帝国cms如何做网站浙江省建设网证书查询

张小明 2026/1/19 20:39:04
帝国cms如何做网站,浙江省建设网证书查询,网站域名续费,wordpress主题贝宝K8s二进制安装#xff1a;本章主要是安装K8s服务端组件apiserver kube-controller-manager kube-scheduler#xff0c;安装nginx进行高可用负载#xff0c;配置TLS Bootstrapping 为以后自动给client发布证书使用(所有文章结束后会把使用到的容器镜像及工具一并共享) 1、Ngi…K8s二进制安装本章主要是安装K8s服务端组件apiserver kube-controller-manager kube-scheduler安装nginx进行高可用负载配置TLS Bootstrapping 为以后自动给client发布证书使用(所有文章结束后会把使用到的容器镜像及工具一并共享)1、Nginx负载均衡K8s配置# 安装编译环境yuminstallgcc -y# 下载解压 nginx 二进制文件wgethttp://nginx.org/download/nginx-1.25.3.tar.gztarxvf nginx-1.25.3.tar.gzcdnginx-1.25.3# 进行编译./configure --with-stream --without-http --without-http_uwsgi_module --without-http_scgi_module --without-http_fastcgi_modulemakemakeinstall# 拷贝编译好的 nginxnodeserver171 server172 server173 server174forNODEin$node;doscp-r /usr/local/nginx/$NODE:/usr/local/nginx/;done# 写入配置文件在所有主机上执行cat/usr/local/nginx/conf/nginx.confEOF worker_processes 1; events { worker_connections 1024; } stream { upstream backend { least_conn; hash$remote_addrconsistent; server 192.168.1.170:6443 max_fails3 fail_timeout30s; server 192.168.1.171:6443 max_fails3 fail_timeout30s; server 192.168.1.172:6443 max_fails3 fail_timeout30s; } server { listen 127.0.0.1:8443; proxy_connect_timeout 1s; proxy_pass backend; } } EOF# 也可以生成后推送过去forNODEin$node;doscp-r /usr/local/nginx/conf/nginx.conf$NODE:/usr/local/nginx/conf;done# 将nginx服务交个systemd管理(所有主机都要操作)cat/etc/systemd/system/kube-nginx.serviceEOF [Unit] Descriptionkube-apiserver nginx proxy Afternetwork.target Afternetwork-online.target Wantsnetwork-online.target [Service] Typeforking ExecStartPre/usr/local/nginx/sbin/nginx -c /usr/local/nginx/conf/nginx.conf -p /usr/local/nginx -t ExecStart/usr/local/nginx/sbin/nginx -c /usr/local/nginx/conf/nginx.conf -p /usr/local/nginx ExecReload/usr/local/nginx/sbin/nginx -c /usr/local/nginx/conf/nginx.conf -p /usr/local/nginx -s reload PrivateTmptrue Restartalways RestartSec5 StartLimitInterval0 LimitNOFILE65536 [Install] WantedBymulti-user.target EOF# 加载并启动(所有主机都要操作)systemctl daemon-reload systemctlenable--now kube-nginx.service systemctl status kube-nginx.service2.apiserver组件安装# 所有 k8s 节点创建以下目录(所有master节点)mkdir-p /etc/kubernetes/manifests/ /etc/systemd/system/kubelet.service.d /var/lib/kubelet /var/log/kubernetes# 将apiserver服务托管给systemcd所有 master 节点# server170 节点配置cat/usr/lib/systemd/system/kube-apiserver.serviceEOF [Unit] DescriptionKubernetes API Server Documentationhttps://github.com/kubernetes/kubernetes Afternetwork.target [Service] ExecStart/usr/local/bin/kube-apiserver\\--v2\\--allow-privilegedtrue\\--bind-address0.0.0.0\\--secure-port6443\\--advertise-address192.168.1.170\\--service-cluster-ip-range10.96.0.0/12\\--service-node-port-range30000-32767\\--etcd-servershttps://192.168.1.170:2379,https://192.168.1.171:2379,https://192.168.1.172:2379\\--etcd-cafile/etc/etcd/ssl/etcd-ca.pem\\--etcd-certfile/etc/etcd/ssl/etcd.pem\\--etcd-keyfile/etc/etcd/ssl/etcd-key.pem\\--client-ca-file/etc/kubernetes/pki/ca.pem\\--tls-cert-file/etc/kubernetes/pki/apiserver.pem\\--tls-private-key-file/etc/kubernetes/pki/apiserver-key.pem\\--kubelet-client-certificate/etc/kubernetes/pki/apiserver.pem\\--kubelet-client-key/etc/kubernetes/pki/apiserver-key.pem\\--service-account-key-file/etc/kubernetes/pki/sa.pub\\--service-account-signing-key-file/etc/kubernetes/pki/sa.key\\--service-account-issuerhttps://kubernetes.default.svc.cluster.local\\--kubelet-preferred-address-typesInternalIP,ExternalIP,Hostname\\--enable-admission-pluginsNamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota\\--authorization-modeNode,RBAC\\--enable-bootstrap-token-authtrue\\--requestheader-client-ca-file/etc/kubernetes/pki/front-proxy-ca.pem\\--proxy-client-cert-file/etc/kubernetes/pki/front-proxy-client.pem\\--proxy-client-key-file/etc/kubernetes/pki/front-proxy-client-key.pem\\--requestheader-allowed-namesaggregator\\--requestheader-group-headersX-Remote-Group\\--requestheader-extra-headers-prefixX-Remote-Extra-\\--requestheader-username-headersX-Remote-User\\--enable-aggregator-routingtrue Restarton-failure RestartSec10s LimitNOFILE65535 [Install] WantedBymulti-user.target