Kubernetes 部署 Ingress 控制器 Traefik v2.0
系统环境:
- Traefik 版本:v2.0.5
- Kubernetes 版本:1.16.3
地址:
- Traefik 2.0 官方文档:https://docs.traefik.io/v2.0/
- 部署文件的 Github 地址:https://github.com/my-dlq/blog-example/tree/master/kubernetes/traefik-v2.0-deploy
一、Traefik 简介
Traefik 是一个流行的 HTTP 反向代理和负载均衡器,使用 Traefik 可以很方便的与现在流程的基础架构组件(如 Docker、Swarm、Kubernetes、Marathon、Consul、Etcd、Rancher、Amazon ECS …)集成,并可以针对不同的组件实现动态配置。
二、Kubernetes 部署 Traefik
注意:这里 Traefik 是部署在 Kube-system Namespace 下,如果不是需要修改下面部署文件中的 Namespace 属性。
1、创建 CRD 资源
在 traefik v2.0 版本后,开始使用 CRD(Custom Resource Definition)来完成路由配置等,所以需要提前创建 CRD 资源。
创建 traefik-crd.yaml 文件
## IngressRouteapiVersion: apiextensions.k8s.io/v1beta1kind: CustomResourceDefinitionmetadata: name: ingressroutes.traefik.containo.usspec: scope: Namespaced group: traefik.containo.us version: v1alpha1 names: kind: IngressRoute plural: ingressroutes singular: ingressroute---## IngressRouteTCPapiVersion: apiextensions.k8s.io/v1beta1kind: CustomResourceDefinitionmetadata: name: ingressroutetcps.traefik.containo.usspec: scope: Namespaced group: traefik.containo.us version: v1alpha1 names: kind: IngressRouteTCP plural: ingressroutetcps singular: ingressroutetcp---## MiddlewareapiVersion: apiextensions.k8s.io/v1beta1kind: CustomResourceDefinitionmetadata: name: middlewares.traefik.containo.usspec: scope: Namespaced group: traefik.containo.us version: v1alpha1 names: kind: Middleware plural: middlewares singular: middleware---apiVersion: apiextensions.k8s.io/v1beta1kind: CustomResourceDefinitionmetadata: name: tlsoptions.traefik.containo.usspec: scope: Namespaced group: traefik.containo.us version: v1alpha1 names: kind: TLSOption plural: tlsoptions singular: tlsoption创建 Traefik CRD 资源
$ kubectl apply -f traefik-crd.yaml2、创建 RBAC 权限
Kubernetes 在 1.6 版本中引入了基于角色的访问控制(RBAC)策略,方便对 Kubernetes 资源和 API 进行细粒度控制。Traefik 需要一定的权限,所以这里提前创建好 Traefik ServiceAccount 并分配一定的权限。
创建 traefik-rbac.yaml 文件
apiVersion: v1kind: ServiceAccountmetadata: namespace: kube-system name: traefik-ingress-controller---kind: ClusterRoleapiVersion: rbac.authorization.k8s.io/v1beta1metadata: name: traefik-ingress-controllerrules: - apiGroups: [""] resources: ["services","endpoints","secrets"] verbs: ["get","list","watch"] - apiGroups: ["extensions"] resources: ["ingresses"] verbs: ["get","list","watch"] - apiGroups: ["extensions"] resources: ["ingresses/status"] verbs: ["update"] - apiGroups: ["traefik.containo.us"] resources: ["middlewares"] verbs: ["get","list","watch"] - apiGroups: ["traefik.containo.us"] resources: ["ingressroutes"] verbs: ["get","list","watch"] - apiGroups: ["traefik.containo.us"] resources: ["ingressroutetcps"] verbs: ["get","list","watch"] - apiGroups: ["traefik.containo.us"] resources: ["tlsoptions"] verbs: ["get","list","watch"]---kind: ClusterRoleBindingapiVersion: rbac.authorization.k8s.io/v1beta1metadata: name: traefik-ingress-controllerroleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: traefik-ingress-controllersubjects: - kind: ServiceAccount name: traefik-ingress-controller namespace: kube-system创建 Traefik RBAC 资源
- -n:指定部署的 Namespace
$ kubectl apply -f traefik-rbac.yaml -n kube-system3、创建 Traefik 配置文件
由于 Traefik 配置很多,通过 CLI 定义不是很方便,一般时候选择将其配置选项放到配置文件中,然后存入 ConfigMap,将其挂入 traefik 中。
创建 traefik-config.yaml 文件
kind: ConfigMapapiVersion: v1metadata: name: traefik-configdata: traefik.yaml: |- serversTransport: insecureSkipVerify: true api: insecure: true dashboard: true debug: true metrics: prometheus: "" entryPoints: web: address: ":80" websecure: address: ":443" providers: kubernetesCRD: "" log: filePath: "" level: error format: json accessLog: filePath: "" format: json bufferingSize: 0 filters: retryAttempts: true minDuration: 20 fields: defaultMode: keep names: ClientUsername: drop headers: defaultMode: keep names: User-Agent: redact Authorization: drop Content-Type: keep创建 Traefik ConfigMap 资源
