Skip to content

Commit e6d2608

Browse files
committed
Add kubeadm upgrade docs for 1.11
1 parent 8558241 commit e6d2608

File tree

1 file changed

+303
-0
lines changed

1 file changed

+303
-0
lines changed
Lines changed: 303 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,303 @@
1+
---
2+
reviewers:
3+
- pipejakob
4+
- luxas
5+
- roberthbailey
6+
- jbeda
7+
title: Upgrading kubeadm clusters from v1.10 to v1.11
8+
content_template: templates/task
9+
---
10+
11+
{{% capture overview %}}
12+
13+
This guide is for upgrading `kubeadm` clusters from version 1.10.x to 1.11.x, as well as 1.10.x to 1.10.y and 1.11.x to 1.11.y where `y > x`.
14+
15+
{{% /capture %}}
16+
17+
{{% capture prerequisites %}}
18+
19+
Before proceeding:
20+
21+
- You need to have a functional `kubeadm` Kubernetes cluster running version 1.10.0 or higher in order to use the process described here. Swap also needs to be disabled.
22+
- Make sure you read the [release notes](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.9.md) carefully.
23+
- `kubeadm upgrade` now allows you to upgrade etcd. `kubeadm upgrade` will also upgrade of etcd to 3.1.10 as part of upgrading from v1.8 to v1.9 by default. This is due to the fact that etcd 3.1.10 is the officially validated etcd version for Kubernetes v1.9. The upgrade is handled automatically by kubeadm for you.
24+
- Note that `kubeadm upgrade` will not touch any of your workloads, only Kubernetes-internal components. As a best-practice you should back up what's important to you. For example, any app-level state, such as a database an app might depend on (like MySQL or MongoDB) must be backed up beforehand.
25+
26+
{{< caution >}}
27+
**Caution:** All the containers will get restarted after the upgrade, due to container spec hash value being changed.
28+
{{< /caution >}}
29+
30+
Also, note that only one minor version upgrade is supported. For example, you can only upgrade from 1.10 to 1.11, not from 1.9 to 1.11.
31+
32+
{{% /capture %}}
33+
34+
{{% capture steps %}}
35+
36+
## Upgrading your control plane
37+
38+
Execute these commands on your master node:
39+
40+
1. Install the most recent version of `kubeadm` using `curl` like so:
41+
42+
```shell
43+
sudo apt-get upgdate && sudo apt-get upgrade kubeadm
44+
```
45+
46+
`kubeadm` is only needed on individual (non-master) nodes for joining the cluster.
47+
It is not necessary to update kubeadm on nodes
48+
49+
Verify that this download of kubeadm works and has the expected version:
50+
51+
```shell
52+
kubeadm version
53+
```
54+
55+
2. On the master node, run the following:
56+
57+
```shell
58+
kubeadm upgrade plan
59+
```
60+
61+
You should see output similar to this:
62+
63+
<!-- TODO: copy-paste actual output once new version is stable -->
64+
65+
```shell
66+
[preflight] Running pre-flight checks
67+
[upgrade] Making sure the cluster is healthy:
68+
[upgrade/health] Checking API Server health: Healthy
69+
[upgrade/health] Checking Node health: All Nodes are healthy
70+
[upgrade/health] Checking Static Pod manifests exists on disk: All manifests exist on disk
71+
[upgrade/config] Making sure the configuration is correct:
72+
[upgrade/config] Reading configuration from the cluster...
73+
[upgrade/config] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -o yaml'
74+
[upgrade] Fetching available versions to upgrade to:
75+
[upgrade/versions] Cluster version: v1.10.1
76+
[upgrade/versions] kubeadm version: v1.10.0
77+
[upgrade/versions] Latest stable version: v1.9.0
78+
[upgrade/versions] Latest version in the v1.8 series: v1.8.6
79+
80+
Components that must be upgraded manually after you've upgraded the control plane with 'kubeadm upgrade apply':
81+
COMPONENT CURRENT AVAILABLE
82+
Kubelet 1 x v1.8.1 v1.8.6
83+
84+
Upgrade to the latest version in the v1.8 series:
85+
86+
COMPONENT CURRENT AVAILABLE
87+
