server_others.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503
  1. // +build !windows
  2. /*
  3. Copyright 2014 The Kubernetes Authors.
  4. Licensed under the Apache License, Version 2.0 (the "License");
  5. you may not use this file except in compliance with the License.
  6. You may obtain a copy of the License at
  7. http://www.apache.org/licenses/LICENSE-2.0
  8. Unless required by applicable law or agreed to in writing, software
  9. distributed under the License is distributed on an "AS IS" BASIS,
  10. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. See the License for the specific language governing permissions and
  12. limitations under the License.
  13. */
  14. // Package app does all of the work necessary to configure and run a
  15. // Kubernetes app process.
  16. package app
  17. import (
  18. "errors"
  19. "fmt"
  20. "net"
  21. "strings"
  22. v1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/types"
  24. utilnet "k8s.io/apimachinery/pkg/util/net"
  25. utilruntime "k8s.io/apimachinery/pkg/util/runtime"
  26. utilfeature "k8s.io/apiserver/pkg/util/feature"
  27. "k8s.io/client-go/tools/record"
  28. "k8s.io/component-base/metrics"
  29. "k8s.io/kubernetes/pkg/features"
  30. "k8s.io/kubernetes/pkg/proxy"
  31. proxyconfigapi "k8s.io/kubernetes/pkg/proxy/apis/config"
  32. proxyconfigscheme "k8s.io/kubernetes/pkg/proxy/apis/config/scheme"
  33. "k8s.io/kubernetes/pkg/proxy/healthcheck"
  34. "k8s.io/kubernetes/pkg/proxy/iptables"
  35. "k8s.io/kubernetes/pkg/proxy/ipvs"
  36. proxymetrics "k8s.io/kubernetes/pkg/proxy/metrics"
  37. "k8s.io/kubernetes/pkg/proxy/userspace"
  38. proxyutiliptables "k8s.io/kubernetes/pkg/proxy/util/iptables"
  39. "k8s.io/kubernetes/pkg/util/configz"
  40. utilipset "k8s.io/kubernetes/pkg/util/ipset"
  41. utiliptables "k8s.io/kubernetes/pkg/util/iptables"
  42. utilipvs "k8s.io/kubernetes/pkg/util/ipvs"
  43. utilnode "k8s.io/kubernetes/pkg/util/node"
  44. utilsysctl "k8s.io/kubernetes/pkg/util/sysctl"
  45. "k8s.io/utils/exec"
  46. utilsnet "k8s.io/utils/net"
  47. "k8s.io/klog"
  48. )
  49. // NewProxyServer returns a new ProxyServer.
  50. func NewProxyServer(o *Options) (*ProxyServer, error) {
  51. return newProxyServer(o.config, o.CleanupAndExit, o.master)
  52. }
  53. func newProxyServer(
  54. config *proxyconfigapi.KubeProxyConfiguration,
  55. cleanupAndExit bool,
  56. master string) (*ProxyServer, error) {
  57. if config == nil {
  58. return nil, errors.New("config is required")
  59. }
  60. if c, err := configz.New(proxyconfigapi.GroupName); err == nil {
  61. c.Set(config)
  62. } else {
  63. return nil, fmt.Errorf("unable to register configz: %s", err)
  64. }
  65. protocol := utiliptables.ProtocolIpv4
  66. if net.ParseIP(config.BindAddress).To4() == nil {
  67. klog.V(0).Infof("IPv6 bind address (%s), assume IPv6 operation", config.BindAddress)
  68. protocol = utiliptables.ProtocolIpv6
  69. }
  70. var iptInterface utiliptables.Interface
  71. var ipvsInterface utilipvs.Interface
  72. var kernelHandler ipvs.KernelHandler
  73. var ipsetInterface utilipset.Interface
  74. // Create a iptables utils.
