server_others.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. // +build !windows
  2. /*
  3. Copyright 2014 The Kubernetes Authors.
  4. Licensed under the Apache License, Version 2.0 (the "License");
  5. you may not use this file except in compliance with the License.
  6. You may obtain a copy of the License at
  7. http://www.apache.org/licenses/LICENSE-2.0
  8. Unless required by applicable law or agreed to in writing, software
  9. distributed under the License is distributed on an "AS IS" BASIS,
  10. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. See the License for the specific language governing permissions and
  12. limitations under the License.
  13. */
  14. // Package app does all of the work necessary to configure and run a
  15. // Kubernetes app process.
  16. package app
  17. import (
  18. "errors"
  19. "fmt"
  20. "net"
  21. "strings"
  22. v1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/types"
  24. utilnet "k8s.io/apimachinery/pkg/util/net"
  25. utilruntime "k8s.io/apimachinery/pkg/util/runtime"
  26. utilfeature "k8s.io/apiserver/pkg/util/feature"
  27. "k8s.io/client-go/tools/record"
  28. "k8s.io/component-base/metrics"
  29. "k8s.io/kubernetes/pkg/features"
  30. "k8s.io/kubernetes/pkg/proxy"
  31. proxyconfigapi "k8s.io/kubernetes/pkg/proxy/apis/config"
  32. proxyconfigscheme "k8s.io/kubernetes/pkg/proxy/apis/config/scheme"
  33. "k8s.io/kubernetes/pkg/proxy/healthcheck"
  34. "k8s.io/kubernetes/pkg/proxy/iptables"
  35. "k8s.io/kubernetes/pkg/proxy/ipvs"
  36. proxymetrics "k8s.io/kubernetes/pkg/proxy/metrics"
  37. "k8s.io/kubernetes/pkg/proxy/userspace"
  38. "k8s.io/kubernetes/pkg/util/configz"
  39. utilipset "k8s.io/kubernetes/pkg/util/ipset"
  40. utiliptables "k8s.io/kubernetes/pkg/util/iptables"
  41. utilipvs "k8s.io/kubernetes/pkg/util/ipvs"
  42. utilnode "k8s.io/kubernetes/pkg/util/node"
  43. utilsysctl "k8s.io/kubernetes/pkg/util/sysctl"
  44. "k8s.io/utils/exec"
  45. utilsnet "k8s.io/utils/net"
  46. "k8s.io/klog"
  47. )
  48. // NewProxyServer returns a new ProxyServer.
  49. func NewProxyServer(o *Options) (*ProxyServer, error) {
  50. return newProxyServer(o.config, o.CleanupAndExit, o.master)
  51. }
  52. func newProxyServer(
  53. config *proxyconfigapi.KubeProxyConfiguration,
  54. cleanupAndExit bool,
  55. master string) (*ProxyServer, error) {
  56. if config == nil {
  57. return nil, errors.New("config is required")
  58. }
  59. if c, err := configz.New(proxyconfigapi.GroupName); err == nil {
  60. c.Set(config)
  61. } else {
  62. return nil, fmt.Errorf("unable to register configz: %s", err)
  63. }
  64. protocol := utiliptables.ProtocolIpv4
  65. if net.ParseIP(config.BindAddress).To4() == nil {
  66. klog.V(0).Infof("IPv6 bind address (%s), assume IPv6 operation", config.BindAddress)
  67. protocol = utiliptables.ProtocolIpv6
  68. }
  69. var iptInterface utiliptables.Interface
  70. var ipvsInterface utilipvs.Interface
  71. var kernelHandler ipvs.KernelHandler
  72. var ipsetInterface utilipset.Interface
  73. // Create a iptables utils.