API Server v1.8.1 v1.8.6
88+
Controller Manager v1.8.1 v1.8.6
89+
Scheduler v1.8.1 v1.8.6
90+
Kube Proxy v1.8.1 v1.8.6
91+
Kube DNS 1.14.4 1.14.5
92+
93+
You can now apply the upgrade by executing the following command:
94+
95+
kubeadm upgrade apply v1.8.6
96+
97+
_____________________________________________________________________
98+
99+
Components that must be upgraded manually after you've upgraded the control plane with 'kubeadm upgrade apply':
100+
COMPONENT CURRENT AVAILABLE
101+
Kubelet 1 x v1.8.1 v1.9.0
102+
103+
Upgrade to the latest stable version:
104+
105+
COMPONENT CURRENT AVAILABLE
106+
API Server v1.8.1 v1.9.0
107+
Controller Manager v1.8.1 v1.9.0
108+
Scheduler v1.8.1 v1.9.0
109+
Kube Proxy v1.8.1 v1.9.0
110+
Kube DNS 1.14.5 1.14.7
111+
112+
You can now apply the upgrade by executing the following command:
113+
114+
kubeadm upgrade apply v1.9.0
115+
116+
Note: Before you do can perform this upgrade, you have to update kubeadm to v1.9.0
117+
118+
_____________________________________________________________________
119+
```
120+
121+
The `kubeadm upgrade plan` checks that your cluster is upgradeable and fetches the versions available to upgrade to in an user-friendly way.
122+
123+
3. Pick a version to upgrade to and run. For example:
124+
125+
```shell
126+
kubeadm upgrade apply v1.11.0
127+
```
128+
129+
You should see output similar to this:
130+
131+
<!-- TODO: output from stable -->
132+
133+
```shell
134+
[preflight] Running pre-flight checks.
135+
[upgrade] Making sure the cluster is healthy:
136+
[upgrade/config] Making sure the configuration is correct:
137+
[upgrade/config] Reading configuration from the cluster...
138+
[upgrade/config] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -oyaml'
139+
I0614 20:56:08.320369 30918 feature_gate.go:230] feature gates: &{map[]}
140+
[upgrade/apply] Respecting the --cri-socket flag that is set with higher priority than the config file.
141+
[upgrade/version] You have chosen to change the cluster version to "v1.11.0-beta.2.78+e0b33dbc2bde88"
142+
[upgrade/versions] Cluster version: v1.10.4
143+
[upgrade/versions] kubeadm version: v1.11.0-beta.2.78+e0b33dbc2bde88
144+
[upgrade/confirm] Are you sure you want to proceed with the upgrade? [y/N]: y
145+
[upgrade/prepull] Will prepull images for components [kube-apiserver kube-controller-manager kube-scheduler etcd]
146+
[upgrade/apply] Upgrading your Static Pod-hosted control plane to version "v1.11.0-beta.2.78+e0b33dbc2bde88"...
147+
Static pod: kube-apiserver-ip-172-31-85-18 hash: 7a329408b21bc0c44d7b3b78ff8187bf
148+
Static pod: kube-controller-manager-ip-172-31-85-18 hash: 24fd3157627c7567b687968967c6a5e8
149+
Static pod: kube-scheduler-ip-172-31-85-18 hash: 5179266fb24d4c1834814c4f69486371
150+
Static pod: etcd-ip-172-31-85-18 hash: 9dfc197f444be11fcc70ab1467b030b8
151+
[etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/tmp/kubeadm-upgraded-manifests089436939/etcd.yaml"
152+
[certificates] Using the existing etcd/ca certificate and key.
153+
[certificates] Using the existing etcd/server certificate and key.
154+
[certificates] Using the existing etcd/peer certificate and key.
155+
[certificates] Using the existing etcd/healthcheck-client certificate and key.
156+
[upgrade/staticpods] Moved new manifest to "/etc/kubernetes/manifests/etcd.yaml" and backed up old manifest to "/etc/kubernetes/tmp/kubeadm-backup-manifests-2018-06-14-20-56-11/etcd.yaml"
157+
[upgrade/staticpods] Waiting for the kubelet to restart the component
158+
Static pod: etcd-ip-172-31-85-18 hash: 9dfc197f444be11fcc70ab1467b030b8
159+
< snip >
160+
[apiclient] Found 1 Pods for label selector component=etcd
161+
[upgrade/staticpods] Component "etcd" upgraded successfully!
162+
[upgrade/etcd] Waiting for etcd to become available
163+
[util/etcd] Waiting 0s for initial delay
164+
