Creating your first Kubernetes cluster

The YouTube ID of H-n0A6tZk17vY is invalid.

We look into installing k3s cluster locally using virtual servers. VirtualBox is used to create one controller and two nodes, connect them and install a dashboard.

Creating a small K3S cluster.

First, ensure that you have curl installed the nodes and server so you can install the packages for k3s.

First run the command below in order to create a control node, a server that all your other nodes will connect to in order to get their commands from.

curl -sfL https://get.k3s.io | sh -

Next up we need to set up the nodes. And in order to set this up, we need some information. Run the commands below on the server to fetch the internal IP address of the network with the controller and nodes. We also need a security token from the server which we can fetch with cat.

ip addr show
cat /var/lib/rancher/k3s/server/node-token

After we have to fetch these information pieces we will add them to the command below and run this on our nodes in order to connect them to the cluster.

curl -sfL https://get.k3s.io | K3S_URL=https://[server_internal_ip_address]:6443 K3S_TOKEN=[TOKEN_FROM_COMMAND_ABOVE] sh -

We now have a working cluster and we need some application to run on the cluster. A nice application to run is the dashboard where you can test the network. The command below we run on the controller/server and this will send instructions to the nodes to install the dashboard and metric server.

kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta6/aio/deploy/recommended.yaml

Next, we need an account so we can administrate everything. Start by creating a file named service-account.yaml and add the information below. This will create the admin Service Account.

apiVersion: v1
kind: ServiceAccount
metadata:
name: admin-user
namespace: kube-system

Next up we set up what the new account can manage by creating a file named cluster-role.yaml and adding the text below.

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: admin-user
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
name: admin-user
namespace: kube-system

Running these commands will import the configurations we created above.

kubectl apply -f service-account.yaml 
kubectl apply -f cluster-role.yaml

Now we have a service account but we need another token in order to login to the dashboard. This can be located by running the command below. Look for "Token: " and copy the long token string.

kubectl -n kube-system describe secret $(kubectl -n kube-system get secret | grep admin-user | awk '{print $1}')

Lastly, we need to open up the dashboard so we can reach it outside the cluster. We can do this with a port forwarding using the external IP address of your cluster.

kubectl port-forward -n kubernetes-dashboard service/kubernetes-dashboard 10443:443 --address [server_external_ip_address]

In order to reach your dashboard, you visit https://server_external_ip_address:10443 this site is using SSL and we haven't set up any certificates so you might need to use a web browser that doesn't require signed certificates.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.