项目重构
This commit is contained in:
94
0-部署应用/Oracle-Cloud/k3s集群/0-host免密登录.sh
Normal file
94
0-部署应用/Oracle-Cloud/k3s集群/0-host免密登录.sh
Normal file
@@ -0,0 +1,94 @@
|
||||
#!/bin/bash
|
||||
|
||||
|
||||
addHost() {
|
||||
head -n 10 /etc/hosts > 1.txt
|
||||
|
||||
cat 1.txt > /etc/hosts
|
||||
cat /etc/hosts
|
||||
rm 1.txt
|
||||
cat >> /etc/hosts<<EOF
|
||||
146.56.147.12 arm-s-1 s0
|
||||
10.10.0.10 arm-s-1 s0
|
||||
10.0.0.91 arm-s-1 s0
|
||||
|
||||
146.56.159.175 arm-s-2 s5
|
||||
10.10.0.20 arm-s-2 s5
|
||||
10.0.0.173 arm-s-2 s5
|
||||
|
||||
140.238.8.73 seoul-1 s1
|
||||
10.10.0.11 seoul-1 s1
|
||||
10.0.0.3 seoul-1 s1
|
||||
|
||||
140.238.30.110 seoul-2 s2
|
||||
10.10.0.12 seoul-2 s2
|
||||
10.0.0.14 seoul-2 s2
|
||||
|
||||
140.238.29.102 seoul-3 s3
|
||||
10.10.0.13 seoul-3 s3
|
||||
10.0.0.2 seoul-3 s3
|
||||
|
||||
140.238.14.103 seoul-4 s4
|
||||
10.10.0.14 seoul-4 s4
|
||||
10.0.0.3 seoul-4 s4
|
||||
|
||||
150.230.198.103 tokyo-0 t0
|
||||
10.10.0.20 arm-s-1 t0
|
||||
|
||||
140.238.63.37 tokyo-1 t1
|
||||
10.10.0.21 tokyo-1 t1
|
||||
|
||||
140.238.52.228 tokyo-2 t2
|
||||
10.10.0.22 tokyo-2 t2
|
||||
|
||||
42.192.52.227 tc-sh
|
||||
10.10.0.71 tc-sh
|
||||
|
||||
43.128.39.232 tc-hk
|
||||
10.10.0.79 tc-hk
|
||||
|
||||
114.117.165.222 tc-cd
|
||||
10.10.0.72 tc-cd
|
||||
EOF
|
||||
cat /etc/hosts
|
||||
}
|
||||
|
||||
clearHosts(){
|
||||
|
||||
}
|
||||
|
||||
|
||||
shutdownIPtables(){
|
||||
# oracle 主机可以使用下面的额命令进行清除
|
||||
snap info oracle-cloud-agent
|
||||
snap stop oracle-cloud-agent
|
||||
snap remove oracle-cloud-agent
|
||||
|
||||
systemctl status snapd.service
|
||||
|
||||
for i in $(ls /lib/systemd/system/ | grep snapd | awk '{print$1}') ; do
|
||||
echo $i
|
||||
systemctl stop $i
|
||||
systemctl disable $i
|
||||
done
|
||||
|
||||
rm -rf /root/snap
|
||||
|
||||
systemctl stop ufw
|
||||
systemctl disable ufw
|
||||
#停止firewall
|
||||
systemctl stop firewalld.service
|
||||
#禁止firewall开机启动
|
||||
|
||||
systemctl disable firewalld.service
|
||||
#关闭iptables
|
||||
service iptables stop
|
||||
#去掉iptables开机启动
|
||||
chkconfig iptables off
|
||||
|
||||
systemctl stop ip6tables.service
|
||||
systemctl disable ip6tables.service
|
||||
|
||||
crontab -e
|
||||
@reboot "iptables -F"
|
||||
}
|
||||
1173
0-部署应用/Oracle-Cloud/k3s集群/1-基础环境初始化.sh
Normal file
1173
0-部署应用/Oracle-Cloud/k3s集群/1-基础环境初始化.sh
Normal file
File diff suppressed because it is too large
Load Diff
148
0-部署应用/Oracle-Cloud/k3s集群/2-安装k3集群.sh
Normal file
148
0-部署应用/Oracle-Cloud/k3s集群/2-安装k3集群.sh
Normal file
@@ -0,0 +1,148 @@
|
||||
#!/bin/bash
|
||||
|
||||
server(){
|
||||
# install from binary
|
||||
# https://github.com/k3s-io/k3s/releases/tag/v1.22.3+k3s1
|
||||
k3s server \
|
||||
--write-kubeconfig-mode "0644" \
|
||||
--https-listen-port "16643" \
|
||||
--advertise-port "16643" \
|
||||
--lb-server-port "16644" \
|
||||
--advertise-address "146.56.147.12" \
|
||||
--node-name "master-s0" \
|
||||
--bind-address "0.0.0.0" \
|
||||
--cluster-cidr "10.74.0.0/16" \
|
||||
--service-cidr "10.100.0.0/16" \
|
||||
--cluster-dns "10.100.0.10" \
|
||||
--service-node-port-range "19000-19500" \
|
||||
--cluster-domain "wdd.io" \
|
||||
--default-local-storage-path "/data/k3s/" \
|
||||
--no-deploy "metrics-server" \
|
||||
--no-deploy "coredns" \
|
||||
--no-deploy "servicelb" \
|
||||
--node-label "location=seoul" \
|
||||
--disable-network-policy \
|
||||
--docker \
|
||||
--agent-token "woshinibaba" \
|
||||
--cluster-init
|
||||
|
||||
# install by script
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
write-kubeconfig-mode: "0644"
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
https-listen-port: "16643"
|
||||
advertise-port: "16643"
|
||||
lb-server-port: "16644"
|
||||
advertise-address: "146.56.147.12"
|
||||
node-name: "master-s0"
|
||||
node-ip: "10.10.0.10"
|
||||
node-external-ip: "146.56.147.12"
|
||||
flannel-iface: "wg0-oracle"
|
||||
flannel-backend: "wireguard"
|
||||
bind-address: "0.0.0.0"
|
||||
cluster-cidr: "10.100.0.0/16"
|
||||
service-cidr: "10.74.0.0/16"
|
||||
cluster-dns: "10.74.0.10"
|
||||
service-node-port-range: "19000-19500"
|
||||
cluster-domain: "wdd.io"
|
||||
default-local-storage-path: "/data/k3s/"
|
||||
node-label: "location=seoul"
|
||||
#disable:
|
||||
# - "metrics-server"
|
||||
# - "service-lb"
|
||||
# - "local-storage"
|
||||
agent-token: "woshinibaba"
|
||||
EOF
|
||||
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml --docker" sh -
|
||||
cat /root/k3s-install/install-k3s-official.sh | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml --docker" sh -
|
||||
|
||||
}
|
||||
|
||||
|
||||
|
||||
agent() {
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-0"
|
||||
node-external-ip: "150.230.198.103"
|
||||
node-ip: "10.10.0.20"
|
||||
docker: "true"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
cat /root/k3s-install/install-k3s-official.sh| INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "arm-seoul-2"
|
||||
node-external-ip: "146.56.159.175"
|
||||
node-ip: "10.10.0.19"
|
||||
docker: "true"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=seoul"
|
||||
EOF
|
||||
cat /root/k3s-install/install-k3s-official.sh| INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-1"
|
||||
node-external-ip: "140.238.63.37"
|
||||
node-ip: "10.10.0.21"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
cat /root/k3s-install/install-k3s-official.sh| INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-2"
|
||||
node-external-ip: "140.238.52.228"
|
||||
node-ip: "10.10.0.22"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
cat /root/k3s-install/install-k3s-official.sh| INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tc-sh"
|
||||
node-external-ip: "42.192.52.227"
|
||||
node-ip: "10.10.0.71"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=shanghai"
|
||||
EOF
|
||||
curl -sfL http://rancher-mirror.cnrancher.com/k3s/k3s-install.sh | INSTALL_K3S_MIRROR=cn INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tc-hk"
|
||||
node-external-ip: "43.154.83.213"
|
||||
node-ip: "10.10.0.79"
|
||||
docker: "true"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=hongkong"
|
||||
EOF
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tc-hk"
|
||||
node-external-ip: "43.154.83.213"
|
||||
node-ip: "10.10.0.79"
|
||||
flannel-iface: "wg0-oracle"
|
||||
node-label: "location=hongkong"
|
||||
docker: "true"
|
||||
EOF
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:16643" K3S_TOKEN="woshinibaba" sh -
