共计 11161 个字符,预计需要花费 28 分钟才能阅读完成。
本篇内容介绍了“Docker Swarm 集群创建与可视化管理方法是什么”的有关知识,在实际案例的操作过程中,不少人都会遇到这样的困境,接下来就让丸趣 TV 小编带领大家学习一下如何处理这些情况吧!希望大家仔细阅读,能够学有所成!
节点信息:
manager:192.168.220.194
worker1:192.168.220.173
worker2:192.168.220.197
技术栈:
Docker 1.12
Shipyard
swarm
etcd
SwarmOps
rethinkdb
docker-proxy
所需资源包:
quick start:
1、安装 docker 1.12(所有节点,内核限制最低 centos7)
设置 docker1.12 yum 源:
cat /etc/yum.repos.d/docker.repo -EOF
[dockerrepo]
name=Docker Repository
baseurl=https://yum.dockerproject.org/repo/experimental/centos/7/
enabled=1
gpgcheck=1
gpgkey=https://yum.dockerproject.org/gpg
EOF
开放端口(manager 节点):
firewall-cmd –zone=public –add-port=2375/tcp –permanent
firewall-cmd –zone=public –add-port=2377/tcp –permanent
firewall-cmd –zone=public –add-port=3375/tcp –permanent
firewall-cmd –zone=public –add-port=4001/tcp –permanent
firewall-cmd –zone=public –add-port=7001/tcp –permanent
firewall-cmd –zone=public –add-port=8080/tcp –permanent
firewall-cmd –zone=public –add-port=10130/tcp –permanent
firewall-cmd –reload
开放端口(worker 节点):
firewall-cmd –zone=public –add-port=2375/tcp –permanent
firewall-cmd –zone=public –add-port=2377/tcp –permanent
firewall-cmd –zone=public –add-port=3375/tcp –permanent
firewall-cmd –reload
安装 docker1.12:
yum -y install docker-engine
设置开机自启动:
systemctl enable docker
开启 docker 服务:
systemctl start docker
设置加速器(国内源):
curl -sSL https://get.daocloud.io/daotools/set_mirror.sh | sh -s http://e80d24c6.m.daocloud.io
重启 docker 服务:
systemctl restart docker
初始化 swarm 集群:
docker swarm init
输出信息如下:
Swarm initialized: current node (9r76p77projw3olxbmzmdfura) is now a manager.
To add a worker to this swarm, run the following command:
docker swarm join \
–token SWMTKN-1-1m8h611662w4s79nus0az57fucoypykm199b6lc88hr6mu7zeb-1b7ks1s15o2d5xssllqq8u4no \
192.168.220.143:2377
To add a manager to this swarm, run docker swarm join-token manager and follow the instructions.
worker 节点加入 swarm 集群:
docker swarm join –token SWMTKN-1-1m8h611662w4s79nus0az57fucoypykm199b6lc88hr6mu7zeb-1b7ks1s15o2d5xssllqq8u4no 192.168.220.143:2377
输出信息如下:
This node joined a swarm as a worker.
查看 swarm 节点:
docker node ls
输出信息如下:
ID HOSTNAME STATUS AVAILABILITY MANAGER STATUS
9r76p77projw3olxbmzmdfura * DockerH1 Ready Active Leader
athdt83y3sxw6oo8sp7tnnmh4 DockerH1 Ready Active
查看 master 节点 token:
1、添加 manager 节点:
docker swarm join-token manager
2、添加 worker 节点:
docker swarm join-token worker
输出信息如下:
To add a manager to this swarm, run the following command:
docker swarm join \
–token SWMTKN-1-1m8h611662w4s79nus0az57fucoypykm199b6lc88hr6mu7zeb-3knrcvyaj6uz3df7jkm13w0iu \
192.168.220.143:2377
To add a worker to this swarm, run the following command:
docker swarm join \
–token SWMTKN-1-1m8h611662w4s79nus0az57fucoypykm199b6lc88hr6mu7zeb-1b7ks1s15o2d5xssllqq8u4no \
192.168.220.143:2377
节点退出 swarm 集群:
docker swarm leave
2、安装 Shipyard 集群管理服务:
导入启动文件:
docker.sh
文件内容:
【docker.sh】
——————————————————————————————————–
#!/bin/bash
if [$1 !=] [$1 = -h]; then
echo Shipyard Deploy uses the following environment variables:
echo ACTION: this is the action to use (deploy, upgrade, node, remove)
echo DISCOVERY: discovery system used by Swarm (only if using node action)
