional service
  170. # account, see NB below.)
  171. function create-master-auth {
  172. echo "Creating master auth files"
  173. local -r auth_dir="/etc/srv/kubernetes"
  174. if [[ ! -e "${auth_dir}/ca.crt" && ! -z "${CA_CERT:-}" && ! -z "${MASTER_CERT:-}" && ! -z "${MASTER_KEY:-}" ]]; then
  175. echo "${CA_CERT}" | base64 --decode > "${auth_dir}/ca.crt"
  176. echo "${MASTER_CERT}" | base64 --decode > "${auth_dir}/server.cert"
  177. echo "${MASTER_KEY}" | base64 --decode > "${auth_dir}/server.key"
  178. fi
  179. local -r basic_auth_csv="${auth_dir}/basic_auth.csv"
  180. if [[ ! -e "${basic_auth_csv}" ]]; then
  181. echo "${KUBE_PASSWORD},${KUBE_USER},admin" > "${basic_auth_csv}"
  182. fi
  183. local -r known_tokens_csv="${auth_dir}/known_tokens.csv"
  184. if [[ ! -e "${known_tokens_csv}" ]]; then
  185. echo "${KUBE_BEARER_TOKEN},admin,admin" > "${known_tokens_csv}"
  186. echo "${KUBELET_TOKEN},kubelet,kubelet" >> "${known_tokens_csv}"
  187. echo "${KUBE_PROXY_TOKEN},kube_proxy,kube_proxy" >> "${known_tokens_csv}"
  188. fi
  189. local use_cloud_config="false"
  190. cat <<EOF >/etc/gce.conf
  191. [global]
  192. EOF
  193. if [[ -n "${PROJECT_ID:-}" && -n "${TOKEN_URL:-}" && -n "${TOKEN_BODY:-}" && -n "${NODE_NETWORK:-}" ]]; then
  194. use_cloud_config="true"
  195. cat <<EOF >>/etc/gce.conf
  196. token-url = ${TOKEN_URL}
  197. token-body = ${TOKEN_BODY}
  198. project-id = ${PROJECT_ID}
  199. network-name = ${NODE_NETWORK}
  200. EOF
  201. fi
  202. if [[ -n "${NODE_INSTANCE_PREFIX:-}" ]]; then
  203. use_cloud_config="true"
  204. if [[ -n "${NODE_TAGS:-}" ]]; then
  205. local -r node_tags="${NODE_TAGS}"
  206. else
  207. local -r node_tags="${NODE_INSTANCE_PREFIX}"
  208. fi
  209. cat <<EOF >>/etc/gce.conf
  210. node-tags = ${node_tags}
  211. node-instance-prefix = ${NODE_INSTANCE_PREFIX}
  212. EOF
  213. fi
  214. if [[ -n "${MULTIZONE:-}" ]]; then
  215. use_cloud_config="true"
  216. cat <<EOF >>/etc/gce.conf
  217. multizone = ${MULTIZONE}
  218. EOF
  219. fi
  220. if [[ "${use_cloud_config}" != "true" ]]; then
  221. rm -f /etc/gce.conf
  222. fi
  223. if [[ -n "${GCP_AUTHN_URL:-}" ]]; then
  224. cat <<EOF >/etc/gcp_authn.config
  225. clusters:
  226. - name: gcp-authentication-server
  227. cluster:
  228. server: ${GCP_AUTHN_URL}
  229. users:
  230. - name: kube-apiserver
  231. user:
  232. auth-provider:
  233. name: gcp
  234. current-context: webhook
  235. contexts:
  236. - context:
  237. cluster: gcp-authentication-server
  238. user: kube-apiserver
  239. name: webhook
  240. EOF
  241. fi
  242. if [[ -n "${GCP_AUTHZ_URL:-}" ]]; then
  243. cat <<EOF >/etc/gcp_authz.config
  244. clusters:
  245. - name: gcp-authorization-server
  246. cluster:
  247. server: ${GCP_AUTHZ_URL}
  248. users:
  249. - name: kube-apiserver
  250. user:
  251. auth-provider:
  252. name: gcp
  253. current-context: webhook
  254. contexts:
  255. - context:
  256. cluster: gcp-authorization-server
  257. user: kube-apiserver
  258. name: webhook
  259. EOF
  260. fi
  261. if [[ -n "${GCP_IMAGE_VERIFICATION_URL:-}" ]]; then
  262. # This is the config file for the image review webhook.
  263. cat <<EOF >/etc/gcp_image_review.config
  264. clusters:
  265. - name: gcp-image-review-server
  266. cluster:
  267. server: ${GCP_IMAGE_VERIFICATION_URL}
  268. users:
  269. - name: kube-apiserver
  270. user:
  271. auth-provider:
  272. name: gcp
  273. current-context: webhook
  274. contexts:
  275. - context:
  276. cluster: gcp-image-review-server
  277. user: kube-apiserver
  278. name: webhook
  279. EOF
  280. # This is the config for the image review admission controller.
  281. cat <<EOF >/etc/admission_controller.config
  282. imagePolicy:
  283. kubeConfigFile: /etc/gcp_image_review.config
  284. allowTTL: 30
  285. denyTTL: 30
  286. retryBackoff: 500
  287. defaultAllow: true
  288. EOF
  289. fi
  290. }
  291. function create-kubelet-kubeconfig {
  292. echo "Creating kubelet kubeconfig file"
  293. if [[ -z "${KUBELET_CA_CERT:-}" ]]; then
  294. KUBELET_CA_CERT="${CA_CERT}"
  295. fi
  296. cat <<EOF >/var/lib/kubelet/kubeconfig
  297. apiVersion: v1
  298. kind: Config
  299. users:
  300. - name: kubelet
  301. user:
  302. client-certificate-data: ${KUBELET_CERT}
  303. client-key-data: ${KUBELET_KEY}
  304. clusters:
  305. - name: local
  306. cluster:
  307. certificate-authority-data: ${KUBELET_CA_CERT}
  308. contexts:
  309. - context:
  310. cluster: local
  311. user: kubelet
  312. name: service-account-context
  313. current-context: service-account-context
  314. EOF
  315. }
  316. # Uses KUBELET_CA_CERT (falling back to CA_CERT), KUBELET_CERT, and KUBELET_KEY
  317. # to generate a kubeconfig file for the kubelet to securely connect to the apiserver.
  318. function create-master-kubelet-auth {
  319. # Only configure the kubelet on the master if the required variables are
  320. # set in the environment.
