Kubernetes: Difference between revisions
Line 203: | Line 203: | ||
ports: | ports: | ||
- containerPort: 443 | - containerPort: 443 | ||
imagePullSecrets: | |||
- name: regcred | |||
</syntaxhighlight> | |||
==Volumes== | |||
To use volumes you need to define them in the deploy. The example below shows how to share a local folder | |||
<syntaxhighlight lang="yaml"> | |||
apiVersion: v1 | |||
kind: Pod | |||
metadata: | |||
name: bibble-pod | |||
labels: | |||
app: bibble | |||
spec: | |||
containers: | |||
- name: bibble-container | |||
image: bibble235/bibble:0.0.1 | |||
ports: | |||
- containerPort: 443 | |||
volumeMounts: | |||
- mountPath: /etc/someshare | |||
name: someshare-volume | |||
volumes: | |||
- name: someshare-volume | |||
hostPath: | |||
path: /home/iwiseman/someshare | |||
imagePullSecrets: | imagePullSecrets: | ||
- name: regcred | - name: regcred | ||
Line 219: | Line 245: | ||
kubectl describe pods hello-pod | kubectl describe pods hello-pod | ||
</syntaxhighlight> | </syntaxhighlight> | ||
==Example Cleanup== | ==Example Cleanup== | ||
To clean up the deployment we can either | To clean up the deployment we can either |
Revision as of 03:49, 20 August 2021
Introduction
Kubernetes came out of Google and Open Source. Greek for helmsman or k8s (Kates). Kubernetes is an orchestrator and can schedule, scale and update containers. There are alternatives like Docker Swarm
Architecture
Overview
Apps are put in a container, wrapped in a pod and deployment details. They are provisioned on a Node inside a K8s Clustoer
Master
In general these are a hosted services on the cloud but you can run them locally on a linux box.
- This is the front-end to the control plane
- It exposes a RESTFul API consuming JSON and Yaml
- We send manifests describing our apps to this
The Cluster Store for users with large changes often separate this
The controllers controls
- Node Controller
- Deployment controller
- Endpoints/EndpointSlice
The scheduler
- Watches for new work
- Assigns Work to the cluster nodes
Kubernetes Nodes
Now its time for the Nodes. These are made up of three parts, the Kublet, Container runtime and the Kube Proxy
Kubelet
The Kubelet is the Main Kubernetes agent it
- Registers node with the cluster
- Watches API Server for work tasks (Pods)
- Executes Pods
- Reports to the master
Container Runtime
- Can be Docker
- Pluggable via Container Runtime Interface (CRI)
- Generally is Docker or containerd, other like gVisor and katacontainers exist
- Does the stop and starting of containers
Kube Proxy
- The Networking Component
- Does light-weight load balancing
Declarative Model/Desired State
We describe what we want the cluster to look like but we do not care how it happens. Kubernetes constantly checks the desired state matches the observed state.
Pods
A pod is a shared execution environment and can container one or more containers. It is the Pod which has a unique IP. Containers within the same pod must allocate unique ports if they are to talk to each other or the outside world. The same for volumes etc.When scaling you scale Pods not Containers.
Multi container Pods are for two different but complimentary containers which need to be aligned. An example of this might be a service mesh. For example the mesh container could be responsible for encryption or decryption. Note Deployment of Pods is atomic
Pods provide
- Annotations
- Labels
- Policies
- Resources
- Co-scheduling of contianers
and other Metadata.
Kubernetes Service Objects
As mentioned the IP address are provided for each Pod. However Pods die, we scales up and down and it would not be practical to use them so Kurbenetes provides the Service object which is describe in the deploymennt. With the use of labels the Service object knows which pods to send traffic to. By either removing labels from the pod the objects can be match generically.
In the example below both 1.3 and 1.4 will be matched of the Pods. Equally we could add a version to the service object and the unmatched version would not be used.
Service objects
- Only Send traffic to healthy Pods
- Can do session affinity (Sending of subsequent requests to the same Pod)
- Can send traffic to endpoints outside of the cluster
- Can do TCP and UDP
Kubernetes API Server
This is the API which exposes and RESTFul API. It exposes the various objects handles the requests. The objects are broken up into various sub categories. We use the command line kubectl to control this.
