您的位置:首页 > 游戏 > 手游 > 灰色广告投放平台_wap文字游戏源码_如何联系百度客服_网络推广平台软件app

灰色广告投放平台_wap文字游戏源码_如何联系百度客服_网络推广平台软件app

2024/12/22 2:48:27 来源:https://blog.csdn.net/qianghong000/article/details/144459229  浏览:    关键词:灰色广告投放平台_wap文字游戏源码_如何联系百度客服_网络推广平台软件app
灰色广告投放平台_wap文字游戏源码_如何联系百度客服_网络推广平台软件app

部署 ECK [2.12]

安装说明

ElasticCloudonKubernetes(ECK)是一个 Elasticsearch Operator,但远不止于此。ECK 使用 Kubernetes Operator 模式构建而成,需要安装在您的 Kubernetes 集群内;
借助 Elastic Cloud on Kubernetes (ECK),您可以扩展基本的 Kubernetes 编排功能,以轻松部署、保护、升级 Elasticsearch 集群等。

基于Operator 模式的Elastic Cloud on Kubernetes,是 Elastic 推荐的在 Kubernetes 上部署 Elasticsearch、Kibana 和 APM Server 的方法。 ECK 有一个专用的 Helm 图表,可以 在 ECK 存储库(文档)中找到。

ECK中集成了大量es的运维工作:

  • 管理和监测多个集群
  • 轻松升级至新的版本
  • 扩大或缩小集群容量
  • 更改集群配置
  • 动态调整本地存储的规模(包括 Elastic Local Volume(一款本地存储驱动器))
  • 备份

支持版本

  • Kubernetes 1.25-1.29
  • OpenShift 4.11-4.14
  • Google Kubernetes Engine (GKE), Azure Kubernetes Service (AKS), and Amazon Elastic - Kubernetes Service (EKS)
  • Helm: 3.2.0+
  • Elasticsearch, Kibana, APM Server: 6.8+, 7.1+, 8+
  • Enterprise Search: 7.7+, 8+
  • Beats: 7.0+, 8+
  • Elastic Agent: 7.10+ (standalone), 7.14+ (Fleet), 8+
  • Elastic Maps Server: 7.11+, 8+
  • Logstash: 8.7+

从 ECK 1.3.0 开始,Helm 图表可用于安装 ECK。它可以从 Elastic Helm 存储库中获取,并且可以通过运行以下命令将其添加到您的 Helm 存储库列表中:

helm repo add elastic https://helm.elastic.co
helm repo update
# 查看图表的所有可用版本
helm search repo elastic/eck-operator --versions

Helm 支持的最低版本是 3.2.0。

限制安装

ECK operator 默认运行在elastic-system命名空间中。建议您为工作负载选择专用命名空间,而不是使用elastic-system或default命名空间。

安装CRD

此模式避免安装任何集群范围的资源,并限制操作员仅管理一组预定义的命名空间。
由于 CRD 是全局资源,因此它们仍然需要由管理员安装。这可以通过以下方式实现:

# 创建命名空间
kubectl create ns apm# 指定版本安装
helm install --create-namespace -n apm elastic-operator-crds elastic/eck-operator-crds --version 2.12.1

这个操作可以由对他们希望管理的命名空间集具有完全访问权限的任何用户安装。

安装operator

以下示例将运算符安装到 elastic-system 命名空间,并将其配置为仅管理 elastic-system 和 apm:

# 下载指定版本图表
# 下载指定版本图表
helm pull elastic/eck-operator --version 2.12.1
tar zxvf eck-operator-2.12.1.tgz
helm upgrade --install elastic-operator elastic/eck-operator \-n apm --create-namespace \--values="eck-operator/values.yaml" \--set=installCRDs=false \--set=managedNamespaces='{apm,}' \--set=createClusterScopedResources=false \--set=webhook.enabled=false \--set=config.validateStorageClass=false

eck-operator 图表包含多个预定义的配置文件,可帮助您在不同的配置中安装 operator。这些配置文件可以在图表目录的根目录中找到,以 profile- 为前缀。例如,前面的代码提取中所示的受限配置是在 profile-restricted.yaml 文件中定义的。

查看可用的配置选项

您可以通过运行以下命令来查看所有可配置值:

helm show values elastic/eck-operator -n apm
验证服务

验证一下是否安装成功

[root@node1 ~]# kubectl get pods -n apm
NAME                 READY   STATUS    RESTARTS   AGE
elastic-operator-0   1/1     Running   0          5m29s