echo IMAGE: this overrides the default Shipyard image
echo PREFIX: prefix for container names
echo SHIPYARD_ARGS: these are passed to the Shipyard controller container as controller args
echo TLS_CERT_PATH: path to certs to enable TLS for Shipyard
echo PORT: specify the listen port for the controller (default: 8080)
echo IP: specify the address at which the controller or node will be available (default: eth0 ip)
echo PROXY_PORT: port to run docker proxy (default: 2375)
exit 1
fi
if [-z `which docker`]; then
echo You must have the Docker CLI installed on your \$PATH
echo See http://docs.docker.com for details
exit 1
fi
ACTION=${ACTION:-deploy}
IMAGE=${IMAGE:-shipyard/shipyard:latest}
PREFIX=${PREFIX:-shipyard}
SHIPYARD_ARGS=${SHIPYARD_ARGS:-}
TLS_CERT_PATH=${TLS_CERT_PATH:-}
CERT_PATH= /etc/shipyard
PROXY_PORT=${PROXY_PORT:-2375}
SWARM_PORT=3375
SHIPYARD_PROTOCOL=http
SHIPYARD_PORT=${PORT:-8080}
SHIPYARD_IP=${IP}
DISCOVERY_BACKEND=etcd
DISCOVERY_PORT=4001
DISCOVERY_PEER_PORT=7001
ENABLE_TLS=0
CERT_FINGERPRINT=
LOCAL_CA_CERT=
LOCAL_SSL_CERT=
LOCAL_SSL_KEY=
LOCAL_SSL_CLIENT_CERT=
LOCAL_SSL_CLIENT_KEY=
SSL_CA_CERT=
SSL_CERT=
SSL_KEY=
SSL_CLIENT_CERT=
SSL_CLIENT_KEY=
show_cert_help() {
echo To use TLS in Shipyard, you must have existing certificates.
echo The certs must be named ca.pem, server.pem, server-key.pem, cert.pem and key.pem
echo If you need to generate certificates, see https://github.com/ehazlett/certm for examples.
}
check_certs() {
if [-z $TLS_CERT_PATH]; then
return
fi
if [! -e $TLS_CERT_PATH]; then
echo Error: unable to find certificates in $TLS_CERT_PATH
show_cert_help
exit 1
fi
if [$PROXY_PORT = 2375]; then
PROXY_PORT=2376
fi
SWARM_PORT=3376
SHIPYARD_PROTOCOL=https
LOCAL_SSL_CA_CERT= $TLS_CERT_PATH/ca.pem
LOCAL_SSL_CERT= $TLS_CERT_PATH/server.pem
LOCAL_SSL_KEY= $TLS_CERT_PATH/server-key.pem
LOCAL_SSL_CLIENT_CERT= $TLS_CERT_PATH/cert.pem
LOCAL_SSL_CLIENT_KEY= $TLS_CERT_PATH/key.pem
SSL_CA_CERT= $CERT_PATH/ca.pem
SSL_CERT= $CERT_PATH/server.pem
SSL_KEY= $CERT_PATH/server-key.pem
SSL_CLIENT_CERT= $CERT_PATH/cert.pem
SSL_CLIENT_KEY= $CERT_PATH/key.pem
CERT_FINGERPRINT=$(openssl x509 -noout -in $LOCAL_SSL_CERT -fingerprint -sha256 | awk -F= {print $2;} )
if [! -e $LOCAL_SSL_CA_CERT] || [! -e $LOCAL_SSL_CERT] || [! -e $LOCAL_SSL_KEY] || [! -e $LOCAL_SSL_CLIENT_CERT] || [! -e $LOCAL_SSL_CLIENT_KEY]; then
echo Error: unable to find certificates
show_cert_help
exit 1
fi
ENABLE_TLS=1
}
# container functions
start_certs() {
ID=$(docker run \
-ti \
-d \
–restart=always \
–name $PREFIX-certs \
-v $CERT_PATH \
alpine \
sh)
if [$ENABLE_TLS = 1]; then
docker cp $LOCAL_SSL_CA_CERT $PREFIX-certs:$SSL_CA_CERT
docker cp $LOCAL_SSL_CERT $PREFIX-certs:$SSL_CERT
docker cp $LOCAL_SSL_KEY $PREFIX-certs:$SSL_KEY
docker cp $LOCAL_SSL_CLIENT_CERT $PREFIX-certs:$SSL_CLIENT_CERT
docker cp $LOCAL_SSL_CLIENT_KEY $PREFIX-certs:$SSL_CLIENT_KEY
fi
}
remove_certs() {
docker rm -fv $PREFIX-certs /dev/null 2 1
}
get_ip() {
if [-z $SHIPYARD_IP]; then
SHIPYARD_IP=`docker run –rm –net=host alpine ip route get 8.8.8.8 | awk {print $7;} `
fi
}
start_discovery() {
get_ip
ID=$(docker run \
