start-kubemark.sh 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516
  1. #!/usr/bin/env bash
  2. # Copyright 2015 The Kubernetes Authors.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. # Script that creates a Kubemark cluster for any given cloud provider.
  16. set -o errexit
  17. set -o nounset
  18. set -o pipefail
  19. TMP_ROOT="$(dirname "${BASH_SOURCE[@]}")/../.."
  20. KUBE_ROOT=$(readlink -e "${TMP_ROOT}" 2> /dev/null || perl -MCwd -e 'print Cwd::abs_path shift' "${TMP_ROOT}")
  21. source "${KUBE_ROOT}/test/kubemark/skeleton/util.sh"
  22. source "${KUBE_ROOT}/test/kubemark/cloud-provider-config.sh"
  23. source "${KUBE_ROOT}/test/kubemark/${CLOUD_PROVIDER}/util.sh"
  24. source "${KUBE_ROOT}/cluster/kubemark/${CLOUD_PROVIDER}/config-default.sh"
  25. if [[ -f "${KUBE_ROOT}/test/kubemark/${CLOUD_PROVIDER}/startup.sh" ]] ; then
  26. source "${KUBE_ROOT}/test/kubemark/${CLOUD_PROVIDER}/startup.sh"
  27. fi
  28. source "${KUBE_ROOT}/cluster/kubemark/util.sh"
  29. # hack/lib/init.sh will ovewrite ETCD_VERSION if this is unset
  30. # what what is default in hack/lib/etcd.sh
  31. # To avoid it, if it is empty, we set it to 'avoid-overwrite' and
  32. # clean it after that.
  33. if [ -z "${ETCD_VERSION:-}" ]; then
  34. ETCD_VERSION="avoid-overwrite"
  35. fi
  36. source "${KUBE_ROOT}/hack/lib/init.sh"
  37. if [ "${ETCD_VERSION:-}" == "avoid-overwrite" ]; then
  38. ETCD_VERSION=""
  39. fi
  40. KUBECTL="${KUBE_ROOT}/cluster/kubectl.sh"
  41. KUBEMARK_DIRECTORY="${KUBE_ROOT}/test/kubemark"
  42. RESOURCE_DIRECTORY="${KUBEMARK_DIRECTORY}/resources"
  43. # Generate a random 6-digit alphanumeric tag for the kubemark image.
  44. # Used to uniquify image builds across different invocations of this script.
  45. KUBEMARK_IMAGE_TAG=$(head /dev/urandom | tr -dc 'a-z0-9' | fold -w 6 | head -n 1)
  46. # Write all environment variables that we need to pass to the kubemark master,
  47. # locally to the file ${RESOURCE_DIRECTORY}/kubemark-master-env.sh.
  48. function create-master-environment-file {
  49. cat > "${RESOURCE_DIRECTORY}/kubemark-master-env.sh" <<EOF
  50. # Generic variables.
  51. INSTANCE_PREFIX="${INSTANCE_PREFIX:-}"
  52. SERVICE_CLUSTER_IP_RANGE="${SERVICE_CLUSTER_IP_RANGE:-}"
  53. EVENT_PD="${EVENT_PD:-}"
  54. # Etcd related variables.
  55. ETCD_IMAGE="${ETCD_IMAGE:-3.3.10-1}"
  56. ETCD_VERSION="${ETCD_VERSION:-}"
  57. # Controller-manager related variables.
  58. CONTROLLER_MANAGER_TEST_ARGS="${CONTROLLER_MANAGER_TEST_ARGS:-}"
  59. ALLOCATE_NODE_CIDRS="${ALLOCATE_NODE_CIDRS:-}"
  60. CLUSTER_IP_RANGE="${CLUSTER_IP_RANGE:-}"
  61. TERMINATED_POD_GC_THRESHOLD="${TERMINATED_POD_GC_THRESHOLD:-}"
  62. # Scheduler related variables.
  63. SCHEDULER_TEST_ARGS="${SCHEDULER_TEST_ARGS:-}"
  64. # Apiserver related variables.
