Skip to content

Latest commit

 

History

History
137 lines (92 loc) · 7.81 KB

README.md

File metadata and controls

137 lines (92 loc) · 7.81 KB

Kelly's Linkerd 2 Guide

A simple guide with step-by-step commands for setting up Linkerd for real use in long lived and/or production Kubernetes clusters.

While I love Helm as much as the next guy, this guide is done entirely without it. It's important to know that Buoyant does recommend the use of Helm for production installation as it's more repeatable.

This is not intended to be an in-depth discussion, or advanced topics guide for Linkerd or Kubernetes. I've got just enough setup guide to get it up and running. Please read Buoyant’s Linkerd Production Runbook for yourself to learn a lot more detail.

Contributions welcome: If you have suggestions on how this can be improved, I welcome any and all feedback. I also have a million things on my plate, so please don't be offended if I don't reply immediately.

Relevancy

This guide is based on Linkerd 2.12.3. Newer or older versions of Linkerd may have differences. Please always double-check this against the Linkerd Docs before starting.

Disclaimer

I am nowhere near the foremost expert on Linkerd. I've just been using it for quite a while and have hit a few pit-falls from configurations that were not exactly production-ready. The Linkerd Slack has much smarter people than me. I highly recommend you join and ask questions there.

Setup Instructions

I'm executing all of these commands from the root folder in this repository, on Ubuntu 18.04 (WSL). This guide should work as-is on any other OS or distro.

I'm doing this on AKS, but there is nothing Azure specific. This should work on any cloud or even bare-metal Kubernetes cluster.

Prerequisites

  • You need the Linkerd CLI already installed on your workstation. See Buoyant's Getting Started guide for installation instructions.
  • You need to have cert-manager, and its CRDs, already installed and working on your cluster. I may add that as a sub-guide here later but for now I'll just direct you to their Installation Instructions.

1) Generate a new, long-lived root certificate

I'm doing this with smallstep cli. If you don't already have it installed, here are their Install Instructions. It is also possible to do this with OpenSSL, but I'm not going to covert that here.

Let's generate a 20-year root certificate, so when it needs to be rotated it won't be our problem.

step certificate create root.linkerd.cluster.local ca.crt ca.key \
  --profile root-ca --no-password --insecure --not-after 175200h

2) Create the linkerd namespace.

You'll need this to exist for the next few commands to work.

kubectl create namespace linkerd

3) Load your new certificate as a secret.

This will be used by Linkerd as the trust anchor for the control plane, mTLS and by cert-manager to issue and rotate shorter lived certificates.

kubectl create secret tls linkerd-trust-anchor --cert=ca.crt --key=ca.key --namespace=linkerd

4) Load the included YAML, for cert-manager to create managed certificates

The "linkerd-cert-issuer.yaml" includes the issuers for the trust-ancher and webhooks as well as manager certificate definitions for linkerd-identity-issuer, linkerd-policy-validator, linkerd-proxy-injector and linkerd-sp-validator.

I've chosen a certificate lifetime of 180-days with a renew-before of 60-days. Linkerd's guide actually recommend a much shorter lifetime. In the real-world I've had older versions of cert-manger "miss" certificate renewals for a few days to weeks. This gives it more cushion against expiration.

This longer lifetime also has the benefit of $ linkerd check telling you all-is-good if your certificates are rotating properly. Any lifetime of less than 60 days will cause the built-in check to constantly warn you that your certificates are close to expiration.

kubectl apply -f linkerd-cert-issuer.yaml

5) Verify your certificates are created

This step can be skipped, if you like to live on the edge. If cert-manager is working as expected, this command will show a listing of all the certificates mentioned above.

kubectl get secret -n linkerd

The output should look something like this:

NAME                                 TYPE                                  DATA   AGE
default-token-f8v2m                  kubernetes.io/service-account-token   3      10m
linkerd-identity-issuer              kubernetes.io/tls                     3      2m
linkerd-policy-validator-k8s-tls     kubernetes.io/tls                     3      2m
linkerd-proxy-injector-k8s-tls       kubernetes.io/tls                     3      2m
linkerd-sp-validator-k8s-tls         kubernetes.io/tls                     3      2m
linkerd-trust-anchor                 kubernetes.io/tls                     2      2m

6) Ensure you have correctly labeled the kube-system namespace

This is really important for HA installation of Linkerd, which we're going to be doing.

I'll let Buoyant explain the necessity of this in their page on High Availability.

kubectl label namespace kube-system config.linkerd.io/admission-webhooks=disabled

7) Install Linkerd

We're using the Linkerd CLI installation method. The arguments passed configure High Availability mode as well as informing Linkerd that the issuer and web-hook certificates will be managed by cert-manager.

Update for 2.12.x: Added step for --crds to create linkerd CRDs as first-step of install

linkerd install --crds | kubectl apply -f -

Update for 2.11.2: Added --set proxyInit.runAsRoot=false to run init containers as non-root (best practice)

linkerd install --ha \
  --identity-external-issuer \
  --identity-trust-anchors-file ca.crt \
  --set policyValidator.externalSecret=true \
  --set-file policyValidator.caBundle=ca.crt \
  --set proxyInjector.externalSecret=true \
  --set-file proxyInjector.caBundle=ca.crt \
  --set profileValidator.externalSecret=true \
  --set-file profileValidator.caBundle=ca.crt \
  --set proxyInit.runAsRoot=false \
  | kubectl apply -f -

NOTE: You are going to get a warning that the linkerd namespace already exists outside of kubectl apply. This is expected and can be safely ignored.

8) Verify your Linkerd installation

As before, this step can be skipped, if you like to live on the edge. We're going use the built-in check feature of Linkerd CLI.

Give the previous command 1-2 minutes, to install and start the Linkerd workloads, before trying to verify.

linkerd check

If Linkerd is working as expected, or if there are problems, this tool will tell you.

Next Steps

This is all that is required to get a production ready Linkerd install up an running. The existing online Linkerd Docs cover all the details of configuring your other cluster workloads, including ingress, to actually work with your newly installed service-mesh. I don't feel the need to repeat any of that here.

Linkerd Viz and Jaeger

If you're interested in using the Viz and Jaeger extensions with this configuration, check out "extensions.md" in this repository.