Getting started with Kubernetes
One of the Flatcar purposes is to run container workloads, this term is quite generic: it goes from running a single Docker container to operate a Kubernetes cluster.
This documentation will cover preliminary aspects of operating Kubernetes cluster based on Flatcar.
Supported Kubernetes version
A Kubernetes basic scenario (deploy a simple Nginx) is being tested on Flatcar accross the channels and various CNIs, it mainly ensures that Kubernetes can be correctly installed and can operate in a simple way.
One way to contribute to Flatcar would be to extend the covered CNIs (example: kubenet ) or to provide more complex scenarios (example: cilium extension ).
This is a compatibility matrix between Flatcar and Kubernetes deployed using vanilla components and Flatcar provided software:
| ⬇️ Flatcar channel \ Kubernetes Version ➡️ | 1.23 | 1.24 | 1.25 | 1.26 | 1.27 | 1.28 |
|---|---|---|---|---|---|---|
| Alpha | 🔶 | 🔶 | ✅ | ✅ | ✅ | ✅ |
| Beta | 🔶 | 🔶 | ✅ | ✅ | ✅ | ✅ |
| Stable | 🔶 | 🔶 | ✅ | ✅ | ✅ | ✅ |
| LTS | 🔶 | 🔶 | ✅ | ❌ | ❌ | ❌ |
🔶: The version is not tested anymore before a release but was known for working.
Tested CNIs:
- Cilium
- Flannel
- Calico
Known issues:
- Flannel > 0.17.0 does not work with enforced SELinux ( flatcar#779 )
- Cilium needs to be patched regarding SELinux labels to work (even in permissive mode) ( flatcar#891 )
Deploy a Kubernetes cluster with Flatcar
Using Kubeadm
kubeadm remains one standard way to quickly deploy and operate a Kubernetes cluster. It’s possible to install the tools (kubeadm, kubelet, etc.) using Ignition or directly with the Kubernetes sysext image distributed from the
flatcar/sysext-bakery
release page.
Setup the control plane
Here are two examples to setup a control plane with Butane . The first example is using the systemd-sysext approach to bring in the binaries and update them through systemd-sysupdate. The second approach fetches the binaries but has no way of updating them in-place.
---
version: 1.0.0
variant: flatcar
storage:
links:
- target: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw
path: /etc/extensions/kubernetes.raw
hard: false
files:
- path: /etc/sysupdate.kubernetes.d/kubernetes.conf
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/kubernetes.conf
- path: /etc/sysupdate.d/noop.conf
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/noop.conf
- path: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/kubernetes-v1.27.4-x86-64.raw
systemd:
units:
- name: systemd-sysupdate.timer
enabled: true
- name: systemd-sysupdate.service
dropins:
- name: kubernetes.conf
contents: |
[Service]
ExecStartPre=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes"
ExecStartPre=/usr/lib/systemd/systemd-sysupdate -C kubernetes update
ExecStartPost=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes-new"
ExecStartPost=/usr/bin/sh -c "[[ $(cat /tmp/kubernetes) != $(cat /tmp/kubernetes-new) ]] && touch /run/reboot-required"
- name: kubeadm.service
enabled: true
contents: |
[Unit]
Description=Kubeadm service
Requires=containerd.service
After=containerd.service
ConditionPathExists=!/etc/kubernetes/kubelet.conf
[Service]
ExecStartPre=/usr/bin/kubeadm init
ExecStartPre=/usr/bin/mkdir /home/core/.kube
ExecStartPre=/usr/bin/cp /etc/kubernetes/admin.conf /home/core/.kube/config
