2 ################################################################################
3 # Copyright (c) 2019,2020 AT&T Intellectual Property. #
5 # Licensed under the Apache License, Version 2.0 (the "License"); #
6 # you may not use this file except in compliance with the License. #
7 # You may obtain a copy of the License at #
9 # http://www.apache.org/licenses/LICENSE-2.0 #
11 # Unless required by applicable law or agreed to in writing, software #
12 # distributed under the License is distributed on an "AS IS" BASIS, #
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. #
14 # See the License for the specific language governing permissions and #
15 # limitations under the License. #
16 ################################################################################
19 # first parameter: number of expected running pods
20 # second parameter: namespace (all-namespaces means all namespaces)
21 # third parameter: [optional] keyword
22 wait_for_pods_running () {
24 CMD="kubectl get pods --all-namespaces "
25 if [ "$NS" != "all-namespaces" ]; then
26 CMD="kubectl get pods -n $2 "
29 if [ "$#" == "3" ]; then
30 KEYWORD="${3}.*Running"
33 CMD2="$CMD | grep \"$KEYWORD\" | wc -l"
34 NUMPODS=$(eval "$CMD2")
35 echo "waiting for $NUMPODS/$1 pods running in namespace [$NS] with keyword [$KEYWORD]"
36 while [ $NUMPODS -lt $1 ]; do
38 NUMPODS=$(eval "$CMD2")
39 echo "> waiting for $NUMPODS/$1 pods running in namespace [$NS] with keyword [$KEYWORD]"
44 # first parameter: interface name
46 # enable ipv6 interface
47 # standard Ubuntu cloud image does not have dual interface configuration or ipv6
49 if ifconfig -a $IPv6IF; then
50 echo "" >> /etc/network/interfaces.d/50-cloud-init.cfg
51 echo "allow-hotplug ${IPv6IF}" >> /etc/network/interfaces.d/50-cloud-init.cfg
52 echo "iface ${IPv6IF} inet6 auto" >> /etc/network/interfaces.d/50-cloud-init.cfg
57 echo "k8s_vm_install.sh"
59 export DEBIAN_FRONTEND=noninteractive
60 echo "__host_private_ip_addr__ $(hostname)" >> /etc/hosts
67 echo "__docker_version__" > /opt/config/docker_version.txt
68 echo "__k8s_version__" > /opt/config/k8s_version.txt
69 echo "__k8s_cni_version__" > /opt/config/k8s_cni_version.txt
70 echo "__helm_version__" > /opt/config/helm_version.txt
71 echo "__host_private_ip_addr__" > /opt/config/host_private_ip_addr.txt
72 echo "__k8s_mst_floating_ip_addr__" > /opt/config/k8s_mst_floating_ip_addr.txt
73 echo "__k8s_mst_private_ip_addr__" > /opt/config/k8s_mst_private_ip_addr.txt
74 echo "__mtu__" > /opt/config/mtu.txt
75 echo "__cinder_volume_id__" > /opt/config/cinder_volume_id.txt
76 echo "__stack_name__" > /opt/config/stack_name.txt
78 # assume we are setting up AUX cluster VM if hostname contains "aux"
80 if [[ $(cat /opt/config/stack_name.txt) == *aux* ]]; then
88 modprobe -- nf_conntrack_ipv4
89 modprobe -- nf_conntrack_ipv6
90 modprobe -- nf_conntrack_proto_sctp
92 if [ ! -z "$IPV6IF" ]; then
97 #SWAPFILES=$(grep swap /etc/fstab | sed '/^[ \t]*#/ d' |cut -f1 -d' ')
98 SWAPFILES=$(grep swap /etc/fstab | sed '/^[ \t]*#/ d' | sed 's/[\t ]/ /g' | tr -s " " | cut -f1 -d' ')
99 if [ ! -z $SWAPFILES ]; then
100 for SWAPFILE in $SWAPFILES
102 if [ ! -z $SWAPFILE ]; then
103 echo "disabling swap file $SWAPFILE"
104 if [[ $SWAPFILE == UUID* ]]; then
105 UUID=$(echo $SWAPFILE | cut -f2 -d'=')
110 sed -i "\%$SWAPFILE%d" /etc/fstab