Installing Ubuntu
This was really easy. Had to use Firefox to get the dashboard to work on https://127.0.0.1:10443. Need to review how to get it to work on Chrome.
sudo snap install microk8s --classic
sudo usermod -a -G microk8s $USER
sudo chown -f -R $USER ~/.kube
su - $USER
microk8s status --wait-ready
microk8s enable dashboard dns ingress
microk8s kubectl get all --all-namespaces
microk8s dashboard-proxy
To be able to use the dashboard on chrome you need to go to chrome://flags/#allow-insecure-localhost and enable Allow invalid certificates for resources loaded from localhost. Firefox works by default.
Deploying Pods
Introduction
We do this by
- Creating App Code
- Create an image
- Store in a repo
- Define in a manifest
- Post to the API Server
Example
Creating App Code
Clone the App Code
git clone https://github.com/nigelpoulton/getting-started-k8s.git
Create an Image
Easy pezzy lemon squeezy. Where nigelpulton is your own Docker hub account/repository
cd getting-started-k8s/App
docker image build -t nigelpulton/getting-started-k8s:1.0 .
Store in repo
Now push the image to your docker hub account.
docker image push nigelpoulton/getting-started-k8s:1.0
Docker Password
We need to authenticate with docker if in private repository. On your laptop, you must authenticate with a registry in order to pull a private image:
docker login
When prompted, enter your Docker username and password. The login process creates or updates a config.json file that holds an authorization token. View the config.json file:
cat ~/.docker/config.json
>{
> "auths": {
> "https://index.docker.io/v1/": {
> "auth": "c3R...zE2"
> }
> }
>}
If you already ran docker login, you can copy that credential into Kubernetes:
kubectl create secret generic regcred \
--from-file=.dockerconfigjson=<path/to/.docker/config.json> \
--type=kubernetes.io/dockerconfigjson
Define in a manifest
We can define this in either Yaml or Json. I used yq eval -j to convert mine but it does say kubectl convert should work. I am using microk8s and it said it did not work.
apiVersion: v1
kind: Pod
metadata:
name: hello-pod
labels:
app: web
spec:
containers:
- name: web-ctr
image: nigelpulton/getting-started-k8s:1.0
ports:
- containerPort: 8080
And the json version
{
"apiVersion": "v1",
"kind": "Pod",
"metadata": {
"name": "hello-pod",
"labels": {
"app": "web"
}
},
"spec": {
"containers": [
{
"name": "web-ctr",
"image": "nigelpulton/getting-started-k8s:1.0",
"ports": [
{
"containerPort": 8080
}
]
}
]
}
}
The "Kind" and "apiVersion" refer to the object. The objects you can use are grouped into types. Here is some of the objects in the apps group.
The default image tag by default will use the docker hub. You can add a prefix with the dns name if it is stored somewhere else.
If you are using authentication then you need to add imagePullSecrets to the manifest
apiVersion: v1
kind: Pod
metadata:
name: bibbleweb-pod
labels:
app: bibbleweb
spec:
containers:
- name: bibbleweb-container
image: bibble235/bibbleweb:0.0.1
ports:
- containerPort: 443
imagePullSecrets:
- name: regcred
Volumes
To use volumes you need to define them in the deploy. The example below shows how to share a local folder
apiVersion: v1
kind: Pod
metadata:
name: bibble-pod
labels:
app: bibble
spec:
containers:
- name: bibble-container
image: bibble235/bibble:0.0.1
ports:
- containerPort: 443
volumeMounts:
- mountPath: /etc/someshare
name: someshare-volume
volumes:
- name: someshare-volume
hostPath:
path: /home/iwiseman/someshare
imagePullSecrets:
- name: regcred
Post to the API Server
You can post the manifest to the cluster with
cd Pods
kubectl apply -f pod.yml
# Get the status
kubectl get pods --watch -o wide
# Get All the Pod information
kubectl describe pods hello-pod
Example Cleanup
To clean up the deployment we can either
# Delete by using delete and the manifest
kubectl delete -f pod.yml
# Or delete using the name
kubectl delete pod hello-pod
Kubernetes Services
The Service has a frontend and a backend.
Frontend
The frontend is
- Name
- IP
- Port
The IP on the frontend is called a ClusterIP and is assigned by Kubernetes. It is only for use within the cluster. The name is the name of the service and that is registered with DNS.
Every container in every pod can resolve service names
Backend
Is a way for the service to know which pods to send track on to. The endpoint slice tracks the list of healthy Pod which match the services label selector.