|
||||
913
0-部署应用/Oracle-Cloud/k3s集群/3.officical-k3s-install.sh
Normal file
913
0-部署应用/Oracle-Cloud/k3s集群/3.officical-k3s-install.sh
Normal file
@@ -0,0 +1,913 @@
|
||||
#!/bin/sh
|
||||
set -e
|
||||
set -o noglob
|
||||
|
||||
# Usage:
|
||||
# curl ... | ENV_VAR=... sh -
|
||||
# or
|
||||
# ENV_VAR=... ./install.sh
|
||||
#
|
||||
# Example:
|
||||
# Installing a server without traefik:
|
||||
# curl ... | INSTALL_K3S_EXEC="--disable=traefik" sh -
|
||||
# Installing an agent to point at a server:
|
||||
# curl ... | K3S_TOKEN=xxx K3S_URL=https://server-url:6443 sh -
|
||||
#
|
||||
# Environment variables:
|
||||
# - K3S_*
|
||||
# Environment variables which begin with K3S_ will be preserved for the
|
||||
# systemd service to use. Setting K3S_URL without explicitly setting
|
||||
# a systemd exec command will default the command to "agent", and we
|
||||
# enforce that K3S_TOKEN or K3S_CLUSTER_SECRET is also set.
|
||||
#
|
||||
# - INSTALL_K3S_SKIP_DOWNLOAD
|
||||
# If set to true will not download k3s hash or binary.
|
||||
#
|
||||
# - INSTALL_K3S_FORCE_RESTART
|
||||
# If set to true will always restart the K3s service
|
||||
#
|
||||
# - INSTALL_K3S_SYMLINK
|
||||
# If set to 'skip' will not create symlinks, 'force' will overwrite,
|
||||
# default will symlink if command does not exist in path.
|
||||
#
|
||||
# - INSTALL_K3S_SKIP_ENABLE
|
||||
# If set to true will not enable or start k3s service.
|
||||
#
|
||||
# - INSTALL_K3S_SKIP_START
|
||||
# If set to true will not start k3s service.
|
||||
#
|
||||
# - INSTALL_K3S_VERSION
|
||||
# Version of k3s to download from github. Will attempt to download from the
|
||||
# stable channel if not specified.
|
||||
#
|
||||
# - INSTALL_K3S_COMMIT
|
||||
# Commit of k3s to download from temporary cloud storage.
|
||||
# * (for developer & QA use)
|
||||
#
|
||||
# - INSTALL_K3S_BIN_DIR
|
||||
# Directory to install k3s binary, links, and uninstall script to, or use
|
||||
# /usr/local/bin as the default
|
||||
#
|
||||
# - INSTALL_K3S_BIN_DIR_READ_ONLY
|
||||
# If set to true will not write files to INSTALL_K3S_BIN_DIR, forces
|
||||
# setting INSTALL_K3S_SKIP_DOWNLOAD=true
|
||||
#
|
||||
# - INSTALL_K3S_SYSTEMD_DIR
|
||||
# Directory to install systemd service and environment files to, or use
|
||||
# /etc/systemd/system as the default
|
||||
#
|
||||
# - INSTALL_K3S_EXEC or script arguments
|
||||
# Command with flags to use for launching k3s in the systemd service, if
|
||||
# the command is not specified will default to "agent" if K3S_URL is set
|
||||
# or "server" if not. The final systemd command resolves to a combination
|
||||
# of EXEC and script args ($@).
|
||||
#
|
||||
# The following commands result in the same behavior:
|
||||
# curl ... | INSTALL_K3S_EXEC="--disable=traefik" sh -s -
|
||||
# curl ... | INSTALL_K3S_EXEC="server --disable=traefik" sh -s -
|
||||
# curl ... | INSTALL_K3S_EXEC="server" sh -s - --disable=traefik
|
||||
# curl ... | sh -s - server --disable=traefik
|
||||
# curl ... | sh -s - --disable=traefik
|
||||
#
|
||||
# - INSTALL_K3S_NAME
|
||||
# Name of systemd service to create, will default from the k3s exec command
|
||||
# if not specified. If specified the name will be prefixed with 'k3s-'.
|
||||
#
|
||||
# - INSTALL_K3S_TYPE
|
||||
# Type of systemd service to create, will default from the k3s exec command
|
||||
# if not specified.
|
||||
#
|
||||
# - INSTALL_K3S_SELINUX_WARN
|
||||
# If set to true will continue if k3s-selinux policy is not found.
|
||||
#
|
||||
# - INSTALL_K3S_SKIP_SELINUX_RPM
|
||||
# If set to true will skip automatic installation of the k3s RPM.
|
||||
#
|
||||
# - INSTALL_K3S_CHANNEL_URL
|
||||
# Channel URL for fetching k3s download URL.
|
||||
# Defaults to 'https://update.k3s.io/v1-release/channels'.
|
||||
#
|
||||
# - INSTALL_K3S_CHANNEL
|
||||
# Channel to use for fetching k3s download URL.
|
||||
# Defaults to 'stable'.
|
||||
|
||||
GITHUB_URL=https://github.com/k3s-io/k3s/releases
|
||||
STORAGE_URL=https://storage.googleapis.com/k3s-ci-builds
|
||||
DOWNLOADER=
|
||||
|
||||
# --- helper functions for logs ---
|
||||
info()
|
||||
{
|
||||
echo '[INFO] ' "$@"
|
||||
}
|
||||
warn()
|
||||
{
|
||||
echo '[WARN] ' "$@" >&2
|
||||
}
|
||||
fatal()
|
||||
{
|
||||
echo '[ERROR] ' "$@" >&2
|
||||
exit 1
|
||||
}
|
||||
|
||||
# --- fatal if no systemd or openrc ---
|
||||
verify_system() {
|
||||
if [ -x /sbin/openrc-run ]; then
|
||||
HAS_OPENRC=true
|
||||
return
|
||||
fi
|
||||
if [ -x /bin/systemctl ] || type systemctl > /dev/null 2>&1; then
|
||||
HAS_SYSTEMD=true
|
||||
return
|
||||
fi
|
||||
fatal 'Can not find systemd or openrc to use as a process supervisor for k3s'
|
||||
}
|
||||
|
||||
# --- add quotes to command arguments ---
|
||||
quote() {
|
||||
for arg in "$@"; do
|
||||
printf '%s\n' "$arg" | sed "s/'/'\\\\''/g;1s/^/'/;\$s/\$/'/"
|
||||
done
|
||||
}
|
||||
|
||||
# --- add indentation and trailing slash to quoted args ---
|
||||
quote_indent() {
|
||||
printf ' \\\n'
|
||||
for arg in "$@"; do
|
||||
printf '\t%s \\\n' "$(quote "$arg")"
|
||||
done
|
||||
}
|
||||
|
||||
# --- escape most punctuation characters, except quotes, forward slash, and space ---
|
||||
escape() {
|
||||
printf '%s' "$@" | sed -e 's/\([][!#$%&()*;<=>?\_`{|}]\)/\\\1/g;'
|
||||
}
|
||||
|
||||
# --- escape double quotes ---
|
||||
escape_dq() {
|
||||
printf '%s' "$@" | sed -e 's/"/\\"/g'
|
||||
}
|
||||
|
||||
# --- ensures $K3S_URL is empty or begins with https://, exiting fatally otherwise ---
|
||||
verify_k3s_url() {
|
||||
case "${K3S_URL}" in
|
||||
"")
|
||||
;;
|
||||
https://*)
|
||||
;;
|
||||
*)
|
||||
fatal "Only https:// URLs are supported for K3S_URL (have ${K3S_URL})"
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
# --- define needed environment variables ---
|
||||
setup_env() {
|
||||
# --- use command args if passed or create default ---
|
||||
case "$1" in
|
||||
# --- if we only have flags discover if command should be server or agent ---
|
||||
(-*|"")
|
||||
if [ -z "${K3S_URL}" ]; then
|
||||
CMD_K3S=server
|
||||
else
|
||||
if [ -z "${K3S_TOKEN}" ] && [ -z "${K3S_TOKEN_FILE}" ] && [ -z "${K3S_CLUSTER_SECRET}" ]; then
|
||||
fatal "Defaulted k3s exec command to 'agent' because K3S_URL is defined, but K3S_TOKEN, K3S_TOKEN_FILE or K3S_CLUSTER_SECRET is not defined."