-ti \
-d \
-p 4001:4001 \
-p 7001:7001 \
–restart=always \
–name $PREFIX-discovery \
microbox/etcd:latest -addr $SHIPYARD_IP:$DISCOVERY_PORT -peer-addr $SHIPYARD_IP:$DISCOVERY_PEER_PORT)
}
remove_discovery() {
docker rm -fv $PREFIX-discovery /dev/null 2 1
}
start_rethinkdb() {
ID=$(docker run \
-ti \
-d \
–restart=always \
–name $PREFIX-rethinkdb \
rethinkdb)
}
remove_rethinkdb() {
docker rm -fv $PREFIX-rethinkdb /dev/null 2 1
}
start_proxy() {
TLS_OPTS=
if [$ENABLE_TLS = 1]; then
TLS_OPTS= -e SSL_CA=$SSL_CA_CERT -e SSL_CERT=$SSL_CERT -e SSL_KEY=$SSL_KEY -e SSL_SKIP_VERIFY=1
fi
# Note: we add SSL_SKIP_VERIFY=1 to skip verification of the client
# certificate in the proxy image. this will pass it to swarm that
# does verify. this helps with performance and avoids certificate issues
# when running through the proxy. ultimately if the cert is invalid
# swarm will fail to return.
ID=$(docker run \
-ti \
-d \
-p $PROXY_PORT:$PROXY_PORT \
–hostname=$HOSTNAME \
–restart=always \
–name $PREFIX-proxy \
-v /var/run/docker.sock:/var/run/docker.sock \
-e PORT=$PROXY_PORT \
–volumes-from=$PREFIX-certs $TLS_OPTS\
shipyard/docker-proxy:latest)
}
remove_proxy() {
docker rm -fv $PREFIX-proxy /dev/null 2 1
}
start_swarm_manager() {
get_ip
TLS_OPTS=
if [$ENABLE_TLS = 1]; then
TLS_OPTS= –tlsverify –tlscacert=$SSL_CA_CERT –tlscert=$SSL_CERT –tlskey=$SSL_KEY
fi
EXTRA_RUN_OPTS=
if [-z $DISCOVERY]; then
DISCOVERY= $DISCOVERY_BACKEND://discovery:$DISCOVERY_PORT
EXTRA_RUN_OPTS= –link $PREFIX-discovery:discovery
fi
ID=$(docker run \
-ti \
-d \
–restart=always \
–name $PREFIX-swarm-manager \
–volumes-from=$PREFIX-certs $EXTRA_RUN_OPTS \
swarm:latest \
m –replication –addr $SHIPYARD_IP:$SWARM_PORT –host tcp://0.0.0.0:$SWARM_PORT $TLS_OPTS $DISCOVERY)
}
remove_swarm_manager() {
docker rm -fv $PREFIX-swarm-manager /dev/null 2 1
}
start_swarm_agent() {
get_ip
if [-z $DISCOVERY]; then
DISCOVERY= $DISCOVERY_BACKEND://discovery:$DISCOVERY_PORT
EXTRA_RUN_OPTS= –link $PREFIX-discovery:discovery
fi
ID=$(docker run \
-ti \
-d \
–restart=always \
–name $PREFIX-swarm-agent $EXTRA_RUN_OPTS \
swarm:latest \
j –addr $SHIPYARD_IP:$PROXY_PORT $DISCOVERY)
}
remove_swarm_agent() {
docker rm -fv $PREFIX-swarm-agent /dev/null 2 1
}
start_controller() {
#-v $CERT_PATH:/etc/docker:ro \
TLS_OPTS=
if [$ENABLE_TLS = 1]; then
TLS_OPTS= –tls-ca-cert $SSL_CA_CERT –tls-cert=$SSL_CERT –tls-key=$SSL_KEY –shipyard-tls-ca-cert=$SSL_CA_CERT –shipyard-tls-cert=$SSL_CERT –shipyard-tls-key=$SSL_KEY
fi
ID=$(docker run \
-ti \
-d \
–restart=always \
–name $PREFIX-controller \
–link $PREFIX-rethinkdb:rethinkdb \
–link $PREFIX-swarm-manager:swarm \
-p $SHIPYARD_PORT:$SHIPYARD_PORT \
–volumes-from=$PREFIX-certs \
$IMAGE \
–debug \
server \
–listen :$SHIPYARD_PORT \
-d tcp://swarm:$SWARM_PORT $TLS_OPTS $SHIPYARD_ARGS)
}
wait_for_available() {
set +e
IP=$1
PORT=$2
echo Waiting for Shipyard on $IP:$PORT
docker pull ehazlett/curl /dev/null 2 1
TLS_OPTS=
if [$ENABLE_TLS = 1]; then
TLS_OPTS= -k
fi
until $(docker run –rm ehazlett/curl –output /dev/null –connect-timeout 1 –silent –head –fail $TLS_OPTS $SHIPYARD_PROTOCOL://$IP:$PORT/ /dev/null 2 do
printf .