EOF# server171 节点配置cat/usr/lib/systemd/system/kube-apiserver.serviceEOF [Unit] DescriptionKubernetes API Server Documentationhttps://github.com/kubernetes/kubernetes Afternetwork.target [Service] ExecStart/usr/local/bin/kube-apiserver\\--v2\\--allow-privilegedtrue\\--bind-address0.0.0.0\\--secure-port6443\\--advertise-address192.168.1.171\\--service-cluster-ip-range10.96.0.0/12\\--service-node-port-range30000-32767\\--etcd-servershttps://192.168.1.170:2379,https://192.168.1.171:2379,https://192.168.1.172:2379\\--etcd-cafile/etc/etcd/ssl/etcd-ca.pem\\--etcd-certfile/etc/etcd/ssl/etcd.pem\\--etcd-keyfile/etc/etcd/ssl/etcd-key.pem\\--client-ca-file/etc/kubernetes/pki/ca.pem\\--tls-cert-file/etc/kubernetes/pki/apiserver.pem\\--tls-private-key-file/etc/kubernetes/pki/apiserver-key.pem\\--kubelet-client-certificate/etc/kubernetes/pki/apiserver.pem\\--kubelet-client-key/etc/kubernetes/pki/apiserver-key.pem\\--service-account-key-file/etc/kubernetes/pki/sa.pub\\--service-account-signing-key-file/etc/kubernetes/pki/sa.key\\--service-account-issuerhttps://kubernetes.default.svc.cluster.local\\--kubelet-preferred-address-typesInternalIP,ExternalIP,Hostname\\--enable-admission-pluginsNamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota\\--authorization-modeNode,RBAC\\--enable-bootstrap-token-authtrue\\--requestheader-client-ca-file/etc/kubernetes/pki/front-proxy-ca.pem\\--proxy-client-cert-file/etc/kubernetes/pki/front-proxy-client.pem\\--proxy-client-key-file/etc/kubernetes/pki/front-proxy-client-key.pem\\--requestheader-allowed-namesaggregator\\--requestheader-group-headersX-Remote-Group\\--requestheader-extra-headers-prefixX-Remote-Extra-\\--requestheader-username-headersX-Remote-User\\--enable-aggregator-routingtrue Restarton-failure RestartSec10s LimitNOFILE65535 [Install] WantedBymulti-user.target EOF# server172 配置cat/usr/lib/systemd/system/kube-apiserver.serviceEOF [Unit] DescriptionKubernetes API Server Documentationhttps://github.com/kubernetes/kubernetes Afternetwork.target [Service] ExecStart/usr/local/bin/kube-apiserver\\--v2\\--allow-privilegedtrue\\--bind-address0.0.0.0\\--secure-port6443\\--advertise-address192.168.1.172\\--service-cluster-ip-range10.96.0.0/12\\--service-node-port-range30000-32767\\--etcd-servershttps://192.168.1.170:2379,https://192.168.1.171:2379,https://192.168.1.172:2379\\--etcd-cafile/etc/etcd/ssl/etcd-ca.pem\\--etcd-certfile/etc/etcd/ssl/etcd.pem\\--etcd-keyfile/etc/etcd/ssl/etcd-key.pem\\--client-ca-file/etc/kubernetes/pki/ca.pem\\--tls-cert-file/etc/kubernetes/pki/apiserver.pem\\--tls-private-key-file/etc/kubernetes/pki/apiserver-key.pem\\--kubelet-client-certificate/etc/kubernetes/pki/apiserver.pem\\--kubelet-client-key/etc/kubernetes/pki/apiserver-key.pem\\--service-account-key-file/etc/kubernetes/pki/sa.pub\\--service-account-signing-key-file/etc/kubernetes/pki/sa.key\\--service-account-issuerhttps://kubernetes.default.svc.cluster.local\\--kubelet-preferred-address-typesInternalIP,ExternalIP,Hostname\\--enable-admission-pluginsNamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota\\--authorization-modeNode,RBAC\\--enable-bootstrap-token-authtrue\\--requestheader-client-ca-file/etc/kubernetes/pki/front-proxy-ca.pem\\--proxy-client-cert-file/etc/kubernetes/pki/front-proxy-client.pem\\--proxy-client-key-file/etc/kubernetes/pki/front-proxy-client-key.pem\\--requestheader-allowed-namesaggregator\\--requestheader-group-headersX-Remote-Group\\--requestheader-extra-headers-prefixX-Remote-Extra-\\--requestheader-username-headersX-Remote-User\\--enable-aggregator-routingtrue Restarton-failure RestartSec10s LimitNOFILE65535 [Install] WantedBymulti-user.target EOF# 启动 apiServersystemctl daemon-reload systemctlenable--now kube-apiserver.service systemctl status kube-apiserver.service3.kube-controller-manager# 配置 kube-controller-manager service# 所有master节点配置且配置相同# 172.16.0.0/12为pod网段按需求设置你自己的网段cat/usr/lib/systemd/system/kube-controller-manager.serviceEOF [Unit] DescriptionKubernetes Controller Manager Documentationhttps://github.com/kubernetes/kubernetes Afternetwork.target [Service] ExecStart/usr/local/bin/kube-controller-manager\\--v2\\--bind-address0.0.0.0\\--root-ca-file/etc/kubernetes/pki/ca.pem\\--cluster-signing-cert-file/etc/kubernetes/pki/ca.pem\\--cluster-signing-key-file/etc/kubernetes/pki/ca-key.pem\\--service-account-private-key-file/etc/kubernetes/pki/sa.key\\--kubeconfig/etc/kubernetes/controller-manager.kubeconfig\\--leader-electtrue\\--use-service-account-credentialstrue\\--node-monitor-grace-period40s\\--node-monitor-period5s\\--controllers*,bootstrapsigner,tokencleaner\\--allocate-node-cidrstrue\\--service-cluster-ip-range10.96.0.0/12,fd00:1111::/112\\--cluster-cidr172.16.0.0/12,fc00:2222::/112\\--node-cidr-mask-size-ipv424\\--node-cidr-mask-size-ipv6120 \ \如果有IPv6可以添加没有请去除 --requestheader-client-ca-file/etc/kubernetes/pki/front-proxy-ca.pem Restartalways RestartSec10s [Install] WantedBymulti-user.target EOF# 启动 kube-controller-managersystemctl daemon-reload systemctlenable--now kube-controller-manager.service systemctl status kube-controller-manager.service4.kube-scheduler# 配置 kube-scheduler service# 所有 master 节点配置且配置相同cat/usr/lib/systemd/system/kube-scheduler.serviceEOF [Unit] DescriptionKubernetes Scheduler Documentationhttps://github.com/kubernetes/kubernetes Afternetwork.target [Service] ExecStart/usr/local/bin/kube-scheduler\\--v2\\--bind-address0.0.0.0\\--leader-electtrue\\--kubeconfig/etc/kubernetes/scheduler.kubeconfig Restartalways RestartSec10s [Install] WantedBymulti-user.target EOF# 启动 kube-schedulersystemctl daemon-reload systemctlenable--now kube-scheduler.service systemctl status kube-scheduler.service5.TLS Bootstrapping 配置# 自动颁发node节点证书# 在 master01 上配置kubectl config set-cluster kubernetes\--certificate-authority/etc/kubernetes/pki/ca.pem\--embed-certstrue --serverhttps://127.0.0.1:8443\--kubeconfig/etc/kubernetes/bootstrap-kubelet.kubeconfig# 设置token值kubectl config set-credentials tls-bootstrap-token-user\--tokenc8ad9c.2e4d610cf3e7426e\--kubeconfig/etc/kubernetes/bootstrap-kubelet.kubeconfig kubectl config set-context tls-bootstrap-token-userkubernetes\--clusterkubernetes\--usertls-bootstrap-token-user\--kubeconfig/etc/kubernetes/bootstrap-kubelet.kubeconfig kubectl config use-context tls-bootstrap-token-userkubernetes\--kubeconfig/etc/kubernetes/bootstrap-kubelet.kubeconfigmkdir-p /root/.kube;cp/etc/kubernetes/admin.kubeconfig /root/.kube/config# 查看集群状态kubectl get cs# 安全文件上下文catbootstrap.secret.yamlEOF apiVersion: v1 kind: Secret metadata: name: bootstrap-token-c8ad9c namespace: kube-system type: bootstrap.kubernetes.io/token stringData: description: The default bootstrap token generated by kubelet . token-id: c8ad9c token-secret: 2e4d610cf3e7426e usage-bootstrap-authentication: true usage-bootstrap-signing: true auth-extra-groups: system:bootstrappers:default-node-token,system:bootstrappers:worker,system:bootstrappers:ingress --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-bootstrap roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-bootstrapper subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:bootstrappers:default-node-token --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: node-autoapprove-bootstrap roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:certificates.k8s.io:certificatesigningrequests:nodeclient subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:bootstrappers:default-node-token --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: node-autoapprove-certificate-rotation roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:nodes --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: true labels: kubernetes.io/bootstrapping: rbac-defaults name: system:kube-apiserver-to-kubelet rules: - apiGroups: - resources: - nodes/proxy - nodes/stats - nodes/log - nodes/spec - nodes/metrics verbs: - * --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:kube-apiserver namespace: roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:kube-apiserver-to-kubelet subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: kube-apiserver EOF# 执行加载kubectl create -f bootstrap.secret.yaml
版权声明:本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若内容造成侵权/违法违规/事实不符,请联系邮箱:809451989@qq.com进行投诉反馈,一经查实,立即删除!

