K8S 部署 traefik 2.2.1 ingress controller

準備traefik K8S 部署相關的yaml 文件

# 有*號替換的問題請查看我自己的github
https://github.com/qist/k8s/tree/master/k8s-yaml/traefik2
# 官網規則地址:
# https://docs.traefik.io/v2.2/routing/providers/kubernetes-ingress/
# https://docs.traefik.io/v2.2/routing/providers/kubernetes-crd/
# 創建新命名空間 ingress-system
vim 0traefik-namespace.yaml
apiVersion: v1
kind: Namespace
metadata:
  name: ingress-system
---
# 創建rbac 及Definitions 
vim traefik-rbac.yaml
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: ingre***outes.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: Ingre***oute
    plural: ingre***outes
    singular: ingre***oute
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: middlewares.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: Middleware
    plural: middlewares
    singular: middleware
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: ingre***outetcps.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: Ingre***outeTCP
    plural: ingre***outetcps
    singular: ingre***outetcp
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: ingre***outeudps.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: Ingre***outeUDP
    plural: ingre***outeudps
    singular: ingre***outeudp
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: tlsoptions.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: TLSOption
    plural: tlsoptions
    singular: tlsoption
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: tlsstores.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: TLSStore
    plural: tlsstores
    singular: tlsstore
  scope: Namespaced

---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
  name: traefikservices.traefik.containo.us

spec:
  group: traefik.containo.us
  version: v1alpha1
  names:
    kind: TraefikService
    plural: traefikservices
    singular: traefikservice
  scope: Namespaced
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: traefik

rules:
  - apiGroups:
      - ""
    resources:
      - services
      - endpoints
      - secrets
    verbs:
      - get
      - list
      - watch
  - apiGroups:
      - extensions
    resources:
      - ingresses
    verbs:
      - get
      - list
      - watch
  - apiGroups:
      - extensions
    resources:
      - ingresses/status
    verbs:
      - update
  - apiGroups:
      - traefik.containo.us
    resources:
      - middlewares
      - ingre***outes
      - traefikservices
      - ingre***outetcps
      - ingre***outeudps
      - tlsoptions
      - tlsstores
    verbs:
      - get
      - list
      - watch

---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: traefik

roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: traefik
subjects:
  - kind: ServiceAccount
    name: traefik
    namespace: ingress-system
# 創建traefik daemonset yaml 私有環境daemonset 方式部署
vim traefik-daemonset-https.yaml
---
apiVersion: v1
kind: ServiceAccount
metadata:
  name: traefik
  namespace: ingress-system
---
kind: DaemonSet
apiVersion: apps/v1
metadata:
  namespace: ingress-system
  name: traefik
  labels:
    k8s-app: traefik
spec:
  selector:
    matchLabels:
      k8s-app: traefik
  template:
    metadata:
      labels:
        k8s-app: traefik
      annotations:
        prometheus.io/port: "8082"
        prometheus.io/scrape: 'true'
    spec:
      serviceAccountName: traefik
      terminationGracePeriodSeconds: 60
      hostNetwork: true
      dnsPolicy: ClusterFirstWithHostNet
      containers:
        - name: traefik
          image: traefik:v2.2.1
          args:
            - --api.insecure
            - --api.dashboard
            - --log
            - --log.level=INFO
            - --accesslog
            - --accessLog.fields.headers.defaultMode=redact
            - --entrypoints.web.Address=:80
            - --entrypoints.websecure.Address=:443
            - --providers.kubernetescrd
            - --metrics.prometheus
            - --metrics.prometheus.entrypoint=metrics
            - --metrics.prometheus.addEntryPointsLabels=true
            - --entryPoints.metrics.address=:8082
            - --serverstransport.insecureskipverify=true
            - --providers.kubernetesingress.disablepasshostheaders=true
          ports:
            - name: web
              containerPort: 80
              hostPort: 80
            - name: websecure
              containerPort: 443
              hostPort: 443
            - name: admin
              containerPort: 8080
              hostPort: 8080
            - name: http-metrics
              containerPort: 8082
              hostPort: 8082
          securityContext:
            capabilities:
              drop:
              - ALL
              add:
              - NET_BIND_SERVICE
      #nodeSelector:
        #ingress: "yes"
      tolerations:
      - effect: NoSchedule
        key: node-role.kubernetes.io/ingress
        operator: Equal
  updateStrategy:
    type: RollingUpdate
    rollingUpdate:
      maxUnavailable: 1

