Tool to manage the full lifecycle of a cluster.
The required infrastructure for deploying CaaSP needs to exist beforehand, it's
required for you to have SSH access to these machines from the machine that you
are running skuba
from. skuba
requires you to have added your SSH
keys to the SSH agent on this machine, e.g:
ssh-add ~/.ssh/id_rsa
The system running skuba
must have kubectl
available.
go get github.com/SUSE/skuba/cmd/skuba
A development build will:
registry.suse.de/devel/caasp/4.5/containers/containers/caasp/v4.5/
To build it, run:
make
A staging build will:
registry.suse.de/suse/sle-15-sp2/update/products/caasp/4.5/containers/caasp/v4.5
To build it, run:
make staging
A release build will:
registry.suse.com/caasp/v4.5
To build it, run:
make release
Go to any directory in your machine, e.g. ~/clusters
. From there, execute:
The init
process creates the definition of your cluster. Ideally there's
nothing to tweak in the general case, but you can go through the generated
configurations and check if everything is fine for your taste.
skuba cluster init --control-plane load-balancer.example.com company-cluster
This command will have generated a basic project scaffold in the company-cluster
folder. You need to change the directory to this new folder in order to run the rest
of the commands in this README.
You need to bootstrap your first master node of the cluster. For this purpose
you have to be inside the company-cluster
folder.
skuba node bootstrap --user opensuse --sudo --target <IP/fqdn> my-master
You can check skuba node bootstrap --help
for further options, but the
previous command means:
<IP/fqdn>
opensuse
user when opening the SSH sessionsudo
when executing commands inside the machinemy-master
: this is what Kubernetes will use to refer to your nodeWhen this command has finished, some secrets will have been copied to your
company-cluster
folder. Namely:
pki
folderadmin.conf
file of the cluster has been copied in
root of the company-cluster
folder
company-cluster/admin.conf
file is the kubeconfig
configuration
required by kubectl
and other command line toolsJoining a node allows you to grow your Kubernetes cluster. You can join master nodes as
well as worker nodes to your existing cluster. For this purpose you have to be inside the
company-cluster
folder.
This task will automatically create a new bootstrap token on the existing cluster that will be used for the kubelet TLS bootstrap to happen on the new node. The token will be fed automatically to the configuration used to join the new node.
This task will create the configuration file inside the kubeadm-join.conf.d
folder as well
with a file named <IP/fqdn>.conf
that will contain the join configuration used. If this file
existed before it will be honored, only overriding a small subset of settings automatically:
node-ip
if the --target
is an IP addresshostname-override
to the node-name
provided as an argumentcni-bin-dir
directory location if requirednode-name
provided as an argumentThis command will join a new master node to the cluster. This will also increase the etcd member count by one.
skuba node join --role master --user opensuse --sudo --target <IP/fqdn> second-master
This command will join a new worker node to the cluster.
skuba node join --role worker --user opensuse --sudo --target <IP/fqdn> my-worker
It's possible to remove master and worker nodes from the cluster. All the required tasks to remove the target node will be performed automatically:
kubeadm-config
config mapFor removing a node you only need to provide the name of the node known to Kubernetes:
skuba node remove my-worker
Or, if you want to remove a master node:
skuba node remove second-master
This project also comes with a kubectl plugin that has the same layout as skuba
. You can
call to the same commands presented in skuba
as kubectl caasp
when installing the
kubectl-caasp
binary in your path.
The purpose of the tool is to provide a quick way to see if nodes have pending upgrades.
$ kubectl caasp cluster status
NAME STATUS ROLE OS-IMAGE KERNEL-VERSION KUBELET-VERSION CONTAINER-RUNTIME HAS-UPDATES HAS-DISRUPTIVE-UPDATES CAASP-RELEASE-VERSION
master0 Ready master SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
master1 Ready master SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
master2 Ready master SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
worker0 Ready <none> SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
worker1 Ready <none> SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
worker2 Ready <none> SUSE Linux Enterprise Server 15 SP1 4.12.14-197.29-default v1.16.2 cri-o://1.16.0 no no 4.1.0
This is a quick screencast showing how it's easy to deploy a multi master node on top of AWS. The procedure is the same as the deployment on OpenStack or on libvirt.
The deployment is done on AWS via the terraform files shared inside of the infra
repository.
Videos:
The videos are uncut, as you will see the whole deployment takes around 7 minutes: 4 minutes for the infrastructure, 3 minutes for the actual cluster.
The demo uses a small script to automate the sequential invocations of skuba
.
Anything can be used to do that, including bash.