sleep 1
done
printf \n
}
remove_controller() {
docker rm -fv $PREFIX-controller /dev/null 2 1
}
if [$ACTION = deploy]; then
set -e
check_certs
get_ip
echo Deploying Shipyard
echo – Starting Database
start_rethinkdb
echo – Starting Discovery
start_discovery
echo – Starting Cert Volume
start_certs
echo – Starting Proxy
start_proxy
echo – Starting Swarm Manager
start_swarm_manager
echo – Starting Swarm Agent
start_swarm_agent
echo – Starting Controller
start_controller
wait_for_available $SHIPYARD_IP $SHIPYARD_PORT
echo Shipyard available at $SHIPYARD_PROTOCOL://$SHIPYARD_IP:$SHIPYARD_PORT
if [$ENABLE_TLS = 1] [! -z $CERT_FINGERPRINT]; then
echo SSL SHA-256 Fingerprint: $CERT_FINGERPRINT
fi
echo Username: admin Password: shipyard
elif [$ACTION = node]; then
set -e
if [-z $DISCOVERY]; then
echo You must set the DISCOVERY environment variable
echo with the discovery system used with Swarm
exit 1
fi
check_certs
echo Adding Node
echo – Starting Cert Volume
start_certs
echo – Starting Proxy
start_proxy
echo – Starting Swarm Manager
start_swarm_manager $DISCOVERY
echo – Starting Swarm Agent
start_swarm_agent
echo Node added to Swarm: $SHIPYARD_IP
elif [$ACTION = upgrade]; then
set -e
check_certs
get_ip
echo Upgrading Shipyard
echo – Pulling $IMAGE
docker pull $IMAGE
echo – Upgrading Controller
remove_controller
start_controller
wait_for_available $SHIPYARD_IP $SHIPYARD_PORT
echo Shipyard controller updated
elif [$ACTION = remove]; then
# ignore errors
set +e
echo Removing Shipyard
echo – Removing Database
remove_rethinkdb
echo – Removing Discovery
remove_discovery
echo – Removing Cert Volume
remove_certs
echo – Removing Proxy
remove_proxy
echo – Removing Swarm Agent
remove_swarm_agent
echo – Removing Swarm Manager
remove_swarm_manager
echo – Removing Controller
remove_controller
echo Done
else
echo Unknown action $ACTION
exit 1
fi
——————————————————————————————————–
加载镜像(manager 节点)
docker load shipyard.tar.gz
docker load shipyard-docker-proxy.tar.gz
docker load swarm.tar.gz
docker load microbox-etcd.tar.gz
docker load rethinkdb.tar.gz
docker load alpine.tar.gz
运行以下命令:
bash docker.sh
加载镜像(worker 节点)
docker load shipyard-docker-proxy.tar.gz
docker load swarm.tar.gz
docker load alpine.tar.gz
运行以下命令:
export ACTION=node DISCOVERY=etcd:// manager host ip :4001 bash docker.sh
查看所有节点 swarm-manager 日志:
docker logs -f shipyard-swarm-manager
显示如下则表示服务启动成功:
若出现如下错误:
解决方案:(所有节点)
停止 docker 服务,删除 /etc/docker/key.json,启动 docker 服务
systemctl stop docker.service (所有节点同时进行,即都在删除 key.json 文件前执行)
rm -rf /etc/docker/key.json (所有节点同时进行,即都在停止 docker 服务后删除 key.json)
systemctl start docker.service (所有节点同时进行,即都在删除 key.json 文件后执行)
浏览器访问:
http:// manager host ip :8080
节点信息:
3、安装 SwarmOps:
加载 SwarmOps 镜像:
docker load swarmops.tar.gz
启动 SwarmOps 容器:
docker run -tdi –name swarmops –net=host –restart=always swarmops:0.0.2
浏览器访问:
http:// manager host ip :10130
“Docker Swarm 集群创建与可视化管理方法是什么”的内容就介绍到这里了,感谢大家的阅读。如果想了解更多行业相关的知识可以关注丸趣 TV 网站,丸趣 TV 小编将为大家输出更多高质量的实用文章!