|
||||
fi
|
||||
CMD_K3S=agent
|
||||
fi
|
||||
;;
|
||||
# --- command is provided ---
|
||||
(*)
|
||||
CMD_K3S=$1
|
||||
shift
|
||||
;;
|
||||
esac
|
||||
|
||||
verify_k3s_url
|
||||
|
||||
CMD_K3S_EXEC="${CMD_K3S}$(quote_indent "$@")"
|
||||
|
||||
# --- use systemd name if defined or create default ---
|
||||
if [ -n "${INSTALL_K3S_NAME}" ]; then
|
||||
SYSTEM_NAME=k3s-${INSTALL_K3S_NAME}
|
||||
else
|
||||
if [ "${CMD_K3S}" = server ]; then
|
||||
SYSTEM_NAME=k3s
|
||||
else
|
||||
SYSTEM_NAME=k3s-${CMD_K3S}
|
||||
fi
|
||||
fi
|
||||
|
||||
# --- check for invalid characters in system name ---
|
||||
valid_chars=$(printf '%s' "${SYSTEM_NAME}" | sed -e 's/[][!#$%&()*;<=>?\_`{|}/[:space:]]/^/g;' )
|
||||
if [ "${SYSTEM_NAME}" != "${valid_chars}" ]; then
|
||||
invalid_chars=$(printf '%s' "${valid_chars}" | sed -e 's/[^^]/ /g')
|
||||
fatal "Invalid characters for system name:
|
||||
${SYSTEM_NAME}
|
||||
${invalid_chars}"
|
||||
fi
|
||||
|
||||
# --- use sudo if we are not already root ---
|
||||
SUDO=sudo
|
||||
if [ $(id -u) -eq 0 ]; then
|
||||
SUDO=
|
||||
fi
|
||||
|
||||
# --- use systemd type if defined or create default ---
|
||||
if [ -n "${INSTALL_K3S_TYPE}" ]; then
|
||||
SYSTEMD_TYPE=${INSTALL_K3S_TYPE}
|
||||
else
|
||||
if [ "${CMD_K3S}" = server ]; then
|
||||
SYSTEMD_TYPE=notify
|
||||
else
|
||||
SYSTEMD_TYPE=exec
|
||||
fi
|
||||
fi
|
||||
|
||||
# --- use binary install directory if defined or create default ---
|
||||
if [ -n "${INSTALL_K3S_BIN_DIR}" ]; then
|
||||
BIN_DIR=${INSTALL_K3S_BIN_DIR}
|
||||
else
|
||||
# --- use /usr/local/bin if root can write to it, otherwise use /opt/bin if it exists
|
||||
BIN_DIR=/usr/local/bin
|
||||
if ! $SUDO sh -c "touch ${BIN_DIR}/k3s-ro-test && rm -rf ${BIN_DIR}/k3s-ro-test"; then
|
||||
if [ -d /opt/bin ]; then
|
||||
BIN_DIR=/opt/bin
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
# --- use systemd directory if defined or create default ---
|
||||
if [ -n "${INSTALL_K3S_SYSTEMD_DIR}" ]; then
|
||||
SYSTEMD_DIR="${INSTALL_K3S_SYSTEMD_DIR}"
|
||||
else
|
||||
SYSTEMD_DIR=/etc/systemd/system
|
||||
fi
|
||||
|
||||
# --- set related files from system name ---
|
||||
SERVICE_K3S=${SYSTEM_NAME}.service
|
||||
UNINSTALL_K3S_SH=${UNINSTALL_K3S_SH:-${BIN_DIR}/${SYSTEM_NAME}-uninstall.sh}
|
||||
KILLALL_K3S_SH=${KILLALL_K3S_SH:-${BIN_DIR}/k3s-killall.sh}
|
||||
|
||||
# --- use service or environment location depending on systemd/openrc ---
|
||||
if [ "${HAS_SYSTEMD}" = true ]; then
|
||||
FILE_K3S_SERVICE=${SYSTEMD_DIR}/${SERVICE_K3S}
|
||||
FILE_K3S_ENV=${SYSTEMD_DIR}/${SERVICE_K3S}.env
|
||||
elif [ "${HAS_OPENRC}" = true ]; then
|
||||
$SUDO mkdir -p /etc/rancher/k3s
|
||||
FILE_K3S_SERVICE=/etc/init.d/${SYSTEM_NAME}
|
||||
FILE_K3S_ENV=/etc/rancher/k3s/${SYSTEM_NAME}.env
|
||||
fi
|
||||
|
||||
# --- get hash of config & exec for currently installed k3s ---
|
||||
PRE_INSTALL_HASHES=$(get_installed_hashes)
|
||||
|
||||
# --- if bin directory is read only skip download ---
|
||||
if [ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = true ]; then
|
||||
INSTALL_K3S_SKIP_DOWNLOAD=true
|
||||
fi
|
||||
|
||||
# --- setup channel values
|
||||
INSTALL_K3S_CHANNEL_URL=${INSTALL_K3S_CHANNEL_URL:-'https://update.k3s.io/v1-release/channels'}
|
||||
INSTALL_K3S_CHANNEL=${INSTALL_K3S_CHANNEL:-'stable'}
|
||||
}
|
||||
|
||||
# --- check if skip download environment variable set ---
|
||||
can_skip_download() {
|
||||
if [ "${INSTALL_K3S_SKIP_DOWNLOAD}" != true ]; then
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# --- verify an executable k3s binary is installed ---
|
||||
verify_k3s_is_executable() {
|
||||
if [ ! -x ${BIN_DIR}/k3s ]; then
|
||||
fatal "Executable k3s binary not found at ${BIN_DIR}/k3s"
|
||||
fi
|
||||
}
|
||||
|
||||
# --- set arch and suffix, fatal if architecture not supported ---
|
||||
setup_verify_arch() {
|
||||
if [ -z "$ARCH" ]; then
|
||||
ARCH=$(uname -m)
|
||||
fi
|
||||
case $ARCH in
|
||||
amd64)
|
||||
ARCH=amd64
|
||||
SUFFIX=
|
||||
;;
|
||||
x86_64)
|
||||
ARCH=amd64
|
||||
SUFFIX=
|
||||
;;
|
||||
arm64)
|
||||
ARCH=arm64
|
||||
SUFFIX=-${ARCH}
|
||||
;;
|
||||
aarch64)
|
||||
ARCH=arm64
|
||||
SUFFIX=-${ARCH}
|
||||
;;
|
||||
arm*)
|
||||
ARCH=arm
|
||||
SUFFIX=-${ARCH}hf
|
||||
;;
|
||||
*)
|
||||
fatal "Unsupported architecture $ARCH"
|
||||
esac
|
||||
}
|
||||
|
||||
# --- verify existence of network downloader executable ---
|
||||
verify_downloader() {
|
||||
# Return failure if it doesn't exist or is no executable
|
||||
[ -x "$(command -v $1)" ] || return 1
|
||||
|
||||
# Set verified executable as our downloader program and return success
|
||||
DOWNLOADER=$1
|
||||
return 0
|
||||
}
|
||||
|
||||
# --- create temporary directory and cleanup when done ---
|
||||
setup_tmp() {
|
||||
TMP_DIR=$(mktemp -d -t k3s-install.XXXXXXXXXX)
|
||||
TMP_HASH=${TMP_DIR}/k3s.hash
|
||||
TMP_BIN=${TMP_DIR}/k3s.bin
|
||||
cleanup() {
|
||||
code=$?