  74. execer := exec.New()
  75. iptInterface = utiliptables.New(execer, protocol)
  76. kernelHandler = ipvs.NewLinuxKernelHandler()
  77. ipsetInterface = utilipset.New(execer)
  78. canUseIPVS, _ := ipvs.CanUseIPVSProxier(kernelHandler, ipsetInterface)
  79. if canUseIPVS {
  80. ipvsInterface = utilipvs.New(execer)
  81. }
  82. // We omit creation of pretty much everything if we run in cleanup mode
  83. if cleanupAndExit {
  84. return &ProxyServer{
  85. execer: execer,
  86. IptInterface: iptInterface,
  87. IpvsInterface: ipvsInterface,
  88. IpsetInterface: ipsetInterface,
  89. }, nil
  90. }
  91. if len(config.ShowHiddenMetricsForVersion) > 0 {
  92. metrics.SetShowHidden()
  93. }
  94. client, eventClient, err := createClients(config.ClientConnection, master)
  95. if err != nil {
  96. return nil, err
  97. }
  98. // Create event recorder
  99. hostname, err := utilnode.GetHostname(config.HostnameOverride)
  100. if err != nil {
  101. return nil, err
  102. }
  103. eventBroadcaster := record.NewBroadcaster()
  104. recorder := eventBroadcaster.NewRecorder(proxyconfigscheme.Scheme, v1.EventSource{Component: "kube-proxy", Host: hostname})
  105. nodeRef := &v1.ObjectReference{
  106. Kind: "Node",
  107. Name: hostname,
  108. UID: types.UID(hostname),
  109. Namespace: "",
  110. }
  111. var healthzServer *healthcheck.ProxierHealthServer
  112. if len(config.HealthzBindAddress) > 0 {
  113. healthzServer = healthcheck.NewProxierHealthServer(config.HealthzBindAddress, 2*config.IPTables.SyncPeriod.Duration, recorder, nodeRef)
  114. }
  115. var proxier proxy.Provider
  116. proxyMode := getProxyMode(string(config.Mode), kernelHandler, ipsetInterface, iptables.LinuxKernelCompatTester{})
  117. nodeIP := net.ParseIP(config.BindAddress)
  118. if nodeIP.IsUnspecified() {
  119. nodeIP = utilnode.GetNodeIP(client, hostname)
  120. if nodeIP == nil {
  121. klog.V(0).Infof("can't determine this node's IP, assuming 127.0.0.1; if this is incorrect, please set the --bind-address flag")
  122. nodeIP = net.ParseIP("127.0.0.1")
  123. }
  124. }
  125. if proxyMode == proxyModeIPTables {
  126. klog.V(0).Info("Using iptables Proxier.")
  127. if config.IPTables.MasqueradeBit == nil {
  128. // MasqueradeBit must be specified or defaulted.
  129. return nil, fmt.Errorf("unable to read IPTables MasqueradeBit from config")
  130. }
  131. if utilfeature.DefaultFeatureGate.Enabled(features.IPv6DualStack) {
  132. klog.V(0).Info("creating dualStackProxier for iptables.")
  133. // Create iptables handlers for both families, one is already created
  134. // Always ordered as IPv4, IPv6
  135. var ipt [2]utiliptables.Interface
  136. if iptInterface.IsIpv6() {
  137. ipt[1] = iptInterface
  138. ipt[0] = utiliptables.New(execer, utiliptables.ProtocolIpv4)
  139. } else {
  140. ipt[0] = iptInterface
  141. ipt[1] = utiliptables.New(execer, utiliptables.ProtocolIpv6)
  142. }
  143. // TODO this has side effects that should only happen when Run() is invoked.
  144. proxier, err = iptables.NewDualStackProxier(
  145. ipt,
  146. utilsysctl.New(),
  147. execer,
  148. config.IPTables.SyncPeriod.Duration,
  149. config.IPTables.MinSyncPeriod.Duration,
  150. config.IPTables.MasqueradeAll,
  151. int(*config.IPTables.MasqueradeBit),
  152. cidrTuple(config.ClusterCIDR),
  153. hostname,
  154. nodeIPTuple(config.BindAddress),
  155. recorder,
  156. healthzServer,
  157. config.NodePortAddresses,
  158. )
  159. } else { // Create a single-stack proxier.
  160. // TODO this has side effects that should only happen when Run() is invoked.
  161. proxier, err = iptables.NewProxier(
  162. iptInterface,
  163. utilsysctl.New(),
  164. execer,
  165. config.IPTables.SyncPeriod.Duration,
  166. config.IPTables.MinSyncPeriod.Duration,
  167. config.IPTables.MasqueradeAll,
  168. int(*config.IPTables.MasqueradeBit),
  169. config.ClusterCIDR,
  170. hostname,
  171. nodeIP,
  172. recorder,
  173. healthzServer,
  174. config.NodePortAddresses,
  175. )
  176. }
  177. if err != nil {
  178. return nil, fmt.Errorf("unable to create proxier: %v", err)
  179. }
  180. proxymetrics.RegisterMetrics()
  181. } else if proxyMode == proxyModeIPVS {
  182. klog.V(0).Info("Using ipvs Proxier.")