116 DOCKERV=$(cat /opt/config/docker_version.txt)
117 KUBEV=$(cat /opt/config/k8s_version.txt)
118 KUBECNIV=$(cat /opt/config/k8s_cni_version.txt)
120 KUBEVERSION="${KUBEV}-00"
121 CNIVERSION="${KUBECNIV}-00"
122 DOCKERVERSION="${DOCKERV}"
124 # adjust package version tag
125 UBUNTU_RELEASE=$(lsb_release -r | sed 's/^[a-zA-Z:\t ]\+//g')
126 if [[ ${UBUNTU_RELEASE} == 16.* ]]; then
127 echo "Installing on Ubuntu $UBUNTU_RELEASE (Xenial Xerus) host"
128 if [ ! -z "${DOCKERV}" ]; then
129 DOCKERVERSION="${DOCKERV}-0ubuntu1~16.04.5"
131 elif [[ ${UBUNTU_RELEASE} == 18.* ]]; then
132 echo "Installing on Ubuntu $UBUNTU_RELEASE (Bionic Beaver)"
133 if [ ! -z "${DOCKERV}" ]; then
134 DOCKERVERSION="${DOCKERV}-0ubuntu1~18.04.5"
137 echo "Unsupported Ubuntu release ($UBUNTU_RELEASE) detected. Exit."
142 curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | apt-key add -
143 echo 'deb http://apt.kubernetes.io/ kubernetes-xenial main' > /etc/apt/sources.list.d/kubernetes.list
145 # tell apt to retry 3 times if failed
146 mkdir -p /etc/apt/apt.conf.d
147 echo "APT::Acquire::Retries \"3\";" > /etc/apt/apt.conf.d/80-retries
149 # install low latency kernel, docker.io, and kubernetes
152 RES=$(apt-get install -y virt-what curl jq netcat make 2>&1)
153 if [[ $RES == */var/lib/dpkg/lock* ]]; then
154 echo "Fail to get dpkg lock. Wait for any other package installation"
155 echo "process to finish, then rerun this script"
159 if ! echo $(virt-what) | grep "virtualbox"; then
160 # this version of low latency kernel causes virtualbox VM to hang.
161 # install if identifying the VM not being a virtualbox VM.
162 apt-get install -y linux-image-4.15.0-45-lowlatency
165 APTOPTS="--allow-downgrades --allow-change-held-packages --allow-unauthenticated --ignore-hold "
167 # remove infrastructure stack if present
168 # note the order of the packages being removed.
169 for PKG in kubeadm docker.io; do
170 INSTALLED_VERSION=$(dpkg --list |grep ${PKG} |tr -s " " |cut -f3 -d ' ')
171 if [ ! -z ${INSTALLED_VERSION} ]; then
172 if [ "${PKG}" == "kubeadm" ]; then
175 apt-get -y $APTOPTS remove kubeadm kubelet kubectl kubernetes-cni
177 apt-get -y $APTOPTS remove "${PKG}"
181 apt-get -y autoremove
184 if [ -z ${DOCKERVERSION} ]; then
185 apt-get install -y $APTOPTS docker.io
187 apt-get install -y $APTOPTS docker.io=${DOCKERVERSION}
189 cat > /etc/docker/daemon.json <<EOF
191 "exec-opts": ["native.cgroupdriver=systemd"],
192 "log-driver": "json-file",
196 "storage-driver": "overlay2"
199 mkdir -p /etc/systemd/system/docker.service.d
200 systemctl enable docker.service
201 systemctl daemon-reload
202 systemctl restart docker
204 if [ -z ${CNIVERSION} ]; then
205 apt-get install -y $APTOPTS kubernetes-cni
207 apt-get install -y $APTOPTS kubernetes-cni=${CNIVERSION}
210 if [ -z ${KUBEVERSION} ]; then
211 apt-get install -y $APTOPTS kubeadm kubelet kubectl
213 apt-get install -y $APTOPTS kubeadm=${KUBEVERSION} kubelet=${KUBEVERSION} kubectl=${KUBEVERSION}
216 apt-mark hold docker.io kubernetes-cni kubelet kubeadm kubectl
219 # test access to k8s docker registry
220 kubeadm config images pull --kubernetes-version=${KUBEV}
224 # non-master nodes have hostnames ending with -[0-9][0-9]
225 if [ "$NODETYPE" == "master" ]; then
226 # below are steps for initializating master node, only run on the master node.