监控 operator 日志:

kubectl -n apm logs -f statefulset.apps/elastic-operator

这个时候会安装上若干个 CRD 对象,当然这些 CRD 资源的控制器就在上面的 elastic-operator-0 这个 Pod 中:

$ kubectl get crd  | grep elastic
agents.agent.k8s.elastic.co                                 2024-05-08T03:26:15Z
apmservers.apm.k8s.elastic.co                               2024-05-08T03:26:15Z
beats.beat.k8s.elastic.co                                   2024-05-08T03:26:15Z
elasticmapsservers.maps.k8s.elastic.co                      2024-05-08T03:26:15Z
elasticsearchautoscalers.autoscaling.k8s.elastic.co         2024-05-08T03:26:15Z
elasticsearches.elasticsearch.k8s.elastic.co                2024-05-08T03:26:15Z
enterprisesearches.enterprisesearch.k8s.elastic.co          2024-05-08T03:26:15Z
kibanas.kibana.k8s.elastic.co                               2024-05-08T03:26:15Z
logstashes.logstash.k8s.elastic.co                          2024-05-08T03:26:15Z
stackconfigpolicies.stackconfigpolicy.k8s.elastic.co        2024-05-08T03:26:15Z

然后我们可以利用 CRD 对象来创建一个非常简单的单个 Elasticsearch 集群

创建ES存储

创建存储类

创建华为云sfs存储类
创建文件 sfsturbo-es-sc.yaml
---
apiVersion: storage.k8s.io/v1
allowVolumeExpansion: true
kind: StorageClass
metadata:name: sfsturbo-es-sc
mountOptions:
- vers=3
- nolock
- timeo=600
- hard
parameters:csi.storage.k8s.io/csi-driver-name: sfsturbo.csi.everest.iocsi.storage.k8s.io/fstype: nfseverest.io/archive-on-delete: "true"everest.io/share-access-to: 4f9789b0-xxxx-xxxx-xxxx-cxxxx75dxxxx # subpath模式下,填写SFS Turbo资源的所在VPC的ID。everest.io/share-export-location: 3967e677-xxxx-xxxx-xxxx-xxxxxxx8xxxx.sfsturbo.internal:/APM/Elasticsearcheverest.io/share-source: sfs-turboeverest.io/volume-as: subpath # 该参数需设置为“subpath”来使用subpath模式。everest.io/volume-id: 3967e677-xxxx-xxxx-xxxx-xxxx3xxxxxxx # SFS Turbo资源的卷ID
provisioner: everest-csi-provisioner
allowVolumeExpansion: true
volumeBindingMode: Immediate
reclaimPolicy: Retain
创建nfs存储类
1. 安装配置nfs
# 所有节点安装nfs客户端
# 本文k8s节点系统版本为 RockyLinux 9.2
yum install -y nfs-utils
2. 为nfs创建rabc

创建文件nfs-rbac.yaml

kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: nfs-provisioner-runner
rules:- apiGroups: [""]resources: ["persistentvolumes"]verbs: ["get", "list", "watch", "create", "delete"]- apiGroups: [""]resources: ["persistentvolumeclaims"]verbs: ["get", "list", "watch", "update"]- apiGroups: ["storage.k8s.io"]resources: ["storageclasses"]verbs: ["get", "list", "watch"]- apiGroups: [""]resources: ["events"]verbs: ["create", "update", "patch"]- apiGroups: [""]resources: ["services", "endpoints"]verbs: ["get"]- apiGroups: ["extensions"]resources: ["podsecuritypolicies"]resourceNames: ["nfs-provisioner"]verbs: ["use"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: run-nfs-provisioner
subjects:- kind: ServiceAccountname: nfs-provisioner# replace with namespace where provisioner is deployednamespace: default
roleRef:kind: ClusterRolename: nfs-provisioner-runnerapiGroup: rbac.authorization.k8s.io
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: leader-locking-nfs-provisioner
rules:- apiGroups: [""]resources: ["endpoints"]verbs: ["get", "list", "watch", "create", "update", "patch"]
---
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: leader-locking-nfs-provisioner
subjects:- kind: ServiceAccountname: nfs-provisioner# replace with namespace where provisioner is deployednamespace: default
roleRef:kind: Rolename: leader-locking-nfs-provisionerapiGroup: rbac.authorization.k8s.io
kubectl apply -f nfs-rbac.yaml
3. 创建nfs provisioner

