server_others.go 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284
  1. // +build !windows
  2. /*
  3. Copyright 2014 The Kubernetes Authors.
  4. Licensed under the Apache License, Version 2.0 (the "License");
  5. you may not use this file except in compliance with the License.
  6. You may obtain a copy of the License at
  7. http://www.apache.org/licenses/LICENSE-2.0
  8. Unless required by applicable law or agreed to in writing, software
  9. distributed under the License is distributed on an "AS IS" BASIS,
  10. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. See the License for the specific language governing permissions and
  12. limitations under the License.
  13. */
  14. // Package app does all of the work necessary to configure and run a
  15. // Kubernetes app process.
  16. package app
  17. import (
  18. "errors"
  19. "fmt"
  20. "net"
  21. "k8s.io/api/core/v1"
  22. "k8s.io/apimachinery/pkg/runtime"
  23. "k8s.io/apimachinery/pkg/types"
  24. utilnet "k8s.io/apimachinery/pkg/util/net"
  25. utilruntime "k8s.io/apimachinery/pkg/util/runtime"
  26. "k8s.io/client-go/tools/record"
  27. "k8s.io/kubernetes/pkg/proxy"
  28. proxyconfigapi "k8s.io/kubernetes/pkg/proxy/apis/config"
  29. "k8s.io/kubernetes/pkg/proxy/healthcheck"
  30. "k8s.io/kubernetes/pkg/proxy/iptables"
  31. "k8s.io/kubernetes/pkg/proxy/ipvs"
  32. "k8s.io/kubernetes/pkg/proxy/metrics"
  33. "k8s.io/kubernetes/pkg/proxy/userspace"
  34. "k8s.io/kubernetes/pkg/util/configz"
  35. utildbus "k8s.io/kubernetes/pkg/util/dbus"
  36. utilipset "k8s.io/kubernetes/pkg/util/ipset"
  37. utiliptables "k8s.io/kubernetes/pkg/util/iptables"
  38. utilipvs "k8s.io/kubernetes/pkg/util/ipvs"
  39. utilnode "k8s.io/kubernetes/pkg/util/node"
  40. utilsysctl "k8s.io/kubernetes/pkg/util/sysctl"
  41. "k8s.io/utils/exec"
  42. "k8s.io/klog"
  43. )
  44. // NewProxyServer returns a new ProxyServer.
  45. func NewProxyServer(o *Options) (*ProxyServer, error) {
  46. return newProxyServer(o.config, o.CleanupAndExit, o.scheme, o.master)
  47. }
  48. func newProxyServer(
  49. config *proxyconfigapi.KubeProxyConfiguration,
  50. cleanupAndExit bool,
  51. scheme *runtime.Scheme,
  52. master string) (*ProxyServer, error) {
  53. if config == nil {
  54. return nil, errors.New("config is required")
  55. }
  56. if c, err := configz.New(proxyconfigapi.GroupName); err == nil {
  57. c.Set(config)
  58. } else {
  59. return nil, fmt.Errorf("unable to register configz: %s", err)
  60. }
  61. protocol := utiliptables.ProtocolIpv4
  62. if net.ParseIP(config.BindAddress).To4() == nil {
  63. klog.V(0).Infof("IPv6 bind address (%s), assume IPv6 operation", config.BindAddress)
  64. protocol = utiliptables.ProtocolIpv6
  65. }
  66. var iptInterface utiliptables.Interface
  67. var ipvsInterface utilipvs.Interface
  68. var kernelHandler ipvs.KernelHandler
  69. var ipsetInterface utilipset.Interface
  70. var dbus utildbus.Interface
  71. // Create a iptables utils.