  321. if [[ -n "${KUBELET_APISERVER:-}" && -n "${KUBELET_CERT:-}" && -n "${KUBELET_KEY:-}" ]]; then
  322. create-kubelet-kubeconfig
  323. fi
  324. }
  325. function create-kubeproxy-kubeconfig {
  326. echo "Creating kube-proxy kubeconfig file"
  327. cat <<EOF >/var/lib/kube-proxy/kubeconfig
  328. apiVersion: v1
  329. kind: Config
  330. users:
  331. - name: kube-proxy
  332. user:
  333. token: ${KUBE_PROXY_TOKEN}
  334. clusters:
  335. - name: local
  336. cluster:
  337. certificate-authority-data: ${CA_CERT}
  338. contexts:
  339. - context:
  340. cluster: local
  341. user: kube-proxy
  342. name: service-account-context
  343. current-context: service-account-context
  344. EOF
  345. }
  346. function assemble-docker-flags {
  347. echo "Assemble docker command line flags"
  348. local docker_opts="-p /var/run/docker.pid --iptables=false --ip-masq=false"
  349. if [[ "${TEST_CLUSTER:-}" == "true" ]]; then
  350. docker_opts+=" --log-level=debug"
  351. else
  352. docker_opts+=" --log-level=warn"
  353. fi
  354. local use_net_plugin="true"
  355. if [[ "${NETWORK_PROVIDER:-}" == "kubenet" || "${NETWORK_PROVIDER:-}" == "cni" ]]; then
  356. # set docker0 cidr to private ip address range to avoid conflict with cbr0 cidr range
  357. docker_opts+=" --bip=169.254.123.1/24"
  358. else
  359. use_net_plugin="false"
  360. docker_opts+=" --bridge=cbr0"
  361. fi
  362. # Decide whether to enable a docker registry mirror. This is taken from
  363. # the "kube-env" metadata value.
  364. if [[ -n "${DOCKER_REGISTRY_MIRROR_URL:-}" ]]; then
  365. echo "Enable docker registry mirror at: ${DOCKER_REGISTRY_MIRROR_URL}"
  366. docker_opts+=" --registry-mirror=${DOCKER_REGISTRY_MIRROR_URL}"
  367. fi
  368. echo "DOCKER_OPTS=\"${docker_opts} ${EXTRA_DOCKER_OPTS:-}\"" > /etc/default/docker
  369. # If using a network plugin, we need to explicitly restart docker daemon, because
  370. # kubelet will not do it.
  371. if [[ "${use_net_plugin}" == "true" ]]; then
  372. echo "Docker command line is updated. Restart docker to pick it up"
  373. systemctl restart docker
  374. fi
  375. }
  376. # A helper function for loading a docker image. It keeps trying up to 5 times.
  377. #
  378. # $1: Full path of the docker image
  379. function try-load-docker-image {
  380. local -r img=$1
  381. echo "Try to load docker image file ${img}"
  382. # Temporarily turn off errexit, because we don't want to exit on first failure.
  383. set +e
  384. local -r max_attempts=5
  385. local -i attempt_num=1
  386. until timeout 30 docker load -i "${img}"; do
  387. if [[ "${attempt_num}" == "${max_attempts}" ]]; then
  388. echo "Fail to load docker image file ${img} after ${max_attempts} retries. Exist!!"
  389. exit 1
  390. else
  391. attempt_num=$((attempt_num+1))
  392. sleep 5
  393. fi
  394. done
  395. # Re-enable errexit.
  396. set -e
  397. }
  398. # Loads kube-system docker images. It is better to do it before starting kubelet,
  399. # as kubelet will restart docker daemon, which may interfere with loading images.
  400. function load-docker-images {
  401. echo "Start loading kube-system docker images"
  402. local -r img_dir="${KUBE_HOME}/kube-docker-files"
  403. if [[ "${KUBERNETES_MASTER:-}" == "true" ]]; then
  404. try-load-docker-image "${img_dir}/kube-apiserver.tar"
  405. try-load-docker-image "${img_dir}/kube-controller-manager.tar"
  406. try-load-docker-image "${img_dir}/kube-scheduler.tar"
  407. else
  408. try-load-docker-image "${img_dir}/kube-proxy.tar"
  409. fi
  410. }
  411. # This function assembles the kubelet systemd service file and starts it
  412. # using systemctl.
  413. function start-kubelet {
  414. echo "Start kubelet"
  415. local kubelet_bin="${KUBE_HOME}/bin/kubelet"
  416. local -r version="$("${kubelet_bin}" --version=true | cut -f2 -d " ")"
  417. local -r builtin_kubelet="/usr/bin/kubelet"
  418. if [[ "${TEST_CLUSTER:-}" == "true" ]]; then
  419. # Determine which binary to use on test clusters. We use the built-in
  420. # version only if the downloaded version is the same as the built-in
  421. # version. This allows GCI to run some of the e2e tests to qualify the
  422. # built-in kubelet.
  423. if [[ -x "${builtin_kubelet}" ]]; then
  424. local -r builtin_version="$("${builtin_kubelet}" --version=true | cut -f2 -d " ")"
  425. if [[ "${builtin_version}" == "${version}" ]]; then
  426. kubelet_bin="${builtin_kubelet}"
  427. fi
  428. fi
  429. fi
  430. echo "Using kubelet binary at ${kubelet_bin}"
  431. local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
  432. flags+=" --allow-privileged=true"
  433. flags+=" --babysit-daemons=true"
  434. flags+=" --cgroup-root=/"
  435. flags+=" --cloud-provider=gce"
  436. flags+=" --cluster-dns=${DNS_SERVER_IP}"
  437. flags+=" --cluster-domain=${DNS_DOMAIN}"
  438. flags+=" --config=/etc/kubernetes/manifests"
  439. flags+=" --kubelet-cgroups=/kubelet"
  440. flags+=" --system-cgroups=/system"
  441. if [[ -n "${KUBELET_PORT:-}" ]]; then
  442. flags+=" --port=${KUBELET_PORT}"
  443. fi
  444. local reconcile_cidr="true"
  445. if [[ "${KUBERNETES_MASTER:-}" == "true" ]]; then
  446. flags+=" --enable-debugging-handlers=false"
  447. flags+=" --hairpin-mode=none"
  448. if [[ ! -z "${KUBELET_APISERVER:-}" && ! -z "${KUBELET_CERT:-}" && ! -z "${KUBELET_KEY:-}" ]]; then
  449. flags+=" --api-servers=https://${KUBELET_APISERVER}"
  450. flags+=" --register-schedulable=false"
  451. flags+=" --pod-cidr=10.123.45.0/30"
  452. reconcile_cidr="false"
  453. else
  454. flags+=" --pod-cidr=${MASTER_IP_RANGE}"
  455. fi
  456. else # For nodes
  457. flags+=" --enable-debugging-handlers=true"
  458. flags+=" --api-servers=https://${KUBERNETES_MASTER_NAME}"
  459. if [[ "${HAIRPIN_MODE:-}" == "promiscuous-bridge" ]] || \
  460. [[ "${HAIRPIN_MODE:-}" == "hairpin-veth" ]] || \
  461. [[ "${HAIRPIN_MODE:-}" == "none" ]]; then
  462. flags+=" --hairpin-mode=${HAIRPIN_MODE}"
  463. fi
  464. fi
  465. # Network plugin
  466. if [[ -n "${NETWORK_PROVIDER:-}" ]]; then
  467. flags+=" --network-plugin-dir=/home/kubernetes/bin"
  468. flags+=" --network-plugin=${NETWORK_PROVIDER}"
  469. fi
  470. flags+=" --reconcile-cidr=${reconcile_cidr}"
  471. if [[ -n "${NON_MASQUERADE_CIDR:-}" ]]; then
  472. flag+=" --non-masquerade-cidr=${NON_MASQUERADE_CIDR}"
  473. fi
  474. if [[ "${ENABLE_MANIFEST_URL:-}" == "true" ]]; then
  475. flags+=" --manifest-url=${MANIFEST_URL}"
  476. flags+=" --manifest-url-header=${MANIFEST_URL_HEADER}"
  477. fi
  478. if [[ -n "${ENABLE_CUSTOM_METRICS:-}" ]]; then
  479. flags+=" --enable-custom-metrics=${ENABLE_CUSTOM_METRICS}"
  480. fi
  481. if [[ -n "${NODE_LABELS:-}" ]]; then
  482. flags+=" --node-labels=${NODE_LABELS}"
  483. fi
  484. if [[ -n "${EVICTION_HARD:-}" ]]; then
  485. flags+=" --eviction-hard=${EVICTION_HARD}"
  486. fi
  487. if [[ "${ALLOCATE_NODE_CIDRS:-}" == "true" ]]; then
  488. flags+=" --configure-cbr0=${ALLOCATE_NODE_CIDRS}"
  489. fi
  490. if [[ -n "${FEATURE_GATES:-}" ]]; then
  491. flags+=" --feature-gates=${FEATURE_GATES}"
  492. fi
  493. local -r kubelet_env_file="/etc/default/kubelet"
  494. echo "KUBELET_OPTS=\"${flags}\"" > "${kubelet_env_file}"
  495. # Write the systemd service file for kubelet.