ExecStart=/usr/bin/chown -R core:core /home/core/.kube
[Install]
WantedBy=multi-user.target
---
version: 1.0.0
variant: flatcar
storage:
files:
- path: /opt/bin/kubectl
mode: 0755
contents:
source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubectl
- path: /opt/bin/kubeadm
mode: 0755
contents:
source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubeadm
- path: /opt/bin/kubelet
mode: 0755
contents:
source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubelet
- path: /etc/systemd/system/kubelet.service
contents:
source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubelet/lib/systemd/system/kubelet.service
- path: /etc/systemd/system/kubelet.service.d/10-kubeadm.conf
contents:
source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubeadm/10-kubeadm.conf
- path: /etc/kubeadm.yml
contents:
inline: |
apiVersion: kubeadm.k8s.io/v1beta2
kind: InitConfiguration
nodeRegistration:
kubeletExtraArgs:
volume-plugin-dir: "/opt/libexec/kubernetes/kubelet-plugins/volume/exec/"
---
apiVersion: kubeadm.k8s.io/v1beta2
kind: ClusterConfiguration
controllerManager:
extraArgs:
flex-volume-plugin-dir: "/opt/libexec/kubernetes/kubelet-plugins/volume/exec/"
systemd:
units:
- name: kubelet.service
enabled: true
dropins:
- name: 20-kubelet.conf
contents: |
[Service]
ExecStart=
ExecStart=/opt/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_CONFIG_ARGS $KUBELET_KUBEADM_ARGS $KUBELET_EXTRA_ARGS
- name: kubeadm.service
enabled: true
contents: |
[Unit]
Description=Kubeadm service
Requires=containerd.service
After=containerd.service
ConditionPathExists=!/etc/kubernetes/kubelet.conf
[Service]
Environment="PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/opt/bin"
ExecStartPre=/opt/bin/kubeadm config images pull
ExecStartPre=/opt/bin/kubeadm init --config /etc/kubeadm.yml
ExecStartPre=/usr/bin/mkdir /home/core/.kube
ExecStartPre=/usr/bin/cp /etc/kubernetes/admin.conf /home/core/.kube/config
ExecStart=/usr/bin/chown -R core:core /home/core/.kube
[Install]
WantedBy=multi-user.target
This minimal configuration can be used with Flatcar on QEMU (⚠️ be sure that the instance has enough memory: 4096mb is good).
butane < config.yaml > config.json
./flatcar_production_qemu.sh -i config.json -- -display curses
kubectl get nodes
NAME STATUS ROLES AGE VERSION
localhost NotReady control-plane 6m5s v1.26.0
The control plane will appear has non-ready until a CNI is deployed, here’s an example with calico:
kubectl \
apply -f https://raw.githubusercontent.com/projectcalico/calico/v3.24.1/manifests/calico.yaml
kubectl get nodes
NAME STATUS ROLES AGE VERSION
localhost Ready control-plane 8m30s v1.26.0
If you want to coordinate the nodes reboot when there is a new Kubernetes sysext image or a Flatcar update, you can deploy
Kured
:
latest=$(curl -s https://api.github.com/repos/kubereboot/kured/releases | jq -r '.[0].tag_name')
kubectl apply -f "https://github.com/kubereboot/kured/releases/download/$latest/kured-$latest-dockerhub.yaml"
We can now prepare the nodes to join the cluster.
Setup the nodes
Here’s are two examples for a butane configuration to setup the nodes. The first example is using the systemd-sysext approach to bring in the binaries and update them through systemd-sysupdate. The second approach fetches the binaries but has no way of updating them in-place.
