《kubernetes-1.8.0》11-addon-Harbor

《kubernetes-1.8.0》11-addon-Harbor

《kubernetes 1.8.0 测试环境安装部署》

时间:2017-11-27

一、环境准备

docker版本:1.17
docker-compose版本:1.17

安装docker-compose

curl -L https://github.com/docker/compose/releases/download/1.17.1/docker-compose-`uname -s`-`uname -m` -o /usr/local/bin/docker-compose
chmod +x /usr/local/bin/docker-compose

从harbor 发布页面下载最新的harbor offline安装包(当前版本v1.3.0-rc1):

wget  --continue http://harbor.orientsoft.cn/harbor-v1.3.0-rc1/harbor-offline-installer-v1.3.0-rc1.tgz

1.3.0开始建议去镜像站下载,嗷嗷快

解压tarball,并加载镜像:

$ tar -zxvf harbor-offline-installer-v1.3.0-rc1.tgz 
$ cd harbor
$ docker load -i harbor.v1.3.0-rc1.tar.gz

创建harbor所需证书:

签名请求:

$ cat > harbor-csr.json <<EOF
{"CN": "harbor","hosts": ["127.0.0.1","172.18.169.134"],"key": {"algo": "rsa","size": 2048},"names": [{"C": "CN","ST": "BeiJing","L": "BeiJing","O": "k8s","OU": "System"}]
}
EOF
  • "hosts":本例中改字段使用ip,实际测试环境中使用的是域名,方便外网使用。

创建证书和秘钥:

由于是在node节点上部署,使用k8s根ca做签名,因此沿用原有k8s ca根证书,重新创建或者从master节点上拷贝k8s-gencert.json(配置文件) 以及ca证书和key(签完后删除)

 scp /etc/kubernetes/ssl/k8s-root-ca-key.pem root@172.18.169.134:/etc/kubernetes/ssl/
cat > /etc/kubernetes/ssl/k8s-gencert.json  << EOF
{"signing": {"default": {"expiry": "87600h"},"profiles": {"kubernetes": {"usages": ["signing","key encipherment","server auth","client auth"],"expiry": "87600h"}}}
}
EOF

创建证书秘钥:

$ cfssl gencert -ca=/etc/kubernetes/ssl/k8s-root-ca.pem \-ca-key=/etc/kubernetes/ssl/k8s-root-ca-key.pem \-config=/etc/kubernetes/ssl/k8s-gencert.json \-profile=kubernetes harbor-csr.json | cfssljson -bare harbor
$ ls harbor*
harbor.csr  harbor-csr.json  harbor-key.pem harbor.pem
$ sudo mkdir -p /etc/harbor/ssl
$ sudo mv harbor*.pem /etc/harbor/ssl
$ rm /etc/kubernetes/ssl/k8s-root-ca-key.pem 
$ rm harbor.csr  harbor-csr.json

二、部署harbor

修改harbor.cfg 文件

$ vi harbor.cfg修改一下参数hostname = 172.18.169.134 
ui_url_protocol = https 
ssl_cert = /etc/harbor/ssl/harbor.pem
ssl_cert_key = /etc/harbor/ssl/harbor-key.pem