  75. execer := exec.New()
  76. iptInterface = utiliptables.New(execer, protocol)
  77. kernelHandler = ipvs.NewLinuxKernelHandler()
  78. ipsetInterface = utilipset.New(execer)
  79. canUseIPVS, _ := ipvs.CanUseIPVSProxier(kernelHandler, ipsetInterface)
  80. if canUseIPVS {
  81. ipvsInterface = utilipvs.New(execer)
  82. }
  83. // We omit creation of pretty much everything if we run in cleanup mode
  84. if cleanupAndExit {
  85. return &ProxyServer{
  86. execer: execer,
  87. IptInterface: iptInterface,
  88. IpvsInterface: ipvsInterface,
  89. IpsetInterface: ipsetInterface,
  90. }, nil
  91. }
  92. if len(config.ShowHiddenMetricsForVersion) > 0 {
  93. metrics.SetShowHidden()
  94. }
  95. client, eventClient, err := createClients(config.ClientConnection, master)
  96. if err != nil {
  97. return nil, err
  98. }
  99. // Create event recorder
  100. hostname, err := utilnode.GetHostname(config.HostnameOverride)
  101. if err != nil {
  102. return nil, err
  103. }
  104. eventBroadcaster := record.NewBroadcaster()
  105. recorder := eventBroadcaster.NewRecorder(proxyconfigscheme.Scheme, v1.EventSource{Component: "kube-proxy", Host: hostname})
  106. nodeRef := &v1.ObjectReference{
  107. Kind: "Node",
  108. Name: hostname,
  109. UID: types.UID(hostname),
  110. Namespace: "",
  111. }
  112. var healthzServer healthcheck.ProxierHealthUpdater
  113. if len(config.HealthzBindAddress) > 0 {
  114. healthzServer = healthcheck.NewProxierHealthServer(config.HealthzBindAddress, 2*config.IPTables.SyncPeriod.Duration, recorder, nodeRef)
  115. }
  116. var proxier proxy.Provider
  117. var detectLocalMode proxyconfigapi.LocalMode
  118. proxyMode := getProxyMode(string(config.Mode), kernelHandler, ipsetInterface, iptables.LinuxKernelCompatTester{})
  119. detectLocalMode, err = getDetectLocalMode(config)
  120. if err != nil {
  121. return nil, fmt.Errorf("cannot determine detect-local-mode: %v", err)
  122. }
  123. nodeIP := net.ParseIP(config.BindAddress)
  124. if nodeIP.IsUnspecified() {
  125. nodeIP = utilnode.GetNodeIP(client, hostname)
  126. if nodeIP == nil {
  127. klog.V(0).Infof("can't determine this node's IP, assuming 127.0.0.1; if this is incorrect, please set the --bind-address flag")
  128. nodeIP = net.ParseIP("127.0.0.1")
  129. }
  130. }
  131. klog.V(2).Info("DetectLocalMode: '", string(detectLocalMode), "'")
  132. if proxyMode == proxyModeIPTables {
  133. klog.V(0).Info("Using iptables Proxier.")
  134. if config.IPTables.MasqueradeBit == nil {
  135. // MasqueradeBit must be specified or defaulted.
  136. return nil, fmt.Errorf("unable to read IPTables MasqueradeBit from config")
  137. }
  138. if utilfeature.DefaultFeatureGate.Enabled(features.IPv6DualStack) {
  139. klog.V(0).Info("creating dualStackProxier for iptables.")
  140. // Create iptables handlers for both families, one is already created
  141. // Always ordered as IPv4, IPv6
  142. var ipt [2]utiliptables.Interface
  143. if iptInterface.IsIpv6() {
  144. ipt[1] = iptInterface
  145. ipt[0] = utiliptables.New(execer, utiliptables.ProtocolIpv4)
  146. } else {
  147. ipt[0] = iptInterface
  148. ipt[1] = utiliptables.New(execer, utiliptables.ProtocolIpv6)
  149. }
  150. // Always ordered to match []ipt
  151. var localDetectors [2]proxyutiliptables.LocalTrafficDetector
  152. localDetectors, err = getDualStackLocalDetectorTuple(detectLocalMode, config, ipt)
  153. if err != nil {
  154. return nil, fmt.Errorf("unable to create proxier: %v", err)
  155. }
  156. // TODO this has side effects that should only happen when Run() is invoked.
  157. proxier, err = iptables.NewDualStackProxier(
  158. ipt,
  159. utilsysctl.New(),
  160. execer,
  161. config.IPTables.SyncPeriod.Duration,
  162. config.IPTables.MinSyncPeriod.Duration,
  163. config.IPTables.MasqueradeAll,
  164. int(*config.IPTables.MasqueradeBit),
  165. localDetectors,
  166. hostname,
  167. nodeIPTuple(config.BindAddress),
  168. recorder,
  169. healthzServer,
  170. config.NodePortAddresses,
  171. )
  172. } else { // Create a single-stack proxier.
  173. var localDetector proxyutiliptables.LocalTrafficDetector
  174. localDetector, err = getLocalDetector(detectLocalMode, config, iptInterface)
  175. if err != nil {
  176. return nil, fmt.Errorf("unable to create proxier: %v", err)
  177. }
  178. // TODO this has side effects that should only happen when Run() is invoked.