---
apiVersion: v1
kind: Service
metadata:
  labels:
    k8s-app: traefik  
  name: traefik
  namespace: ingress-system
spec:
  clusterIP: None
  type: ClusterIP
  ports:
    - protocol: TCP
      name: web
      port: 80
    - protocol: TCP
      name: admin
      port: 8080
    - protocol: TCP
      name: websecure
      port: 443
    - protocol: TCP
      name: http-metrics
      port: 8082
  selector:
    k8s-app: traefik
# 創建 traefik dashboard  ingress
vim traefik-dashboard.yaml
---
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: traefik-dashboard
  namespace: ingress-system
spec:
  entryPoints:
    - web
  routes:
  - match: Host(`traefik.tycng.com`)
    kind: Rule
    services:
    - name: api@internal
      kind: TraefikService

部署traefik ingress

kubectl apply -f .
root@Qist:/mnt/g/work/k8s/k8s-yaml/traefik2# kubectl apply -f .
namespace/ingress-system created
customresourcedefinition.apiextensions.k8s.io/ingre***outes.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/middlewares.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/ingre***outetcps.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/ingre***outeudps.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/tlsoptions.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/tlsstores.traefik.containo.us created
customresourcedefinition.apiextensions.k8s.io/traefikservices.traefik.containo.us created
clusterrole.rbac.authorization.k8s.io/traefik created
clusterrolebinding.rbac.authorization.k8s.io/traefik created
ingre***oute.traefik.containo.us/traefik-dashboard created
serviceaccount/traefik created
daemonset.apps/traefik created
service/traefik created
# 如果報錯請多試一次
unable to recognize "traefik-dashboard.yaml": no matches for kind "Ingre***oute" in version "traefik.containo.us/v1alpha1"
# 再次執行kubectl apply -f . 就好了

驗證traefik ingress 部署是否正常

# traefik 有自己的dashboard 端口是8080 任意節點訪問
http://192.168.2.175:8080/dashboard/#/
# dns 解析traefik-dashboard traefik.tycng.com # 域名改成自己的

K8S 部署 traefik 2.2.1 ingress controller

# 域名訪問結果

K8S 部署 traefik 2.2.1 ingress controller

創建應用對外提供訪問

# 記得域名修改成自己的,然後dns 做好解析
# 創建測項目
#  部署一個應用
kubectl create deployment myip --image=cloudnativelabs/whats-my-ip 
# 暴露端口
kubectl expose deployment myip --port=8080 --target-port=8080
# 兼容 K8S 
cat << EOF | kubectl apply -f -
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
  name: myip
    namespace: default
spec:
  ingressClassName: traefik
  rules:
  - host: prometheus.tycng.com
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          serviceName: myip 
          servicePort: 8080
EOF

