Getting started with Kubernetes
One of the Flatcar purposes is to run container workloads, this term is quite generic: it goes from running a single Docker container to operate a Kubernetes cluster.
This documentation will cover preliminary aspects of operating Kubernetes cluster based on Flatcar.
Supported Kubernetes version
A Kubernetes basic scenario (deploy a simple Nginx) is being tested on Flatcar accross the channels and various CNIs, it mainly ensures that Kubernetes can be correctly installed and can operate in a simple way.
One way to contribute to Flatcar would be to extend the covered CNIs (example: kubenet ) or to provide more complex scenarios (example: cilium extension ).
This is a compatibility matrix between Flatcar and Kubernetes deployed using vanilla components and Flatcar provided software:
⬇️ Flatcar channel \ Kubernetes Version ➡️ | 1.26 | 1.27 | 1.28 | 1.29 | 1.30 | 1.31 |
---|---|---|---|---|---|---|
Alpha | 🔶 | 🔶 | 🔶 | ✅ | ✅ | ✅ |
Beta | 🔶 | 🔶 | 🔶 | ✅ | ✅ | ✅ |
Stable | 🔶 | 🔶 | 🔶 | ✅ | ✅ | ✅ |
LTS (2023) | 🔶 | 🔶 | 🔶 | ✅ | ✅ | ✅ |
🔶: The version is not tested anymore before a release but was known for working.
Tested CNIs:
- Cilium
- Flannel
- Calico
Known issues:
- Flannel > 0.17.0 does not work with enforced SELinux ( flatcar#779 )
Deploy a Kubernetes cluster with Flatcar
Using Kubeadm
kubeadm
remains one standard way to quickly deploy and operate a Kubernetes cluster. It’s possible to install the tools (kubeadm
, kubelet
, etc.) using Ignition or directly with the Kubernetes sysext image distributed from the
flatcar/sysext-bakery
release page.
Setup the control plane
Here are two examples to setup a control plane with Butane . The first example is using the systemd-sysext approach to bring in the binaries and update them through systemd-sysupdate. The second approach fetches the binaries but has no way of updating them in-place.
--- version: 1.0.0 variant: flatcar storage: links: - target: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw path: /etc/extensions/kubernetes.raw hard: false files: - path: /etc/sysupdate.kubernetes.d/kubernetes-v1.27.conf contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.27.conf - path: /etc/sysupdate.d/noop.conf contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/noop.conf - path: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.27.4-x86-64.raw systemd: units: - name: systemd-sysupdate.timer enabled: true - name: systemd-sysupdate.service dropins: - name: kubernetes.conf contents: | [Service] ExecStartPre=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes" ExecStartPre=/usr/lib/systemd/systemd-sysupdate -C kubernetes update ExecStartPost=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes-new" ExecStartPost=/usr/bin/sh -c "if ! cmp --silent /tmp/kubernetes /tmp/kubernetes-new; then touch /run/reboot-required; fi" - name: locksmithd.service # NOTE: To coordinate the node reboot in this context, we recommend to use Kured. mask: true - name: kubeadm.service enabled: true contents: | [Unit] Description=Kubeadm service Requires=containerd.service After=containerd.service ConditionPathExists=!/etc/kubernetes/kubelet.conf [Service] ExecStartPre=/usr/bin/kubeadm init ExecStartPre=/usr/bin/mkdir /home/core/.kube ExecStartPre=/usr/bin/cp /etc/kubernetes/admin.conf /home/core/.kube/config ExecStart=/usr/bin/chown -R core:core /home/core/.kube [Install] WantedBy=multi-user.target
--- version: 1.0.0 variant: flatcar storage: files: - path: /opt/bin/kubectl mode: 0755 contents: source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubectl - path: /opt/bin/kubeadm mode: 0755 contents: source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubeadm - path: /opt/bin/kubelet mode: 0755 contents: source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubelet - path: /etc/systemd/system/kubelet.service contents: source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubelet/lib/systemd/system/kubelet.service - path: /etc/systemd/system/kubelet.service.d/10-kubeadm.conf contents: source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubeadm/10-kubeadm.conf - path: /etc/kubeadm.yml contents: inline: | apiVersion: kubeadm.k8s.io/v1beta2 kind: InitConfiguration nodeRegistration: kubeletExtraArgs: volume-plugin-dir: "/opt/libexec/kubernetes/kubelet-plugins/volume/exec/" --- apiVersion: kubeadm.k8s.io/v1beta2 kind: ClusterConfiguration controllerManager: extraArgs: flex-volume-plugin-dir: "/opt/libexec/kubernetes/kubelet-plugins/volume/exec/" systemd: units: - name: kubelet.service enabled: true dropins: - name: 20-kubelet.conf contents: | [Service] ExecStart= ExecStart=/opt/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_CONFIG_ARGS $KUBELET_KUBEADM_ARGS $KUBELET_EXTRA_ARGS - name: kubeadm.service enabled: true contents: | [Unit] Description=Kubeadm service Requires=containerd.service After=containerd.service ConditionPathExists=!/etc/kubernetes/kubelet.conf [Service] Environment="PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/opt/bin" ExecStartPre=/opt/bin/kubeadm config images pull ExecStartPre=/opt/bin/kubeadm init --config /etc/kubeadm.yml ExecStartPre=/usr/bin/mkdir /home/core/.kube ExecStartPre=/usr/bin/cp /etc/kubernetes/admin.conf /home/core/.kube/config ExecStart=/usr/bin/chown -R core:core /home/core/.kube [Install] WantedBy=multi-user.target
This minimal configuration can be used with Flatcar on QEMU (⚠️ be sure that the instance has enough memory: 4096mb is good).
