azure-aks

Handling PersistentVolumeClaim in DaemonSet

假装没事ソ 提交于 2020-01-04 04:31:07
问题 I have a DaemonSet that creates flink task manager pods, one per each node. Nodes Say I have two nodes node-A node-B Pods the daemonSet would create pod-A on node-A pod-B on node-B Persistent Volume Claim I am on AKS and want to use azure-disk for Persistent Storage According to the docs : [https://docs.microsoft.com/en-us/azure/aks/azure-disks-dynamic-pv ] an azure disk can be associated on to single node say I create pvc-A for pv-A attached to node-A pvc-B for pv-B attached to node-B

How to add an Azure AKS Kubernetes Cluster self-signed CA to GitLab CI/CD Kubernetes integration?

隐身守侯 提交于 2020-01-01 08:37:52
问题 I'm trying to add my Azure AKS Kubernetes cluster to my GitLab CI/CD Kubernetes integration. I can execute kubectl commands on the cluster from my pc, after I ran this command: az aks get-credentials --resource-group <resource-group-name> --name <kubernetes-cluster-name> It created a .kube/config file with a content like this: apiVersion: v1 clusters: - cluster: certificate-authority-data: <some long base64 string here> server: https://<resource-group-name+some-hexadecimal-chars>.hcp

Expose a kubernetes deployment (frontend) using ingress controller

白昼怎懂夜的黑 提交于 2019-12-29 09:32:31
问题 I am deploying a number of docker containers of micro-services and angular frontend on Kubernetes. I have exposed the services using an ingress controller specifying each service using this, and specifying paths in backend. apiVersion: extensions/v1beta1 kind: Ingress For my frontend, I have created a service with type loadbalancer. apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/azure-load-balancer-resource-group: my-resource-group name: myapp-svc namespace: ui

Expose a kubernetes deployment (frontend) using ingress controller

二次信任 提交于 2019-12-29 09:32:17
问题 I am deploying a number of docker containers of micro-services and angular frontend on Kubernetes. I have exposed the services using an ingress controller specifying each service using this, and specifying paths in backend. apiVersion: extensions/v1beta1 kind: Ingress For my frontend, I have created a service with type loadbalancer. apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/azure-load-balancer-resource-group: my-resource-group name: myapp-svc namespace: ui

How to create Azure Container Registry inside the Virtual Network?

爱⌒轻易说出口 提交于 2019-12-24 22:54:10
问题 I am managing K8s cluster with AKS. My main aim to keep all the resources which are required for K8s in the same Vnet. One of the resources is ACR. I want to make it private and also it should be only able to access within the Vnet. Please let me know if its possible or point me in the right direction. Thanks! 回答1: Unfortunately, the ACR is just a repository to create and maintain Azure container registries to store and manage your private Docker container images. It seems that there is no

Ingress rule not redirecting to deployment

限于喜欢 提交于 2019-12-24 21:26:06
问题 Ingress apiVersion: extensions/v1beta1 kind: Ingress metadata: name: assortment-ingress annotations: kubernetes.io/ingress.class: nginx nginx.ingress.kubernetes.io/rewrite-target: / spec: tls: - hosts: - myapp.centralus.cloudapp.azure.com secretName: aks-ingress-tls rules: - host: myapp.centralus.cloudapp.azure.com http: paths: - path: /my-service backend: serviceName: my-backend servicePort: 80 deployment & service apiVersion: apps/v1beta1 kind: Deployment metadata: name: my-deployment spec:

Upgrading from Helm stable/cert-manager to jetstack/cert-manager

久未见 提交于 2019-12-22 07:46:30
问题 We have a production AKS cluster that has a stable/cert-manager helm chart installed to allow using Let's Encrypt certificates. The current version installed is cert-manager-v0.6.0 in the kube-system namespace. Let's Encrypt is to stop support for traffic from cert-manager pre 8.0 version from 1st of November 2019. I would like to upgrade but the latest available stable chart version is v0.6.7 . Seems like the way to go is to switch to jetstack/cert-manager . How do I best approach this?

Configure Ingress controller to forward custom http headers

微笑、不失礼 提交于 2019-12-21 17:53:54
问题 We are setting up an AKS cluster on Azure, following this guide We are running 5 .Net Core API's behind an ingress controller, everything works fine, requests are being routed nicely. However, in our SPA Frontend, we are sending a custom http header to our API's, this header never seems to make it to the API's, when we inspect the logging in AKS we see the desired http header is empty. In development, everything works fine, we also see the http header is filled in our test environment in AKS,

Azure AKS Monitoring - custom dashboard resources

天涯浪子 提交于 2019-12-13 08:56:33
问题 I am trying to create a custom dashboard with some specific data for the AKS cluster. What i would like to do is assemble a dashboard with a graph of the RAM and CPU usage per selected controllers and nodes, and if possible number of restarts per pod. How can i create a custom graphs with the controllers average resource usage ? 回答1: You can click on "Logs" link on the left on your AKS cluster blade in Azure Portal (make sure you have Insights enabled by clicking on "Insights" first - if it

Finding the URL for an AKS Cluster

浪尽此生 提交于 2019-12-13 04:16:41
问题 I've set-up an AKS cluster and am now trying to connect to it. My deployment YAML is here: apiVersion: v1 kind: Pod spec: containers: - name: dockertest20190205080020 image: dockertest20190205080020.azurecr.io/dockertest ports: - containerPort: 443 metadata: name: my-test If I run the dashboard, I get this: Which looks like it should be telling me the external endpoint, but isn't. I have a theory that this is because the Yaml file is only deploying a Pod, which is in some way not able to