  183. if utilfeature.DefaultFeatureGate.Enabled(features.IPv6DualStack) {
  184. klog.V(0).Info("creating dualStackProxier for ipvs.")
  185. // Create iptables handlers for both families, one is already created
  186. // Always ordered as IPv4, IPv6
  187. var ipt [2]utiliptables.Interface
  188. if iptInterface.IsIpv6() {
  189. ipt[1] = iptInterface
  190. ipt[0] = utiliptables.New(execer, utiliptables.ProtocolIpv4)
  191. } else {
  192. ipt[0] = iptInterface
  193. ipt[1] = utiliptables.New(execer, utiliptables.ProtocolIpv6)
  194. }
  195. proxier, err = ipvs.NewDualStackProxier(
  196. ipt,
  197. ipvsInterface,
  198. ipsetInterface,
  199. utilsysctl.New(),
  200. execer,
  201. config.IPVS.SyncPeriod.Duration,
  202. config.IPVS.MinSyncPeriod.Duration,
  203. config.IPVS.ExcludeCIDRs,
  204. config.IPVS.StrictARP,
  205. config.IPVS.TCPTimeout.Duration,
  206. config.IPVS.TCPFinTimeout.Duration,
  207. config.IPVS.UDPTimeout.Duration,
  208. config.IPTables.MasqueradeAll,
  209. int(*config.IPTables.MasqueradeBit),
  210. cidrTuple(config.ClusterCIDR),
  211. hostname,
  212. nodeIPTuple(config.BindAddress),
  213. recorder,
  214. healthzServer,
  215. config.IPVS.Scheduler,
  216. config.NodePortAddresses,
  217. )
  218. } else {
  219. proxier, err = ipvs.NewProxier(
  220. iptInterface,
  221. ipvsInterface,
  222. ipsetInterface,
  223. utilsysctl.New(),
  224. execer,
  225. config.IPVS.SyncPeriod.Duration,
  226. config.IPVS.MinSyncPeriod.Duration,
  227. config.IPVS.ExcludeCIDRs,
  228. config.IPVS.StrictARP,
  229. config.IPVS.TCPTimeout.Duration,
  230. config.IPVS.TCPFinTimeout.Duration,
  231. config.IPVS.UDPTimeout.Duration,
  232. config.IPTables.MasqueradeAll,
  233. int(*config.IPTables.MasqueradeBit),
  234. config.ClusterCIDR,
  235. hostname,
  236. nodeIP,
  237. recorder,
  238. healthzServer,
  239. config.IPVS.Scheduler,
  240. config.NodePortAddresses,
  241. )
  242. }
  243. if err != nil {
  244. return nil, fmt.Errorf("unable to create proxier: %v", err)
  245. }
  246. proxymetrics.RegisterMetrics()
  247. } else {
  248. klog.V(0).Info("Using userspace Proxier.")
  249. // TODO this has side effects that should only happen when Run() is invoked.
  250. proxier, err = userspace.NewProxier(
  251. userspace.NewLoadBalancerRR(),
  252. net.ParseIP(config.BindAddress),
  253. iptInterface,
  254. execer,
  255. *utilnet.ParsePortRangeOrDie(config.PortRange),
  256. config.IPTables.SyncPeriod.Duration,
  257. config.IPTables.MinSyncPeriod.Duration,
  258. config.UDPIdleTimeout.Duration,
  259. config.NodePortAddresses,
  260. )
  261. if err != nil {
  262. return nil, fmt.Errorf("unable to create proxier: %v", err)
  263. }
  264. }
  265. return &ProxyServer{
  266. Client: client,
  267. EventClient: eventClient,
  268. IptInterface: iptInterface,
  269. IpvsInterface: ipvsInterface,
  270. IpsetInterface: ipsetInterface,
  271. execer: execer,
  272. Proxier: proxier,
  273. Broadcaster: eventBroadcaster,
  274. Recorder: recorder,
  275. ConntrackConfiguration: config.Conntrack,
  276. Conntracker: &realConntracker{},
  277. ProxyMode: proxyMode,
  278. NodeRef: nodeRef,
  279. MetricsBindAddress: config.MetricsBindAddress,
  280. EnableProfiling: config.EnableProfiling,
  281. OOMScoreAdj: config.OOMScoreAdj,
  282. ConfigSyncPeriod: config.ConfigSyncPeriod.Duration,
  283. HealthzServer: healthzServer,
  284. UseEndpointSlices: utilfeature.DefaultFeatureGate.Enabled(features.EndpointSliceProxying),
  285. }, nil
  286. }
  287. // cidrTuple takes a comma separated list of CIDRs and return a tuple (ipv4cidr,ipv6cidr)
  288. // The returned tuple is guaranteed to have the order (ipv4,ipv6) and if no cidr from a family is found an
  289. // empty string "" is inserted.