  496. cat <<EOF >/etc/systemd/system/kubelet.service
  497. [Unit]
  498. Description=Kubernetes kubelet
  499. Requires=network-online.target
  500. After=network-online.target
  501. [Service]
  502. Restart=always
  503. RestartSec=10
  504. EnvironmentFile=${kubelet_env_file}
  505. ExecStart=${kubelet_bin} \$KUBELET_OPTS
  506. [Install]
  507. WantedBy=multi-user.target
  508. EOF
  509. # Flush iptables nat table
  510. iptables -t nat -F || true
  511. systemctl start kubelet.service
  512. }
  513. # Create the log file and set its properties.
  514. #
  515. # $1 is the file to create.
  516. function prepare-log-file {
  517. touch $1
  518. chmod 644 $1
  519. chown root:root $1
  520. }
  521. # Starts kube-proxy pod.
  522. function start-kube-proxy {
  523. echo "Start kube-proxy pod"
  524. prepare-log-file /var/log/kube-proxy.log
  525. local -r src_file="${KUBE_HOME}/kube-manifests/kubernetes/kube-proxy.manifest"
  526. remove-salt-config-comments "${src_file}"
  527. local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
  528. local kube_docker_registry="gcr.io/google_containers"
  529. if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
  530. kube_docker_registry=${KUBE_DOCKER_REGISTRY}
  531. fi
  532. local -r kube_proxy_docker_tag=$(cat /home/kubernetes/kube-docker-files/kube-proxy.docker_tag)
  533. local api_servers="--master=https://${KUBERNETES_MASTER_NAME}"
  534. local params="${KUBEPROXY_TEST_LOG_LEVEL:-"--v=2"}"
  535. if [[ -n "${FEATURE_GATES:-}" ]]; then
  536. params+=" --feature-gates=${FEATURE_GATES}"
  537. fi
  538. if [[ -n "${KUBEPROXY_TEST_ARGS:-}" ]]; then
  539. params+=" ${KUBE_PROXY_TEST_ARGS}"
  540. fi
  541. sed -i -e "s@{{kubeconfig}}@${kubeconfig}@g" ${src_file}
  542. sed -i -e "s@{{pillar\['kube_docker_registry'\]}}@${kube_docker_registry}@g" ${src_file}
  543. sed -i -e "s@{{pillar\['kube-proxy_docker_tag'\]}}@${kube_proxy_docker_tag}@g" ${src_file}
  544. sed -i -e "s@{{params}}@${params}@g" ${src_file}
  545. sed -i -e "s@{{ cpurequest }}@100m@g" ${src_file}
  546. sed -i -e "s@{{api_servers_with_port}}@${api_servers}@g" ${src_file}
  547. if [[ -n "${CLUSTER_IP_RANGE:-}" ]]; then
  548. sed -i -e "s@{{cluster_cidr}}@--cluster-cidr=${CLUSTER_IP_RANGE}@g" ${src_file}
  549. fi
  550. cp "${src_file}" /etc/kubernetes/manifests
  551. }
  552. # Replaces the variables in the etcd manifest file with the real values, and then
  553. # copy the file to the manifest dir
  554. # $1: value for variable 'suffix'
  555. # $2: value for variable 'port'
  556. # $3: value for variable 'server_port'
  557. # $4: value for variable 'cpulimit'
  558. # $5: pod name, which should be either etcd or etcd-events
  559. function prepare-etcd-manifest {
  560. local host_name=$(hostname)
  561. local etcd_cluster=""
  562. local cluster_state="new"
  563. for host in $(echo "${INITIAL_ETCD_CLUSTER:-${host_name}}" | tr "," "\n"); do
  564. etcd_host="etcd-${host}=http://${host}:$3"
  565. if [[ -n "${etcd_cluster}" ]]; then
  566. etcd_cluster+=","
  567. cluster_state="existing"
  568. fi
  569. etcd_cluster+="${etcd_host}"
  570. done
  571. local -r temp_file="/tmp/$5"
  572. cp "${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/etcd.manifest" "${temp_file}"
  573. remove-salt-config-comments "${temp_file}"
  574. sed -i -e "s@{{ *suffix *}}@$1@g" "${temp_file}"
  575. sed -i -e "s@{{ *port *}}@$2@g" "${temp_file}"
  576. sed -i -e "s@{{ *server_port *}}@$3@g" "${temp_file}"
  577. sed -i -e "s@{{ *cpulimit *}}@\"$4\"@g" "${temp_file}"
  578. sed -i -e "s@{{ *hostname *}}@$host_name@g" "${temp_file}"
  579. sed -i -e "s@{{ *etcd_cluster *}}@$etcd_cluster@g" "${temp_file}"
  580. sed -i -e "s@{{ *storage_backend *}}@${STORAGE_BACKEND:-}@g" "${temp_file}"
  581. sed -i -e "s@{{ *cluster_state *}}@$cluster_state@g" "${temp_file}"
  582. if [[ -n "${TEST_ETCD_VERSION:-}" ]]; then
  583. sed -i -e "s@{{ *pillar\.get('etcd_docker_tag', '\(.*\)') *}}@${TEST_ETCD_VERSION}@g" "${temp_file}"
  584. else
  585. sed -i -e "s@{{ *pillar\.get('etcd_docker_tag', '\(.*\)') *}}@\1@g" "${temp_file}"
  586. fi
  587. # Replace the volume host path.
