美文网首页
[istio源码分析] istio源码开发调试版简单安装

[istio源码分析] istio源码开发调试版简单安装

作者: nicktming | 来源:发表于2020-01-20 17:35 被阅读0次

    1. 前言

    转载请说明原文出处, 尊重他人劳动成果!

    源码位置: https://github.com/nicktming/istio
    分支: tming-v1.3.6 (基于1.3.6版本)

    2. 安装 sidecar

    [root@master istio.io]# pwd
    /root/go/src/istio.io
    [root@master istio.io]# git clone https://github.com/nicktming/istio.git
    [root@master istio]# kubectl get nodes
    NAME     STATUS     ROLES    AGE   VERSION
    master   Ready      <none>   23d   v1.15.3
    node     NotReady   <none>   23d   v1.15.3
    node2    NotReady   <none>   8d    v1.15.3
    [root@master istio]# 
    [root@master istio]# kubectl create ns istio-system
    

    ca.crtapi-server根证书, 放到certs目录下.
    生成secret, istio.istio-sidecar-injector-service-account, 其实该secret是由组件citadel来自动生成秘钥并签名.

    [root@master default]# pwd
    /root/go/src/istio.io/istio/configuration/default
    [root@master default]# ls
    certs  cm.yaml  examples  files  istio.yaml  sidecar.yaml  webhook-create-signed-cert.sh
    [root@master default]# ls certs/ca.crt 
    certs/ca.crt
    [root@master default]# ./webhook-create-signed-cert.sh 
    root@master default]# kubectl get secret -n istio-system
    NAME                                           TYPE                                  DATA   AGE
    default-token-jm6jv                            kubernetes.io/service-account-token   3      75m
    istio.istio-sidecar-injector-service-account   Opaque                                3      75m
    

    部署一些配置文件

    [root@master default]# kubectl apply -f cm.yaml
    [root@master default]# kubectl apply -f sidecar.yaml
    [root@master default]# kubectl get pods -n istio-system
    NAME                                      READY   STATUS    RESTARTS   AGE
    istio-sidecar-injector-84d5c488d9-6kj6s   1/1     Running   0          59m
    root@master default]# kubectl get cm -n istio-system
    NAME                     DATA   AGE
    istio                    2      64m
    istio-sidecar-injector   2      64m
    

    测试一个例子

    [root@master default]# kubectl creat ns tming
    [root@master default]# kubectl label namespace ns istio-injection=enabled
    [root@master default]# kubectl apply -f examples/busybox.yaml -n tming
    [root@master default]# kubectl get pods -n tming
    NAME           READY   STATUS    RESTARTS   AGE
    test-sidecar   1/2     Running   0          47m
    [root@master default]# kubectl logs test-sidecar istio-proxy -n tming
    ...
    2020-01-19T14:40:25.392967Z     info    Envoy proxy is NOT ready: config not received from Pilot (is Pilot running?): cds updates: 0 successful, 0 rejected; lds updates: 0 successful, 0 rejected
    [root@master default]# 
    

    已经成功, 但是envoy没有连上pilot, 所以接下来将以二进制形式运行pilot.

    3. pilot 和 galley

    在运行pilot之前, 将所有crd全部部署上.

    3.1 部署crd

    [root@master default]# pwd
    /root/go/src/istio.io/istio/configuration/default
    [root@master default]# kubectl apply -f files/
    customresourcedefinition.apiextensions.k8s.io/virtualservices.networking.istio.io created
    ...
    customresourcedefinition.apiextensions.k8s.io/challenges.certmanager.k8s.io created
    

    3.2 运行pilot

    [root@master pilot-discovery]# pwd
    /root/go/src/istio.io/istio/pilot/cmd/pilot-discovery
    [root@master pilot-discovery]# ./run.sh
    ...
    2020-01-20T06:38:19.808058Z     info    starting discovery service at http=[::]:9090 grpc=[::]:15010
    2020-01-20T06:38:19.821669Z     info    ads     Push debounce stable[2] 15: 100.027975ms since last change, 100.089227ms since last push, full=true
    2020-01-20T06:38:19.821869Z     info    ads     XDS: Pushing:2020-01-20T14:38:19+08:00/1 Services:3 ConnectedEndpoints:0
    2020-01-20T06:38:19.821883Z     info    ads     Cluster init time 364ns 2020-01-20T14:38:19+08:00/1
    2020-01-20T06:38:29.308073Z     info    ads     Push Status: {
        "ProxyStatus": {}
    }
    

    3.3 运行galley

    [root@master galley]# pwd
    /root/go/src/istio.io/istio/galley/cmd/galley
    [root@master galley]# ./run.sh
    ...
    2020-01-20T06:38:19.722421Z     info    mcp     Watch(): created watch 32 for istio/rbac/v1alpha1/servicerolebindings from group "default", version "0"
    

    4. 验证

    [root@master ~]# kubectl get pods -n tming
    NAME           READY   STATUS    RESTARTS   AGE
    test-sidecar   1/2     Running   0          16h
    

    验证发现sidecar还是没有连上pilot, 这是因为pilot-agent连的是默认配置的地址.