K8S 部署 traefik 2.2.1 ingress controller

# 能夠正常提供訪問
# kubernetes-crd 創建對我服務網 並測試ipv4 ipv6
# 創建應用IPV4 service
cat << EOF | kubectl apply -f -
apiVersion: v1
kind: Service
metadata:
  labels:
    app: myip
  name: myip-ipv4
  namespace: default
spec:
  ipFamily: IPv4
  ports:
  - port: 8080
    protocol: TCP
    targetPort: 8080
  selector:
    app: myip
  sessionAffinity: None
  type: ClusterIP
EOF
# 創建應用IPV6 service
cat << EOF | kubectl apply -f -
apiVersion: v1
kind: Service
metadata:
  labels:
    app: myip
  name: myip-ipv6
  namespace: default
spec:
  ipFamily: IPv6
  ports:
  - port: 8080
    protocol: TCP
    targetPort: 8080
  selector:
    app: myip
  sessionAffinity: None
  type: ClusterIP
EOF
# 創建應用IPV4 Ingress
cat << EOF | kubectl apply -f -
---
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: myip-ipv4
  namespace: default
spec:
  entryPoints:
    - web
  routes:
  - match: Host(\`ipv4.tycng.com\`)
    kind: Rule
    services:
    - kind: Service
      name: myip-ipv4
      port: 8080
      sticky:
        cookie:
          httpOnly: true
          name: cookie
          secure: true
          sameSite: none
      passHostHeader: true
      responseForwarding:
        flushInterval: 100ms
EOF
# 創建應用IPV6Ingress
cat << EOF | kubectl apply -f -
---
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: myip-ipv6
  namespace: default
spec:
  entryPoints:
    - web
  routes:
  - match: Host(\`ipv6.tycng.com\`)
    kind: Rule
    services:
    - kind: Service
      name: myip-ipv6
      port: 8080
      sticky:
        cookie:
          httpOnly: true
          name: cookie
          secure: true
          sameSite: none
      passHostHeader: true
      responseForwarding:
        flushInterval: 100ms
EOF
# 分別訪問 ipv4 ipv6 域名

K8S 部署 traefik 2.2.1 ingress controller
K8S 部署 traefik 2.2.1 ingress controller

#查看日誌
# http://prometheus.tycng.com/
192.168.0.151 - - [09/May/2020:02:17:55 +0000] "GET / HTTP/1.1" 200 48 "-" "REDACTED" 5 "myip-default-prometheus-tycng-com@kubernetes" "http://10.81.251.198:8080" 1ms
192.168.0.151 - - [09/May/2020:02:17:55 +0000] "GET /favicon.ico HTTP/1.1" 200 48 "REDACTED" "REDACTED" 6 "myip-default-prometheus-tycng-com@kubernetes" "http://10.81.251.198:8080" 1ms
192.168.0.151 - - [09/May/2020:02:17:55 +0000] "GET / HTTP/1.1" 200 48 "-" "REDACTED" 7 "myip-default-prometheus-tycng-com@kubernetes" "http://10.81.251.198:8080" 1ms
192.168.0.151 - - [09/May/2020:02:17:55 +0000] "GET /favicon.ico HTTP/1.1" 200 48 "REDACTED" "REDACTED" 8 "myip-default-prometheus-tycng-com@kubernetes" "http://10.81.251.198:8080" 1ms
## http://ipv4.tycng.com/
192.168.0.151 - - [09/May/2020:02:17:38 +0000] "GET / HTTP/1.1" 200 48 "-" "REDACTED" 7 "default-myip-ipv4-e434de741cf720e0f177@kubernetescrd" "http://10.81.251.198:8080" 3ms
192.168.0.151 - - [09/May/2020:02:17:38 +0000] "GET /favicon.ico HTTP/1.1" 200 48 "REDACTED" "REDACTED" 8 "default-myip-ipv4-e434de741cf720e0f177@kubernetescrd" "http://10.81.251.198:8080" 2ms
192.168.0.151 - - [09/May/2020:02:17:40 +0000] "GET / HTTP/1.1" 200 48 "-" "REDACTED" 9 "default-myip-ipv4-e434de741cf720e0f177@kubernetescrd" "http://10.81.251.198:8080" 2ms
192.168.0.151 - - [09/May/2020:02:17:40 +0000] "GET /favicon.ico HTTP/1.1" 200 48 "REDACTED" "REDACTED" 10 "default-myip-ipv4-e434de741cf720e0f177@kubernetescrd" "http://10.81.251.198:8080" 3ms
# http://ipv6.tycng.com/
fc00:bd4:efa8:1002:2c5b:6d16:5d76:db04 - - [09/May/2020:02:20:14 +0000] "GET / HTTP/1.1" 200 48 "-" "REDACTED" 11 "default-myip-ipv6-93107a0b989d93ecac85@kubernetescrd" "http://fd00::1:fbc6:8080" 7ms
fc00:bd4:efa8:1002:2c5b:6d16:5d76:db04 - - [09/May/2020:02:20:14 +0000] "GET /favicon.ico HTTP/1.1" 200 48 "REDACTED" "REDACTED" 12 "default-myip-ipv6-93107a0b989d93ecac85@kubernetescrd" "http://fd00::1:fbc6:8080" 3ms