227 # minion node join will be triggered from the caller of the stack creation as ssh command.
229 # create kubenetes config file
230 if [[ ${KUBEV} == 1.13.* ]]; then
231 cat <<EOF >/root/config.yaml
232 apiVersion: kubeadm.k8s.io/v1alpha3
233 kubernetesVersion: v${KUBEV}
234 kind: ClusterConfiguration
236 feature-gates: SCTPSupport=true
238 dnsDomain: cluster.local
239 podSubnet: 10.244.0.0/16
240 serviceSubnet: 10.96.0.0/12
242 apiVersion: kubeproxy.config.k8s.io/v1alpha1
243 kind: KubeProxyConfiguration
247 elif [[ ${KUBEV} == 1.14.* ]]; then
248 cat <<EOF >/root/config.yaml
249 apiVersion: kubeadm.k8s.io/v1beta1
250 kubernetesVersion: v${KUBEV}
251 kind: ClusterConfiguration
253 feature-gates: SCTPSupport=true
255 dnsDomain: cluster.local
256 podSubnet: 10.244.0.0/16
257 serviceSubnet: 10.96.0.0/12
259 apiVersion: kubeproxy.config.k8s.io/v1alpha1
260 kind: KubeProxyConfiguration
263 elif [[ ${KUBEV} == 1.16.* ]]; then
264 cat <<EOF >/root/config.yaml
265 apiVersion: kubeadm.k8s.io/v1beta2
266 kubernetesVersion: v${KUBEV}
267 kind: ClusterConfiguration
270 feature-gates: SCTPSupport=true
272 dnsDomain: cluster.local
273 podSubnet: 10.244.0.0/16
274 serviceSubnet: 10.96.0.0/12
276 apiVersion: kubeproxy.config.k8s.io/v1alpha1
277 kind: KubeProxyConfiguration
281 echo "Unsupported Kubernetes version requested. Bail."
285 # create a RBAC file for helm (tiller)
286 cat <<EOF > /root/rbac-config.yaml
291 namespace: kube-system
293 apiVersion: rbac.authorization.k8s.io/v1
294 kind: ClusterRoleBinding
298 apiGroup: rbac.authorization.k8s.io
302 - kind: ServiceAccount
304 namespace: kube-system
308 # start cluster (make sure CIDR is enabled with the flag)
309 kubeadm init --config /root/config.yaml
311 # set up kubectl credential and config
315 cp -i /etc/kubernetes/admin.conf /root/.kube/config
316 chown root:root /root/.kube/config
317 export KUBECONFIG=/root/.kube/config
319 # at this point we should be able to use kubectl
320 kubectl get pods --all-namespaces
323 kubectl apply -f "https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml"
325 # waiting for all 8 kube-system pods to be in running state
326 # (at this point, minions have not joined yet)
327 wait_for_pods_running 8 kube-system
329 # if running a single node cluster, need to enable master node to run pods
330 kubectl taint nodes --all node-role.kubernetes.io/master-
333 HELMV=$(cat /opt/config/helm_version.txt)
335 if [ ! -e helm-v${HELMVERSION}-linux-amd64.tar.gz ]; then
336 wget https://storage.googleapis.com/kubernetes-helm/helm-v${HELMVERSION}-linux-amd64.tar.gz
338 cd /root && rm -rf Helm && mkdir Helm && cd Helm
339 tar -xvf ../helm-v${HELMVERSION}-linux-amd64.tar.gz
340 mv linux-amd64/helm /usr/local/bin/helm
343 # install RBAC for Helm
344 kubectl create -f rbac-config.yaml
347 if [[ ${KUBEV} == 1.16.* ]]; then
348 # helm init uses API extensions/v1beta1 which is depreciated by Kubernetes
349 # 1.16.0. Until upstream (helm) provides a fix, this is the work-around.
