Multi-Node Kubernetes 1.18.2 with kubeadm on local multipass cloud with Docker, Containerd or CRI-O and Rancher Server on top
These simple scripts deploy a multi-node Kubernetes 1.17.0 with kubeadm on multipass VMs with Containerd, Docker or CRI-O on your local machine in about 6 minutes, depending on your internet speed.
You need kubectl and multipass installed on your laptop.
Get the latest Multipass here:
https://github.com/CanonicalLtd/multipass/releases
Deploy the master node, 2 worker nodes and join the worker nodes into the cluster step by step:
./1-deploy-kubeadm-containerd-master.sh
./2-deploy-kubeadm-containerd-nodes.sh
./3-kubeadm_join_nodes.sh
or deploy with a single command:
./deploy-bonsai-containerd.sh
Deploy the master node, 2 worker nodes and join the worker nodes into the cluster step by step:
./1-deploy-kubeadm-master.sh
./2-deploy-kubeadm-nodes.sh
./3-kubeadm_join_nodes.sh
or deploy with a single command:
./deploy.sh
You should get something similar to this at the end:
NAME STATUS ROLES AGE VERSION
master Ready master 8m55s v1.17.0
worker1 Ready node 3m45s v1.17.0
worker2 Ready node 3m24s v1.17.0
############################################################################
Enjoy and learn to love learning :-)
Total runtime in minutes was: 06:30
############################################################################
Launch a single Ubuntu VM with multipass and try CRI-O with kubeadm and podman:
multipass launch ubuntu --name master --cpus 2 --mem 2G --disk 8G
multipass shell master
sudo -i
wget https://raw.githubusercontent.com/arashkaffamanesh/kubeadm-multipass/master/crio-install.sh
chmod +x crio-install.sh
./crio-install.sh
You can deploy Rancher Server on top of your kubeadm cluster with:
./4-deploy-rancher-on-kubeadm.sh
# a browser tab should pop up to Rancher Server UI
./install-metal-lb.sh
brew install mkcert
mkcert --install
# provision a wildcard certificate for our new local domain
mkcert '*.k8s.local'
# This will create two files: _wildcard.k8s.local-key.pem and _wildcard.k8s.local.pem.
kubectl -n kube-system create secret tls traefik-tls-cert --key=_wildcard.k8s.local-key.pem --cert=_wildcard.k8s.local.pem
kubectl apply -f configmap.yml
kubectl create -f traefik.yaml
kubectl apply -f rbac.yml
kubectl get pods -n kube-system | grep traefik
# you should see a line that looks like the following
traefik-ingress-controller-68c5fbccbd-5kjvw 1/1 Running
kubectl create -f whoami-deployment.yml
# create a host entry in /etc/hosts like this to the IP of the traefik ingress controller svc
# 192.168.64.23 whoami.k8s.local
curl https://whoami.k8s.local
# or
open https://whoami.k8s.local
# it should work
With that you can eypose services over a valid HTTPS connection with your private local CA!
Change the whoami service type to LoadBalancer and see what happens :-)
Change the rancher service type to LoadBalancer and adapt the host entry in rancher ingress to point to rancher.k8s.local and make sure your /etc/hosts has an entry like this:
192.168.64.23 whoami.k8s.local
192.168.64.23 rancher.k8s.local
N.B.: 192.168.64.23 is the IP of the traefik ingress controller service!
open https://rancher.k8s.local
#Should take you via HTTPS to Rancher without any warnings :-)
Your valid certificate should look something like this:
That's it for now, more integrations and related blog posts are coming soon.
Note: we're using Calico here, if 192.178.0.0/16 is already in use within your network you must select a different pod network CIDR, replacing 192.178.0.0/16 in the kubeadm init command in ./1-deploy-kubeadm-master.sh
script as well as in the calico.yaml
file provided in this repo.
./cleanup.sh
A related blog post is published on medium:
https://blog.kubernauts.io/simplicity-matters-kubernetes-1-16-fffbf7e84944