  290. func cidrTuple(cidrList string) [2]string {
  291. cidrs := [2]string{"", ""}
  292. foundIPv4 := false
  293. foundIPv6 := false
  294. for _, cidr := range strings.Split(cidrList, ",") {
  295. if utilsnet.IsIPv6CIDRString(cidr) && !foundIPv6 {
  296. cidrs[1] = cidr
  297. foundIPv6 = true
  298. } else if !foundIPv4 {
  299. cidrs[0] = cidr
  300. foundIPv4 = true
  301. }
  302. if foundIPv6 && foundIPv4 {
  303. break
  304. }
  305. }
  306. return cidrs
  307. }
  308. // nodeIPTuple takes an addresses and return a tuple (ipv4,ipv6)
  309. // The returned tuple is guaranteed to have the order (ipv4,ipv6). The address NOT of the passed address
  310. // will have "any" address (0.0.0.0 or ::) inserted.
  311. func nodeIPTuple(bindAddress string) [2]net.IP {
  312. nodes := [2]net.IP{net.IPv4zero, net.IPv6zero}
  313. adr := net.ParseIP(bindAddress)
  314. if utilsnet.IsIPv6(adr) {
  315. nodes[1] = adr
  316. } else {
  317. nodes[0] = adr
  318. }
  319. return nodes
  320. }
  321. func getProxyMode(proxyMode string, khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  322. switch proxyMode {
  323. case proxyModeUserspace:
  324. return proxyModeUserspace
  325. case proxyModeIPTables:
  326. return tryIPTablesProxy(kcompat)
  327. case proxyModeIPVS:
  328. return tryIPVSProxy(khandle, ipsetver, kcompat)
  329. }
  330. klog.Warningf("Unknown proxy mode %q, assuming iptables proxy", proxyMode)
  331. return tryIPTablesProxy(kcompat)
  332. }
  333. func tryIPVSProxy(khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  334. // guaranteed false on error, error only necessary for debugging
  335. // IPVS Proxier relies on ip_vs_* kernel modules and ipset
  336. useIPVSProxy, err := ipvs.CanUseIPVSProxier(khandle, ipsetver)
  337. if err != nil {
  338. // Try to fallback to iptables before falling back to userspace
  339. utilruntime.HandleError(fmt.Errorf("can't determine whether to use ipvs proxy, error: %v", err))
  340. }
  341. if useIPVSProxy {
  342. return proxyModeIPVS
  343. }
  344. // Try to fallback to iptables before falling back to userspace
  345. klog.V(1).Infof("Can't use ipvs proxier, trying iptables proxier")
  346. return tryIPTablesProxy(kcompat)
  347. }
  348. func tryIPTablesProxy(kcompat iptables.KernelCompatTester) string {
  349. // guaranteed false on error, error only necessary for debugging
  350. useIPTablesProxy, err := iptables.CanUseIPTablesProxier(kcompat)
  351. if err != nil {
  352. utilruntime.HandleError(fmt.Errorf("can't determine whether to use iptables proxy, using userspace proxier: %v", err))
  353. return proxyModeUserspace
  354. }
  355. if useIPTablesProxy {
  356. return proxyModeIPTables
  357. }
  358. // Fallback.
  359. klog.V(1).Infof("Can't use iptables proxy, using userspace proxier")
  360. return proxyModeUserspace
  361. }