Skip to content

Latest commit

 

History

History
164 lines (126 loc) · 4.31 KB

tmp.md

File metadata and controls

164 lines (126 loc) · 4.31 KB
  • name: "etcd证书" gather_facts: no hosts: all roles:
    • { role: cert, csr_file: "etcd-csr.json", cert_dir: "{{cert_etcd_dir}}",cert_name: "etcd" } tags:
    • cert_etcd
sudo mkdir -p /root/local/bin
sudo cp /vagrant/environment.sh /root/local/bin

wget https://pkg.cfssl.org/R1.2/cfssl_linux-amd64
chmod +x cfssl_linux-amd64
sudo mv cfssl_linux-amd64 /root/local/bin/cfssl

wget https://pkg.cfssl.org/R1.2/cfssljson_linux-amd64
chmod +x cfssljson_linux-amd64
sudo mv cfssljson_linux-amd64 /root/local/bin/cfssljson

wget https://pkg.cfssl.org/R1.2/cfssl-certinfo_linux-amd64
chmod +x cfssl-certinfo_linux-amd64
sudo mv cfssl-certinfo_linux-amd64 /root/local/bin/cfssl-certinfo

export PATH=/root/local/bin:$PATH
mkdir ssl
cd ssl
cfssl print-defaults config > config.json
cfssl print-defaults csr > csr.json
cat > ca-config.json << EOF
{
  "signing": {
    "default": {
      "expiry": "8760h"
    },
    "profiles": {
      "kubernetes": {
        "usages": [
            "signing",
            "key encipherment",
            "server auth",
            "client auth"
        ],
        "expiry": "8760h"
      }
    }
  }
}
EOF
cat > ca-csr.json << EOF
{
  "CN": "kubernetes",
  "key": {
    "algo": "rsa",
    "size": 2048
  },
  "names": [
    {
      "C": "CN",
      "ST": "BeiJing",
      "L": "BeiJing",
      "O": "k8s",
      "OU": "System"
    }
  ]
}
EOF
cfssl gencert -initca ca-csr.json | cfssljson -bare ca
sudo mkdir -p /etc/kubernetes/ssl
sudo cp ca* /etc/kubernetes/ssl

etcd每个机器的证书都不一样

for ip in 192.168.100.101 192.168.100.102 192.168.100.103; do ETCDCTL_API=3 /usr/local/bin/etcdctl
endpoint health; done

sudo systemctl daemon-reload sudo systemctl restart etcd

sudo systemctl stop etcd

sudo /usr/local/bin/etcd
--name=etcd_node-2
--cert-file=/etc/etcd/ssl/etcd.pem
--key-file=/etc/etcd/ssl/etcd-key.pem
--peer-cert-file=/etc/etcd/ssl/etcd.pem
--peer-key-file=/etc/etcd/ssl/etcd-key.pem
--trusted-ca-file=/etc/kubernetes/ssl/ca.pem
--peer-trusted-ca-file=/etc/kubernetes/ssl/ca.pem
--initial-advertise-peer-urls=https://192.168.100.102:2380
--listen-peer-urls=https://192.168.100.102:2380
--listen-client-urls=https://192.168.100.102:2379,http://1··· 27.0.0.1:2379
--advertise-client-urls=https://192.168.100.102:2379
--initial-cluster-token=etcd-cluster-1
--initial-cluster=etcd_node-1=https://192.168.100.101:2380,etcd_node-2=https://192.168.100.102:2380,etcd_node-3=https://192.168.100.103:2380
--initial-cluster-state=new
--data-dir=/var/lib/etcd

sudo /usr/local/bin/etcdctl
--ca-file=/etc/kubernetes/ssl/ca.pem
set /kubernetes/network/config '{ "Network": "10.0.0.0/16" }'

sudo /usr/local/bin/etcdctl
--ca-file=/etc/kubernetes/ssl/ca.pem
get /kubernetes/network/config

/usr/local/bin/kubectl config set-cluster kubernetes
--certificate-authority=/etc/kubernetes/ssl/ca.pem
--embed-certs=true
--server=https://192.168.100.101:6443

/usr/local/bin/kubectl config set-credentials admin
--client-certificate=/etc/kubernetes/ssl/admin.pem
--embed-certs=true
--client-key=/etc/kubernetes/ssl/admin-key.pem

/usr/local/bin/kubectl config set-context kubernetes
--cluster=kubernetes
--user=admin

/usr/local/bin/kubectl config use-context kubernetes

https https https malformed HTTP response "\x15\x03\x01\x00\x02\x02\x16

export PATH=$PATH:/usr/local/bin

https://raw.githubusercontent.com/kubernetes/dashboard/master/src/deploy/recommended/kubernetes-dashboard.yaml

wget https://192.168.100.101:6443 --ca-certificate ca.pem --certificate admin.pem --private-key admin-key.pem -q -O -

openssl pkcs12 -export -inkey /etc/kubernetes/ssl/admin-key.pem -in /etc/kubernetes/ssl/admin.pem -passin pass: -out admin.p12 -passout pass:

openssl pkcs12 -export -inkey /etc/kubernetes/ssl/admin-key.pem -in /etc/kubernetes/ssl/admin.pem -out admin.p12 kubectl -n kube-system get secret kubectl -n kube-system describe secret kubectl -n kube-system get secret|grep kubernetes-dashboard-token|awk '{print $1}' kubectl -n kube-system get secret|grep kubernetes-dashboard-token|awk '{print $1}'

https://github.com/kubernetes/heapster/releases

openssl pkcs12 -export -cacerts -inkey ca-key.pem -in ca.pem -out ca.p12

sudo /usr/local/bin/docker images|awk '{print "sudo /usr/local/bin/docker save -o",$1":"$2".tar",$1":"$2}'