[util/etcd] Attempting to see if all cluster endpoints are available 1/10
165+
[upgrade/staticpods] Writing new Static Pod manifests to "/etc/kubernetes/tmp/kubeadm-upgraded-manifests089436939"
166+
[controlplane] wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/tmp/kubeadm-upgraded-manifests089436939/kube-apiserver.yaml"
167+
[controlplane] wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/tmp/kubeadm-upgraded-manifests089436939/kube-controller-manager.yaml"
168+
[controlplane] wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/tmp/kubeadm-upgraded-manifests089436939/kube-scheduler.yaml"
169+
[certificates] Using the existing etcd/ca certificate and key.
170+
[certificates] Using the existing apiserver-etcd-client certificate and key.
171+
[upgrade/staticpods] Moved new manifest to "/etc/kubernetes/manifests/kube-apiserver.yaml" and backed up old manifest to "/etc/kubernetes/tmp/kubeadm-backup-manifests-2018-06-14-20-56-11/kube-apiserver.yaml"
172+
[upgrade/staticpods] Waiting for the kubelet to restart the component
173+
Static pod: kube-apiserver-ip-172-31-85-18 hash: 7a329408b21bc0c44d7b3b78ff8187bf
174+
< snip >
175+
[apiclient] Found 1 Pods for label selector component=kube-apiserver
176+
[upgrade/staticpods] Component "kube-apiserver" upgraded successfully!
177+
[upgrade/staticpods] Moved new manifest to "/etc/kubernetes/manifests/kube-controller-manager.yaml" and backed up old manifest to "/etc/kubernetes/tmp/kubeadm-backup-manifests-2018-06-14-20-56-11/kube-controller-manager.yaml"
178+
[upgrade/staticpods] Waiting for the kubelet to restart the component
179+
Static pod: kube-controller-manager-ip-172-31-85-18 hash: 24fd3157627c7567b687968967c6a5e8
180+
Static pod: kube-controller-manager-ip-172-31-85-18 hash: 63992ff14733dcb9dcfa6ac0a3b8031a
181+
[apiclient] Found 1 Pods for label selector component=kube-controller-manager
182+
[upgrade/staticpods] Component "kube-controller-manager" upgraded successfully!
183+
[upgrade/staticpods] Moved new manifest to "/etc/kubernetes/manifests/kube-scheduler.yaml" and backed up old manifest to "/etc/kubernetes/tmp/kubeadm-backup-manifests-2018-06-14-20-56-11/kube-scheduler.yaml"
184+
[upgrade/staticpods] Waiting for the kubelet to restart the component
185+
Static pod: kube-scheduler-ip-172-31-85-18 hash: 5179266fb24d4c1834814c4f69486371
186+
Static pod: kube-scheduler-ip-172-31-85-18 hash: 831e4b9425f758e572392976311e56d9
187+
[apiclient] Found 1 Pods for label selector component=kube-scheduler
188+
[upgrade/staticpods] Component "kube-scheduler" upgraded successfully!
189+
[uploadconfig] storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace
190+
[kubelet] Creating a ConfigMap "kubelet-config-1.11" in namespace kube-system with the configuration for the kubelets in the cluster
191+
[kubelet] Downloading configuration for the kubelet from the "kubelet-config-1.11" ConfigMap in the kube-system namespace
192+
[kubelet] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml"
193+
[patchnode] Uploading the CRI Socket information "/var/run/dockershim.sock" to the Node API object "ip-172-31-85-18" as an annotation
194+
[bootstraptoken] configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials
195+
[bootstraptoken] configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token
196+
[bootstraptoken] configured RBAC rules to allow certificate rotation for all node client certificates in the cluster
197+
[addons] Applied essential addon: CoreDNS
198+
[addons] Applied essential addon: kube-proxy
199+
200+
[upgrade/successful] SUCCESS! Your cluster was upgraded to "v1.11.0-beta.2.78+e0b33dbc2bde88". Enjoy!
201+
202+
[upgrade/kubelet] Now that your control plane is upgraded, please proceed with upgrading your kubelets if you haven't already done so.
203+
```
204+
205+
To upgrade the cluster with CoreDNS as the default internal DNS, invoke `kubeadm upgrade apply` with the `--feature-gates=CoreDNS=true` flag.