  72. execer := exec.New()
  73. dbus = utildbus.New()
  74. iptInterface = utiliptables.New(execer, dbus, protocol)
  75. kernelHandler = ipvs.NewLinuxKernelHandler()
  76. ipsetInterface = utilipset.New(execer)
  77. canUseIPVS, _ := ipvs.CanUseIPVSProxier(kernelHandler, ipsetInterface)
  78. if canUseIPVS {
  79. ipvsInterface = utilipvs.New(execer)
  80. }
  81. // We omit creation of pretty much everything if we run in cleanup mode
  82. if cleanupAndExit {
  83. return &ProxyServer{
  84. execer: execer,
  85. IptInterface: iptInterface,
  86. IpvsInterface: ipvsInterface,
  87. IpsetInterface: ipsetInterface,
  88. }, nil
  89. }
  90. client, eventClient, err := createClients(config.ClientConnection, master)
  91. if err != nil {
  92. return nil, err
  93. }
  94. // Create event recorder
  95. hostname, err := utilnode.GetHostname(config.HostnameOverride)
  96. if err != nil {
  97. return nil, err
  98. }
  99. eventBroadcaster := record.NewBroadcaster()
  100. recorder := eventBroadcaster.NewRecorder(scheme, v1.EventSource{Component: "kube-proxy", Host: hostname})
  101. nodeRef := &v1.ObjectReference{
  102. Kind: "Node",
  103. Name: hostname,
  104. UID: types.UID(hostname),
  105. Namespace: "",
  106. }
  107. var healthzServer *healthcheck.HealthzServer
  108. var healthzUpdater healthcheck.HealthzUpdater
  109. if len(config.HealthzBindAddress) > 0 {
  110. healthzServer = healthcheck.NewDefaultHealthzServer(config.HealthzBindAddress, 2*config.IPTables.SyncPeriod.Duration, recorder, nodeRef)
  111. healthzUpdater = healthzServer
  112. }
  113. var proxier proxy.ProxyProvider
  114. proxyMode := getProxyMode(string(config.Mode), iptInterface, kernelHandler, ipsetInterface, iptables.LinuxKernelCompatTester{})
  115. nodeIP := net.ParseIP(config.BindAddress)
  116. if nodeIP.IsUnspecified() {
  117. nodeIP = utilnode.GetNodeIP(client, hostname)
  118. }
  119. if proxyMode == proxyModeIPTables {
  120. klog.V(0).Info("Using iptables Proxier.")
  121. if config.IPTables.MasqueradeBit == nil {
  122. // MasqueradeBit must be specified or defaulted.
  123. return nil, fmt.Errorf("unable to read IPTables MasqueradeBit from config")
  124. }
  125. // TODO this has side effects that should only happen when Run() is invoked.
  126. proxier, err = iptables.NewProxier(
  127. iptInterface,
  128. utilsysctl.New(),
  129. execer,
  130. config.IPTables.SyncPeriod.Duration,
  131. config.IPTables.MinSyncPeriod.Duration,
  132. config.IPTables.MasqueradeAll,
  133. int(*config.IPTables.MasqueradeBit),
  134. config.ClusterCIDR,
  135. hostname,
  136. nodeIP,
  137. recorder,
  138. healthzUpdater,
  139. config.NodePortAddresses,
  140. )
  141. if err != nil {
  142. return nil, fmt.Errorf("unable to create proxier: %v", err)
  143. }
  144. metrics.RegisterMetrics()
  145. } else if proxyMode == proxyModeIPVS {
  146. klog.V(0).Info("Using ipvs Proxier.")
  147. proxier, err = ipvs.NewProxier(
  148. iptInterface,
  149. ipvsInterface,
  150. ipsetInterface,
  151. utilsysctl.New(),
  152. execer,
  153. config.IPVS.SyncPeriod.Duration,
  154. config.IPVS.MinSyncPeriod.Duration,
  155. config.IPVS.ExcludeCIDRs,
  156. config.IPVS.StrictARP,
  157. config.IPTables.MasqueradeAll,
  158. int(*config.IPTables.MasqueradeBit),
  159. config.ClusterCIDR,
  160. hostname,
  161. nodeIP,
  162. recorder,
  163. healthzServer,
  164. config.IPVS.Scheduler,
  165. config.NodePortAddresses,
  166. )
  167. if err != nil {
  168. return nil, fmt.Errorf("unable to create proxier: %v", err)
  169. }
  170. metrics.RegisterMetrics()
  171. } else {
  172. klog.V(0).Info("Using userspace Proxier.")