加载和启动 harbor 镜像

[root@node-134 harbor]# vi harbor.cfg 
## Configuration file of Harbor#The IP address or hostname to access admin UI and registry service.
#DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients.
hostname = 172.18.169.134#The protocol for accessing the UI and token/notification service, by default it is http.
#It can be set to https if ssl is enabled on nginx.
ui_url_protocol = https#The password for the root user of mysql db, change this before any production use.
db_password = root123#Maximum number of job workers in job service
max_job_workers = 3#Determine whether or not to generate certificate for the registry's token.
#If the value is on, the prepare script creates new root cert and private key
#for generating token to access the registry. If the value is off the default key/cert will be used.
#This flag also controls the creation of the notary signer's cert.
customize_crt = on#The path of cert and key files for nginx, they are applied only the protocol is set to https
ssl_cert = /etc/harbor/ssl/harbor.pem
ssl_cert_key = /etc/harbor/ssl/harbor-key.pem#The path of secretkey storage
secretkey_path = /data#Admiral's url, comment this attribute, or set its value to NA when Harbor is standalone
admiral_url = NA#The password of the Clair's postgres database, only effective when Harbor is deployed with Clair.
#Please update it before deployment, subsequent update will cause Clair's API server and Harbor unable to access Clair's database.
clair_db_password = password"harbor.cfg" 125L, 5021C written
[root@node-134 harbor]# ./install.sh [Step 0]: checking installation environment ...Note: docker version: 17.09.0Note: docker-compose version: 1.17.1[Step 1]: loading Harbor images ...
Loaded image: vmware/harbor-log:v1.3.0-rc1
Loaded image: vmware/harbor-db:v1.3.0-rc1
Loaded image: vmware/harbor-jobservice:v1.3.0-rc1
Loaded image: vmware/notary-photon:server-0.5.1
Loaded image: vmware/notary-photon:signer-0.5.1
Loaded image: vmware/harbor-db-migrator:1.3
Loaded image: vmware/harbor-adminserver:v1.3.0-rc1
Loaded image: vmware/photon:1.0
Loaded image: vmware/mariadb-photon:10.2.10
Loaded image: vmware/harbor-ui:v1.3.0-rc1
Loaded image: vmware/nginx-photon:1.11.13
Loaded image: vmware/registry:2.6.2-photon
Loaded image: vmware/clair:v2.0.1-photon
Loaded image: vmware/postgresql:9.6.5-photon[Step 2]: preparing environment ...
Generated and saved secret to file: /data/secretkey
Generated configuration file: ./common/config/nginx/nginx.conf
Generated configuration file: ./common/config/adminserver/env
Generated configuration file: ./common/config/ui/env
Generated configuration file: ./common/config/registry/config.yml
Generated configuration file: ./common/config/db/env
Generated configuration file: ./common/config/jobservice/env
Generated configuration file: ./common/config/log/logrotate.conf
Generated configuration file: ./common/config/jobservice/app.conf
Generated configuration file: ./common/config/ui/app.conf
Generated certificate, key file: ./common/config/ui/private_key.pem, cert file: ./common/config/registry/root.crt
The configuration files are ready, please use docker-compose to start the service.[Step 3]: checking existing instance of Harbor ...[Step 4]: starting Harbor ...
Creating network "harbor_harbor" with the default driver
Creating harbor-log ... 
Creating harbor-log ... done
Creating harbor-adminserver ... 
Creating registry ... 
Creating harbor-db ... 
Creating registry
Creating harbor-db
Creating registry ... done
Creating harbor-ui ... 
Creating harbor-ui ... done
Creating harbor-jobservice ... 
Creating nginx ... 
Creating harbor-jobservice
Creating nginx ... done✔ ----Harbor has been installed and started successfully.----Now you should be able to visit the admin portal at https://172.18.169.134. 
For more details, please visit https://github.com/vmware/harbor .

三、测试访问

浏览器访问 https://${NODE_IP},示例的是 https://172.18.169.134

用账号 admin 和 harbor.cfg 配置文件中的默认密码 Harbor12345 登陆系统:

harbor 运行时产生的文件、目录:

$ # 日志目录
$ ls /var/log/harbor/
adminserver.log  jobservice.log  mysql.log  proxy.log  registry.log  ui.log
$ # 数据目录,包括数据库、镜像仓库
$ ls /data/
ca_download  config  database  job_logs registry  secretkey

docker 客户端访问:

将签署 harbor 证书的 CA 证书拷贝到 /etc/docker/certs.d/172.18.169.134 目录下

$ sudo mkdir -p /etc/docker/certs.d/172.18.169.134
$ sudo cp /etc/kubernetes/ssl/k8s-root-ca.pem /etc/docker/certs.d/172.18.169.134/ca.crt

