OpenShift Container Platform 4.8 日志记录如果您删除应用程序命名空间对象并创建新对象,CloudWatch 会创建一个新的日志组。 如果您考虑使用名称相同的连续应用程序命名空间对象,请使用本例中描述的方法。否则,请参阅前面的 "Example: Naming log groups for application namespace name" 部分。 要在应用程序命名空间 UUID 后命名日志组,您可以在 ClusterLogForwarder CR 对象的 YAML 文件: ruler: storage: type: local local: directory: /tmp/loki/rules rule_path: /tmp/loki/rules-temp alertmanager_url: http://localhost:9093 ring: kvstore: store: inmemory ClusterRole 2 apiVersion: rbac.authorization.k8s.io/v1 metadata: name: event-reader rules: - apiGroups: [""] resources: ["events"] verbs: ["get", "watch", "list"] - kind:0 码力 | 223 页 | 2.28 MB | 1 年前3
 OpenShift Container Platform 4.10 监控monitoring.coreos.com/v1 kind: PrometheusRule metadata: labels: prometheus: k8s role: alert-rules name: monitoring-stack-alerts 1 namespace: ns1 2 spec: groups: OpenShift Container Platform ApproachingEnforcedSamplesLimit 警报的严重性。 2. 将配置应用到用户定义的项目中: 其他 其他资 资源 源 - name: general.rules rules: - alert: TargetDown 3 annotations: message: '{{ printf "%.4g" $value }}% of "audit.k8s.io/v1" "kind": "Policy" "metadata": "name": "Request" "omitStages": - "RequestReceived" "rules": - "level": "Request" 第 第 4 章 章 为 为 PROMETHEUS ADAPTER 设 设置 置审计 审计日志 日志级别 级别 57 其他 其他资 资源 源0 码力 | 135 页 | 1.58 MB | 1 年前3
 OpenShift Container Platform 4.8 Service Meshio/v1beta1 kind: AuthorizationPolicy metadata: name: httpbin namespace: foo spec: action: DENY rules: - from: - source: namespaces: ["dev"] to: - operation: hosts: [“httpbin io/v1beta1 kind: AuthorizationPolicy metadata: name: httpbin namespace: default spec: action: DENY rules: - to: - operation: hosts: ["httpbin.example.com:*"] OpenShift Container Platform 4 的服务网格和应用程序性能图表。。您还可以创建您自己的自定义仪表板。 追踪 – 通过与 Jaeger 集成,可以在组成一个应用程序的多个微服务间追踪请求的路径。 验证 – 对最常见 Istio 对象(Destination Rules 、Service Entries 、Virtual Services 等等)进行高 级验证。 配置 – 使用向导创建、更新和删除 Istio 路由配置的可选功能,或者直接在 Kiali Console0 码力 | 344 页 | 3.04 MB | 1 年前3
 OpenShift Container Platform 4.3 架构5 name: kubernetes 6 path:7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: 5 name: kubernetes 6 path: 7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: kind: ClusterRole metadata: annotations: name: system:openshift:online:my-webhook-server rules: - apiGroups: - online.openshift.io resources: - namespacereservations 3 verbs: 0 码力 | 47 页 | 1.05 MB | 1 年前3
 OpenShift Container Platform 4.7 架构5 name: kubernetes 6 path:7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: 5 name: kubernetes 6 path: 7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: kind: ClusterRole metadata: annotations: name: system:openshift:online:my-webhook-server rules: - apiGroups: - online.openshift.io resources: - namespacereservations 3 verbs: 0 码力 | 55 页 | 1.16 MB | 1 年前3
 OpenShift Container Platform 4.10 架构5 name: kubernetes 6 path:7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: 5 name: kubernetes 6 path: 7 caBundle: 8 rules: 9 - operations: 10 - apiGroups: - "" apiVersions: - "*" resources: kind: ClusterRole metadata: annotations: name: system:openshift:online:my-webhook-server rules: - apiGroups: - online.openshift.io resources: - namespacereservations 3 verbs: 0 码力 | 63 页 | 1.40 MB | 1 年前3
 OpenShift Container Platform 4.7 更新集群个字符。如果您看到 ReconcileCompleted 状态为 false,原因为 CreateRouteFailed caused by host must conform to DNS 1123 naming convention and must be no more than 63 characters,请尝试使用较短的名称创建 Update Service。 3.3.3. 配置 Cluster0 码力 | 62 页 | 716.72 KB | 1 年前3
 OpenShift Container Platform 4.14 存储authorization.k8s.io/v1 kind: Role metadata: name: shared-resource-my-share namespace: my-namespace rules: - apiGroups: - sharedresource.openshift.io resources: - sharedsecrets resourceNames: authorization.k8s.io/v1 kind: Role metadata: name: shared-resource-my-share namespace: my-namespace rules: - apiGroups: - sharedresource.openshift.io resources: - sharedconfigmaps resourceNames: com/ec2/v2/home#SecurityGroups。 b. 通过过滤之前复制的组 ID 来查找 AWS EFS 卷使用的安全组。 c. 在 Inbound rules 选项卡中,点 Edit inbound rules,然后添加新规则来允许 OpenShift Container Platform 节点访问 AWS EFS 卷(即,使用集群中的 NFS 端口): 类型 型 :NFS0 码力 | 215 页 | 2.56 MB | 1 年前3
 OpenShift Container Platform 4.14 Operatorauthorization.k8s.io/aggregate-to-admin: "true" 3 rbac.authorization.k8s.io/aggregate-to-edit: "true" 4 rules: - apiGroups: ["stable.example.com"] 5 resources: ["crontabs"] 6 verbs: ["get", "list", "watch" io/aggregate-to-view: "true" 9 rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" 10 rules: - apiGroups: ["stable.example.com"] 11 resources: ["crontabs"] 12 verbs: ["get", "list", "watch"] apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: scoped namespace: scoped rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v10 码力 | 423 页 | 4.26 MB | 1 年前3
 OpenShift Container Platform 4.12 专用硬件和驱动程序启用apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: simple-kmod-driver-container rules: - apiGroups: - security.openshift.io resources: - securitycontextconstraints verbs: - use metadata: name: example-rule spec: rules: - name: "example rule" labels: "example-custom-feature": "true" # Label is created if all of the rules below match matchFeatures: kind: ClusterRole metadata: name: kmm-module-manager rules: - apiGroups: [kmm.sigs.x-k8s.io] resources: [modules]0 码力 | 54 页 | 591.48 KB | 1 年前3
共 41 条
- 1
 - 2
 - 3
 - 4
 - 5
 