  173. // TODO this has side effects that should only happen when Run() is invoked.
  174. proxier, err = userspace.NewProxier(
  175. userspace.NewLoadBalancerRR(),
  176. net.ParseIP(config.BindAddress),
  177. iptInterface,
  178. execer,
  179. *utilnet.ParsePortRangeOrDie(config.PortRange),
  180. config.IPTables.SyncPeriod.Duration,
  181. config.IPTables.MinSyncPeriod.Duration,
  182. config.UDPIdleTimeout.Duration,
  183. config.NodePortAddresses,
  184. )
  185. if err != nil {
  186. return nil, fmt.Errorf("unable to create proxier: %v", err)
  187. }
  188. }
  189. iptInterface.AddReloadFunc(proxier.Sync)
  190. return &ProxyServer{
  191. Client: client,
  192. EventClient: eventClient,
  193. IptInterface: iptInterface,
  194. IpvsInterface: ipvsInterface,
  195. IpsetInterface: ipsetInterface,
  196. execer: execer,
  197. Proxier: proxier,
  198. Broadcaster: eventBroadcaster,
  199. Recorder: recorder,
  200. ConntrackConfiguration: config.Conntrack,
  201. Conntracker: &realConntracker{},
  202. ProxyMode: proxyMode,
  203. NodeRef: nodeRef,
  204. MetricsBindAddress: config.MetricsBindAddress,
  205. EnableProfiling: config.EnableProfiling,
  206. OOMScoreAdj: config.OOMScoreAdj,
  207. ResourceContainer: config.ResourceContainer,
  208. ConfigSyncPeriod: config.ConfigSyncPeriod.Duration,
  209. HealthzServer: healthzServer,
  210. }, nil
  211. }
  212. func getProxyMode(proxyMode string, iptver iptables.Versioner, khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  213. switch proxyMode {
  214. case proxyModeUserspace:
  215. return proxyModeUserspace
  216. case proxyModeIPTables:
  217. return tryIPTablesProxy(iptver, kcompat)
  218. case proxyModeIPVS:
  219. return tryIPVSProxy(iptver, khandle, ipsetver, kcompat)
  220. }
  221. klog.Warningf("Flag proxy-mode=%q unknown, assuming iptables proxy", proxyMode)
  222. return tryIPTablesProxy(iptver, kcompat)
  223. }
  224. func tryIPVSProxy(iptver iptables.Versioner, khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  225. // guaranteed false on error, error only necessary for debugging
  226. // IPVS Proxier relies on ip_vs_* kernel modules and ipset
  227. useIPVSProxy, err := ipvs.CanUseIPVSProxier(khandle, ipsetver)
  228. if err != nil {
  229. // Try to fallback to iptables before falling back to userspace
  230. utilruntime.HandleError(fmt.Errorf("can't determine whether to use ipvs proxy, error: %v", err))
  231. }
  232. if useIPVSProxy {
  233. return proxyModeIPVS
  234. }
  235. // Try to fallback to iptables before falling back to userspace
  236. klog.V(1).Infof("Can't use ipvs proxier, trying iptables proxier")
  237. return tryIPTablesProxy(iptver, kcompat)
  238. }
  239. func tryIPTablesProxy(iptver iptables.Versioner, kcompat iptables.KernelCompatTester) string {
  240. // guaranteed false on error, error only necessary for debugging
  241. useIPTablesProxy, err := iptables.CanUseIPTablesProxier(iptver, kcompat)
  242. if err != nil {
  243. utilruntime.HandleError(fmt.Errorf("can't determine whether to use iptables proxy, using userspace proxier: %v", err))
  244. return proxyModeUserspace
  245. }
  246. if useIPTablesProxy {
  247. return proxyModeIPTables
  248. }
  249. // Fallback.
  250. klog.V(1).Infof("Can't use iptables proxy, using userspace proxier")
  251. return proxyModeUserspace
  252. }