  65. APISERVER_TEST_ARGS="${APISERVER_TEST_ARGS:-}"
  66. STORAGE_MEDIA_TYPE="${STORAGE_MEDIA_TYPE:-}"
  67. STORAGE_BACKEND="${STORAGE_BACKEND:-etcd3}"
  68. ETCD_SERVERS="${ETCD_SERVERS:-}"
  69. ETCD_SERVERS_OVERRIDES="${ETCD_SERVERS_OVERRIDES:-}"
  70. ETCD_COMPACTION_INTERVAL_SEC="${ETCD_COMPACTION_INTERVAL_SEC:-}"
  71. RUNTIME_CONFIG="${RUNTIME_CONFIG:-}"
  72. NUM_NODES="${NUM_NODES:-}"
  73. CUSTOM_ADMISSION_PLUGINS="${CUSTOM_ADMISSION_PLUGINS:-}"
  74. FEATURE_GATES="${FEATURE_GATES:-}"
  75. KUBE_APISERVER_REQUEST_TIMEOUT="${KUBE_APISERVER_REQUEST_TIMEOUT:-}"
  76. ENABLE_APISERVER_ADVANCED_AUDIT="${ENABLE_APISERVER_ADVANCED_AUDIT:-}"
  77. EOF
  78. echo "Created the environment file for master."
  79. }
  80. # Generate certs/keys for CA, master, kubelet and kubecfg, and tokens for kubelet
  81. # and kubeproxy.
  82. function generate-pki-config {
  83. kube::util::ensure-temp-dir
  84. gen-kube-bearertoken
  85. gen-kube-basicauth
  86. create-certs "${MASTER_IP}"
  87. create-etcd-apiserver-certs "etcd-${MASTER_NAME}" "${MASTER_NAME}"
  88. KUBELET_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  89. KUBE_PROXY_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  90. NODE_PROBLEM_DETECTOR_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  91. HEAPSTER_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  92. CLUSTER_AUTOSCALER_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  93. KUBE_DNS_TOKEN=$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64 | tr -d "=+/" | dd bs=32 count=1 2>/dev/null)
  94. echo "Generated PKI authentication data for kubemark."
  95. }
  96. # Wait for the master to be reachable for executing commands on it. We do this by
  97. # trying to run the bash noop(:) on the master, with 10 retries.
  98. function wait-for-master-reachability {
  99. execute-cmd-on-master-with-retries ":" 10
  100. echo "Checked master reachability for remote command execution."
  101. }
  102. # Write all the relevant certs/keys/tokens to the master.
  103. function write-pki-config-to-master {
  104. PKI_SETUP_CMD="sudo mkdir /home/kubernetes/k8s_auth_data -p && \
  105. sudo bash -c \"echo ${CA_CERT_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/ca.crt\" && \
  106. sudo bash -c \"echo ${MASTER_CERT_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/server.cert\" && \
  107. sudo bash -c \"echo ${MASTER_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/server.key\" && \
  108. sudo bash -c \"echo ${ETCD_APISERVER_CA_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/etcd-apiserver-ca.key\" && \
  109. sudo bash -c \"echo ${ETCD_APISERVER_CA_CERT_BASE64} | base64 --decode | gunzip > /home/kubernetes/k8s_auth_data/etcd-apiserver-ca.crt\" && \
  110. sudo bash -c \"echo ${ETCD_APISERVER_SERVER_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/etcd-apiserver-server.key\" && \
  111. sudo bash -c \"echo ${ETCD_APISERVER_SERVER_CERT_BASE64} | base64 --decode | gunzip > /home/kubernetes/k8s_auth_data/etcd-apiserver-server.crt\" && \
  112. sudo bash -c \"echo ${ETCD_APISERVER_CLIENT_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/etcd-apiserver-client.key\" && \
  113. sudo bash -c \"echo ${ETCD_APISERVER_CLIENT_CERT_BASE64} | base64 --decode | gunzip > /home/kubernetes/k8s_auth_data/etcd-apiserver-client.crt\" && \
  114. sudo bash -c \"echo ${REQUESTHEADER_CA_CERT_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/aggr_ca.crt\" && \
  115. sudo bash -c \"echo ${PROXY_CLIENT_CERT_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/proxy_client.crt\" && \
  116. sudo bash -c \"echo ${PROXY_CLIENT_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/proxy_client.key\" && \
  117. sudo bash -c \"echo ${KUBECFG_CERT_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/kubecfg.crt\" && \
  118. sudo bash -c \"echo ${KUBECFG_KEY_BASE64} | base64 --decode > /home/kubernetes/k8s_auth_data/kubecfg.key\" && \
  119. sudo bash -c \"echo \"${KUBE_BEARER_TOKEN},admin,admin\" > /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  120. sudo bash -c \"echo \"${KUBELET_TOKEN},system:node:node-name,uid:kubelet,system:nodes\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  121. sudo bash -c \"echo \"${KUBE_PROXY_TOKEN},system:kube-proxy,uid:kube_proxy\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  122. sudo bash -c \"echo \"${HEAPSTER_TOKEN},system:heapster,uid:heapster\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  123. sudo bash -c \"echo \"${CLUSTER_AUTOSCALER_TOKEN},system:cluster-autoscaler,uid:cluster-autoscaler\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  124. sudo bash -c \"echo \"${NODE_PROBLEM_DETECTOR_TOKEN},system:node-problem-detector,uid:system:node-problem-detector\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  125. sudo bash -c \"echo \"${KUBE_DNS_TOKEN},system:kube-dns,uid:kube-dns\" >> /home/kubernetes/k8s_auth_data/known_tokens.csv\" && \
  126. sudo bash -c \"echo ${KUBE_PASSWORD},admin,admin > /home/kubernetes/k8s_auth_data/basic_auth.csv\""
  127. execute-cmd-on-master-with-retries "${PKI_SETUP_CMD}" 3
  128. echo "Wrote PKI certs, keys, tokens and admin password to master."
  129. }
  130. # Write kubeconfig to ${RESOURCE_DIRECTORY}/kubeconfig.kubemark in order to
  131. # use kubectl locally.
  132. function write-local-kubeconfig {
  133. LOCAL_KUBECONFIG="${RESOURCE_DIRECTORY}/kubeconfig.kubemark"
  134. cat > "${LOCAL_KUBECONFIG}" << EOF
  135. apiVersion: v1
  136. kind: Config
  137. users:
  138. - name: kubecfg
  139. user:
  140. client-certificate-data: "${KUBECFG_CERT_BASE64}"
  141. client-key-data: "${KUBECFG_KEY_BASE64}"
  142. username: admin
  143. password: admin
  144. clusters:
  145. - name: kubemark
  146. cluster:
  147. certificate-authority-data: "${CA_CERT_BASE64}"
  148. server: https://${MASTER_IP}
  149. contexts:
  150. - context:
  151. cluster: kubemark
  152. user: kubecfg
  153. name: kubemark-context
  154. current-context: kubemark-context
  155. EOF
  156. echo "Kubeconfig file for kubemark master written to ${LOCAL_KUBECONFIG}."
  157. }
  158. # Copy all the necessary resource files (scripts/configs/manifests) to the master.
  159. function copy-resource-files-to-master {
  160. copy-files \
  161. "${SERVER_BINARY_TAR}" \
  162. "${RESOURCE_DIRECTORY}/kubemark-master-env.sh" \
  163. "${RESOURCE_DIRECTORY}/start-kubemark-master.sh" \
  164. "${RESOURCE_DIRECTORY}/kubeconfig.kubemark" \
  165. "${KUBEMARK_DIRECTORY}/configure-kubectl.sh" \
  166. "${RESOURCE_DIRECTORY}/manifests/etcd.yaml" \
  167. "${RESOURCE_DIRECTORY}/manifests/etcd-events.yaml" \
  168. "${RESOURCE_DIRECTORY}/manifests/kube-apiserver.yaml" \
  169. "${RESOURCE_DIRECTORY}/manifests/kube-scheduler.yaml" \
  170. "${RESOURCE_DIRECTORY}/manifests/kube-controller-manager.yaml" \
  171. "${RESOURCE_DIRECTORY}/manifests/kube-addon-manager.yaml" \
  172. "${RESOURCE_DIRECTORY}/manifests/addons/kubemark-rbac-bindings" \
  173. "kubernetes@${MASTER_NAME}":/home/kubernetes/
  174. echo "Copied server binary, master startup scripts, configs and resource manifests to master."
  175. }
  176. # Make startup scripts executable and run start-kubemark-master.sh.
  177. function start-master-components {
  178. echo ""
  179. MASTER_STARTUP_CMD="sudo bash /home/kubernetes/start-kubemark-master.sh"
  180. execute-cmd-on-master-with-retries "${MASTER_STARTUP_CMD}"
  181. echo "The master has started and is now live."
  182. }
  183. # Create a docker image for hollow-node and upload it to the appropriate docker registry.
  184. function create-and-upload-hollow-node-image {
  185. authenticate-docker
  186. KUBEMARK_IMAGE_REGISTRY="${KUBEMARK_IMAGE_REGISTRY:-${CONTAINER_REGISTRY}/${PROJECT}}"
  187. if [[ "${KUBEMARK_BAZEL_BUILD:-}" =~ ^[yY]$ ]]; then
  188. # Build+push the image through bazel.
  189. touch WORKSPACE # Needed for bazel.
  190. build_cmd=("bazel" "run" "//cluster/images/kubemark:push" "--define" "REGISTRY=${KUBEMARK_IMAGE_REGISTRY}" "--define" "IMAGE_TAG=${KUBEMARK_IMAGE_TAG}")
  191. run-cmd-with-retries "${build_cmd[@]}"
  192. else
  193. # Build+push the image through makefile.
  194. build_cmd=("make" "${KUBEMARK_IMAGE_MAKE_TARGET}")
  195. MAKE_DIR="${KUBE_ROOT}/cluster/images/kubemark"
  196. KUBEMARK_BIN="$(kube::util::find-binary-for-platform kubemark linux/amd64)"
  197. if [[ -z "${KUBEMARK_BIN}" ]]; then
  198. echo 'Cannot find cmd/kubemark binary'
  199. exit 1
  200. fi
  201. echo "Copying kubemark binary to ${MAKE_DIR}"
  202. cp "${KUBEMARK_BIN}" "${MAKE_DIR}"
  203. CURR_DIR=$(pwd)
  204. cd "${MAKE_DIR}"
  205. REGISTRY=${KUBEMARK_IMAGE_REGISTRY} IMAGE_TAG=${KUBEMARK_IMAGE_TAG} run-cmd-with-retries "${build_cmd[@]}"
  206. rm kubemark
  207. cd "$CURR_DIR"
  208. fi
  209. echo "Created and uploaded the kubemark hollow-node image to docker registry."
  210. # Cleanup the kubemark image after the script exits.
  211. if [[ "${CLEANUP_KUBEMARK_IMAGE:-}" == "true" ]]; then
  212. trap delete-kubemark-image EXIT
  213. fi
  214. }
  215. function delete-kubemark-image {
  216. delete-image "${KUBEMARK_IMAGE_REGISTRY}/kubemark:${KUBEMARK_IMAGE_TAG}"
  217. }
  218. # Generate secret and configMap for the hollow-node pods to work, prepare
  219. # manifests of the hollow-node and heapster replication controllers from
  220. # templates, and finally create these resources through kubectl.
  221. function create-kube-hollow-node-resources {
  222. # Create kubeconfig for Kubelet.
  223. KUBELET_KUBECONFIG_CONTENTS="apiVersion: v1
  224. kind: Config
  225. users:
  226. - name: kubelet
  227. user:
  228. client-certificate-data: ${KUBELET_CERT_BASE64}
  229. client-key-data: ${KUBELET_KEY_BASE64}
  230. clusters:
  231. - name: kubemark
  232. cluster:
  233. certificate-authority-data: ${CA_CERT_BASE64}
  234. server: https://${MASTER_IP}
  235. contexts:
  236. - context:
  237. cluster: kubemark
  238. user: kubelet
  239. name: kubemark-context
  240. current-context: kubemark-context"
  241. # Create kubeconfig for Kubeproxy.
  242. KUBEPROXY_KUBECONFIG_CONTENTS="apiVersion: v1
  243. kind: Config
  244. users:
  245. - name: kube-proxy
  246. user:
  247. token: ${KUBE_PROXY_TOKEN}
  248. clusters:
  249. - name: kubemark
  250. cluster:
  251. insecure-skip-tls-verify: true
  252. server: https://${MASTER_IP}
  253. contexts:
  254. - context:
  255. cluster: kubemark
  256. user: kube-proxy
  257. name: kubemark-context
  258. current-context: kubemark-context"
  259. # Create kubeconfig for Heapster.
  260. HEAPSTER_KUBECONFIG_CONTENTS="apiVersion: v1
  261. kind: Config
  262. users:
  263. - name: heapster
  264. user:
  265. token: ${HEAPSTER_TOKEN}
  266. clusters:
  267. - name: kubemark
  268. cluster:
  269. insecure-skip-tls-verify: true
  270. server: https://${MASTER_IP}
  271. contexts:
  272. - context:
  273. cluster: kubemark
  274. user: heapster
  275. name: kubemark-context
  276. current-context: kubemark-context"
  277. # Create kubeconfig for Cluster Autoscaler.