测试登陆:

[root@node-134 harbor]# docker login 172.18.169.134
Username: admin
Password: 
Login Succeeded

认证信息自动保存到 ~/.docker/config.json 文件。

测试上传镜像:

web界面创建项目-elk:

查看ELK相关镜像:

[root@node-131 ~]# docker images
REPOSITORY                                                       TAG                 IMAGE ID            CREATED             SIZE
...
gcr.io/google-containers/elasticsearch                           v5.6.4              856b33b5decc        4 days ago          877MB
docker.elastic.co/kibana/kibana                                  5.6.4               ec9ec2836846        2 weeks ago         675MB
alpine                                                           3.6                 053cde6e8953        3 weeks ago         3.96MB
gcr.io/google-containers/fluentd-elasticsearch                   v2.0.2              38ec68ca7d24        3 weeks ago         135MB
...

给这些镜像贴上tag(格式:仓库地址/项目/镜像名:版本):

docker tag gcr.io/google-containers/elasticsearch:v5.6.4 \
172.18.169.134/elk/elasticsearch:v5.6.4

查看一下:

[root@node-131 ~]# docker images
REPOSITORY                                                       TAG                 IMAGE ID            CREATED             SIZE
...
172.18.169.134/elk/elasticsearch                                 v5.6.4              856b33b5decc        4 days ago          877MB
...

上传镜像:

[root@node-131 ~]# docker push 172.18.169.134/elk/elasticsearch:v5.6.4
The push refers to a repository [172.18.169.134/elk/elasticsearch]
7fb277b4b1c2: Pushed 
c0fb0737c000: Pushed 
b5688bac09d0: Pushed 
e067b2830979: Pushed 
415c63c897f0: Pushed 
5efd536b792b: Pushed 
7bc10b7b826b: Pushed 
fb4c22ecaccd: Pushed 
bfda58dbf7bc: Pushed 
f40e9cb1a305: Pushed 
8b1feb2e5b7d: Pushed 
c177774cd13d: Pushed 
500b2871701f: Pushed 
v5.6.4: digest: sha256:e2386ddc70a6f02770e05967e39f9a9a0b0346875f91aefe7c04c79577f89d2b size: 3041

web界面查看:

另一台主机测试下载:

[root@node-132 ~]# docker login 172.18.169.134
Username: admin
Password: 
Login Succeeded
[root@node-132 ~]# docker pull 172.18.169.134/elk/elasticsearch:v5.6.4
v5.6.4: Pulling from elk/elasticsearch
Digest: sha256:e2386ddc70a6f02770e05967e39f9a9a0b0346875f91aefe7c04c79577f89d2b
Status: Downloaded newer image for 172.18.169.134/elk/elasticsearch:v5.6.4[root@node-132 ~]# docker images
REPOSITORY                                                       TAG                 IMAGE ID            CREATED             SIZE
...
172.18.169.134/elk/elasticsearch                                 v5.6.4              856b33b5decc        4 days ago          877MB
...

至此harbor搭建完成

本系列其他内容:

  • 01-环境准备

  • 02-etcd群集搭建

  • 03-kubectl管理工具

  • 04-master搭建

  • 05-node节点搭建

  • 06-addon-calico

  • 07-addon-kubedns

  • 08-addon-dashboard

  • 09-addon-kube-prometheus

  • 10-addon-EFK

  • 11-addon-Harbor

  • 12-addon-ingress-nginx

  • 13-addon-traefik

参考资料:

https://github.com/opsnull/follow-me-install-kubernetes-cluster/blob/master/13-部署harbor私有仓库.md

https://github.com/vmware/harbor


本文来自互联网用户投稿,文章观点仅代表作者本人,不代表本站立场,不承担相关法律责任。如若转载,请注明出处。 如若内容造成侵权/违法违规/事实不符,请点击【内容举报】进行投诉反馈!

相关文章

立即
投稿

微信公众账号

微信扫一扫加关注

返回
顶部