  179. proxier, err = iptables.NewProxier(
  180. iptInterface,
  181. utilsysctl.New(),
  182. execer,
  183. config.IPTables.SyncPeriod.Duration,
  184. config.IPTables.MinSyncPeriod.Duration,
  185. config.IPTables.MasqueradeAll,
  186. int(*config.IPTables.MasqueradeBit),
  187. localDetector,
  188. hostname,
  189. nodeIP,
  190. recorder,
  191. healthzServer,
  192. config.NodePortAddresses,
  193. )
  194. }
  195. if err != nil {
  196. return nil, fmt.Errorf("unable to create proxier: %v", err)
  197. }
  198. proxymetrics.RegisterMetrics()
  199. } else if proxyMode == proxyModeIPVS {
  200. klog.V(0).Info("Using ipvs Proxier.")
  201. if utilfeature.DefaultFeatureGate.Enabled(features.IPv6DualStack) {
  202. klog.V(0).Info("creating dualStackProxier for ipvs.")
  203. // Create iptables handlers for both families, one is already created
  204. // Always ordered as IPv4, IPv6
  205. var ipt [2]utiliptables.Interface
  206. if iptInterface.IsIpv6() {
  207. ipt[1] = iptInterface
  208. ipt[0] = utiliptables.New(execer, utiliptables.ProtocolIpv4)
  209. } else {
  210. ipt[0] = iptInterface
  211. ipt[1] = utiliptables.New(execer, utiliptables.ProtocolIpv6)
  212. }
  213. nodeIPs := nodeIPTuple(config.BindAddress)
  214. // Always ordered to match []ipt
  215. var localDetectors [2]proxyutiliptables.LocalTrafficDetector
  216. localDetectors, err = getDualStackLocalDetectorTuple(detectLocalMode, config, ipt)
  217. if err != nil {
  218. return nil, fmt.Errorf("unable to create proxier: %v", err)
  219. }
  220. proxier, err = ipvs.NewDualStackProxier(
  221. ipt,
  222. ipvsInterface,
  223. ipsetInterface,
  224. utilsysctl.New(),
  225. execer,
  226. config.IPVS.SyncPeriod.Duration,
  227. config.IPVS.MinSyncPeriod.Duration,
  228. config.IPVS.ExcludeCIDRs,
  229. config.IPVS.StrictARP,
  230. config.IPVS.TCPTimeout.Duration,
  231. config.IPVS.TCPFinTimeout.Duration,
  232. config.IPVS.UDPTimeout.Duration,
  233. config.IPTables.MasqueradeAll,
  234. int(*config.IPTables.MasqueradeBit),
  235. localDetectors,
  236. hostname,
  237. nodeIPs,
  238. recorder,
  239. healthzServer,
  240. config.IPVS.Scheduler,
  241. config.NodePortAddresses,
  242. )
  243. } else {
  244. var localDetector proxyutiliptables.LocalTrafficDetector
  245. localDetector, err = getLocalDetector(detectLocalMode, config, iptInterface)
  246. if err != nil {
  247. return nil, fmt.Errorf("unable to create proxier: %v", err)
  248. }
  249. proxier, err = ipvs.NewProxier(
  250. iptInterface,
  251. ipvsInterface,
  252. ipsetInterface,
  253. utilsysctl.New(),
  254. execer,
  255. config.IPVS.SyncPeriod.Duration,
  256. config.IPVS.MinSyncPeriod.Duration,
  257. config.IPVS.ExcludeCIDRs,
  258. config.IPVS.StrictARP,
  259. config.IPVS.TCPTimeout.Duration,
  260. config.IPVS.TCPFinTimeout.Duration,
  261. config.IPVS.UDPTimeout.Duration,
  262. config.IPTables.MasqueradeAll,
  263. int(*config.IPTables.MasqueradeBit),
  264. localDetector,
  265. hostname,
  266. nodeIP,
  267. recorder,
  268. healthzServer,
  269. config.IPVS.Scheduler,
  270. config.NodePortAddresses,
  271. )
  272. }
  273. if err != nil {
  274. return nil, fmt.Errorf("unable to create proxier: %v", err)
  275. }
  276. proxymetrics.RegisterMetrics()
  277. } else {
  278. klog.V(0).Info("Using userspace Proxier.")
  279. // TODO this has side effects that should only happen when Run() is invoked.
  280. proxier, err = userspace.NewProxier(
  281. userspace.NewLoadBalancerRR(),
  282. net.ParseIP(config.BindAddress),
  283. iptInterface,
  284. execer,
  285. *utilnet.ParsePortRangeOrDie(config.PortRange),
  286. config.IPTables.SyncPeriod.Duration,
  287. config.IPTables.MinSyncPeriod.Duration,
  288. config.UDPIdleTimeout.Duration,
  289. config.NodePortAddresses,
  290. )
  291. if err != nil {
  292. return nil, fmt.Errorf("unable to create proxier: %v", err)
  293. }
  294. }
  295. return &ProxyServer{
  296. Client: client,
  297. EventClient: eventClient,
  298. IptInterface: iptInterface,
  299. IpvsInterface: ipvsInterface,
  300. IpsetInterface: ipsetInterface,
  301. execer: execer,
  302. Proxier: proxier,
  303. Broadcaster: eventBroadcaster,
  304. Recorder: recorder,
  305. ConntrackConfiguration: config.Conntrack,
  306. Conntracker: &realConntracker{},
  307. ProxyMode: proxyMode,
  308. NodeRef: nodeRef,
  309. MetricsBindAddress: config.MetricsBindAddress,
  310. EnableProfiling: config.EnableProfiling,
  311. OOMScoreAdj: config.OOMScoreAdj,
  312. ConfigSyncPeriod: config.ConfigSyncPeriod.Duration,
  313. HealthzServer: healthzServer,
  314. UseEndpointSlices: utilfeature.DefaultFeatureGate.Enabled(features.EndpointSliceProxying),
  315. }, nil
  316. }
  317. func getDetectLocalMode(config *proxyconfigapi.KubeProxyConfiguration) (proxyconfigapi.LocalMode, error) {
  318. mode := config.DetectLocalMode
  319. switch mode {
  320. case proxyconfigapi.LocalModeClusterCIDR:
  321. return mode, nil
  322. default:
  323. if strings.TrimSpace(mode.String()) != "" {
  324. return mode, fmt.Errorf("unknown detect-local-mode: %v", mode)
  325. }
  326. klog.V(4).Info("Defaulting detect-local-mode to ", string(proxyconfigapi.LocalModeClusterCIDR))
  327. return proxyconfigapi.LocalModeClusterCIDR, nil
  328. }
  329. }
  330. func getLocalDetector(mode proxyconfigapi.LocalMode, config *proxyconfigapi.KubeProxyConfiguration, ipt utiliptables.Interface) (proxyutiliptables.LocalTrafficDetector, error) {
  331. switch mode {
  332. case proxyconfigapi.LocalModeClusterCIDR:
  333. if len(strings.TrimSpace(config.ClusterCIDR)) == 0 {
  334. klog.Warning("detect-local-mode set to ClusterCIDR, but no cluster CIDR defined")
  335. break
  336. }
  337. return proxyutiliptables.NewDetectLocalByCIDR(config.ClusterCIDR, ipt)
  338. }
  339. klog.V(0).Info("detect-local-mode: ", string(mode), " , defaulting to no-op detect-local")
  340. return proxyutiliptables.NewNoOpLocalDetector(), nil
  341. }
  342. func getDualStackLocalDetectorTuple(mode proxyconfigapi.LocalMode, config *proxyconfigapi.KubeProxyConfiguration, ipt [2]utiliptables.Interface) ([2]proxyutiliptables.LocalTrafficDetector, error) {
  343. var err error
  344. localDetectors := [2]proxyutiliptables.LocalTrafficDetector{proxyutiliptables.NewNoOpLocalDetector(), proxyutiliptables.NewNoOpLocalDetector()}
  345. switch mode {
  346. case proxyconfigapi.LocalModeClusterCIDR:
  347. if len(strings.TrimSpace(config.ClusterCIDR)) == 0 {
  348. klog.Warning("detect-local-mode set to ClusterCIDR, but no cluster CIDR defined")
  349. break
  350. }
  351. clusterCIDRs := cidrTuple(config.ClusterCIDR)
  352. if len(strings.TrimSpace(clusterCIDRs[0])) == 0 {
  353. klog.Warning("detect-local-mode set to ClusterCIDR, but no IPv4 cluster CIDR defined, defaulting to no-op detect-local for IPv4")
  354. } else {
  355. localDetectors[0], err = proxyutiliptables.NewDetectLocalByCIDR(clusterCIDRs[0], ipt[0])
  356. if err != nil { // don't loose the original error
  357. return localDetectors, err
  358. }
  359. }
  360. if len(strings.TrimSpace(clusterCIDRs[1])) == 0 {
  361. klog.Warning("detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, , defaulting to no-op detect-local for IPv6")
  362. } else {
  363. localDetectors[1], err = proxyutiliptables.NewDetectLocalByCIDR(clusterCIDRs[1], ipt[1])
  364. }
  365. return localDetectors, err
  366. default:
  367. klog.Warningf("unknown detect-local-mode: %v", mode)
  368. }
  369. klog.Warning("detect-local-mode: ", string(mode), " , defaulting to no-op detect-local")
  370. return localDetectors, nil
  371. }
  372. // cidrTuple takes a comma separated list of CIDRs and return a tuple (ipv4cidr,ipv6cidr)
  373. // The returned tuple is guaranteed to have the order (ipv4,ipv6) and if no cidr from a family is found an
  374. // empty string "" is inserted.