butane < config.yaml > config.json
./flatcar_production_qemu.sh -i config.json -- -display curses
kubectl get nodes
NAME STATUS ROLES AGE VERSION
localhost NotReady control-plane 6m5s v1.26.0
The control plane will appear has non-ready until a CNI is deployed, here’s an example with calico:
kubectl \
apply -f https://raw.githubusercontent.com/projectcalico/calico/v3.24.1/manifests/calico.yaml
kubectl get nodes
NAME STATUS ROLES AGE VERSION
localhost Ready control-plane 8m30s v1.26.0
If you want to coordinate the nodes reboot when there is a new Kubernetes sysext image or a Flatcar update, you can deploy
Kured
:
latest=$(curl -s https://api.github.com/repos/kubereboot/kured/releases | jq -r '.[0].tag_name')
kubectl apply -f "https://github.com/kubereboot/kured/releases/download/$latest/kured-$latest-dockerhub.yaml"
We can now prepare the nodes to join the cluster.
Setup the nodes
Here’s are two examples for a butane configuration to setup the nodes. The first example is using the systemd-sysext approach to bring in the binaries and update them through systemd-sysupdate. The second approach fetches the binaries but has no way of updating them in-place.
--- version: 1.0.0 variant: flatcar storage: links: - target: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw path: /etc/extensions/kubernetes.raw hard: false files: - path: /etc/sysupdate.kubernetes.d/kubernetes-v1.27.conf contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.27.conf - path: /etc/sysupdate.d/noop.conf contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/noop.conf - path: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw contents: source: https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.27.4-x86-64.raw systemd: units: - name: systemd-sysupdate.timer enabled: true - name: systemd-sysupdate.service dropins: - name: kubernetes.conf contents: | [Service] ExecStartPre=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes" ExecStartPre=/usr/lib/systemd/systemd-sysupdate -C kubernetes update ExecStartPost=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes-new" ExecStartPost=/usr/bin/sh -c "if ! cmp --silent /tmp/kubernetes /tmp/kubernetes-new; then touch /run/reboot-required; fi" - name: locksmithd.service # NOTE: To coordinate the node reboot in this context, we recommend to use Kured. mask: true - name: kubeadm.service enabled: true contents: | [Unit] Description=Kubeadm service Requires=containerd.service After=containerd.service ConditionPathExists=!/etc/kubernetes/kubelet.conf [Service] ExecStart=/usr/bin/kubeadm join $(output from 'kubeadm token create --print-join-command') [Install] WantedBy=multi-user.target
--- version: 1.0.0 variant: flatcar storage: files: - path: /opt/bin/kubeadm mode: 0755 contents: source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubeadm - path: /opt/bin/kubelet mode: 0755 contents: source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubelet - path: /etc/systemd/system/kubelet.service contents: source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubelet/lib/systemd/system/kubelet.service - path: /etc/systemd/system/kubelet.service.d/10-kubeadm.conf contents: source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubeadm/10-kubeadm.conf systemd: units: - name: kubelet.service enabled: true dropins: - name: 20-kubelet.conf contents: | [Service] ExecStart= ExecStart=/opt/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_CONFIG_ARGS $KUBELET_KUBEADM_ARGS $KUBELET_EXTRA_ARGS - name: kubeadm.service enabled: true contents: | [Unit] Description=Kubeadm service Requires=containerd.service After=containerd.service ConditionPathExists=!/etc/kubernetes/kubelet.conf [Service] Environment="PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/opt/bin" ExecStart=/opt/bin/kubeadm join $(output from 'kubeadm token create --print-join-command') [Install] WantedBy=multi-user.target
This method is far from being ideal in terms of infrastructure as code as it requires a two steps manipulation: create the control plane to generate the join configuration then pass that configuration to the nodes. Other solutions exist to make things easier, like Cluster API or Typhoon .
Switching from Docker to containerd for Kubernetes
In Kubernetes v1.20, dockershim
was deprecated and it has been
officially
removed in Kubernetes v1.24.
The containerd
CRI plugin is enabled by default and you can use containerd for Kubernetes while still allowing Docker to function.
Recent Kubernetes versions will prefer containerd over Docker automatically on recent Flatcar versions.
If you run kubelet
in a Docker container, make sure it has access
to the following directories on the host file system:
/run/docker/libcontainerd/
/run/containerd/
/var/lib/containerd/
And that it has access to the following binaries on the host file system and that they are included in PATH
:
- For Flatcar releases until major version 3760:
/run/torcx/unpack/docker/bin/containerd-shim-runc-v1
/run/torcx/unpack/docker/bin/containerd-shim-runc-v2
- For Flatcar releases above major version 3760:
/usr/bin/containerd-shim-runc-v1
/usr/bin/containerd-shim-runc-v2
Finally, tell kubelet
to use containerd by adding to it the following flags:
--container-runtime=remote
--container-runtime-endpoint=unix:///run/containerd/containerd.sock
Cluster API
From the official documentation :
Cluster API is a Kubernetes sub-project focused on providing declarative APIs and tooling to simplify provisioning, upgrading, and operating multiple Kubernetes clusters.
As it requires to have some tools already installed on the OS to work correcly with CAPI, Flatcar images can be built using the image-builder project.
While CAPI is an evolving project and Flatcar support is in-progress regarding the various providers, here’s the current list of supported providers:
Kubespray
Kubespray is an open-source project used to deploy production ready Kubernetes cluster, learn more about it on the documentation .
Based on users feedback, Flatcar is known to work with Kubespray - you can read more about it in this section: https://kubespray.io/#/docs/flatcar .