  588. sed -i -e "s@/mnt/master-pd/var/etcd@/mnt/disks/master-pd/var/etcd@g" "${temp_file}"
  589. mv "${temp_file}" /etc/kubernetes/manifests
  590. }
  591. function start-etcd-empty-dir-cleanup-pod {
  592. cp "${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml" "/etc/kubernetes/manifests"
  593. }
  594. # Starts etcd server pod (and etcd-events pod if needed).
  595. # More specifically, it prepares dirs and files, sets the variable value
  596. # in the manifests, and copies them to /etc/kubernetes/manifests.
  597. function start-etcd-servers {
  598. echo "Start etcd pods"
  599. if [[ -d /etc/etcd ]]; then
  600. rm -rf /etc/etcd
  601. fi
  602. if [[ -e /etc/default/etcd ]]; then
  603. rm -f /etc/default/etcd
  604. fi
  605. if [[ -e /etc/systemd/system/etcd.service ]]; then
  606. rm -f /etc/systemd/system/etcd.service
  607. fi
  608. if [[ -e /etc/init.d/etcd ]]; then
  609. rm -f /etc/init.d/etcd
  610. fi
  611. prepare-log-file /var/log/etcd.log
  612. prepare-etcd-manifest "" "2379" "2380" "200m" "etcd.manifest"
  613. prepare-log-file /var/log/etcd-events.log
  614. prepare-etcd-manifest "-events" "4002" "2381" "100m" "etcd-events.manifest"
  615. }
  616. # Calculates the following variables based on env variables, which will be used
  617. # by the manifests of several kube-master components.
  618. # CLOUD_CONFIG_OPT
  619. # CLOUD_CONFIG_VOLUME
  620. # CLOUD_CONFIG_MOUNT
  621. # DOCKER_REGISTRY
  622. function compute-master-manifest-variables {
  623. CLOUD_CONFIG_OPT=""
  624. CLOUD_CONFIG_VOLUME=""
  625. CLOUD_CONFIG_MOUNT=""
  626. if [[ -f /etc/gce.conf ]]; then
  627. CLOUD_CONFIG_OPT="--cloud-config=/etc/gce.conf"
  628. CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\"}},"
  629. CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
  630. fi
  631. DOCKER_REGISTRY="gcr.io/google_containers"
  632. if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
  633. DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
  634. fi
  635. }
  636. # A helper function for removing salt configuration and comments from a file.
  637. # This is mainly for preparing a manifest file.
  638. #
  639. # $1: Full path of the file to manipulate
  640. function remove-salt-config-comments {
  641. # Remove salt configuration.
  642. sed -i "/^[ |\t]*{[#|%]/d" $1
  643. # Remove comments.
  644. sed -i "/^[ |\t]*#/d" $1
  645. }
  646. # Starts kubernetes apiserver.
  647. # It prepares the log file, loads the docker image, calculates variables, sets them
  648. # in the manifest file, and then copies the manifest file to /etc/kubernetes/manifests.
  649. #
  650. # Assumed vars (which are calculated in function compute-master-manifest-variables)
  651. # CLOUD_CONFIG_OPT
  652. # CLOUD_CONFIG_VOLUME
  653. # CLOUD_CONFIG_MOUNT
  654. # DOCKER_REGISTRY
  655. function start-kube-apiserver {
  656. echo "Start kubernetes api-server"
  657. prepare-log-file /var/log/kube-apiserver.log
  658. # Calculate variables and assemble the command line.
  659. local params="${API_SERVER_TEST_LOG_LEVEL:-"--v=2"} ${APISERVER_TEST_ARGS:-} ${CLOUD_CONFIG_OPT}"
  660. params+=" --address=127.0.0.1"
  661. params+=" --allow-privileged=true"
  662. params+=" --authorization-policy-file=/etc/srv/kubernetes/abac-authz-policy.jsonl"
  663. params+=" --basic-auth-file=/etc/srv/kubernetes/basic_auth.csv"
  664. params+=" --cloud-provider=gce"
  665. params+=" --client-ca-file=/etc/srv/kubernetes/ca.crt"
  666. params+=" --etcd-servers=http://127.0.0.1:2379"
  667. params+=" --etcd-servers-overrides=/events#http://127.0.0.1:4002"
  668. params+=" --secure-port=443"
  669. params+=" --tls-cert-file=/etc/srv/kubernetes/server.cert"
  670. params+=" --tls-private-key-file=/etc/srv/kubernetes/server.key"
  671. params+=" --token-auth-file=/etc/srv/kubernetes/known_tokens.csv"
  672. if [[ -n "${STORAGE_BACKEND:-}" ]]; then
  673. params+=" --storage-backend=${STORAGE_BACKEND}"
  674. fi
  675. if [[ -n "${ENABLE_GARBAGE_COLLECTOR:-}" ]]; then
  676. params+=" --enable-garbage-collector=${ENABLE_GARBAGE_COLLECTOR}"
  677. fi
  678. if [[ -n "${NUM_NODES:-}" ]]; then
  679. # Set amount of memory available for apiserver based on number of nodes.
  680. # TODO: Once we start setting proper requests and limits for apiserver
  681. # we should reuse the same logic here instead of current heuristic.
  682. params+=" --target-ram-mb=$((${NUM_NODES} * 60))"
  683. fi
  684. if [[ -n "${SERVICE_CLUSTER_IP_RANGE:-}" ]]; then
  685. params+=" --service-cluster-ip-range=${SERVICE_CLUSTER_IP_RANGE}"
  686. fi
  687. local admission_controller_config_mount=""
  688. local admission_controller_config_volume=""
  689. local image_policy_webhook_config_mount=""
  690. local image_policy_webhook_config_volume=""
  691. if [[ -n "${ADMISSION_CONTROL:-}" ]]; then
  692. params+=" --admission-control=${ADMISSION_CONTROL}"
  693. if [[ ${ADMISSION_CONTROL} == *"ImagePolicyWebhook"* ]]; then
  694. params+=" --admission-control-config-file=/etc/admission_controller.config"
  695. # Mount the file to configure admission controllers if ImagePolicyWebhook is set.
  696. admission_controller_config_mount="{\"name\": \"admissioncontrollerconfigmount\",\"mountPath\": \"/etc/admission_controller.config\", \"readOnly\": false},"
  697. admission_controller_config_volume="{\"name\": \"admissioncontrollerconfigmount\",\"hostPath\": {\"path\": \"/etc/admission_controller.config\"}},"
  698. # Mount the file to configure the ImagePolicyWebhook's webhook.