206+
`kubeadm upgrade apply` does the following:
207+
208+
- Checks that your cluster is in an upgradeable state:
209+
- The API server is reachable,
210+
- All nodes are in the `Ready` state
211+
- The control plane is healthy
212+
- Enforces the version skew policies.
213+
- Makes sure the control plane images are available or available to pull to the machine.
214+
- Upgrades the control plane components or rollbacks if any of them fails to come up.
215+
- Applies the new `kube-dns` and `kube-proxy` manifests and enforces that all necessary RBAC rules are created.
216+
- Creates new certificate and key files of apiserver and backs up old files if they're about to expire in 180 days.
217+
218+
4. Manually upgrade your Software Defined Network (SDN).
219+
220+
Your Container Network Interface (CNI) provider may have its own upgrade instructions to follow.
221+
Check the [addons](/docs/concepts/cluster-administration/addons/) page to
222+
find your CNI provider and see if there are additional upgrade steps
223+
necessary.
224+
225+
## Upgrading your master and node packages
226+
227+
For each host (referred to as `$HOST` below) in your cluster, upgrade `kubelet` by executing the following commands:
228+
229+
1. Prepare the host for maintenance, marking it unschedulable and evicting the workload:
230+
231+
```shell
232+
kubectl drain $HOST --ignore-daemonsets
233+
```
234+
235+
When running this command against the master host, `--ignore-daemonsets` is required:
236+
237+
```shell
238+
kubectl drain ip-172-31-85-18
239+
node "ip-172-31-85-18" cordoned
240+
error: unable to drain node "ip-172-31-85-18", aborting command...
241+
242+
There are pending nodes to be drained:
243+
ip-172-31-85-18
244+
error: DaemonSet-managed pods (use --ignore-daemonsets to ignore): calico-node-5798d, kube-proxy-thjp9
245+
```
246+
247+
```
248+
kubectl drain ip-172-31-85-18 --ignore-daemonsets
249+
node "ip-172-31-85-18" already cordoned
250+
WARNING: Ignoring DaemonSet-managed pods: calico-node-5798d, kube-proxy-thjp9
251+
node "ip-172-31-85-18" drained
252+
```
253+
254+
2. Upgrade the Kubernetes package versions on the `$HOST` node by using a Linux distribution-specific package manager:
255+
256+
If the host is running a Debian-based distro such as Ubuntu, run:
257+
258+
```shell
259+
apt-get update
260+
apt-get upgrade
261+
```
262+
263+
If the host is running CentOS or the like, run:
264+
265+
```shell
266+
yum update
267+
```
268+
269+
3. Restart the kubectl process with
270+
```shell
271+
sudo systemctl restart kubelet
272+
```
273+
274+
Now the new version of the `kubelet` should be running on the host. Verify this using the following command on `$HOST`:
275+
276+
```shell
277+
systemctl status kubelet
278+
```
279+
280+
4. Bring the host back online by marking it schedulable:
281+
282+
```shell
283+
kubectl uncordon $HOST
284+
```
285+
286+
5. After upgrading `kubelet` on each host in your cluster, verify that all nodes are available again by executing the following (from anywhere, for example, from outside the cluster):
287+
288+
```shell
289+
kubectl get nodes
290+
```
291+
292+
If the `STATUS` column of the above command shows `Ready` for all of your hosts and the version you expect, you are done.
293+
294+
## Recovering from a failure state
295+
296+
If `kubeadm upgrade` somehow fails and fails to roll back, for example due to an unexpected shutdown during execution,
297+
you can run `kubeadm upgrade` again as it is idempotent and should eventually make sure the actual state is the desired state you are declaring.
298+
299+
You can use `kubeadm upgrade` to change a running cluster with `x.x.x --> x.x.x` with `--force`, which can be used to recover from a bad state.
300+
301+
{{% /capture %}}
302+
303+

0 commit comments

Comments
 (0)