350 helm init --service-account tiller --override spec.selector.matchLabels.'name'='tiller',spec.selector.matchLabels.'app'='helm' --output yaml > /tmp/helm-init.yaml
351 sed 's@apiVersion: extensions/v1beta1@apiVersion: apps/v1@' /tmp/helm-init.yaml > /tmp/helm-init-patched.yaml
352 kubectl apply -f /tmp/helm-init-patched.yaml
354 helm init --service-account tiller
357 export HELM_HOME="/root/.helm"
359 # waiting for tiller pod to be in running state
360 while ! helm version; do
361 echo "Waiting for Helm to be ready"
365 echo "Preparing a master node (lowser ID) for using local FS for PV"
366 PV_NODE_NAME=$(kubectl get nodes |grep master | cut -f1 -d' ' | sort | head -1)
367 kubectl label --overwrite nodes $PV_NODE_NAME local-storage=enable
368 if [ "$PV_NODE_NAME" == "$(hostname)" ]; then
369 mkdir -p /opt/data/dashboard-data
372 echo "Done with master node setup"
376 # add rancodev CI tool hostnames
377 if [[ ! -z "${__RUNRICENV_GERRIT_IP__}" && ! -z "${__RUNRICENV_GERRIT_HOST__}" ]]; then
378 echo "${__RUNRICENV_GERRIT_IP__} ${__RUNRICENV_GERRIT_HOST__}" >> /etc/hosts
380 if [[ ! -z "${__RUNRICENV_DOCKER_IP__}" && ! -z "${__RUNRICENV_DOCKER_HOST__}" ]]; then
381 echo "${__RUNRICENV_DOCKER_IP__} ${__RUNRICENV_DOCKER_HOST__}" >> /etc/hosts
383 if [[ ! -z "${__RUNRICENV_HELMREPO_IP__}" && ! -z "${__RUNRICENV_HELMREPO_HOST__}" ]]; then
384 echo "${__RUNRICENV_HELMREPO_IP__} ${__RUNRICENV_HELMREPO_HOST__}" >> /etc/hosts
387 if [[ "${__RUNRICENV_HELMREPO_CERT_LEN__}" -gt "100" ]]; then
388 cat <<EOF >/etc/ca-certificates/update.d/helm.crt
389 ${__RUNRICENV_HELMREPO_CERT__}
393 # add cert for accessing docker registry in Azure
394 if [[ "${__RUNRICENV_DOCKER_CERT_LEN__}" -gt "100" ]]; then
395 mkdir -p /etc/docker/certs.d/${__RUNRICENV_DOCKER_HOST__}:${__RUNRICENV_DOCKER_PORT__}
396 cat <<EOF >/etc/docker/ca.crt
397 ${__RUNRICENV_DOCKER_CERT__}
399 cp /etc/docker/ca.crt /etc/docker/certs.d/${__RUNRICENV_DOCKER_HOST__}:${__RUNRICENV_DOCKER_PORT__}/ca.crt
401 service docker restart
402 systemctl enable docker.service
403 docker login -u ${__RUNRICENV_DOCKER_USER__} -p ${__RUNRICENV_DOCKER_PASS__} ${__RUNRICENV_DOCKER_HOST__}:${__RUNRICENV_DOCKER_PORT__}
404 docker pull ${__RUNRICENV_DOCKER_HOST__}:${__RUNRICENV_DOCKER_PORT__}/whoami:0.0.1
407 if [ "$(uname -r)" != "4.15.0-45-lowlatency" ]; then reboot; fi