  699. image_policy_webhook_config_mount="{\"name\": \"imagepolicywebhookconfigmount\",\"mountPath\": \"/etc/gcp_image_review.config\", \"readOnly\": false},"
  700. image_policy_webhook_config_volume="{\"name\": \"imagepolicywebhookconfigmount\",\"hostPath\": {\"path\": \"/etc/gcp_image_review.config\"}},"
  701. fi
  702. fi
  703. if [[ -n "${KUBE_APISERVER_REQUEST_TIMEOUT:-}" ]]; then
  704. params+=" --min-request-timeout=${KUBE_APISERVER_REQUEST_TIMEOUT}"
  705. fi
  706. if [[ -n "${RUNTIME_CONFIG:-}" ]]; then
  707. params+=" --runtime-config=${RUNTIME_CONFIG}"
  708. fi
  709. if [[ -n "${FEATURE_GATES:-}" ]]; then
  710. params+=" --feature-gates=${FEATURE_GATES}"
  711. fi
  712. if [[ -n "${PROJECT_ID:-}" && -n "${TOKEN_URL:-}" && -n "${TOKEN_BODY:-}" && -n "${NODE_NETWORK:-}" ]]; then
  713. local -r vm_external_ip=$(curl --retry 5 --retry-delay 3 --fail --silent -H 'Metadata-Flavor: Google' "http://metadata/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip")
  714. params+=" --advertise-address=${vm_external_ip}"
  715. params+=" --ssh-user=${PROXY_SSH_USER}"
  716. params+=" --ssh-keyfile=/etc/srv/sshproxy/.sshkeyfile"
  717. fi
  718. local webhook_authn_config_mount=""
  719. local webhook_authn_config_volume=""
  720. if [[ -n "${GCP_AUTHN_URL:-}" ]]; then
  721. params+=" --authentication-token-webhook-config-file=/etc/gcp_authn.config"
  722. webhook_authn_config_mount="{\"name\": \"webhookauthnconfigmount\",\"mountPath\": \"/etc/gcp_authn.config\", \"readOnly\": false},"
  723. webhook_authn_config_volume="{\"name\": \"webhookauthnconfigmount\",\"hostPath\": {\"path\": \"/etc/gcp_authn.config\"}},"
  724. fi
  725. params+=" --authorization-mode=ABAC"
  726. local webhook_config_mount=""
  727. local webhook_config_volume=""
  728. if [[ -n "${GCP_AUTHZ_URL:-}" ]]; then
  729. params+=",Webhook --authorization-webhook-config-file=/etc/gcp_authz.config"
  730. webhook_config_mount="{\"name\": \"webhookconfigmount\",\"mountPath\": \"/etc/gcp_authz.config\", \"readOnly\": false},"
  731. webhook_config_volume="{\"name\": \"webhookconfigmount\",\"hostPath\": {\"path\": \"/etc/gcp_authz.config\"}},"
  732. fi
  733. local -r src_dir="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty"
  734. if [[ -n "${KUBE_USER:-}" ]]; then
  735. local -r abac_policy_json="${src_dir}/abac-authz-policy.jsonl"
  736. remove-salt-config-comments "${abac_policy_json}"
  737. sed -i -e "s/{{kube_user}}/${KUBE_USER}/g" "${abac_policy_json}"
  738. cp "${abac_policy_json}" /etc/srv/kubernetes/
  739. fi
  740. src_file="${src_dir}/kube-apiserver.manifest"
  741. remove-salt-config-comments "${src_file}"
  742. # Evaluate variables.
  743. local -r kube_apiserver_docker_tag=$(cat /home/kubernetes/kube-docker-files/kube-apiserver.docker_tag)
  744. sed -i -e "s@{{params}}@${params}@g" "${src_file}"
  745. sed -i -e "s@{{srv_kube_path}}@/etc/srv/kubernetes@g" "${src_file}"
  746. sed -i -e "s@{{srv_sshproxy_path}}@/etc/srv/sshproxy@g" "${src_file}"
  747. sed -i -e "s@{{cloud_config_mount}}@${CLOUD_CONFIG_MOUNT}@g" "${src_file}"
  748. sed -i -e "s@{{cloud_config_volume}}@${CLOUD_CONFIG_VOLUME}@g" "${src_file}"
  749. sed -i -e "s@{{pillar\['kube_docker_registry'\]}}@${DOCKER_REGISTRY}@g" "${src_file}"
  750. sed -i -e "s@{{pillar\['kube-apiserver_docker_tag'\]}}@${kube_apiserver_docker_tag}@g" "${src_file}"
  751. sed -i -e "s@{{pillar\['allow_privileged'\]}}@true@g" "${src_file}"
  752. sed -i -e "s@{{secure_port}}@443@g" "${src_file}"
  753. sed -i -e "s@{{secure_port}}@8080@g" "${src_file}"
  754. sed -i -e "s@{{additional_cloud_config_mount}}@@g" "${src_file}"
  755. sed -i -e "s@{{additional_cloud_config_volume}}@@g" "${src_file}"
  756. sed -i -e "s@{{webhook_authn_config_mount}}@${webhook_authn_config_mount}@g" "${src_file}"
  757. sed -i -e "s@{{webhook_authn_config_volume}}@${webhook_authn_config_volume}@g" "${src_file}"
  758. sed -i -e "s@{{webhook_config_mount}}@${webhook_config_mount}@g" "${src_file}"
  759. sed -i -e "s@{{webhook_config_volume}}@${webhook_config_volume}@g" "${src_file}"
  760. sed -i -e "s@{{admission_controller_config_mount}}@${admission_controller_config_mount}@g" "${src_file}"
  761. sed -i -e "s@{{admission_controller_config_volume}}@${admission_controller_config_volume}@g" "${src_file}"
  762. sed -i -e "s@{{image_policy_webhook_config_mount}}@${image_policy_webhook_config_mount}@g" "${src_file}"
  763. sed -i -e "s@{{image_policy_webhook_config_volume}}@${image_policy_webhook_config_volume}@g" "${src_file}"
  764. cp "${src_file}" /etc/kubernetes/manifests
  765. }
  766. # Starts kubernetes controller manager.
  767. # It prepares the log file, loads the docker image, calculates variables, sets them
  768. # in the manifest file, and then copies the manifest file to /etc/kubernetes/manifests.
  769. #
  770. # Assumed vars (which are calculated in function compute-master-manifest-variables)
  771. # CLOUD_CONFIG_OPT
  772. # CLOUD_CONFIG_VOLUME
  773. # CLOUD_CONFIG_MOUNT
  774. # DOCKER_REGISTRY
  775. function start-kube-controller-manager {
  776. echo "Start kubernetes controller-manager"
  777. prepare-log-file /var/log/kube-controller-manager.log
  778. # Calculate variables and assemble the command line.