  278. CLUSTER_AUTOSCALER_KUBECONFIG_CONTENTS="apiVersion: v1
  279. kind: Config
  280. users:
  281. - name: cluster-autoscaler
  282. user:
  283. token: ${CLUSTER_AUTOSCALER_TOKEN}
  284. clusters:
  285. - name: kubemark
  286. cluster:
  287. insecure-skip-tls-verify: true
  288. server: https://${MASTER_IP}
  289. contexts:
  290. - context:
  291. cluster: kubemark
  292. user: cluster-autoscaler
  293. name: kubemark-context
  294. current-context: kubemark-context"
  295. # Create kubeconfig for NodeProblemDetector.
  296. NPD_KUBECONFIG_CONTENTS="apiVersion: v1
  297. kind: Config
  298. users:
  299. - name: node-problem-detector
  300. user:
  301. token: ${NODE_PROBLEM_DETECTOR_TOKEN}
  302. clusters:
  303. - name: kubemark
  304. cluster:
  305. insecure-skip-tls-verify: true
  306. server: https://${MASTER_IP}
  307. contexts:
  308. - context:
  309. cluster: kubemark
  310. user: node-problem-detector
  311. name: kubemark-context
  312. current-context: kubemark-context"
  313. # Create kubeconfig for Kube DNS.
  314. KUBE_DNS_KUBECONFIG_CONTENTS="apiVersion: v1
  315. kind: Config
  316. users:
  317. - name: kube-dns
  318. user:
  319. token: ${KUBE_DNS_TOKEN}
  320. clusters:
  321. - name: kubemark
  322. cluster:
  323. insecure-skip-tls-verify: true
  324. server: https://${MASTER_IP}
  325. contexts:
  326. - context:
  327. cluster: kubemark
  328. user: kube-dns
  329. name: kubemark-context
  330. current-context: kubemark-context"
  331. # Create kubemark namespace.
  332. "${KUBECTL}" create -f "${RESOURCE_DIRECTORY}/kubemark-ns.json"
  333. # Create configmap for configuring hollow- kubelet, proxy and npd.
  334. "${KUBECTL}" create configmap "node-configmap" --namespace="kubemark" \
  335. --from-literal=content.type="${TEST_CLUSTER_API_CONTENT_TYPE}" \
  336. --from-file=kernel.monitor="${RESOURCE_DIRECTORY}/kernel-monitor.json"
  337. # Create secret for passing kubeconfigs to kubelet, kubeproxy and npd.
  338. "${KUBECTL}" create secret generic "kubeconfig" --type=Opaque --namespace="kubemark" \
  339. --from-literal=kubelet.kubeconfig="${KUBELET_KUBECONFIG_CONTENTS}" \
  340. --from-literal=kubeproxy.kubeconfig="${KUBEPROXY_KUBECONFIG_CONTENTS}" \
  341. --from-literal=heapster.kubeconfig="${HEAPSTER_KUBECONFIG_CONTENTS}" \
  342. --from-literal=cluster_autoscaler.kubeconfig="${CLUSTER_AUTOSCALER_KUBECONFIG_CONTENTS}" \
  343. --from-literal=npd.kubeconfig="${NPD_KUBECONFIG_CONTENTS}" \
  344. --from-literal=dns.kubeconfig="${KUBE_DNS_KUBECONFIG_CONTENTS}"
  345. # Create addon pods.
  346. # Heapster.
  347. mkdir -p "${RESOURCE_DIRECTORY}/addons"
  348. sed "s/{{MASTER_IP}}/${MASTER_IP}/g" "${RESOURCE_DIRECTORY}/heapster_template.json" > "${RESOURCE_DIRECTORY}/addons/heapster.json"
  349. metrics_mem_per_node=4
  350. metrics_mem=$((200 + metrics_mem_per_node*NUM_NODES))
  351. sed -i'' -e "s/{{METRICS_MEM}}/${metrics_mem}/g" "${RESOURCE_DIRECTORY}/addons/heapster.json"
  352. metrics_cpu_per_node_numerator=${NUM_NODES}
  353. metrics_cpu_per_node_denominator=2
  354. metrics_cpu=$((80 + metrics_cpu_per_node_numerator / metrics_cpu_per_node_denominator))
  355. sed -i'' -e "s/{{METRICS_CPU}}/${metrics_cpu}/g" "${RESOURCE_DIRECTORY}/addons/heapster.json"
  356. eventer_mem_per_node=500
  357. eventer_mem=$((200 * 1024 + eventer_mem_per_node*NUM_NODES))
  358. sed -i'' -e "s/{{EVENTER_MEM}}/${eventer_mem}/g" "${RESOURCE_DIRECTORY}/addons/heapster.json"
  359. # Cluster Autoscaler.