    [root@master ~]# kubectl -n tming get pod test-sidecar -o yaml
    ...
    - --discoveryAddress
        - istio-pilot.istio-system:15010
    ...
    

    因此需要修改配置才可以, 在istio-sidecar-injector(configMap)中找到discoveryAddress属性将原先的配置"{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}"改成172.31.71.181:15010 (换成自己的ip即可)

    [root@master istio]# kubectl apply -f configuration/default/cm.yaml
    [root@master istio]# kubectl get pods -n tming
    NAME           READY   STATUS    RESTARTS   AGE
    test-sidecar   2/2     Running   0          35s
    

    如果有问题, 可以重启sidecar这个pod.
    可以看到已经正常运行了, 接下来部署一个ingress-gateway来统一入口.

    5. 部署ingress-gateway

    [root@master istio]# pwd
    /root/go/src/istio.io/istio
    [root@master istio]# kubectl apply -f configuration/default/ingress-gateway.yaml 
    deployment.apps/istio-ingressgateway created
    service/istio-policy created
    service/istio-telemetry created
    [root@master istio]# kubectl get pods,svc,MutatingWebhookConfiguration -n istio-system
    NAME                                          READY   STATUS    RESTARTS   AGE
    pod/istio-ingressgateway-768778694-sz9kw      1/1     Running   0          30m
    pod/istio-sidecar-injector-84d5c488d9-jqnx9   1/1     Running   0          41m
    
    NAME                             TYPE           CLUSTER-IP        EXTERNAL-IP   PORT(S)                                                                                                                                     AGE
    service/istio-ingressgateway     LoadBalancer   169.169.242.173   <pending>     15020:15143/TCP,80:31380/TCP,443:31390/TCP,31400:31400/TCP,15029:2880/TCP,15030:42855/TCP,15031:33520/TCP,15032:10091/TCP,15443:42831/TCP   41s
    service/istio-sidecar-injector   ClusterIP      169.169.226.113   <none>        443/TCP,15014/TCP                                                                                                                           19h
    
    NAME                                                                               CREATED AT
    mutatingwebhookconfiguration.admissionregistration.k8s.io/istio-sidecar-injector   2020-01-19T13:28:17Z
    [root@master istio]# 
    

    6. 验证bookinfo

    [root@master istio]# kubectl label ns default instio-injection=enabled
    namespace/default labeled
    [root@master istio]# kubectl apply -f samples/bookinfo/platform/kube/bookinfo.yaml 
    service/details created
    ...
    deployment.apps/productpage-v1 created
    [root@master istio]# 
    [root@master istio]# kubectl get pods
    NAME                              READY   STATUS    RESTARTS   AGE
    details-v1-74f858558f-tb2pl       2/2     Running   0          69s
    productpage-v1-8554d58bff-twxnc   2/2     Running   0          67s
    ratings-v1-7855f5bcb9-76dwb       2/2     Running   0          67s
    reviews-v1-59fd8b965b-cf8v9       2/2     Running   0          68s
    reviews-v2-d6cfdb7d6-n74tg        2/2     Running   0          68s
    reviews-v3-75699b5cfb-txmpt       2/2     Running   0          68s
    [root@master istio]# kubectl apply -f samples/bookinfo/networking/bookinfo-gateway.yaml
    [root@master istio]# kubectl get gw,vs 
    NAME                                           AGE
    gateway.networking.istio.io/bookinfo-gateway   10m
    
    NAME                                          GATEWAYS             HOSTS   AGE
    virtualservice.networking.istio.io/bookinfo   [bookinfo-gateway]   [*]     10m
    

    查看ingress-gateway80端口对应的nodeport.

    [root@master istio]# kubectl get svc istio-ingressgateway -n istio-system
    NAME                   TYPE           CLUSTER-IP        EXTERNAL-IP   PORT(S)                                                                                                                                     AGE
    istio-ingressgateway   LoadBalancer   169.169.242.173   <pending>     15020:15143/TCP,80:31380/TCP,443:31390/TCP,31400:31400/TCP,15029:2880/TCP,15030:42855/TCP,15031:33520/TCP,15032:10091/TCP,15443:42831/TCP   57m
    [root@master istio]# 
    

    访问节点ip:31380效果如下:

    pic.png

    7. 总结

    把各个组件拆分开用二进制运行可以方便研究源码的时候进行调试, 接下来将对各组件源码进行分析.

    8. 参考

    1. istio 1.3.6源码

    相关文章

      网友评论

          本文标题:[istio源码分析] istio源码开发调试版简单安装

          本文链接:https://www.haomeiwen.com/subject/pqqdzctx.html