K8S 部署 traefik 2.2.1 ingress controller
K8S 部署 traefik 2.2.1 ingress controller
K8S 部署 traefik 2.2.1 ingress controller
K8S 部署 traefik 2.2.1 ingress controller

traefik HTTPS 配置

vim traefik-secret.yaml
---
apiVersion: v1
kind: Secret
metadata:
  labels:
    k8s-app: tls-cert
  name: tls-cert
  namespace: ingress-system
type: Opaque
data:
  tls.crt:  # 域名的證書對應nginx 配置證書  base64 加密   tls.crt 名字不可以修改
  tls.key:  # 域名的私鑰對應 nginx 配置私鑰 base64 加密   tls.key名字不可以修改 

# 提交 Secret
 kubectl apply -f tls-cert
# 下面是http 強制https 配置寫法
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: jaeger
  namespace: ingress-system
spec:
  entryPoints:
    - websecure
  routes:
  - match: Host(`trae.tycng.com`)
    kind: Rule
    priority: 12
    services:
    - name: jaeger-query
      port: 80
      weight: 1
     # 開啓粘性會話
      sticky:
        cookie:
          httpOnly: true
          name: cookie
          secure: true
          sameSite: none
      passHostHeader: true
      responseForwarding:
        flushInterval: 100ms
  tls:
    options: 
      name: default
      namespace: ingress-system
    secretName: tls-cert
---
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: jaegerhttp
  namespace: ingress-system
spec:
  entryPoints:
    - web
  routes:
  - match: Host(`trae.tycng.com`)
    kind: Rule
    priority: 12
    services:
    - name: jaeger-query
      port: 80
      weight: 1
      # 開啓粘性會話
      sticky:
        cookie:
          httpOnly: true
          name: cookie
          secure: true
          sameSite: none
      passHostHeader: true
      responseForwarding:
        flushInterval: 100ms
    middlewares:
      - name: redirect

---
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
  name: redirect
  namespace: ingress-system
spec:
  redirectScheme:
    scheme: https
---
apiVersion: traefik.containo.us/v1alpha1
kind: TLSOption
metadata:
  name: default
  namespace: ingress-system

spec:
  minVersion: VersionTLS12

---
apiVersion: traefik.containo.us/v1alpha1
kind: TLSOption
metadata:
  name: mintls13
  namespace: ingress-system

spec:
  minVersion: VersionTLS13
# websockets 轉發寫法
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: rancherhttp
  namespace: cattle-system
spec:
  entryPoints:
    - web
  routes:
  - match: Host(`rke.tycng.com`)
    kind: Rule
    priority: 12
    services:
    - name: rancher
      port: 80
    middlewares:
      - name: redirect
---
apiVersion: traefik.containo.us/v1alpha1
kind: Ingre***oute
metadata:
  name: rancher
  namespace: cattle-system
spec:
  entryPoints:   
    - websecure
  routes:
    - match: Host(`rke.tycng.com`)
      middlewares:
        - name: x-forwarded-proto-allow
          namespace: cattle-system
      kind: Rule
      services:
        - name: rancher
          port: 80
  tls:
    secretName: tls-rancher-ingress    
---    
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
  name: redirect
  namespace: cattle-system
spec:
  redirectScheme:
    scheme: https    
---    
apiVersion: traefik.containo.us/v1alpha1
kind: TLSOption
metadata:
  name: default
  namespace: cattle-system

spec:
  minVersion: VersionTLS12  
--- 
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
  name: x-forwarded-proto-allow
  namespace: cattle-system
spec:
  headers:
    customRequestHeaders:
      X-Forwarded-Proto: https
---
apiVersion: traefik.containo.us/v1alpha1
kind: TLSOption
metadata:
  name: mintls13
  namespace: cattle-system

spec:
  minVersion: VersionTLS13
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章