- -n: 指定程序启的 Namespace
$ kubectl apply -f traefik-config.yaml -n kube-system4、节点设置 Label 标签
由于是 Kubernetes DeamonSet 这种方式部署 Traefik,所以需要提前给节点设置 Label,这样当程序部署时 Pod 会自动调度到设置 Label 的节点上。
节点设置 Label 标签
- 格式:kubectl label nodes [节点名] [key=value]
$ kubectl label nodes k8s-node-2-12 IngressProxy=true查看节点是否设置 Label 成功
$ kubectl get nodes --show-labels
NAME STATUS ROLES VERSION LABELSk8s-master-2-11 Ready master v1.15.3 kubernetes.io/hostname=k8s-master-2-11,node-role.kubernetes.io/master=k8s-node-2-12 Ready <none> v1.15.3 kubernetes.io/hostname=k8s-node-2-12,IngressProxy=truek8s-node-2-13 Ready <none> v1.15.3 kubernetes.io/hostname=k8s-node-2-13k8s-node-2-14 Ready <none> v1.15.3 kubernetes.io/hostname=k8s-node-2-14如果想删除标签,可以使用
kubectl label nodes k8s-node-2-12 IngressProxy-命令
5、Kubernetes 部署 Traefik
这里还是按以前部署 Traefik 1.7 一样,用 DaemonSet 方式部署,便于在多服务器间扩展,用 hostport 方式占用服务器 80、443 端口,方便流量进入。
创建 traefik 部署文件 traefik-deploy.yaml
apiVersion: v1kind: Servicemetadata: name: traefikspec: ports: - name: web port: 80 - name: websecure port: 443 - name: admin port: 8080 selector: app: traefik---apiVersion: apps/v1kind: DaemonSetmetadata: name: traefik-ingress-controller labels: app: traefikspec: selector: matchLabels: app: traefik template: metadata: name: traefik labels: app: traefik spec: serviceAccountName: traefik-ingress-controller terminationGracePeriodSeconds: 1 containers: - image: traefik:v2.0.5 name: traefik-ingress-lb ports: - name: web containerPort: 80 hostPort: 80 #hostPort方式,将端口暴露到集群节点 - name: websecure containerPort: 443 hostPort: 443 #hostPort方式,将端口暴露到集群节点 - name: admin containerPort: 8080 resources: limits: cpu: 2000m memory: 1024Mi requests: cpu: 1000m memory: 1024Mi securityContext: capabilities: drop: - ALL add: - NET_BIND_SERVICE args: - --configfile=/config/traefik.yaml volumeMounts: - mountPath: "/config" name: "config" volumes: - name: config configMap: name: traefik-config tolerations: #设置容忍所有污点,防止节点被设置污点 - operator: "Exists" nodeSelector: #设置node筛选器,在特定label的节点上启动 IngressProxy: "true"Kubernetes 部署 Traefik
$ kubectl apply -f traefik-deploy.yaml -n kube-system到此 Traefik v2.0 应用已经部署完成。
三、Traefik 路由规则配置
1、配置 HTTP 路由规则 (Traefik Dashboard 为例)
Traefik 应用已经部署完成,但是想让外部访问 Kubernetes 内部服务,还需要配置路由规则,这里开启了 Traefik Dashboard 配置,所以首先配置 Traefik Dashboard 看板的路由规则,使外部能够访问 Traefik Dashboard。
创建 Traefik Dashboard 路由规则文件 traefik-dashboard-route.yaml
apiVersion: traefik.containo.us/v1alpha1kind: IngressRoutemetadata: name: traefik-dashboard-routespec: entryPoints: - web routes: - match: Host(`traefik.mydlq.club`) kind: Rule services: - name: traefik port: 8080创建 Traefik Dashboard 路由规则对象
$ kubectl apply -f traefik-dashboard-route.yaml -n kube-system接下来配置 Hosts,客户端想通过域名访问服务,必须要进行 DNS 解析,由于这里没有 DNS 服务器进行域名解析,所以修改 hosts 文件将 Traefik 指定节点的 IP 和自定义 host 绑定。打开电脑的 Hosts 配置文件,往其加入下面配置:
192.168.2.12 traefik.mydlq.club配置完成后,打开浏览器输入地址:http://traefik.mydlq.club 打开 Traefik Dashboard。

2、配置 HTTPS 路由规则(Kubernetes Dashboard 为例)
这里我们创建 Kubernetes 的 Dashboard 看板,它是 Https 协议方式,由于它是需要使用 Https 请求,所以我们配置基于 Https 的路由规则并指定证书。
创建证书文件
# 创建自签名证书$ openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -keyout tls.key -out tls.crt -subj "/CN=cloud.mydlq.club"
# 将证书存储到 Kubernetes Secret 中$ kubectl create secret generic cloud-mydlq-tls --from-file=tls.crt --from-file=tls.key -n kube-system创建 Traefik Dashboard 路由规则文件 kubernetes-dashboard-route.yaml
apiVersion: traefik.containo.us/v1alpha1kind: IngressRoutemetadata: name: kubernetes-dashboard-routespec: entryPoints: - websecure tls: secretName: cloud-mydlq-tls routes: - match: Host(`cloud.mydlq.club`) kind: Rule services: - name: kubernetes-dashboard port: 443创建 Kubernetes Dashboard 路由规则对象
$ kubectl apply -f kubernetes-dashboard-route.yaml -n kube-system跟上面一样,配置 Hosts 文件
192.168.2.12 cloud.mydlq.club配置完成后,打开浏览器输入地址:https://cloud.mydlq.club 打开 Dashboard Dashboard。

到此文章结束,可以访问我的 Github 下载 部署文件,别忘点颗 Start!!
---End---