  360. if [[ "${ENABLE_KUBEMARK_CLUSTER_AUTOSCALER:-}" == "true" ]]; then
  361. echo "Setting up Cluster Autoscaler"
  362. KUBEMARK_AUTOSCALER_MIG_NAME="${KUBEMARK_AUTOSCALER_MIG_NAME:-${NODE_INSTANCE_PREFIX}-group}"
  363. KUBEMARK_AUTOSCALER_MIN_NODES="${KUBEMARK_AUTOSCALER_MIN_NODES:-0}"
  364. KUBEMARK_AUTOSCALER_MAX_NODES="${KUBEMARK_AUTOSCALER_MAX_NODES:-10}"
  365. NUM_NODES=${KUBEMARK_AUTOSCALER_MAX_NODES}
  366. echo "Setting maximum cluster size to ${NUM_NODES}."
  367. KUBEMARK_MIG_CONFIG="autoscaling.k8s.io/nodegroup: ${KUBEMARK_AUTOSCALER_MIG_NAME}"
  368. sed "s/{{master_ip}}/${MASTER_IP}/g" "${RESOURCE_DIRECTORY}/cluster-autoscaler_template.json" > "${RESOURCE_DIRECTORY}/addons/cluster-autoscaler.json"
  369. sed -i'' -e "s/{{kubemark_autoscaler_mig_name}}/${KUBEMARK_AUTOSCALER_MIG_NAME}/g" "${RESOURCE_DIRECTORY}/addons/cluster-autoscaler.json"
  370. sed -i'' -e "s/{{kubemark_autoscaler_min_nodes}}/${KUBEMARK_AUTOSCALER_MIN_NODES}/g" "${RESOURCE_DIRECTORY}/addons/cluster-autoscaler.json"
  371. sed -i'' -e "s/{{kubemark_autoscaler_max_nodes}}/${KUBEMARK_AUTOSCALER_MAX_NODES}/g" "${RESOURCE_DIRECTORY}/addons/cluster-autoscaler.json"
  372. fi
  373. # Kube DNS.
  374. if [[ "${ENABLE_KUBEMARK_KUBE_DNS:-}" == "true" ]]; then
  375. echo "Setting up kube-dns"
  376. sed "s/{{dns_domain}}/${KUBE_DNS_DOMAIN}/g" "${RESOURCE_DIRECTORY}/kube_dns_template.yaml" > "${RESOURCE_DIRECTORY}/addons/kube_dns.yaml"
  377. fi
  378. "${KUBECTL}" create -f "${RESOURCE_DIRECTORY}/addons" --namespace="kubemark"
  379. # Create the replication controller for hollow-nodes.
  380. # We allow to override the NUM_REPLICAS when running Cluster Autoscaler.
  381. NUM_REPLICAS=${NUM_REPLICAS:-${NUM_NODES}}
  382. sed "s/{{numreplicas}}/${NUM_REPLICAS}/g" "${RESOURCE_DIRECTORY}/hollow-node_template.yaml" > "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  383. proxy_cpu=20
  384. if [ "${NUM_NODES}" -gt 1000 ]; then
  385. proxy_cpu=50
  386. fi
  387. proxy_mem_per_node=50
  388. proxy_mem=$((100 * 1024 + proxy_mem_per_node*NUM_NODES))
  389. sed -i'' -e "s/{{HOLLOW_PROXY_CPU}}/${proxy_cpu}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  390. sed -i'' -e "s/{{HOLLOW_PROXY_MEM}}/${proxy_mem}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  391. sed -i'' -e "s'{{kubemark_image_registry}}'${KUBEMARK_IMAGE_REGISTRY}'g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  392. sed -i'' -e "s/{{kubemark_image_tag}}/${KUBEMARK_IMAGE_TAG}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  393. sed -i'' -e "s/{{master_ip}}/${MASTER_IP}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  394. sed -i'' -e "s/{{hollow_kubelet_params}}/${HOLLOW_KUBELET_TEST_ARGS}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  395. sed -i'' -e "s/{{hollow_proxy_params}}/${HOLLOW_PROXY_TEST_ARGS}/g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  396. sed -i'' -e "s'{{kubemark_mig_config}}'${KUBEMARK_MIG_CONFIG:-}'g" "${RESOURCE_DIRECTORY}/hollow-node.yaml"
  397. "${KUBECTL}" create -f "${RESOURCE_DIRECTORY}/hollow-node.yaml" --namespace="kubemark"
  398. echo "Created secrets, configMaps, replication-controllers required for hollow-nodes."
