This is an old revision of the document!
Запустите с правами Administrator C:\cmder\cmder.exe bash cd test -d conf && rm -rf conf git clone http://val.bmstu.ru/unix/conf.git cd conf/virtualbox/ !!! 10 - это номер курса, вместо X укажите Ваш номер стенда, если не знаете его, спросите преподавателя !!! ./setup.sh X 10
# sh net_gate.sh # init 6
# sh net_server.sh # init 6
gate:~# ###git -C conf/ pull gate:~# sh conf/dhcp.sh
# cat /etc/resolv.conf
search corpX.un nameserver 192.168.X.10
# host kubeN
# cat docker-compose.yml
...
userns_mode: 'host'
...
external_url 'https://server.corpX.un:4443'
...
- '4443:4443'
...
bash -c ' scp /opt/freeipa-data/etc/ipa/ca.crt kube1:/usr/local/share/ca-certificates/ ssh kube1 update-ca-certificates ssh kube1 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube2:/usr/local/share/ca-certificates/ ssh kube2 update-ca-certificates ssh kube2 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube3:/usr/local/share/ca-certificates/ ssh kube3 update-ca-certificates ssh kube3 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube4:/usr/local/share/ca-certificates/ ssh kube4 update-ca-certificates ssh kube4 systemctl restart containerd ' kubeN# crictl pull server.corpX.un:5000/student/gowebd crictl images crictl rmi server.corpX.un:5000/student/gowebd
kube1:~# kubectl create ns my-keycloak-ns kube1:~# kubectl create secret tls keycloak-tls --key /tmp/keycloak.key --cert /tmp/keycloak.crt -n my-keycloak-ns
kube1:~/gitlab# cat docker-compose.yml
services:
gitlab:
image: 'gitlab/gitlab-ce:latest'
restart: always
hostname: 'gitlab'
environment:
GITLAB_ROOT_PASSWORD: "strongpassword"
GITLAB_OMNIBUS_CONFIG: |
prometheus_monitoring['enable'] = false
gitlab_rails['registry_enabled'] = true
gitlab_rails['registry_host'] = "gitlab.corpX.un"
external_url 'http://gitlab.corpX.un'
registry_external_url 'http://gitlab.corpX.un:5000'
gitlab_rails['registry_port'] = "5050"
registry['registry_http_addr'] = "0.0.0.0:5050"
ports:
- '80:80'
- '2222:22'
- '5000:5000'
volumes:
- vol1:/var/opt/gitlab
shm_size: '256m'
logging:
driver: "json-file"
options:
max-size: "2048m"
volumes:
vol1:
kube1:~/gitlab# kompose convert kube1:~/gitlab# kubectl -n my-gitlab-ns apply -f vol1-persistentvolumeclaim.yaml,gitlab-service.yaml,gitlab-deployment.yaml
server# scp /opt/freeipa-data/gitlab.* kube1:/tmp/ kube1:~/gitlab# kubectl create secret tls gitlab-tls --key /tmp/gitlab.key --cert /tmp/gitlab.crt -n my-gitlab-ns kube1:~/gitlab# cat my-ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: my-ingress
spec:
ingressClassName: nginx
tls:
- hosts:
- gitlab.corpX.un
secretName: gitlab-tls
rules:
- host: gitlab.corpX.un
http:
paths:
- backend:
service:
name: gitlab
port:
number: 80
path: /
pathType: Prefix
kube1:~/gitlab# kubectl -n my-gitlab-ns apply -f my-ingress.yaml