|
||||
set +e
|
||||
trap - EXIT
|
||||
rm -rf ${TMP_DIR}
|
||||
exit $code
|
||||
}
|
||||
trap cleanup INT EXIT
|
||||
}
|
||||
|
||||
# --- use desired k3s version if defined or find version from channel ---
|
||||
get_release_version() {
|
||||
if [ -n "${INSTALL_K3S_COMMIT}" ]; then
|
||||
VERSION_K3S="commit ${INSTALL_K3S_COMMIT}"
|
||||
elif [ -n "${INSTALL_K3S_VERSION}" ]; then
|
||||
VERSION_K3S=${INSTALL_K3S_VERSION}
|
||||
else
|
||||
info "Finding release for channel ${INSTALL_K3S_CHANNEL}"
|
||||
version_url="${INSTALL_K3S_CHANNEL_URL}/${INSTALL_K3S_CHANNEL}"
|
||||
case $DOWNLOADER in
|
||||
curl)
|
||||
VERSION_K3S=$(curl -w '%{url_effective}' -L -s -S ${version_url} -o /dev/null | sed -e 's|.*/||')
|
||||
;;
|
||||
wget)
|
||||
VERSION_K3S=$(wget -SqO /dev/null ${version_url} 2>&1 | grep -i Location | sed -e 's|.*/||')
|
||||
;;
|
||||
*)
|
||||
fatal "Incorrect downloader executable '$DOWNLOADER'"
|
||||
;;
|
||||
esac
|
||||
fi
|
||||
info "Using ${VERSION_K3S} as release"
|
||||
}
|
||||
|
||||
# --- download from github url ---
|
||||
download() {
|
||||
[ $# -eq 2 ] || fatal 'download needs exactly 2 arguments'
|
||||
|
||||
case $DOWNLOADER in
|
||||
curl)
|
||||
curl -o $1 -sfL $2
|
||||
;;
|
||||
wget)
|
||||
wget -qO $1 $2
|
||||
;;
|
||||
*)
|
||||
fatal "Incorrect executable '$DOWNLOADER'"
|
||||
;;
|
||||
esac
|
||||
|
||||
# Abort if download command failed
|
||||
[ $? -eq 0 ] || fatal 'Download failed'
|
||||
}
|
||||
|
||||
# --- download hash from github url ---
|
||||
download_hash() {
|
||||
if [ -n "${INSTALL_K3S_COMMIT}" ]; then
|
||||
HASH_URL=${STORAGE_URL}/k3s${SUFFIX}-${INSTALL_K3S_COMMIT}.sha256sum
|
||||
else
|
||||
HASH_URL=${GITHUB_URL}/download/${VERSION_K3S}/sha256sum-${ARCH}.txt
|
||||
fi
|
||||
info "Downloading hash ${HASH_URL}"
|
||||
download ${TMP_HASH} ${HASH_URL}
|
||||
HASH_EXPECTED=$(grep " k3s${SUFFIX}$" ${TMP_HASH})
|
||||
HASH_EXPECTED=${HASH_EXPECTED%%[[:blank:]]*}
|
||||
}
|
||||
|
||||
# --- check hash against installed version ---
|
||||
installed_hash_matches() {
|
||||
if [ -x ${BIN_DIR}/k3s ]; then
|
||||
HASH_INSTALLED=$(sha256sum ${BIN_DIR}/k3s)
|
||||
HASH_INSTALLED=${HASH_INSTALLED%%[[:blank:]]*}
|
||||
if [ "${HASH_EXPECTED}" = "${HASH_INSTALLED}" ]; then
|
||||
return
|
||||
fi
|
||||
fi
|
||||
return 1
|
||||
}
|
||||
|
||||
# --- download binary from github url ---
|
||||
download_binary() {
|
||||
if [ -n "${INSTALL_K3S_COMMIT}" ]; then
|
||||
BIN_URL=${STORAGE_URL}/k3s${SUFFIX}-${INSTALL_K3S_COMMIT}
|
||||
else
|
||||
BIN_URL=${GITHUB_URL}/download/${VERSION_K3S}/k3s${SUFFIX}
|
||||
fi
|
||||
info "Downloading binary ${BIN_URL}"
|
||||
download ${TMP_BIN} ${BIN_URL}
|
||||
}
|
||||
|
||||
# --- verify downloaded binary hash ---
|
||||
verify_binary() {
|
||||
info "Verifying binary download"
|
||||
HASH_BIN=$(sha256sum ${TMP_BIN})
|
||||
HASH_BIN=${HASH_BIN%%[[:blank:]]*}
|
||||
if [ "${HASH_EXPECTED}" != "${HASH_BIN}" ]; then
|
||||
fatal "Download sha256 does not match ${HASH_EXPECTED}, got ${HASH_BIN}"
|
||||
fi
|
||||
}
|
||||
|
||||
# --- setup permissions and move binary to system directory ---
|
||||
setup_binary() {
|
||||
chmod 755 ${TMP_BIN}
|
||||
info "Installing k3s to ${BIN_DIR}/k3s"
|
||||
$SUDO chown root:root ${TMP_BIN}
|
||||
$SUDO mv -f ${TMP_BIN} ${BIN_DIR}/k3s
|
||||
}
|
||||
|
||||
# --- setup selinux policy ---
|
||||
setup_selinux() {
|
||||
case ${INSTALL_K3S_CHANNEL} in
|
||||
*testing)
|
||||
rpm_channel=testing
|
||||
;;
|
||||
*latest)
|
||||
rpm_channel=latest
|
||||
;;
|
||||
*)
|
||||
rpm_channel=stable
|
||||
;;
|
||||
esac
|
||||
|
||||
rpm_site="rpm.rancher.io"
|
||||
if [ "${rpm_channel}" = "testing" ]; then
|
||||
rpm_site="rpm-testing.rancher.io"
|
||||
fi
|
||||
|
||||
[ -r /etc/os-release ] && . /etc/os-release
|
||||
if [ "${ID_LIKE%%[ ]*}" = "suse" ]; then
|
||||
rpm_target=sle
|
||||
rpm_site_infix=microos
|
||||
package_installer=zypper
|
||||
elif [ "${VERSION_ID%%.*}" = "7" ]; then
|
||||
rpm_target=el7
|
||||
rpm_site_infix=centos/7
|
||||
package_installer=yum
|
||||
else
|
||||
rpm_target=el8
|
||||
rpm_site_infix=centos/8
|
||||
package_installer=yum
|
||||
fi
|
||||
|
||||
if [ "${package_installer}" = "yum" ] && [ -x /usr/bin/dnf ]; then
|
||||
package_installer=dnf
|
||||
fi
|
||||
|
||||
policy_hint="please install:
|
||||
${package_installer} install -y container-selinux
|
||||
${package_installer} install -y https://${rpm_site}/k3s/${rpm_channel}/common/${rpm_site_infix}/noarch/k3s-selinux-0.4-1.${rpm_target}.noarch.rpm
|
||||
"
|
||||
|
||||
if [ "$INSTALL_K3S_SKIP_SELINUX_RPM" = true ] || can_skip_download || [ ! -d /usr/share/selinux ]; then