  375. func cidrTuple(cidrList string) [2]string {
  376. cidrs := [2]string{"", ""}
  377. foundIPv4 := false
  378. foundIPv6 := false
  379. for _, cidr := range strings.Split(cidrList, ",") {
  380. if utilsnet.IsIPv6CIDRString(cidr) && !foundIPv6 {
  381. cidrs[1] = cidr
  382. foundIPv6 = true
  383. } else if !foundIPv4 {
  384. cidrs[0] = cidr
  385. foundIPv4 = true
  386. }
  387. if foundIPv6 && foundIPv4 {
  388. break
  389. }
  390. }
  391. return cidrs
  392. }
  393. // nodeIPTuple takes an addresses and return a tuple (ipv4,ipv6)
  394. // The returned tuple is guaranteed to have the order (ipv4,ipv6). The address NOT of the passed address
  395. // will have "any" address (0.0.0.0 or ::) inserted.
  396. func nodeIPTuple(bindAddress string) [2]net.IP {
  397. nodes := [2]net.IP{net.IPv4zero, net.IPv6zero}
  398. adr := net.ParseIP(bindAddress)
  399. if utilsnet.IsIPv6(adr) {
  400. nodes[1] = adr
  401. } else {
  402. nodes[0] = adr
  403. }
  404. return nodes
  405. }
  406. func getProxyMode(proxyMode string, khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  407. switch proxyMode {
  408. case proxyModeUserspace:
  409. return proxyModeUserspace
  410. case proxyModeIPTables:
  411. return tryIPTablesProxy(kcompat)
  412. case proxyModeIPVS:
  413. return tryIPVSProxy(khandle, ipsetver, kcompat)
  414. }
  415. klog.Warningf("Unknown proxy mode %q, assuming iptables proxy", proxyMode)
  416. return tryIPTablesProxy(kcompat)
  417. }
  418. func tryIPVSProxy(khandle ipvs.KernelHandler, ipsetver ipvs.IPSetVersioner, kcompat iptables.KernelCompatTester) string {
  419. // guaranteed false on error, error only necessary for debugging
  420. // IPVS Proxier relies on ip_vs_* kernel modules and ipset
  421. useIPVSProxy, err := ipvs.CanUseIPVSProxier(khandle, ipsetver)
  422. if err != nil {
  423. // Try to fallback to iptables before falling back to userspace
  424. utilruntime.HandleError(fmt.Errorf("can't determine whether to use ipvs proxy, error: %v", err))
  425. }
  426. if useIPVSProxy {
  427. return proxyModeIPVS
  428. }
  429. // Try to fallback to iptables before falling back to userspace
  430. klog.V(1).Infof("Can't use ipvs proxier, trying iptables proxier")
  431. return tryIPTablesProxy(kcompat)
  432. }
  433. func tryIPTablesProxy(kcompat iptables.KernelCompatTester) string {
  434. // guaranteed false on error, error only necessary for debugging
  435. useIPTablesProxy, err := iptables.CanUseIPTablesProxier(kcompat)
  436. if err != nil {
  437. utilruntime.HandleError(fmt.Errorf("can't determine whether to use iptables proxy, using userspace proxier: %v", err))
  438. return proxyModeUserspace
  439. }
  440. if useIPTablesProxy {
  441. return proxyModeIPTables
  442. }
  443. // Fallback.
  444. klog.V(1).Infof("Can't use iptables proxy, using userspace proxier")
  445. return proxyModeUserspace
  446. }