  399. }
  400. # Wait until all hollow-nodes are running or there is a timeout.
  401. function wait-for-hollow-nodes-to-run-or-timeout {
  402. echo -n "Waiting for all hollow-nodes to become Running"
  403. start=$(date +%s)
  404. nodes=$("${KUBECTL}" --kubeconfig="${LOCAL_KUBECONFIG}" get node 2> /dev/null) || true
  405. ready=$(($(echo "${nodes}" | grep -vc "NotReady") - 1))
  406. until [[ "${ready}" -ge "${NUM_REPLICAS}" ]]; do
  407. echo -n "."
  408. sleep 1
  409. now=$(date +%s)
  410. # Fail it if it already took more than 30 minutes.
  411. if [ $((now - start)) -gt 1800 ]; then
  412. echo ""
  413. # shellcheck disable=SC2154 # Color defined in sourced script
  414. echo -e "${color_red} Timeout waiting for all hollow-nodes to become Running. ${color_norm}"
  415. # Try listing nodes again - if it fails it means that API server is not responding
  416. if "${KUBECTL}" --kubeconfig="${LOCAL_KUBECONFIG}" get node &> /dev/null; then
  417. echo "Found only ${ready} ready hollow-nodes while waiting for ${NUM_NODES}."
  418. else
  419. echo "Got error while trying to list hollow-nodes. Probably API server is down."
  420. fi
  421. pods=$("${KUBECTL}" get pods -l name=hollow-node --namespace=kubemark) || true
  422. running=$(($(echo "${pods}" | grep -c "Running")))
  423. echo "${running} hollow-nodes are reported as 'Running'"
  424. not_running=$(($(echo "${pods}" | grep -vc "Running") - 1))
  425. echo "${not_running} hollow-nodes are reported as NOT 'Running'"
  426. echo "${pods}" | grep -v Running
  427. exit 1
  428. fi
  429. nodes=$("${KUBECTL}" --kubeconfig="${LOCAL_KUBECONFIG}" get node 2> /dev/null) || true
  430. ready=$(($(echo "${nodes}" | grep -vc "NotReady") - 1))
  431. done
  432. # shellcheck disable=SC2154 # Color defined in sourced script
  433. echo -e "${color_green} Done!${color_norm}"
  434. }
  435. ############################### Main Function ########################################
  436. detect-project &> /dev/null
  437. find-release-tars
  438. # We need master IP to generate PKI and kubeconfig for cluster.
  439. get-or-create-master-ip
  440. generate-pki-config
  441. write-local-kubeconfig
  442. # Setup for master.
  443. function start-master {
  444. # shellcheck disable=SC2154 # Color defined in sourced script
  445. echo -e "${color_yellow}STARTING SETUP FOR MASTER${color_norm}"
  446. create-master-environment-file
  447. create-master-instance-with-resources
  448. wait-for-master-reachability
  449. write-pki-config-to-master
  450. copy-resource-files-to-master
  451. start-master-components
  452. }
  453. start-master &
  454. start_master_pid=$!
  455. # Setup for hollow-nodes.
  456. function start-hollow-nodes {
  457. echo -e "${color_yellow}STARTING SETUP FOR HOLLOW-NODES${color_norm}"
  458. create-and-upload-hollow-node-image
  459. create-kube-hollow-node-resources
  460. wait-for-hollow-nodes-to-run-or-timeout
  461. }
  462. start-hollow-nodes &
  463. start_hollow_nodes_pid=$!
  464. wait $start_master_pid || { echo "Failed to start kubemark master" ; exit 1 ; }
  465. wait $start_hollow_nodes_pid ||{ echo "Failed to start hollow nodes" ; exit 1 ; }
  466. echo ""
  467. echo "Master IP: ${MASTER_IP}"
  468. echo "Password to kubemark master: ${KUBE_PASSWORD}"
  469. echo "Kubeconfig for kubemark master is written in ${LOCAL_KUBECONFIG}"