  779. local params="${CONTROLLER_MANAGER_TEST_LOG_LEVEL:-"--v=2"} ${CONTROLLER_MANAGER_TEST_ARGS:-} ${CLOUD_CONFIG_OPT}"
  780. params+=" --cloud-provider=gce"
  781. params+=" --master=127.0.0.1:8080"
  782. params+=" --root-ca-file=/etc/srv/kubernetes/ca.crt"
  783. params+=" --service-account-private-key-file=/etc/srv/kubernetes/server.key"
  784. if [[ -n "${ENABLE_GARBAGE_COLLECTOR:-}" ]]; then
  785. params+=" --enable-garbage-collector=${ENABLE_GARBAGE_COLLECTOR}"
  786. fi
  787. if [[ -n "${INSTANCE_PREFIX:-}" ]]; then
  788. params+=" --cluster-name=${INSTANCE_PREFIX}"
  789. fi
  790. if [[ -n "${CLUSTER_IP_RANGE:-}" ]]; then
  791. params+=" --cluster-cidr=${CLUSTER_IP_RANGE}"
  792. fi
  793. if [[ -n "${SERVICE_CLUSTER_IP_RANGE:-}" ]]; then
  794. params+=" --service-cluster-ip-range=${SERVICE_CLUSTER_IP_RANGE}"
  795. fi
  796. if [[ "${NETWORK_PROVIDER:-}" == "kubenet" ]]; then
  797. params+=" --allocate-node-cidrs=true"
  798. elif [[ -n "${ALLOCATE_NODE_CIDRS:-}" ]]; then
  799. params+=" --allocate-node-cidrs=${ALLOCATE_NODE_CIDRS}"
  800. fi
  801. if [[ -n "${TERMINATED_POD_GC_THRESHOLD:-}" ]]; then
  802. params+=" --terminated-pod-gc-threshold=${TERMINATED_POD_GC_THRESHOLD}"
  803. fi
  804. if [[ -n "${FEATURE_GATES:-}" ]]; then
  805. params+=" --feature-gates=${FEATURE_GATES}"
  806. fi
  807. local -r kube_rc_docker_tag=$(cat /home/kubernetes/kube-docker-files/kube-controller-manager.docker_tag)
  808. local -r src_file="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/kube-controller-manager.manifest"
  809. remove-salt-config-comments "${src_file}"
  810. # Evaluate variables.
  811. sed -i -e "s@{{srv_kube_path}}@/etc/srv/kubernetes@g" "${src_file}"
  812. sed -i -e "s@{{pillar\['kube_docker_registry'\]}}@${DOCKER_REGISTRY}@g" "${src_file}"
  813. sed -i -e "s@{{pillar\['kube-controller-manager_docker_tag'\]}}@${kube_rc_docker_tag}@g" "${src_file}"
  814. sed -i -e "s@{{params}}@${params}@g" "${src_file}"
  815. sed -i -e "s@{{cloud_config_mount}}@${CLOUD_CONFIG_MOUNT}@g" "${src_file}"
  816. sed -i -e "s@{{cloud_config_volume}}@${CLOUD_CONFIG_VOLUME}@g" "${src_file}"
  817. sed -i -e "s@{{additional_cloud_config_mount}}@@g" "${src_file}"
  818. sed -i -e "s@{{additional_cloud_config_volume}}@@g" "${src_file}"
  819. cp "${src_file}" /etc/kubernetes/manifests
  820. }
  821. # Starts kubernetes scheduler.
  822. # It prepares the log file, loads the docker image, calculates variables, sets them
  823. # in the manifest file, and then copies the manifest file to /etc/kubernetes/manifests.
  824. #
  825. # Assumed vars (which are calculated in compute-master-manifest-variables)
  826. # DOCKER_REGISTRY
  827. function start-kube-scheduler {
  828. echo "Start kubernetes scheduler"
  829. prepare-log-file /var/log/kube-scheduler.log
  830. # Calculate variables and set them in the manifest.
  831. params="${SCHEDULER_TEST_LOG_LEVEL:-"--v=2"} ${SCHEDULER_TEST_ARGS:-}"
  832. if [[ -n "${FEATURE_GATES:-}" ]]; then
  833. params+=" --feature-gates=${FEATURE_GATES}"
  834. fi
  835. if [[ -n "${SCHEDULING_ALGORITHM_PROVIDER:-}" ]]; then
  836. params+=" --algorithm-provider=${SCHEDULING_ALGORITHM_PROVIDER}"
  837. fi
  838. local -r kube_scheduler_docker_tag=$(cat "${KUBE_HOME}/kube-docker-files/kube-scheduler.docker_tag")
  839. # Remove salt comments and replace variables with values.
  840. local -r src_file="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/kube-scheduler.manifest"
  841. remove-salt-config-comments "${src_file}"
  842. sed -i -e "s@{{params}}@${params}@g" "${src_file}"
  843. sed -i -e "s@{{pillar\['kube_docker_registry'\]}}@${DOCKER_REGISTRY}@g" "${src_file}"
  844. sed -i -e "s@{{pillar\['kube-scheduler_docker_tag'\]}}@${kube_scheduler_docker_tag}@g" "${src_file}"
  845. cp "${src_file}" /etc/kubernetes/manifests
  846. }
  847. # Starts cluster autoscaler.
  848. # Assumed vars (which are calculated in function compute-master-manifest-variables)
  849. # CLOUD_CONFIG_OPT
  850. # CLOUD_CONFIG_VOLUME
  851. # CLOUD_CONFIG_MOUNT
  852. function start-cluster-autoscaler {
  853. if [[ "${ENABLE_CLUSTER_AUTOSCALER:-}" == "true" ]]; then
  854. echo "Start kubernetes cluster autoscaler"
  855. prepare-log-file /var/log/cluster-autoscaler.log
  856. # Remove salt comments and replace variables with values
  857. local -r src_file="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/cluster-autoscaler.manifest"
  858. remove-salt-config-comments "${src_file}"
  859. local params="${AUTOSCALER_MIG_CONFIG} ${CLOUD_CONFIG_OPT}"
  860. sed -i -e "s@{{params}}@${params}@g" "${src_file}"
  861. sed -i -e "s@{{cloud_config_mount}}@${CLOUD_CONFIG_MOUNT}@g" "${src_file}"
  862. sed -i -e "s@{{cloud_config_volume}}@${CLOUD_CONFIG_VOLUME}@g" "${src_file}"
  863. sed -i -e "s@{%.*%}@@g" "${src_file}"
  864. cp "${src_file}" /etc/kubernetes/manifests
  865. fi
  866. }
  867. # A helper function for copying addon manifests and set dir/files
  868. # permissions.
  869. #
  870. # $1: addon category under /etc/kubernetes
  871. # $2: manifest source dir
  872. function setup-addon-manifests {
  873. local -r src_dir="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/$2"
  874. local -r dst_dir="/etc/kubernetes/$1/$2"
  875. if [[ ! -d "${dst_dir}" ]]; then
  876. mkdir -p "${dst_dir}"
  877. fi
  878. local files=$(find "${src_dir}" -maxdepth 1 -name "*.yaml")
  879. if [[ -n "${files}" ]]; then
  880. cp "${src_dir}/"*.yaml "${dst_dir}"
  881. fi
  882. files=$(find "${src_dir}" -maxdepth 1 -name "*.json")
  883. if [[ -n "${files}" ]]; then
  884. cp "${src_dir}/"*.json "${dst_dir}"
  885. fi
  886. files=$(find "${src_dir}" -maxdepth 1 -name "*.yaml.in")
  887. if [[ -n "${files}" ]]; then
  888. cp "${src_dir}/"*.yaml.in "${dst_dir}"
  889. fi
  890. chown -R root:root "${dst_dir}"
  891. chmod 755 "${dst_dir}"
  892. chmod 644 "${dst_dir}"/*
  893. }
  894. # Prepares the manifests of k8s addons, and starts the addon manager.