创建文件nfs-provisioner.yaml

apiVersion: v1
kind: ServiceAccount
metadata:name: nfs-provisioner
---
kind: Service
apiVersion: v1
metadata:name: nfs-provisionerlabels:app: nfs-provisioner
spec:ports:- name: nfsport: 2049- name: nfs-udpport: 2049protocol: UDP- name: nlockmgrport: 32803- name: nlockmgr-udpport: 32803protocol: UDP- name: mountdport: 20048- name: mountd-udpport: 20048protocol: UDP- name: rquotadport: 875- name: rquotad-udpport: 875protocol: UDP- name: rpcbindport: 111- name: rpcbind-udpport: 111protocol: UDP- name: statdport: 662- name: statd-udpport: 662protocol: UDPselector:app: nfs-provisioner
---
kind: Deployment
apiVersion: apps/v1
metadata:name: nfs-provisioner
spec:selector:matchLabels:app: nfs-provisionerreplicas: 1strategy:type: Recreate template:metadata:labels:app: nfs-provisionerspec:serviceAccount: nfs-provisionercontainers:- name: nfs-provisioner# image: registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8image: k8s.dockerproxy.com/sig-storage/nfs-provisioner:v4.0.8ports:- name: nfscontainerPort: 2049- name: nfs-udpcontainerPort: 2049protocol: UDP- name: nlockmgrcontainerPort: 32803- name: nlockmgr-udpcontainerPort: 32803protocol: UDP- name: mountdcontainerPort: 20048- name: mountd-udpcontainerPort: 20048protocol: UDP- name: rquotadcontainerPort: 875- name: rquotad-udpcontainerPort: 875protocol: UDP- name: rpcbindcontainerPort: 111- name: rpcbind-udpcontainerPort: 111protocol: UDP- name: statdcontainerPort: 662- name: statd-udpcontainerPort: 662protocol: UDPsecurityContext:capabilities:add:- DAC_READ_SEARCH- SYS_RESOURCEargs:- "-provisioner=tiga.cc/nfs"env:- name: POD_IPvalueFrom:fieldRef:fieldPath: status.podIP- name: SERVICE_NAMEvalue: nfs-provisioner- name: POD_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespaceimagePullPolicy: "IfNotPresent"volumeMounts:- name: export-volumemountPath: /exportvolumes:- name: export-volumehostPath:path: /data/nfs

创建nfs-provisioner

kubectl apply -f nfs-provisioner.yaml

**
查看nfs provisioner状态**

kubectl get pods --selector='app=nfs-provisioner'

输出

NAME                               READY   STATUS    RESTARTS   AGE
nfs-provisioner-7d997c56c5-jhl2x   1/1     Running   0          15h
4. 创建StorageClass

创建文件nfs-class.yaml

kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:name: tiga-nfs
provisioner: tiga.cc/nfs
mountOptions:- vers=4.1

创建nfs stroage class

kubectl apply -f nfs-class.yaml

创建PVC 动态绑定

手动创建PVC 绑定,防止部署变更过程中存储卷变更!!!

手动创建以下pvc
  • elasticsearch-data-es-quickstart-es-default-0
  • elasticsearch-data-es-quickstart-es-default-1
  • elasticsearch-data-es-quickstart-es-default-2

PVC 配置如下:

---
kind: PersistentVolumeClaim
apiVersion: v1
metadata:name: elasticsearch-data-es-quickstart-es-default-0namespace: apm
spec:accessModes:- ReadWriteManyresources:requests:storage: 50GistorageClassName: sfsturbo-es-scvolumeMode: Filesystem
---
kind: PersistentVolumeClaim
apiVersion: v1
metadata:name: elasticsearch-data-es-quickstart-es-default-1namespace: apm
spec:accessModes:- ReadWriteManyresources:requests:storage: 50GistorageClassName: sfsturbo-es-scvolumeMode: Filesystem
---
kind: PersistentVolumeClaim
apiVersion: v1
metadata:name: elasticsearch-data-es-quickstart-es-default-2namespace: apm
spec:accessModes:- ReadWriteManyresources:requests:storage: 50GistorageClassName: sfsturbo-es-scvolumeMode: Filesystem

手动创建pvc

kubectl apply -f pvc.yaml

部署Elasticsearch集群 [7.17.3]