|
||||
info "Skipping installation of SELinux RPM"
|
||||
else
|
||||
install_selinux_rpm ${rpm_site} ${rpm_channel} ${rpm_target} ${rpm_site_infix}
|
||||
fi
|
||||
|
||||
policy_error=fatal
|
||||
# install_selinux_rpm will set INSTALL_K3S_SELINUX_WARN=true on microos
|
||||
if [ "$INSTALL_K3S_SELINUX_WARN" = true ] || [ "${ID_LIKE:-}" = coreos ]; then
|
||||
policy_error=warn
|
||||
fi
|
||||
|
||||
if ! $SUDO chcon -u system_u -r object_r -t container_runtime_exec_t ${BIN_DIR}/k3s >/dev/null 2>&1; then
|
||||
if $SUDO grep '^\s*SELINUX=enforcing' /etc/selinux/config >/dev/null 2>&1; then
|
||||
$policy_error "Failed to apply container_runtime_exec_t to ${BIN_DIR}/k3s, ${policy_hint}"
|
||||
fi
|
||||
else
|
||||
if [ ! -f /usr/share/selinux/packages/k3s.pp ]; then
|
||||
$policy_error "Failed to find the k3s-selinux policy, ${policy_hint}"
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
install_selinux_rpm() {
|
||||
if [ -r /etc/redhat-release ] || [ -r /etc/centos-release ] || [ -r /etc/oracle-release ] || [ "${ID_LIKE%%[ ]*}" = "suse" ]; then
|
||||
repodir=/etc/yum.repos.d
|
||||
if [ -d /etc/zypp/repos.d ]; then
|
||||
repodir=/etc/zypp/repos.d
|
||||
fi
|
||||
set +o noglob
|
||||
$SUDO rm -f ${repodir}/rancher-k3s-common*.repo
|
||||
set -o noglob
|
||||
if [ -r /etc/redhat-release ] && [ "${3}" = "el7" ]; then
|
||||
$SUDO yum install -y yum-utils
|
||||
$SUDO yum-config-manager --enable rhel-7-server-extras-rpms
|
||||
fi
|
||||
$SUDO tee ${repodir}/rancher-k3s-common.repo >/dev/null << EOF
|
||||
[rancher-k3s-common-${2}]
|
||||
name=Rancher K3s Common (${2})
|
||||
baseurl=https://${1}/k3s/${2}/common/${4}/noarch
|
||||
enabled=1
|
||||
gpgcheck=1
|
||||
repo_gpgcheck=0
|
||||
gpgkey=https://${1}/public.key
|
||||
EOF
|
||||
case ${3} in
|
||||
el8)
|
||||
rpm_installer="dnf"
|
||||
;;
|
||||
sle)
|
||||
rpm_installer="zypper --gpg-auto-import-keys"
|
||||
if [ "${TRANSACTIONAL_UPDATE=false}" != "true" ] && [ -x /usr/sbin/transactional-update ]; then
|
||||
rpm_installer="transactional-update --no-selfupdate -d run ${rpm_installer}"
|
||||
: "${INSTALL_K3S_SKIP_START:=true}"
|
||||
: "${INSTALL_K3S_SELINUX_WARN:=true}"
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
rpm_installer="yum"
|
||||
;;
|
||||
esac
|
||||
# shellcheck disable=SC2086
|
||||
$SUDO ${rpm_installer} install -y "k3s-selinux"
|
||||
fi
|
||||
return
|
||||
}
|
||||
|
||||
# --- download and verify k3s ---
|
||||
download_and_verify() {
|
||||
if can_skip_download; then
|
||||
info 'Skipping k3s download and verify'
|
||||
verify_k3s_is_executable
|
||||
return
|
||||
fi
|
||||
|
||||
setup_verify_arch
|
||||
verify_downloader curl || verify_downloader wget || fatal 'Can not find curl or wget for downloading files'
|
||||
setup_tmp
|
||||
get_release_version
|
||||
download_hash
|
||||
|
||||
if installed_hash_matches; then
|
||||
info 'Skipping binary downloaded, installed k3s matches hash'
|
||||
return
|
||||
fi
|
||||
|
||||
download_binary
|
||||
verify_binary
|
||||
setup_binary
|
||||
}
|
||||
|
||||
# --- add additional utility links ---
|
||||
create_symlinks() {
|
||||
[ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = true ] && return
|
||||
[ "${INSTALL_K3S_SYMLINK}" = skip ] && return
|
||||
|
||||
for cmd in kubectl crictl ctr; do
|
||||
if [ ! -e ${BIN_DIR}/${cmd} ] || [ "${INSTALL_K3S_SYMLINK}" = force ]; then
|
||||
which_cmd=$(command -v ${cmd} 2>/dev/null || true)
|
||||
if [ -z "${which_cmd}" ] || [ "${INSTALL_K3S_SYMLINK}" = force ]; then
|
||||
info "Creating ${BIN_DIR}/${cmd} symlink to k3s"
|
||||
$SUDO ln -sf k3s ${BIN_DIR}/${cmd}
|
||||
else
|
||||
info "Skipping ${BIN_DIR}/${cmd} symlink to k3s, command exists in PATH at ${which_cmd}"
|
||||
fi
|
||||
else
|
||||
info "Skipping ${BIN_DIR}/${cmd} symlink to k3s, already exists"
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
# --- create killall script ---
|
||||
create_killall() {
|
||||
[ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = true ] && return
|
||||
info "Creating killall script ${KILLALL_K3S_SH}"
|
||||
$SUDO tee ${KILLALL_K3S_SH} >/dev/null << \EOF
|
||||
#!/bin/sh
|
||||
[ $(id -u) -eq 0 ] || exec sudo $0 $@
|
||||
|
||||
for bin in /var/lib/rancher/k3s/data/**/bin/; do
|
||||
[ -d $bin ] && export PATH=$PATH:$bin:$bin/aux
|
||||
done
|
||||
|
||||
set -x
|
||||
|
||||
for service in /etc/systemd/system/k3s*.service; do
|
||||
[ -s $service ] && systemctl stop $(basename $service)
|
||||
done
|
||||
|
||||
for service in /etc/init.d/k3s*; do
|
||||
[ -x $service ] && $service stop
|
||||
done
|
||||
|
||||
pschildren() {
|
||||
ps -e -o ppid= -o pid= | \
|
||||