  895. function start-kube-addons {
  896. echo "Prepare kube-addons manifests and start kube addon manager"
  897. local -r src_dir="${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty"
  898. local -r dst_dir="/etc/kubernetes/addons"
  899. # Set up manifests of other addons.
  900. if [[ "${ENABLE_CLUSTER_MONITORING:-}" == "influxdb" ]] || \
  901. [[ "${ENABLE_CLUSTER_MONITORING:-}" == "google" ]] || \
  902. [[ "${ENABLE_CLUSTER_MONITORING:-}" == "standalone" ]] || \
  903. [[ "${ENABLE_CLUSTER_MONITORING:-}" == "googleinfluxdb" ]]; then
  904. local -r file_dir="cluster-monitoring/${ENABLE_CLUSTER_MONITORING}"
  905. setup-addon-manifests "addons" "${file_dir}"
  906. # Replace the salt configurations with variable values.
  907. base_metrics_memory="140Mi"
  908. metrics_memory="${base_metrics_memory}"
  909. base_eventer_memory="190Mi"
  910. base_metrics_cpu="80m"
  911. metrics_cpu="${base_metrics_cpu}"
  912. eventer_memory="${base_eventer_memory}"
  913. nanny_memory="90Mi"
  914. local -r metrics_memory_per_node="4"
  915. local -r metrics_cpu_per_node="0.5"
  916. local -r eventer_memory_per_node="500"
  917. local -r nanny_memory_per_node="200"
  918. if [[ -n "${NUM_NODES:-}" && "${NUM_NODES}" -ge 1 ]]; then
  919. num_kube_nodes="$((${NUM_NODES}+1))"
  920. metrics_memory="$((${num_kube_nodes} * ${metrics_memory_per_node} + 200))Mi"
  921. eventer_memory="$((${num_kube_nodes} * ${eventer_memory_per_node} + 200 * 1024))Ki"
  922. nanny_memory="$((${num_kube_nodes} * ${nanny_memory_per_node} + 90 * 1024))Ki"
  923. metrics_cpu=$(echo - | awk "{print ${num_kube_nodes} * ${metrics_cpu_per_node} + 80}")m
  924. fi
  925. controller_yaml="${dst_dir}/${file_dir}"
  926. if [[ "${ENABLE_CLUSTER_MONITORING:-}" == "googleinfluxdb" ]]; then
  927. controller_yaml="${controller_yaml}/heapster-controller-combined.yaml"
  928. else
  929. controller_yaml="${controller_yaml}/heapster-controller.yaml"
  930. fi
  931. remove-salt-config-comments "${controller_yaml}"
  932. sed -i -e "s@{{ *base_metrics_memory *}}@${base_metrics_memory}@g" "${controller_yaml}"
  933. sed -i -e "s@{{ *metrics_memory *}}@${metrics_memory}@g" "${controller_yaml}"
  934. sed -i -e "s@{{ *base_metrics_cpu *}}@${base_metrics_cpu}@g" "${controller_yaml}"
  935. sed -i -e "s@{{ *metrics_cpu *}}@${metrics_cpu}@g" "${controller_yaml}"
  936. sed -i -e "s@{{ *base_eventer_memory *}}@${base_eventer_memory}@g" "${controller_yaml}"
  937. sed -i -e "s@{{ *eventer_memory *}}@${eventer_memory}@g" "${controller_yaml}"
  938. sed -i -e "s@{{ *metrics_memory_per_node *}}@${metrics_memory_per_node}@g" "${controller_yaml}"
  939. sed -i -e "s@{{ *eventer_memory_per_node *}}@${eventer_memory_per_node}@g" "${controller_yaml}"
  940. sed -i -e "s@{{ *nanny_memory *}}@${nanny_memory}@g" "${controller_yaml}"
  941. sed -i -e "s@{{ *metrics_cpu_per_node *}}@${metrics_cpu_per_node}@g" "${controller_yaml}"
  942. fi
  943. if [[ "${ENABLE_CLUSTER_DNS:-}" == "true" ]]; then
  944. setup-addon-manifests "addons" "dns"
  945. local -r dns_rc_file="${dst_dir}/dns/skydns-rc.yaml"
  946. local -r dns_svc_file="${dst_dir}/dns/skydns-svc.yaml"
  947. mv "${dst_dir}/dns/skydns-rc.yaml.in" "${dns_rc_file}"
  948. mv "${dst_dir}/dns/skydns-svc.yaml.in" "${dns_svc_file}"
  949. # Replace the salt configurations with variable values.
  950. sed -i -e "s@{{ *pillar\['dns_replicas'\] *}}@${DNS_REPLICAS}@g" "${dns_rc_file}"
  951. sed -i -e "s@{{ *pillar\['dns_domain'\] *}}@${DNS_DOMAIN}@g" "${dns_rc_file}"
  952. sed -i -e "s@{{ *pillar\['dns_server'\] *}}@${DNS_SERVER_IP}@g" "${dns_svc_file}"
  953. if [[ "${FEDERATION:-}" == "true" ]]; then
  954. local federations_domain_map="${FEDERATIONS_DOMAIN_MAP:-}"
  955. if [[ -z "${federations_domain_map}" && -n "${FEDERATION_NAME:-}" && -n "${DNS_ZONE_NAME:-}" ]]; then
  956. federations_domain_map="${FEDERATION_NAME}=${DNS_ZONE_NAME}"
  957. fi
  958. if [[ -n "${federations_domain_map}" ]]; then
  959. sed -i -e "s@{{ *pillar\['federations_domain_map'\] *}}@- --federations=${federations_domain_map}@g" "${dns_rc_file}"
  960. else
  961. sed -i -e "/{{ *pillar\['federations_domain_map'\] *}}/d" "${dns_rc_file}"
  962. fi
  963. else
  964. sed -i -e "/{{ *pillar\['federations_domain_map'\] *}}/d" "${dns_rc_file}"
  965. fi
  966. fi
  967. if [[ "${ENABLE_CLUSTER_REGISTRY:-}" == "true" ]]; then
  968. setup-addon-manifests "addons" "registry"
  969. local -r registry_pv_file="${dst_dir}/registry/registry-pv.yaml"
  970. local -r registry_pvc_file="${dst_dir}/registry/registry-pvc.yaml"
  971. mv "${dst_dir}/registry/registry-pv.yaml.in" "${registry_pv_file}"
  972. mv "${dst_dir}/registry/registry-pvc.yaml.in" "${registry_pvc_file}"
  973. # Replace the salt configurations with variable values.
