Deploy sw with helm #12607
kailongapple
started this conversation in
Show and tell
Deploy sw with helm
#12607
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
info
RKE2
apt-get install lrzsz -y
ln -sf /usr/share/zoneinfo/Asia/Shanghai /etc/localtime
dpkg-reconfigure --frontend noninteractive tzdata
hostnamectl set-hostname apm28
mkdir /root/rke2-artifacts && cd /root/rke2-artifacts/
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/rke2-images.linux-amd64.tar.zst
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/rke2.linux-amd64.tar.gz
curl -OLs https://github.com/rancher/rke2/releases/download/v1.30.3%2Brke2r1/sha256sum-amd64.txt
curl -sfL https://get.rke2.io --output install.sh
INSTALL_RKE2_ARTIFACT_PATH=/root/rke2-artifacts sh install.sh
systemctl enable rke2-server
systemctl start rke2-server
cat > /etc/profile.d/rek2.sh << EOF
##rek2
export PATH=$PATH:/var/lib/rancher/rke2/bin
export KUBECONFIG=/etc/rancher/rke2/rke2.yaml
export CONTAINERD_ADDRESS=/run/k3s/containerd/containerd.sock
export CRICTL_CONFIG_PATH=/var/lib/rancher/rke2/agent/etc/crictl.yaml
EOF
ln -snf /var/lib/rancher/rke2/agent/etc/crictl.yaml /etc/crictl.yaml
ln -snf /run/k3s/containerd/containerd.sock /run/containerd/containerd.sock
cat > /etc/profile.d/tab.sh << EOF
source /usr/share/bash-completion/bash_completion
source <(kubectl completion bash)
source <(helm completion bash)
source <(k9s completion bash)
EOF
NFS
sudo apt update
sudo apt install nfs-kernel-server
mkdir -p /data
cat >> /etc/exports << EOF
/data *(rw,sync,no_root_squash)
EOF
sudo systemctl restart nfs-kernel-server
sudo systemctl enable nfs-kernel-server
showmount -e localhost
exportfs -v
nfs-subdir-external-provisioner
helm repo add nfs-subdir-external-provisioner https://kubernetes-sigs.github.io/nfs-subdir-external-provisioner
helm install nfs-subdir-external-provisioner nfs-subdir-external-provisioner/nfs-subdir-external-provisioner
-n nfs-system
--set storageClass.name=nfs
--set storageClass.defaultClass=true
--set nfs.server=192.168.2.28
--set nfs.path=/data
--create-namespace
kubectl get sc nfs -o wide
kubectl get deployment -n nfs-system -o wide
skywalking
export SKYWALKING_RELEASE_VERSION=4.6.0
export SKYWALKING_RELEASE_NAME=skywalking
export SKYWALKING_RELEASE_NAMESPACE=apm
helm install "${SKYWALKING_RELEASE_NAME}"
./skywalking-helm
--version "${SKYWALKING_RELEASE_VERSION}"
-n "${SKYWALKING_RELEASE_NAMESPACE}"
--set oap.image.tag=10.0.1
--set oap.storageType=banyandb
--set oap.service.type=NodePort
--set oap.startupProbe.tcpSocket.port=12800
--set oap.startupProbe.failureThreshold=30
--set oap.startupProbe.periodSeconds=15
--set ui.image.tag=10.0.1
--set ui.ingress.enabled=true
--set ui.ingress.hosts[0]=wd-apm.gxptkc.com
--set elasticsearch.enabled=false
--set banyandb.enabled=true
--set banyandb.image.tag=0.6.1
--set banyandb.storage.enabled=true
--set banyandb.etcd.enabled=true
--set banyandb.etcd.replicaCount=1
--set banyandb.standalone.enabled=false
--set banyandb.cluster.enabled=true
--set banyandb.cluster.liaison.replicas=2
--set banyandb.cluster.data.replicas=3
--set banyandb.cluster.liaison.ingress.enabled=true
--set banyandb.cluster.liaison.httpSvc.type=ClusterIP
--set banyandb.cluster.liaison.ingress.rules[0].host=wd-byd.gxptkc.com,banyandb.cluster.liaison.ingress.rules[0].paths[0].path=/,banyandb.cluster.liaison.ingress.rules[0].paths[0].port=17913,banyandb.cluster.liaison.ingress.rules[0].paths[0].serviceName=banyandb-http
--create-namespace
kubectl patch svc skywalking-skywalking-helm-oap -n "${SKYWALKING_RELEASE_NAMESPACE}" -p '{"spec":{"ports":[{"port":11800,"targetPort":11800,"nodePort":31800,"protocol":"TCP"}],"type":"NodePort"}}'
other options
storageClass
--set banyandb.storage.persistentVolumeClaims[0].storageClass=nfs
--set banyandb.storage.persistentVolumeClaims[0].size=50Gi
--set banyandb.storage.persistentVolumeClaims[1].storageClass=nfs
--set banyandb.storage.persistentVolumeClaims[1].size=5Gi \
ssl
--set ui.ingress.tls[0].secretName=gxptkc-tls-secret,ui.ingress.tls[0].hosts[0]=wd-apm.gxptkc.com
--set banyandb.cluster.liaison.ingress.tls[0].secretName=gxptkc-tls-secret,ingress.tls[0].hosts[0]=wd-byd.gxptkc.com \
Beta Was this translation helpful? Give feedback.
All reactions