如果您的 Kubernetes 集群没有任何具有至少 2GiB 可用内存的 Kubernetes 节点,则 pod 将陷入Pending状态。检查管理计算资源以获取有关资源要求以及如何配置资源的更多信息。

API接口文档参考:https://www.elastic.co/guide/en/cloud-on-k8s/1.0/k8s-elasticsearch-k8s-elastic-co-v1.html

利用 CRD 对象来创建 Elasticsearch 集群:

声明了要创建一个 7.17.3 版本的 Elasticsearch 资源对象:

以下示例:在 HTTP 网络层上禁用 TLS/SSL,确保 HTTP 在非加密端口上可用。

---
apiVersion: elasticsearch.k8s.elastic.co/v1
kind: Elasticsearch
metadata:name: es-quickstartnamespace: "apm"
spec:version: 7.17.3updateStrategy:changeBudget:maxSurge: 1maxUnavailable: 0# https://www.elastic.co/guide/en/cloud-on-k8s/2.12/k8s-elasticsearch-specification.htmlnodeSets:- name: defaultcount: 3config:node.roles: ["master", "data", "ingest"]# On Elasticsearch versions before 7.9.0, replace the node.roles configuration with the following:#node.master: true#node.data: true#node.ingest: truenode.store.allow_mmap: falsenode.attr.attr_name: attr_value#开启跨域访问支持,默认为falsehttp.cors.enabled: true#跨域访问允许的域名地址,(允许所有域名)以上使用正则http.cors.allow-origin: /.*/http.cors.allow-headers: Authorization,X-Requested-With,Content-Length,Content-Type#设置节点在再次询问其对等方之后将等待多长时间,然后才认为请求失败。默认为3s.discovery.request_peers_timeout: 30s#设置集群中N个数据节点加入集群后就可以进行数据恢复gateway.recover_after_data_nodes: 2#设置初始化数据恢复进程的超时时间,默认是5分钟。gateway.recover_after_time: 3m#集群中预期的数据节点数。当预期数量的数据节点加入集群时,本地分片的恢复开始。默认为0.gateway.expected_data_nodes: 3#禁用内置令牌服务,确保 HTTP 在非加密端口上可用。xpack.security.http.ssl.enabled: false#启用自动创建索引action.auto_create_index: true#设置集群最大shard(分片)数cluster.max_shards_per_node: 10000podTemplate:metadata:labels:app: elasticsearchspec:containers:- name: elasticsearchenv:# 健康检测协议- name: READINESS_PROBE_PROTOCOLvalue: "http"resources:requests:# ECK Operator默认申请4g内存memory: 1Gicpu: 1limits:memory: 8Gicpu: 4volumeClaimTemplates:- metadata:name: elasticsearch-data # 除非你为数据路径设置了卷挂载,否则不要更改此名称。spec:accessModes:- ReadWriteOnceresources:requests:storage: 50GistorageClassName: sfsturbo-elasticsearch-sc
部署Elasticsearch 应用
kubectl apply -f elastic.yaml

如若部署不成功,请检查日志:
kubectl logs --tail=30 -f pod/elastic-operator-0 -n apm

验证服务

查看es集群信息
[root@node1 ~]# kubectl get elasticsearch -n apm
NAME            HEALTH   NODES   VERSION   PHASE   AGE
es-quickstart   green    3       7.17.3    Ready   6m54s[root@node1 ~]# kubectl get pods --selector='elasticsearch.k8s.elastic.co/cluster-name=es-quickstart' -n apm
NAME                         READY   STATUS    RESTARTS   AGE
es-quickstart-es-default-0   1/1     Running   0          7m44s
es-quickstart-es-default-1   1/1     Running   0          7m44s
es-quickstart-es-default-2   1/1     Running   0          7m44s[root@node1 ~]# kubectl get secret -n apm
NAME                                          TYPE                             DATA   AGE
default-secret                                kubernetes.io/dockerconfigjson   1      7h32m
es-quickstart-es-default-es-config            Opaque                           1      52m
es-quickstart-es-default-es-transport-certs   Opaque                           7      52m
es-quickstart-es-elastic-user                 Opaque                           1      52m
es-quickstart-es-http-ca-internal             Opaque                           2      52m
es-quickstart-es-http-certs-internal          Opaque                           3      52m
es-quickstart-es-http-certs-public            Opaque                           2      52m
es-quickstart-es-internal-users               Opaque                           4      52m
es-quickstart-es-remote-ca                    Opaque                           1      52m
es-quickstart-es-transport-ca-internal        Opaque                           2      52m
es-quickstart-es-transport-certs-public       Opaque                           1      52m
es-quickstart-es-xpack-file-realm             Opaque                           4      52m
paas.elb                                      cfe/secure-opaque                1      7h32m
sh.helm.release.v1.elastic-operator-crds.v1   helm.sh/release.v1               1      6h35m
sh.helm.release.v1.elastic-operator.v1        helm.sh/release.v1               1      6h24m
sh.helm.release.v1.elastic-operator.v2        helm.sh/release.v1               1      6h22m
查看pvc
[root@node1 ~]# kubectl get pvc -n apmNAME                                            STATUS   VOLUME                                     CAPACITY   ACCESS MODES   STORAGECLASS     AGE
elasticsearch-data-es-quickstart-es-default-0   Bound    pvc-1ac4866b-8b09-4a65-ac66-a979197588b6   50Gi       RWO            sfsturbo-es-sc   75m
elasticsearch-data-es-quickstart-es-default-1   Bound    pvc-8bfc5118-2eba-403d-a705-4d3d179dbe79   50Gi       RWO            sfsturbo-es-sc   75m
elasticsearch-data-es-quickstart-es-default-2   Bound    pvc-7f4b715b-a8da-4a03-80e7-9ad202d5882c   50Gi       RWO            sfsturbo-es-sc   75m
请求 Elasticsearch 访问权限
[root@node1 ~]# kubectl get service es-quickstart-es-http -n apmNAME                    TYPE        CLUSTER-IP     EXTERNAL-IP   PORT(S)    AGE
es-quickstart-es-http   ClusterIP   10.247.80.98   <none>        9200/TCP   11m
# 获取elastic用户密码(根据实际用户执行)
PASSWORD=$(kubectl get secret es-quickstart-es-elastic-user -n apm -o go-template='{{ index .data "elastic" | base64decode }}')
验证集群健康状态
kubectl exec es-quickstart-es-default-0 -n apm -- curl -s -u "elastic:$PASSWORD" -k "https://es-quickstart-es-http:9200/_cluster/health?pretty"

输出

Defaulted container "elasticsearch" out of: elasticsearch, elastic-internal-init-filesystem (init), elastic-internal-suspend (init)
1715163850 10:24:10 es-quickstart green 3 3 2 1 0 0 0 0 - 100.0%

部署Kibana [7.17.3]

部署kibana 指定命名空间与镜像版本

cat << EOF > kibana.yaml 
---
apiVersion: kibana.k8s.elastic.co/v1
kind: Kibana
metadata:name: quickstartnamespace: apm
spec:version: 7.17.3count: 1http:tls:selfSignedCertificate:disabled: trueconfig:#中文汉化i18n.locale: "zh-CN"# ElasticsearchRef 是对在同一 Kubernetes 集群中运行的 Elasticsearch 集群的引用。elasticsearchRef:# 与ECK管理的弹性资源对应的现有Kubernetes对象的名称。name: es-quickstart
EOF

配置使用 HTTP 方式连接到ES集群

---
apiVersion: kibana.k8s.elastic.co/v1
kind: Kibana
metadata:name: quickstartnamespace: apm
spec:version: 7.17.3count: 1http:tls:selfSignedCertificate:disabled: trueconfig:#中文汉化i18n.locale: "zh-CN"server.publicBaseUrl: "http://kibana.qshtest.com"elasticsearch.hosts:- http://es-quickstart-es-http.apm.svc:9200elasticsearch.username: elasticelasticsearch.password: "q8yg6903qOa7BNmo7199yjs2"elasticsearch.requestHeadersWhitelist:- authorizationpodTemplate:spec:containers:- name: kibanaenv:- name: NODE_OPTIONSvalue: "--max-old-space-size=4096"resources:requests:memory: 1Gicpu: 0.5limits:memory: 4Gicpu: 2nodeSelector:role: apm

部署应用

kubectl apply -f kibana.yaml

如果 Elasticsearch 集群与 Kibana 运行在同一个命名空间中,则命名空间的使用是可选的。可以指定一个额外的 serviceName 属性来面向自定义 Kubernetes 服务。有关详细信息,请参阅 Traffic Splitting 。

监控日志

日志打印如下,表示部署成功。
image.png

监控 Kibana 健康状况和创建进度。

与 Elasticsearch 类似,您可以检索有关 Kibana 实例的详细信息:

kubectl get kibana -n apm

以及相关的 Pod:

kubectl get pod -n apm --selector='kibana.k8s.elastic.co/name=quickstart'

访问 Kibana

ClusterIP系统会自动为 Kibana 创建一个Service:

kubectl get service quickstart-kb-http -n apm

用kubectl port-forward从本地工作站访问 Kibana:

kubectl port-forward service/quickstart-kb-http 5601

https://localhost:5601在浏览器中打开。您的浏览器将显示警告,因为默认配置的自签名证书未经过已知证书颁发机构的验证,并且不受您的浏览器信任。出于本快速入门的目的,您可以暂时确认该警告,但强烈建议您为任何生产部署配置有效的证书。
以elastic用户身份登录。可以通过以下命令获取密码:

kubectl get secret es-quickstart-es-elastic-user -n apm -o=jsonpath='{.data.elastic}' | base64 --decode; echo

API接口调试

ES7 集群状态信息 API

获取集群健康状态
GET /_cluster/health

使用 GET 请求来获取集群的健康状态。以下是一个示例:

kubectl exec es-quickstart-es-default-0 -n apm -- curl  -s -u "elastic:$PASSWORD" -k "https://es-quickstart-es-http:9200/_cluster/health?pretty"

image.png

获取索引信息

使用 GET 请求来获取有关集群中索引的信息。以下是一个示例:

GET /_cat/indices?v

image.png

更多API接口文档:https://www.elastic.co/guide/en/elasticsearch/reference/7.17/rest-apis.html


安装elasticsearch-head插件

下载es-head插件

es-head插件地址:

mkdir files
# 下载源码包
wget -O files/elasticsearch-head-master.zip https://github.com/mobz/elasticsearch-head/archive/refs/heads/master.zip

Dockerfile 编写

FROM node:alpineWORKDIR /opt/
COPY files/elasticsearch-head-master.zip .RUN apk -U add zip unzip && \rm -rf /var/cache/apk/*RUN unzip elasticsearch-head-master.zip \&& rm -rf elasticsearch-head-master.zipWORKDIR /opt/elasticsearch-head-masterRUN npm install grunt-cliEXPOSE 9100CMD [ "/bin/sh", "-c", "npm run start" ]

build 构建

docker build -t elasticsearch-head:latest .
sudo docker tag elasticsearch-head:latest swr.cn-north-4.myhuaweicloud.com/ops-tools/elasticsearch-head:latest
sudo docker push swr.cn-north-4.myhuaweicloud.com/ops-tools/elasticsearch-head:latest

Deployment 编写

cat << EOF > elasticsearch-head.yaml
---
apiVersion: apps/v1
kind: Deployment
metadata:name: elasticsearch-headnamespace: apm
spec:replicas: 1selector:matchLabels:app: elasticsearch-headtemplate:metadata:labels:app: elasticsearch-headspec:containers:- name: elasticsearch-headimage: swr.cn-north-4.myhuaweicloud.com/ops-tools/elasticsearch-head:latestimagePullSecrets:- name: default-registry-secret
---
apiVersion: v1  # 资源版本
kind: Service  # 资源类型
metadata: # 元数据name: elasticsearch-head # 资源名称namespace: apm # 命名空间
spec: # 描述selector: # 标签选择器,用于确定当前service代理哪些podapp: elasticsearch-headtype: NodePort # service类型ports: # 端口信息- protocol: TCPname: elasticsearch-headport: 9100  # service端口targetPort: 9100 # pod端口
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:name: ingress-es-headnamespace: apm
spec:ingressClassName: nginx-ingressrules:- host: es-head.qsh.cnhttp:paths:- path: /pathType: ImplementationSpecificbackend:service:name: elasticsearch-headport:number: 9100
EOF

部署应用

kubectl apply -f elasticsearch-head.yaml

部署后,浏览器访问 http://es-head.qsh.cn

版权声明:

本网仅为发布的内容提供存储空间,不对发表、转载的内容提供任何形式的保证。凡本网注明“来源:XXX网络”的作品,均转载自其它媒体,著作权归作者所有,商业转载请联系作者获得授权,非商业转载请注明出处。

我们尊重并感谢每一位作者,均已注明文章来源和作者。如因作品内容、版权或其它问题,请及时与我们联系,联系邮箱:809451989@qq.com,投稿邮箱:809451989@qq.com