sed -e 's/^\s*//g; s/\s\s*/\t/g;' | \
|
||||
grep -w "^$1" | \
|
||||
cut -f2
|
||||
}
|
||||
|
||||
pstree() {
|
||||
for pid in $@; do
|
||||
echo $pid
|
||||
for child in $(pschildren $pid); do
|
||||
pstree $child
|
||||
done
|
||||
done
|
||||
}
|
||||
|
||||
killtree() {
|
||||
kill -9 $(
|
||||
{ set +x; } 2>/dev/null;
|
||||
pstree $@;
|
||||
set -x;
|
||||
) 2>/dev/null
|
||||
}
|
||||
|
||||
getshims() {
|
||||
ps -e -o pid= -o args= | sed -e 's/^ *//; s/\s\s*/\t/;' | grep -w 'k3s/data/[^/]*/bin/containerd-shim' | cut -f1
|
||||
}
|
||||
|
||||
killtree $({ set +x; } 2>/dev/null; getshims; set -x)
|
||||
|
||||
do_unmount_and_remove() {
|
||||
set +x
|
||||
while read -r _ path _; do
|
||||
case "$path" in $1*) echo "$path" ;; esac
|
||||
done < /proc/self/mounts | sort -r | xargs -r -t -n 1 sh -c 'umount "$0" && rm -rf "$0"'
|
||||
set -x
|
||||
}
|
||||
|
||||
do_unmount_and_remove '/run/k3s'
|
||||
do_unmount_and_remove '/var/lib/rancher/k3s'
|
||||
do_unmount_and_remove '/var/lib/kubelet/pods'
|
||||
do_unmount_and_remove '/var/lib/kubelet/plugins'
|
||||
do_unmount_and_remove '/run/netns/cni-'
|
||||
|
||||
# Remove CNI namespaces
|
||||
ip netns show 2>/dev/null | grep cni- | xargs -r -t -n 1 ip netns delete
|
||||
|
||||
# Delete network interface(s) that match 'master cni0'
|
||||
ip link show 2>/dev/null | grep 'master cni0' | while read ignore iface ignore; do
|
||||
iface=${iface%%@*}
|
||||
[ -z "$iface" ] || ip link delete $iface
|
||||
done
|
||||
ip link delete cni0
|
||||
ip link delete flannel.1
|
||||
ip link delete flannel-v6.1
|
||||
rm -rf /var/lib/cni/
|
||||
iptables-save | grep -v KUBE- | grep -v CNI- | iptables-restore
|
||||
EOF
|
||||
$SUDO chmod 755 ${KILLALL_K3S_SH}
|
||||
$SUDO chown root:root ${KILLALL_K3S_SH}
|
||||
}
|
||||
|
||||
# --- create uninstall script ---
|
||||
create_uninstall() {
|
||||
[ "${INSTALL_K3S_BIN_DIR_READ_ONLY}" = true ] && return
|
||||
info "Creating uninstall script ${UNINSTALL_K3S_SH}"
|
||||
$SUDO tee ${UNINSTALL_K3S_SH} >/dev/null << EOF
|
||||
#!/bin/sh
|
||||
set -x
|
||||
[ \$(id -u) -eq 0 ] || exec sudo \$0 \$@
|
||||
|
||||
${KILLALL_K3S_SH}
|
||||
|
||||
if command -v systemctl; then
|
||||
systemctl disable ${SYSTEM_NAME}
|
||||
systemctl reset-failed ${SYSTEM_NAME}
|
||||
systemctl daemon-reload
|
||||
fi
|
||||
if command -v rc-update; then
|
||||
rc-update delete ${SYSTEM_NAME} default
|
||||
fi
|
||||
|
||||
rm -f ${FILE_K3S_SERVICE}
|
||||
rm -f ${FILE_K3S_ENV}
|
||||
|
||||
remove_uninstall() {
|
||||
rm -f ${UNINSTALL_K3S_SH}
|
||||
}
|
||||
trap remove_uninstall EXIT
|
||||
|
||||
if (ls ${SYSTEMD_DIR}/k3s*.service || ls /etc/init.d/k3s*) >/dev/null 2>&1; then
|
||||
set +x; echo 'Additional k3s services installed, skipping uninstall of k3s'; set -x
|
||||
exit
|
||||
fi
|
||||
|
||||
for cmd in kubectl crictl ctr; do
|
||||
if [ -L ${BIN_DIR}/\$cmd ]; then
|
||||
rm -f ${BIN_DIR}/\$cmd
|
||||
fi
|
||||
done
|
||||
|
||||
rm -rf /etc/rancher/k3s
|
||||
rm -rf /run/k3s
|
||||
rm -rf /run/flannel
|
||||
rm -rf /var/lib/rancher/k3s
|
||||
rm -rf /var/lib/kubelet
|
||||
rm -f ${BIN_DIR}/k3s
|
||||
rm -f ${KILLALL_K3S_SH}
|
||||
|
||||
if type yum >/dev/null 2>&1; then
|
||||
yum remove -y k3s-selinux
|
||||
rm -f /etc/yum.repos.d/rancher-k3s-common*.repo
|
||||
fi
|
||||
EOF
|
||||
$SUDO chmod 755 ${UNINSTALL_K3S_SH}
|
||||
$SUDO chown root:root ${UNINSTALL_K3S_SH}
|
||||
}
|
||||
|
||||
# --- disable current service if loaded --
|
||||
systemd_disable() {
|
||||
$SUDO systemctl disable ${SYSTEM_NAME} >/dev/null 2>&1 || true
|
||||
$SUDO rm -f /etc/systemd/system/${SERVICE_K3S} || true
|
||||
$SUDO rm -f /etc/systemd/system/${SERVICE_K3S}.env || true
|
||||
}
|
||||
|
||||
# --- capture current env and create file containing k3s_ variables ---
|
||||
create_env_file() {
|
||||
info "env: Creating environment file ${FILE_K3S_ENV}"
|
||||
$SUDO touch ${FILE_K3S_ENV}
|
||||
$SUDO chmod 0600 ${FILE_K3S_ENV}
|
||||
sh -c export | while read x v; do echo $v; done | grep -E '^(K3S|CONTAINERD)_' | $SUDO tee ${FILE_K3S_ENV} >/dev/null
|
||||
sh -c export | while read x v; do echo $v; done | grep -Ei '^(NO|HTTP|HTTPS)_PROXY' | $SUDO tee -a ${FILE_K3S_ENV} >/dev/null
|
||||
}
|
||||
|
||||
# --- write systemd service file ---
|
||||
create_systemd_service_file() {
|
||||
info "systemd: Creating service file ${FILE_K3S_SERVICE}"
|
||||
$SUDO tee ${FILE_K3S_SERVICE} >/dev/null << EOF
|
||||
[Unit]
|
||||
Description=Lightweight Kubernetes
|
||||
Documentation=https://k3s.io
|
||||
Wants=network-online.target
|
||||
After=network-online.target
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
||||
[Service]
|
||||
Type=${SYSTEMD_TYPE}
|
||||
EnvironmentFile=-/etc/default/%N
|
||||
EnvironmentFile=-/etc/sysconfig/%N
|
||||
EnvironmentFile=-${FILE_K3S_ENV}
|
||||
KillMode=process
|
||||
Delegate=yes
|
||||
# Having non-zero Limit*s causes performance problems due to accounting overhead
|
||||
# in the kernel. We recommend using cgroups to do container-local accounting.
|
||||
LimitNOFILE=1048576
|
||||
LimitNPROC=infinity
|
||||
LimitCORE=infinity
|
||||
TasksMax=infinity
|
||||
TimeoutStartSec=0
|
||||
Restart=always
|
||||
RestartSec=5s
|
||||
ExecStartPre=/bin/sh -xc '! /usr/bin/systemctl is-enabled --quiet nm-cloud-setup.service'
|
||||
ExecStartPre=-/sbin/modprobe br_netfilter
|
||||
ExecStartPre=-/sbin/modprobe overlay
|
||||
ExecStart=${BIN_DIR}/k3s \\
|
||||
${CMD_K3S_EXEC}
|
||||
|
||||
EOF
|
||||
}
|
||||
|
||||
# --- write openrc service file ---
|
||||
create_openrc_service_file() {
|
||||
LOG_FILE=/var/log/${SYSTEM_NAME}.log
|
||||
|
||||
info "openrc: Creating service file ${FILE_K3S_SERVICE}"
|
||||
$SUDO tee ${FILE_K3S_SERVICE} >/dev/null << EOF
|
||||
#!/sbin/openrc-run
|
||||
|
||||
depend() {
|
||||
after network-online
|
||||
want cgroups
|
||||
}
|
||||
|
||||
start_pre() {
|
||||
rm -f /tmp/k3s.*
|
||||
}
|
||||
|
||||
supervisor=supervise-daemon
|
||||
name=${SYSTEM_NAME}
|
||||
command="${BIN_DIR}/k3s"
|
||||
command_args="$(escape_dq "${CMD_K3S_EXEC}")
|
||||
>>${LOG_FILE} 2>&1"
|
||||
|
||||
output_log=${LOG_FILE}
|
||||
error_log=${LOG_FILE}
|
||||
|
||||
pidfile="/var/run/${SYSTEM_NAME}.pid"
|
||||
respawn_delay=5
|
||||
respawn_max=0
|
||||
|
||||
set -o allexport
|
||||
if [ -f /etc/environment ]; then source /etc/environment; fi
|
||||
if [ -f ${FILE_K3S_ENV} ]; then source ${FILE_K3S_ENV}; fi
|
||||
set +o allexport
|
||||
EOF
|
||||
$SUDO chmod 0755 ${FILE_K3S_SERVICE}
|
||||
|
||||
$SUDO tee /etc/logrotate.d/${SYSTEM_NAME} >/dev/null << EOF
|
||||
${LOG_FILE} {
|
||||
missingok
|
||||
notifempty
|
||||
copytruncate
|
||||
}
|
||||
EOF
|
||||
}
|
||||
|
||||
# --- write systemd or openrc service file ---
|
||||
create_service_file() {
|
||||
[ "${HAS_SYSTEMD}" = true ] && create_systemd_service_file
|
||||
[ "${HAS_OPENRC}" = true ] && create_openrc_service_file
|
||||
return 0
|
||||
}
|
||||
|
||||
# --- get hashes of the current k3s bin and service files
|
||||
get_installed_hashes() {
|
||||
$SUDO sha256sum ${BIN_DIR}/k3s ${FILE_K3S_SERVICE} ${FILE_K3S_ENV} 2>&1 || true
|
||||
}
|
||||
|
||||
# --- enable and start systemd service ---
|
||||
systemd_enable() {
|
||||
info "systemd: Enabling ${SYSTEM_NAME} unit"
|
||||
$SUDO systemctl enable ${FILE_K3S_SERVICE} >/dev/null
|
||||
$SUDO systemctl daemon-reload >/dev/null
|
||||
}
|
||||
|
||||
systemd_start() {
|
||||
info "systemd: Starting ${SYSTEM_NAME}"
|
||||
$SUDO systemctl restart ${SYSTEM_NAME}
|
||||
}
|
||||
|
||||
# --- enable and start openrc service ---
|
||||
openrc_enable() {
|
||||
info "openrc: Enabling ${SYSTEM_NAME} service for default runlevel"
|
||||
$SUDO rc-update add ${SYSTEM_NAME} default >/dev/null
|
||||
}
|
||||
|
||||
openrc_start() {
|
||||
info "openrc: Starting ${SYSTEM_NAME}"
|
||||
$SUDO ${FILE_K3S_SERVICE} restart
|
||||
}
|
||||
|
||||
# --- startup systemd or openrc service ---
|
||||
service_enable_and_start() {
|
||||
if [ -f "/proc/cgroups" ] && [ "$(grep memory /proc/cgroups | while read -r n n n enabled; do echo $enabled; done)" -eq 0 ];
|
||||
then
|
||||
info 'Failed to find memory cgroup, you may need to add "cgroup_memory=1 cgroup_enable=memory" to your linux cmdline (/boot/cmdline.txt on a Raspberry Pi)'
|
||||
fi
|
||||
|
||||
[ "${INSTALL_K3S_SKIP_ENABLE}" = true ] && return
|
||||
|
||||
[ "${HAS_SYSTEMD}" = true ] && systemd_enable
|
||||
[ "${HAS_OPENRC}" = true ] && openrc_enable
|
||||
|
||||
[ "${INSTALL_K3S_SKIP_START}" = true ] && return
|
||||
|
||||
POST_INSTALL_HASHES=$(get_installed_hashes)
|
||||
if [ "${PRE_INSTALL_HASHES}" = "${POST_INSTALL_HASHES}" ] && [ "${INSTALL_K3S_FORCE_RESTART}" != true ]; then
|
||||
info 'No change detected so skipping service start'
|
||||
return
|
||||
fi
|
||||
|
||||
[ "${HAS_SYSTEMD}" = true ] && systemd_start
|
||||
[ "${HAS_OPENRC}" = true ] && openrc_start
|
||||
return 0
|
||||
}
|
||||
|
||||
# --- re-evaluate args to include env command ---
|
||||
eval set -- $(escape "${INSTALL_K3S_EXEC}") $(quote "$@")
|
||||
|
||||
# --- run the install process --
|
||||
{
|
||||
verify_system
|
||||
setup_env "$@"
|
||||
download_and_verify
|
||||
setup_selinux
|
||||
create_symlinks
|
||||
create_killall
|
||||
create_uninstall
|
||||
systemd_disable
|
||||
create_env_file
|
||||
create_service_file
|
||||
service_enable_and_start
|
||||
}
|
||||
153
0-部署应用/Oracle-Cloud/k3s集群/4-install k3s with headscale.sh
Normal file
153
0-部署应用/Oracle-Cloud/k3s集群/4-install k3s with headscale.sh
Normal file
@@ -0,0 +1,153 @@
|
||||
#!/bin/bash
|
||||
|
||||
server(){
|
||||
|
||||
|
||||
# install from binary
|
||||
# https://github.com/k3s-io/k3s/releases/tag/v1.22.3+k3s1
|
||||
k3s server \
|
||||
--write-kubeconfig-mode "0644" \
|
||||
--https-listen-port "16643" \
|
||||
--advertise-port "16643" \
|
||||
--lb-server-port "16644" \
|
||||
--advertise-address "146.56.147.12" \
|
||||
--node-name "master-s0" \
|
||||
--bind-address "0.0.0.0" \
|
||||
--cluster-cidr "10.74.0.0/16" \
|
||||
--service-cidr "10.100.0.0/16" \
|
||||
--cluster-dns "10.100.0.10" \
|
||||
--service-node-port-range "20000-22000" \
|
||||
--cluster-domain "wdd.io" \
|
||||
--default-local-storage-path "/data/k3s/" \
|
||||
--no-deploy "metrics-server" \
|
||||
--no-deploy "coredns" \
|
||||
--no-deploy "servicelb" \
|
||||
--node-label "location=seoul" \
|
||||
--disable-network-policy \
|
||||
--docker \
|
||||
--agent-token "woshinibaba" \
|
||||
--cluster-init
|
||||
|
||||
# 2022-12-2 use this
|
||||
# install by script
|
||||
mkdir /root/k3s-install/
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
write-kubeconfig-mode: "0644"
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
https-listen-port: "6643"
|
||||
advertise-port: "6643"
|
||||
lb-server-port: "6644"
|
||||
advertise-address: "146.56.147.12"
|
||||
node-name: "master-s0"
|
||||
node-ip: "10.20.0.19"
|
||||
node-external-ip: "146.56.147.12"
|
||||
flannel-iface: "tailscale0"
|
||||
flannel-backend: "vxlan"
|
||||
bind-address: "0.0.0.0"
|
||||
cluster-cidr: "10.100.0.0/16"
|
||||
service-cidr: "10.74.0.0/16"
|
||||
cluster-dns: "10.74.0.10"