  974. remove-salt-config-comments "${controller_yaml}"
  975. sed -i -e "s@{{ *pillar\['cluster_registry_disk_size'\] *}}@${CLUSTER_REGISTRY_DISK_SIZE}@g" "${registry_pv_file}"
  976. sed -i -e "s@{{ *pillar\['cluster_registry_disk_size'\] *}}@${CLUSTER_REGISTRY_DISK_SIZE}@g" "${registry_pvc_file}"
  977. sed -i -e "s@{{ *pillar\['cluster_registry_disk_name'\] *}}@${CLUSTER_REGISTRY_DISK}@g" "${registry_pvc_file}"
  978. fi
  979. if [[ "${ENABLE_NODE_LOGGING:-}" == "true" ]] && \
  980. [[ "${LOGGING_DESTINATION:-}" == "elasticsearch" ]] && \
  981. [[ "${ENABLE_CLUSTER_LOGGING:-}" == "true" ]]; then
  982. setup-addon-manifests "addons" "fluentd-elasticsearch"
  983. fi
  984. if [[ "${ENABLE_CLUSTER_UI:-}" == "true" ]]; then
  985. setup-addon-manifests "addons" "dashboard"
  986. fi
  987. if [[ "${ENABLE_NODE_PROBLEM_DETECTOR:-}" == "true" ]]; then
  988. setup-addon-manifests "addons" "node-problem-detector"
  989. fi
  990. if echo "${ADMISSION_CONTROL:-}" | grep -q "LimitRanger"; then
  991. setup-addon-manifests "admission-controls" "limit-range"
  992. fi
  993. if [[ "${NETWORK_POLICY_PROVIDER:-}" == "calico" ]]; then
  994. setup-addon-manifests "addons" "calico-policy-controller"
  995. fi
  996. # Place addon manager pod manifest.
  997. cp "${src_dir}/kube-addon-manager.yaml" /etc/kubernetes/manifests
  998. }
  999. # Starts a fluentd static pod for logging.
  1000. function start-fluentd {
  1001. echo "Start fluentd pod"
  1002. if [[ "${ENABLE_NODE_LOGGING:-}" == "true" ]]; then
  1003. if [[ "${LOGGING_DESTINATION:-}" == "gcp" ]]; then
  1004. cp "${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/gci/fluentd-gcp.yaml" /etc/kubernetes/manifests/
  1005. elif [[ "${LOGGING_DESTINATION:-}" == "elasticsearch" && "${KUBERNETES_MASTER:-}" != "true" ]]; then
  1006. # Running fluentd-es on the master is pointless, as it can't communicate
  1007. # with elasticsearch from there in the default configuration.
  1008. cp "${KUBE_HOME}/kube-manifests/kubernetes/fluentd-es.yaml" /etc/kubernetes/manifests/
  1009. fi
  1010. fi
  1011. }
  1012. # Starts a l7 loadbalancing controller for ingress.
  1013. function start-lb-controller {
  1014. if [[ "${ENABLE_L7_LOADBALANCING:-}" == "glbc" ]]; then
  1015. echo "Starting GCE L7 pod"
  1016. prepare-log-file /var/log/glbc.log
  1017. setup-addon-manifests "addons" "cluster-loadbalancing/glbc"
  1018. cp "${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/glbc.manifest" \
  1019. /etc/kubernetes/manifests/
  1020. fi
  1021. }
  1022. # Starts rescheduler.
  1023. function start-rescheduler {
  1024. if [[ "${ENABLE_RESCHEDULER:-}" == "true" ]]; then
  1025. echo "Starting Rescheduler"
  1026. prepare-log-file /var/log/rescheduler.log
  1027. cp "${KUBE_HOME}/kube-manifests/kubernetes/gci-trusty/rescheduler.manifest" \
  1028. /etc/kubernetes/manifests/
  1029. fi
  1030. }
  1031. function reset-motd {
  1032. # kubelet is installed both on the master and nodes, and the version is easy to parse (unlike kubectl)
  1033. local -r version="$("${KUBE_HOME}"/bin/kubelet --version=true | cut -f2 -d " ")"
  1034. # This logic grabs either a release tag (v1.2.1 or v1.2.1-alpha.1),
  1035. # or the git hash that's in the build info.
  1036. local gitref="$(echo "${version}" | sed -r "s/(v[0-9]+\.[0-9]+\.[0-9]+)(-[a-z]+\.[0-9]+)?.*/\1\2/g")"
  1037. local devel=""
  1038. if [[ "${gitref}" != "${version}" ]]; then
  1039. devel="
  1040. Note: This looks like a development version, which might not be present on GitHub.
  1041. If it isn't, the closest tag is at:
  1042. https://github.com/kubernetes/kubernetes/tree/${gitref}
  1043. "
  1044. gitref="${version//*+/}"
  1045. fi
  1046. cat > /etc/motd <<EOF
  1047. Welcome to Kubernetes ${version}!
  1048. You can find documentation for Kubernetes at:
  1049. http://docs.kubernetes.io/
  1050. The source for this release can be found at:
  1051. /home/kubernetes/kubernetes-src.tar.gz
  1052. Or you can download it at:
  1053. https://storage.googleapis.com/kubernetes-release/release/${version}/kubernetes-src.tar.gz
  1054. It is based on the Kubernetes source at:
  1055. https://github.com/kubernetes/kubernetes/tree/${gitref}
  1056. ${devel}
  1057. For Kubernetes copyright and licensing information, see:
  1058. /home/kubernetes/LICENSES
  1059. EOF
  1060. }
  1061. ########### Main Function ###########
  1062. echo "Start to configure instance for kubernetes"
  1063. KUBE_HOME="/home/kubernetes"
  1064. if [[ ! -e "${KUBE_HOME}/kube-env" ]]; then
  1065. echo "The ${KUBE_HOME}/kube-env file does not exist!! Terminate cluster initialization."
  1066. exit 1
  1067. fi
  1068. source "${KUBE_HOME}/kube-env"
  1069. if [[ -n "${KUBE_USER:-}" ]]; then
  1070. if ! [[ "${KUBE_USER}" =~ ^[-._@a-zA-Z0-9]+$ ]]; then
  1071. echo "Bad KUBE_USER format."
  1072. exit 1
  1073. fi
  1074. fi
  1075. config-ip-firewall
  1076. create-dirs
  1077. ensure-local-ssds
  1078. setup-logrotate
  1079. if [[ "${KUBERNETES_MASTER:-}" == "true" ]]; then
  1080. mount-master-pd
  1081. create-master-auth
  1082. create-master-kubelet-auth
  1083. else
  1084. create-kubelet-kubeconfig
  1085. create-kubeproxy-kubeconfig
  1086. fi
  1087. assemble-docker-flags
  1088. load-docker-images
  1089. start-kubelet
  1090. if [[ "${KUBERNETES_MASTER:-}" == "true" ]]; then
  1091. compute-master-manifest-variables
  1092. start-etcd-servers
  1093. start-etcd-empty-dir-cleanup-pod
  1094. start-kube-apiserver
  1095. start-kube-controller-manager
  1096. start-kube-scheduler
  1097. start-kube-addons
  1098. start-cluster-autoscaler
  1099. start-lb-controller
  1100. start-rescheduler
  1101. else
  1102. start-kube-proxy
  1103. # Kube-registry-proxy.
  1104. if [[ "${ENABLE_CLUSTER_REGISTRY:-}" == "true" ]]; then
  1105. cp "${KUBE_HOME}/kube-manifests/kubernetes/kube-registry-proxy.yaml" /etc/kubernetes/manifests
  1106. fi
  1107. fi
  1108. start-fluentd
  1109. reset-motd
  1110. echo "Done for the configuration for kubernetes"