Types of Service
- LoadBalancer External access via cloud load-balancer
- NodePrt External access via nodes
- ClusterIP (default) internal cluster connectivity
Creating a Services
We can create service in two ways
- Imperatively
- Declaratively
Imperatively
With imperative we can simply use the kubectl.
kubectl expose pod hello-pod --name=hello-svc --target-port=8080 --type=NodePort
microk8s kubectl get svc
>NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
>kubernetes ClusterIP 10.152.183.1 <none> 443/TCP 21h
>hello-svc NodePort 10.152.183.147 <none> 8080:30737/TCP 11s
From there we can get to the service using the node port which is the outbound port shown for the service. In our case this is 30737. So going to the ip of the machine and port should show the service. e.g. htttp://192.xxx.xxx.1.70:30737. Node ports are allocated by Kubernetes between 32000 and 32767
Declaratively
Here is the yaml file to create the above service. Note I put the word name inside of app for the selector which resulted in the service having no endpoint.
apiVersion: v1
kind: Service
metadata:
name: ps-nodeport
spec:
type: NodePort
ports:
- port: 80
targetPort: 8080
nodePort: 31111
protocol: TCP
selector:
app: web
And here is a picture to explain the ports.
- 31111 is the port for external access
- 80 is the port the cluster is listening on
- 8080 is the port exposed by the pod and the defined in the docker container
We can check we have the right name (label) in the service with the command
kubectl get pods --show-labels
>NAME READY STATUS RESTARTS AGE LABELS
>hello-pod 1/1 Running 0 79m app=web
Clean up
Deleting service can be done with
kubectl delete svc hello-svc
Deployments
Introduction
To deploy a solution we need
- Deployment (Updates and Rollbacks)
- Replication Set (Scalability, Reliability, Desired State)
- Pod (Scheduling and Execution)
- App (App code)
Rolling Updates and Rollbacks
To update we simply provide a new version of the deployment. We can define how this happens e.g. wait 10 mins before OK. Kubernetes keeps the old pods to allow the user to reverse the deployment by using a previous version of the deployment. Here we see the rollback where the green pods are being replace by the original pods.
Deployment Section
The example below show a deployment and provides and overview. The labels in the deployment spec must match the label in the Pods spec. The always is for security and ensures the code not the local copy.
Full Example
Here is a full example. There are many options under the strategy we can configure. In this example we have opted for
- minReadySeconds The amount of time to wait and see if container is working before proceeding
- maxUnavailable Number which should be available during update
- maxSurge The number it can exceed the desired amount by.
So in this example there will be 6 pods during the update and it will wait for 5 seconds and reduce back down to 5.
apiVersion: apps/v1
kind: Deployment
metadata:
name: web-deploy
labels:
app: web
spec:
selector:
matchLabels:
app: web
replicas: 5
minReadySeconds: 5
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 0
maxSurge: 1
template:
metadata:
labels:
app: web
spec:
terminationGracePeriodSeconds: 1
containers:
- name: hello-pod
image: nigelpoulton/getting-started-k8s:2.0
imagePullPolicy: Always
ports:
- containerPort: 8080
==
Doing Update
To perform an update we use the deploy command
#Do Deployment
kubectl apply -f deploy-complete.yml
#Monitor the deploy progress with
kubectl get deploy
#Monitor the replicate sets progress with
kubectl get rs
Reversing the update
As discussed the old replicates still reside with in kubernetes. We can see this by looking as the replication sets. We can reverse the update by
#Get the deployment history
kubectl rollout history deploy web-deploy
>deployment.apps/web-deploy
>REVISION CHANGE-CAUSE
>1 <none>
>2 <none>
#To reverse we just need to provide the revision to rollback to.
kubectl rollout undo deploy web-deploy --to-revision=1
Monitoring Deployment
We can see both the deploy and the replication sets with
kubectl get deploy
kubectl get rs
We can use describe ep to see the endpoints for our configuration.
microk8s kubectl describe ep
>Name: ps-nodeport
>Namespace: default
>Labels: <none>
>Annotations: endpoints.kubernetes.io/last-change-trigger-time: 2021-08->14T17:53:23+12:00
>Subsets:
> Addresses: 10.1.114.202
> NotReadyAddresses: <none>
> Ports:
> Name Port Protocol
> ---- ---- --------
> <unset> 8080 TCP
>
>Events: <none>
iwiseman@OLIVER:
Self Healing and Scaling
We can delete pods and nodes and Kubernetes will fix the problem. This is known as self healing. We can manually deploy with more replicas to scale up and down. There is Horizontal Pod Autoscaler and Cluster Autoscaler as well.