|
||||
service-node-port-range: "20000-22000"
|
||||
cluster-domain: "wdd.io"
|
||||
default-local-storage-path: "/data/k3s/"
|
||||
node-label: "location=seoul"
|
||||
docker: "true"
|
||||
disable:
|
||||
- "metrics-server"
|
||||
#- "service-lb"
|
||||
#- "local-storage"
|
||||
agent-token: "woshinibaba"
|
||||
EOF
|
||||
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_VERSION=v1.24.8+k3s1 INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml --docker --cluster-init" sh -
|
||||
|
||||
|
||||
cat /root/k3s-install/install-k3s-official.sh | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml --docker" sh -
|
||||
|
||||
}
|
||||
|
||||
|
||||
|
||||
agent() {
|
||||
|
||||
mkdir /root/k3s-install
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-0"
|
||||
node-external-ip: "150.230.198.103"
|
||||
node-ip: "10.20.0.16"
|
||||
docker: "true"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_VERSION=v1.24.8+k3s1 INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
mkdir /root/k3s-install
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "seoul-amd64-01"
|
||||
node-external-ip: "140.238.8.73"
|
||||
node-ip: "10.20.0.21"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=seoul"
|
||||
EOF
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" INSTALL_K3S_VERSION=v1.24.8+k3s1 sh -
|
||||
|
||||
mkdir /root/k3s-install
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-1"
|
||||
node-external-ip: "140.238.63.37"
|
||||
node-ip: "10.20.0.18"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
cat /root/k3s-install/install-k3s-official.sh|
|
||||
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" INSTALL_K3S_VERSION=v1.24.8+k3s1 sh -
|
||||
|
||||
mkdir /root/k3s-install
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tokyo-2"
|
||||
node-external-ip: "140.238.52.228"
|
||||
node-ip: "10.20.0.17"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=tokyo"
|
||||
EOF
|
||||
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" INSTALL_K3S_VERSION=v1.24.8+k3s1 sh -
|
||||
|
||||
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tc-sh"
|
||||
node-external-ip: "42.192.52.227"
|
||||
node-ip: "10.10.0.71"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=shanghai"
|
||||
EOF
|
||||
curl -sfL http://rancher-mirror.cnrancher.com/k3s/k3s-install.sh | INSTALL_K3S_MIRROR=cn INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" sh -
|
||||
|
||||
|
||||
mkdir /root/k3s-install
|
||||
cat >/root/k3s-install/k3s-config.yaml<<EOF
|
||||
v: 0
|
||||
log: /root/k3s-install/k3s.log
|
||||
node-name: "node-tc-hk"
|
||||
node-external-ip: "43.154.83.213"
|
||||
node-ip: "10.20.0.13"
|
||||
docker: "true"
|
||||
flannel-iface: "tailscale0"
|
||||
node-label: "location=hongkong"
|
||||
EOF
|
||||
|
||||
curl -sfL https://get.k3s.io | INSTALL_K3S_CHANNEL=stable INSTALL_K3S_EXEC="--config=/root/k3s-install/k3s-config.yaml" K3S_URL="https://146.56.147.12:6643" K3S_TOKEN="woshinibaba" INSTALL_K3S_VERSION=v1.24.8+k3s1 sh -
|
||||
|
||||
}
|
||||
33
0-部署应用/Oracle-Cloud/k3s集群/5-uninstall-k3s.sh
Normal file
33
0-部署应用/Oracle-Cloud/k3s集群/5-uninstall-k3s.sh
Normal file
@@ -0,0 +1,33 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
|
||||
/usr/local/bin/k3s-uninstall.sh
|
||||
/usr/local/bin/k3s-agent-uninstall.sh
|
||||
|
||||
rm -rf /root/k3s-install/
|
||||
|
||||
|
||||
# 添加执行权限 不能执行上面的命令
|
||||
|
||||
apt install acl
|
||||
chmod 440 /usr/local/bin/k3s-uninstall.sh
|
||||
bin/setfacl -m u:root:--- /usr/local/bin/k3s-uninstall.sh
|
||||
bin/setfacl -m g:root:--- /usr/local/bin/k3s-uninstall.sh
|
||||
|
||||
getfacl /usr/local/bin/k3s-uninstall.sh
|
||||
# 显示如下
|
||||
#getfacl: Removing leading '/' from absolute path names
|
||||
## file: usr/local/bin/k3s-uninstall.sh
|
||||
## owner: root
|
||||
## group: root
|
||||
#user::r--
|
||||
#user:root:---
|
||||
#group::r-x #effective:---
|
||||
#group:root:---
|
||||
#mask::---
|
||||
#other::---
|
||||
|
||||
# 执行 显示无权限
|
||||
⚡ root@arm-seoul-1 ~ /usr/local/bin/k3s-uninstall.sh
|
||||
zsh: permission denied: /usr/local/bin/k3s-uninstall.sh
|
||||
|
||||
62
0-部署应用/Oracle-Cloud/k3s集群/9-完全清理k3s集群.sh
Normal file
62
0-部署应用/Oracle-Cloud/k3s集群/9-完全清理k3s集群.sh
Normal file
@@ -0,0 +1,62 @@
|
||||
#!/bin/bash
|
||||
|
||||
|
||||
echo "开始执行k3s默认的清除内容!"
|
||||
|
||||
chmod +x /usr/local/bin/k3s-uninstall.sh
|
||||
chmod +x /usr/local/bin/k3s-agent-uninstall.sh
|
||||
|
||||
/usr/local/bin/k3s-uninstall.sh
|
||||
/usr/local/bin/k3s-agent-uninstall.sh
|
||||
rm -rf /root/k3s-install/
|
||||
|
||||
|
||||
echo "开始清理containerd"
|
||||
|
||||
echo "关停所有的容器!"
|
||||
crictl ps -a | grep -v Running | awk '{print $1}' | xargs sudo crictl rm && crictl rmi --prune
|
||||
|
||||
echo "清除所有的镜像!"
|
||||
crictl images -q | xargs -n 1 crictl rmi 2>/dev/null
|
||||
|
||||
apt-remove containerd
|
||||
|
||||
echo "开始清理docker相关的内容"
|
||||
|
||||
docker system df
|
||||
# 占用存储空间,又没有用的容器
|
||||
docker images -aq -f 'dangling=true' | xargs docker rmi
|
||||
|
||||
# 删除所有
|
||||
echo "删除所有"
|
||||
docker system prune -a
|
||||
|
||||
echo ""
|
||||
echo "清除docker运行的容器!"
|
||||
docker stop $(docker ps -a | awk '{print $1 }')
|
||||
docker rm $(docker ps -a | awk '{print $1 }')
|
||||
|
||||
|
||||
echo "删除镜像"
|
||||
docker rmi $(docker images | grep "none" | awk '{print $3}')
|
||||
|
||||
echo "删除所有镜像 谨慎使用"
|
||||
docker rmi $(docker images -q) -f
|
||||
|
||||
echo ""
|
||||
echo "开始删除docker的文件"
|
||||
rm -rf /var/lib/docker
|
||||
|
||||
echo " "
|
||||
echo "开始清理系统残余"
|
||||
echo ""
|
||||
apt-get autoremove
|
||||
|
||||
|
||||
echo "开始清理系统日志残留"
|
||||
rm -rf /var/log/journal/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
18
0-部署应用/Oracle-Cloud/k3s集群/Seoul-amd64-01.sh
Normal file
18
0-部署应用/Oracle-Cloud/k3s集群/Seoul-amd64-01.sh
Normal file
@@ -0,0 +1,18 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
|
||||
|
||||
curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
|
||||
curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list
|
||||
|
||||
sudo apt-get update
|
||||
sudo apt-get install tailscale
|
||||
|
||||
systemctl enable --now tailscaled
|
||||
|
||||
tailscale up --login-server=http://tailscale.107421.xyz --accept-routes=false --accept-dns=false --advertise-routes=10.100.0.0/16,10.74.0.0/16
|
||||
|
||||
|
||||
systemctl status tailscaled
|
||||
|
||||
headscale routes enable -i 26 -r 10.74.0.0/16,10.100.0.0/16
|
||||
Reference in New Issue
Block a user