商业网站有什么作用展馆设计费取费标准一览表

FaceFusion如何避免换脸后出现双眼不对称?在数字人、虚拟偶像和AI换脸技术日益普及的今天,一个看似微小却极为刺眼的问题频频浮现:换脸后人物的双眼变得不对称——左眼大右眼小、眼神方向不一致、瞳孔偏移甚至“斜视”,瞬间打破真…

张小明 2026/1/17 18:16:41 网站建设

营销型企业网站测评表做网站都需要用到什么软件

AutoUnipus智能答题助手:高效学习新体验 【免费下载链接】AutoUnipus U校园脚本,支持全自动答题,百分百正确 2024最新版 项目地址: https://gitcode.com/gh_mirrors/au/AutoUnipus 还在为U校园平台上的大量练习题而烦恼吗?AutoUnipus这款智能答题…

张小明 2026/1/17 18:16:42 网站建设

天津建站平台企业咨询公司是干嘛的

Oracle数据库补丁与升级全解析 1. 补丁与升级的基本概念 在竞争激烈的IT行业中,包括Oracle在内的复杂软件都处于不断变化的状态。新产品的快速发布带来了两个主要后果: - 存在漏洞 :软件在开发和新功能添加过程中难免出现漏洞,即“bugs”。为修复这些漏洞,Oracle会提…

张小明 2026/1/17 18:16:43 网站建设

广东网站建设系统wordpress网站慢

技术报告:云原生与Kubernetes实践深度解析摘要 本报告系统梳理了基于Kubernetes的云原生技术栈核心实践,包含部署标准化流程、关键API对象(YAML模板)实战应用、主流技术路线优劣势对比分析,并结合行业真实痛点与需求,提供可落地的…

张小明 2026/1/17 18:16:44 网站建设

网站建设的问题疑问苏州网络

AI Agent是具备自主决策能力的智能系统,经历了从传统聊天机器人到LLM驱动,再到RAG系统的进化。其核心组件包括感知模块、推理引擎、执行机构、知识库和学习系统,正在改变智能驾驶、精准医疗等领域。尽管面临伦理困境和数据依赖等挑战&#xf…

张小明 2026/1/17 18:16:46 网站建设

带数据的网站上线啦 图谱智能网站

量子力学的奇妙世界:从争议到多元解读 1. 爱因斯坦与玻尔之争:EPR 悖论 在 20 世纪早期,物理学界的两位巨擘——尼尔斯玻尔和阿尔伯特爱因斯坦,展开了一场鲜为人知的激烈争论。爱因斯坦不认同马克斯玻恩对波函数的概率解释,他希望将相对论拓展到原子尺度,构建一个统一的…

张小明 2026/1/17 18:16:47 网站建设