Illumina Innovates with Rancher and Kubernetes
Available from v2.1.0 to v2.1.9 and v2.2.0 to v2.2.3
This section describes how to provision Windows clusters in Rancher v2.1.x and v2.2.x. If you are using Rancher v2.3.0 or later, please refer to the new documentation for v2.3.0 or later.
When you create a custom cluster, Rancher uses RKE (the Rancher Kubernetes Engine) to provision the Kubernetes cluster on your existing infrastructure.
You can provision a custom Windows cluster using Rancher by using a mix of Linux and Windows hosts as your cluster nodes.
Important: In versions of Rancher prior to v2.3, support for Windows nodes is experimental. Therefore, it is not recommended to use Windows nodes for production environments if you are using Rancher prior to v2.3.
This guide walks you through create of a custom cluster that includes three nodes:
For a summary of Kubernetes features supported in Windows, see Using Windows in Kubernetes.
When setting up a custom cluster with support for Windows nodes and containers, complete the series of tasks below.
To begin provisioning a custom cluster with Windows support, prepare your host servers. Provision three nodes according to our requirements—two Linux, one Windows. Your hosts can be:
The table below lists the Kubernetes roles you’ll assign to each host, although you won’t enable these roles until further along in the configuration process—we’re just informing you of each node’s purpose. The first node, a Linux host, is primarily responsible for managing the Kubernetes control plane, although, in this use case, we’re installing all three roles on this node. Node 2 is also a Linux worker, which is responsible for Ingress support. Finally, the third node is your Windows worker, which will run your Windows applications.
Note: This step only applies to nodes hosted on cloud-hosted virtual machines. If you’re using virtualization clusters or bare-metal servers, skip ahead to Create the Custom Cluster.
If you’re hosting your nodes on any of the cloud services listed below, you must disable the private IP address checks for both your Linux or Windows hosts on startup. To disable this check for each node, follow the directions provided by each service below.
To create a custom cluster that supports Windows nodes, follow the instructions in Creating a Cluster with Custom Nodes, starting from 2. Create the Custom Cluster. While completing the linked instructions, look for steps that requires special actions for Windows nodes, which are flagged with a note. These notes will link back here, to the special Windows instructions listed in the subheadings below.
While choosing Cluster Options, set Windows Support (Experimental) to Enabled.
After you select this option, resume Creating a Cluster with Custom Nodes from step 6.
When choosing a network provider for a cluster that supports Windows, the only option available is Flannel, as host-gw is needed for IP routing.
If your nodes are hosted by a cloud provider and you want automation support such as load balancers or persistent storage devices, see Selecting Cloud Providers for configuration info.
The first node in your cluster should be a Linux host that fills the Control Plane role. This role must be fulfilled before you can add Windows hosts to your cluster. At minimum, the node must have this role enabled, but we recommend enabling all three. The following table lists our recommended settings (we’ll provide the recommended settings for nodes 2 and 3 later).
When you’re done with these configurations, resume Creating a Cluster with Custom Nodes from step 8.
After the initial provisioning of your custom cluster, your cluster only has a single Linux host. Add another Linux host, which will be used to support Ingress for your cluster.
Using the content menu, open the custom cluster your created in 2. Create the Custom Cluster.
From the main menu, select Nodes.
Click Edit Cluster.
Scroll down to Node Operating System. Choose Linux.
Select the Worker role.
Copy the command displayed on screen to your clipboard.
Log in to your Linux host using a remote Terminal connection. Run the command copied to your clipboard.
From Rancher, click Save.
Result: The worker role is installed on your Linux host, and the node registers with Rancher.
You can add Windows hosts to a custom cluster by editing the cluster and choosing the Windows option.
Scroll down to Node Operating System. Choose Windows.
Log in to your Windows host using your preferred tool, such as Microsoft Remote Desktop. Run the command copied to your clipboard in the Command Prompt (CMD).
Optional: Repeat these instruction if you want to add more Windows nodes to your cluster.
Result: The worker role is installed on your Windows host, and the node registers with Rancher.
In Windows clusters, containers communicate with each other using the host-gw mode of Flannel. In host-gw mode, all containers on the same node belong to a private subnet, and traffic routes from a subnet on one node to a subnet on another node through the host network.
host-gw
When worker nodes are provisioned on AWS, virtualization clusters, or bare metal servers, make sure they belong to the same layer 2 subnet. If the nodes don’t belong to the same layer 2 subnet, host-gw networking will not work.
When worker nodes are provisioned on GCE or Azure, they are not on the same layer 2 subnet. Nodes on GCE and Azure belong to a routable layer 3 network. Follow the instructions below to configure GCE and Azure so that the cloud network knows how to route the host subnets on each node.
To configure host subnet routing on GCE or Azure, first run the following command to find out the host subnets on each worker node:
kubectl get nodes -o custom-columns=nodeName:.metadata.name,nodeIP:status.addresses[0].address,routeDestination:.spec.podCIDR
Then follow the instructions for each cloud provider to configure routing rules for each node: