Deploy sw with helm #12607
kailongapple
started this conversation in
Show and tell
Deploy sw with helm
#12607
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
info
RKE2
apt-get install lrzsz -y
ln -sf /usr/share/zoneinfo/Asia/Shanghai /etc/localtime
dpkg-reconfigure --frontend noninteractive tzdata
hostnamectl set-hostname apm28
mkdir /root/rke2-artifacts && cd /root/rke2-artifacts/
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/rke2-images.linux-amd64.tar.zst
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/rke2.linux-amd64.tar.gz
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/sha256sum-amd64.txt
curl -sfL https://get.rke2.io --output install.sh
INSTALL_RKE2_ARTIFACT_PATH=/root/rke2-artifacts sh install.sh
systemctl enable rke2-server
systemctl start rke2-server
cat > /etc/profile.d/rek2.sh << EOF
##rek2
export PATH=$PATH:/var/lib/rancher/rke2/bin
export KUBECONFIG=/etc/rancher/rke2/rke2.yaml
export CONTAINERD_ADDRESS=/run/k3s/containerd/containerd.sock
export CRICTL_CONFIG_PATH=/var/lib/rancher/rke2/agent/etc/crictl.yaml
EOF
ln -snf /var/lib/rancher/rke2/agent/etc/crictl.yaml /etc/crictl.yaml
ln -snf /run/k3s/containerd/containerd.sock /run/containerd/containerd.sock
cat > /etc/profile.d/tab.sh << EOF
source /usr/share/bash-completion/bash_completion
source <(kubectl completion bash)
source <(helm completion bash)
source <(k9s completion bash)
EOF
NFS
sudo apt update
sudo apt install nfs-kernel-server
mkdir -p /data
cat >> /etc/exports << EOF
/data *(rw,sync,no_root_squash)
EOF
sudo systemctl restart nfs-kernel-server
sudo systemctl enable nfs-kernel-server
showmount -e localhost
exportfs -v
nfs-subdir-external-provisioner
helm repo add nfs-subdir-external-provisioner https://kubernetes-sigs.github.io/nfs-subdir-external-provisioner
helm install nfs-subdir-external-provisioner nfs-subdir-external-provisioner/nfs-subdir-external-provisioner
-n nfs-system
--set storageClass.name=nfs
--set storageClass.defaultClass=true
--set nfs.server=192.168.2.28
--set nfs.path=/data
--create-namespace
kubectl get sc nfs -o wide
kubectl get deployment -n nfs-system -o wide
skywalking
export SKYWALKING_RELEASE_VERSION=4.6.0
export SKYWALKING_RELEASE_NAME=skywalking
export SKYWALKING_RELEASE_NAMESPACE=apm
helm install "${SKYWALKING_RELEASE_NAME}"
./skywalking-helm
--version "${SKYWALKING_RELEASE_VERSION}"
-n "${SKYWALKING_RELEASE_NAMESPACE}"
--set oap.image.tag=10.0.1
--set oap.storageType=banyandb
--set oap.service.type=NodePort
--set oap.startupProbe.tcpSocket.port=12800
--set oap.startupProbe.failureThreshold=30
--set oap.startupProbe.periodSeconds=15
--set ui.image.tag=10.0.1
--set ui.ingress.enabled=true
--set ui.ingress.hosts[0]=wd-apm.gxptkc.com
--set elasticsearch.enabled=false
--set banyandb.enabled=true
--set banyandb.image.tag=0.6.1
--set banyandb.storage.enabled=true
--set banyandb.etcd.enabled=true
--set banyandb.etcd.replicaCount=1
--set banyandb.standalone.enabled=false
--set banyandb.cluster.enabled=true
--set banyandb.cluster.liaison.replicas=2
--set banyandb.cluster.data.replicas=3
--set banyandb.cluster.liaison.ingress.enabled=true
--set banyandb.cluster.liaison.httpSvc.type=ClusterIP
--set banyandb.cluster.liaison.ingress.rules[0].host=wd-byd.gxptkc.com,banyandb.cluster.liaison.ingress.rules[0].paths[0].path=/,banyandb.cluster.liaison.ingress.rules[0].paths[0].port=17913,banyandb.cluster.liaison.ingress.rules[0].paths[0].serviceName=banyandb-http
--create-namespace
kubectl patch svc skywalking-skywalking-helm-oap -n "${SKYWALKING_RELEASE_NAMESPACE}" -p '{"spec":{"ports":[{"port":11800,"targetPort":11800,"nodePort":31800,"protocol":"TCP"}],"type":"NodePort"}}'
other options
storageClass
--set banyandb.storage.persistentVolumeClaims[0].storageClass=nfs
--set banyandb.storage.persistentVolumeClaims[0].size=50Gi
--set banyandb.storage.persistentVolumeClaims[1].storageClass=nfs
--set banyandb.storage.persistentVolumeClaims[1].size=5Gi \
ssl
--set ui.ingress.tls[0].secretName=gxptkc-tls-secret,ui.ingress.tls[0].hosts[0]=wd-apm.gxptkc.com
--set banyandb.cluster.liaison.ingress.tls[0].secretName=gxptkc-tls-secret,ingress.tls[0].hosts[0]=wd-byd.gxptkc.com \
Beta Was this translation helpful? Give feedback.
All reactions