---
version: 1.0.0
variant: flatcar
storage:
links:
- target: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw
path: /etc/extensions/kubernetes.raw
hard: false
files:
- path: /etc/sysupdate.kubernetes.d/kubernetes.conf
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/kubernetes.conf
- path: /etc/sysupdate.d/noop.conf
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/noop.conf
- path: /opt/extensions/kubernetes/kubernetes-v1.27.4-x86-64.raw
contents:
source: https://github.com/flatcar/sysext-bakery/releases/download/20230901/kubernetes-v1.27.4-x86-64.raw
systemd:
units:
- name: systemd-sysupdate.timer
enabled: true
- name: systemd-sysupdate.service
dropins:
- name: kubernetes.conf
contents: |
[Service]
ExecStartPre=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes"
ExecStartPre=/usr/lib/systemd/systemd-sysupdate -C kubernetes update
ExecStartPost=/usr/bin/sh -c "readlink --canonicalize /etc/extensions/kubernetes.raw > /tmp/kubernetes-new"
ExecStartPost=/usr/bin/sh -c "[[ $(cat /tmp/kubernetes) != $(cat /tmp/kubernetes-new) ]] && touch /run/reboot-required"
- name: kubeadm.service
enabled: true
contents: |
[Unit]
Description=Kubeadm service
Requires=containerd.service
After=containerd.service
[Service]
ExecStart=/usr/bin/kubeadm join $(output from 'kubeadm token create --print-join-command')
[Install]
WantedBy=multi-user.target
---
version: 1.0.0
variant: flatcar
storage:
files:
- path: /opt/bin/kubeadm
mode: 0755
contents:
source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubeadm
- path: /opt/bin/kubelet
mode: 0755
contents:
source: https://dl.k8s.io/v1.26.0/bin/linux/amd64/kubelet
- path: /etc/systemd/system/kubelet.service
contents:
source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubelet/lib/systemd/system/kubelet.service
- path: /etc/systemd/system/kubelet.service.d/10-kubeadm.conf
contents:
source: https://raw.githubusercontent.com/kubernetes/release/v0.14.0/cmd/kubepkg/templates/latest/deb/kubeadm/10-kubeadm.conf
systemd:
units:
- name: kubelet.service
enabled: true
dropins:
- name: 20-kubelet.conf
contents: |
[Service]
ExecStart=
ExecStart=/opt/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_CONFIG_ARGS $KUBELET_KUBEADM_ARGS $KUBELET_EXTRA_ARGS
- name: kubeadm.service
enabled: true
contents: |
[Unit]
Description=Kubeadm service
Requires=containerd.service
After=containerd.service
[Service]
Environment="PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/opt/bin"
ExecStart=/opt/bin/kubeadm join $(output from 'kubeadm token create --print-join-command')
[Install]
WantedBy=multi-user.target
This method is far from being ideal in terms of infrastructure as code as it requires a two steps manipulation: create the control plane to generate the join configuration then pass that configuration to the nodes. Other solutions exist to make things easier, like Cluster API or Typhoon .
Switching from Docker to containerd for Kubernetes
In Kubernetes v1.20, dockershim was deprecated and it has been
officially
removed in Kubernetes v1.24.
The containerd CRI plugin is enabled by default and you can use containerd for Kubernetes while still allowing Docker to function.
Recent Kubernetes versions will prefer containerd over Docker automatically on recent Flatcar versions.
If you run kubelet in a Docker container, make sure it has access
to the following directories on the host file system:
/run/docker/libcontainerd//run/containerd//var/lib/containerd/
And that it has access to the following binaries on the host file system and that they are included in PATH:
- For Flatcar releases until major version 3760:
/run/torcx/unpack/docker/bin/containerd-shim-runc-v1/run/torcx/unpack/docker/bin/containerd-shim-runc-v2
- For Flatcar releases above major version 3760:
/usr/bin/containerd-shim-runc-v1/usr/bin/containerd-shim-runc-v2
Finally, tell kubelet to use containerd by adding to it the following flags:
--container-runtime=remote--container-runtime-endpoint=unix:///run/containerd/containerd.sock
Cluster API
From the official documentation :
Cluster API is a Kubernetes sub-project focused on providing declarative APIs and tooling to simplify provisioning, upgrading, and operating multiple Kubernetes clusters.
As it requires to have some tools already installed on the OS to work correcly with CAPI, Flatcar images can be built using the image-builder project.
While CAPI is an evolving project and Flatcar support is in-progress regarding the various providers, here’s the current list of supported providers:
Kubespray
Kubespray is an open-source project used to deploy production ready Kubernetes cluster, learn more about it on the documentation .
Based on users feedback, Flatcar is known to work with Kubespray - you can read more about it in this section: https://kubespray.io/#/docs/flatcar .