This is an old revision of the document!
Запустите с правами Administrator C:\cmder\cmder.exe bash cd test -d conf && rm -rf conf git clone http://val.bmstu.ru/unix/conf.git cd conf/virtualbox/ !!! 10 - это номер курса, вместо X укажите Ваш номер стенда, если не знаете его, спросите преподавателя !!! ./setup.sh X 10
# sh net_gate.sh # init 6
# sh net_server.sh # init 6
gate:~# ###git -C conf/ pull gate:~# sh conf/dhcp.sh
# cat /etc/resolv.conf
search corpX.un nameserver 192.168.X.10
# host kubeN
# cat docker-compose.yml
...
userns_mode: 'host'
...
external_url 'https://server.corpX.un:4443'
...
- '4443:4443'
...
bash -c ' scp /opt/freeipa-data/etc/ipa/ca.crt kube1:/usr/local/share/ca-certificates/ ssh kube1 update-ca-certificates ssh kube1 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube2:/usr/local/share/ca-certificates/ ssh kube2 update-ca-certificates ssh kube2 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube3:/usr/local/share/ca-certificates/ ssh kube3 update-ca-certificates ssh kube3 systemctl restart containerd scp /opt/freeipa-data/etc/ipa/ca.crt kube4:/usr/local/share/ca-certificates/ ssh kube4 update-ca-certificates ssh kube4 systemctl restart containerd ' kubeN# crictl pull server.corpX.un:5000/student/gowebd crictl images crictl rmi server.corpX.un:5000/student/gowebd
kube1:~# kubectl create ns my-keycloak-ns kube1:~# kubectl create secret tls keycloak-tls --key /tmp/keycloak.key --cert /tmp/keycloak.crt -n my-keycloak-ns
server# scp /opt/freeipa-data/gitlab.* kube1:/tmp/ server# scp /opt/freeipa-data/etc/ipa/ca.crt kube1:/tmp/ kubectl -n my-gitlab-ns create secret generic gitlab-tls \ --from-file=tls.crt=/tmp/gitlab.crt \ --from-file=tls.key=/tmp/gitlab.key \ --from-file=ca.crt=/tmp/ca.crt
kube1:~/gitlab# cat docker-compose.yml
services:
gitlab:
image: 'gitlab/gitlab-ce:latest'
restart: always
hostname: 'gitlab'
environment:
GITLAB_ROOT_PASSWORD: "strongpassword"
GITLAB_OMNIBUS_CONFIG: |
prometheus_monitoring['enable'] = false
gitlab_rails['registry_enabled'] = true
gitlab_rails['registry_host'] = "gitlab.corpX.un"
external_url 'http://gitlab.corpX.un'
registry_external_url 'http://gitlab.corpX.un:5000'
gitlab_rails['registry_port'] = "5050"
registry['registry_http_addr'] = "0.0.0.0:5050"
ports:
- '80:80'
- '2222:22'
- '5000:5000'
volumes:
- vol1:/var/opt/gitlab
shm_size: '256m'
logging:
driver: "json-file"
options:
max-size: "2048m"
volumes:
vol1:
kube1:~/gitlab# kompose convert
kube1:~/gitlab# cat vol1-persistentvolumeclaim.yaml
...
storage: 2000Mi
kube1:~/gitlab# cat gitlab-deployment.yaml
...
volumeMounts:
- name: secret-tls-volume
subPath: tls.crt
mountPath: /etc/gitlab/ssl/gitlab.corp13.un.crt
- name: secret-tls-volume
subPath: tls.key
mountPath: /etc/gitlab/ssl/gitlab.corp13.un.key
- name: secret-tls-volume
subPath: ca.crt
mountPath: /etc/gitlab/trusted-certs/ca.crt
...
volumes:
...
- name: secret-tls-volume
secret:
secretName: gitlab-tls
...
kube1:~/gitlab# cat gitlab-service.yaml
...
loadBalancerIP: 192.168.13.66
type: LoadBalancer
...
kube1:~/gitlab# kubectl -n my-gitlab-ns apply -f vol1-persistentvolumeclaim.yaml,gitlab-service.yaml,gitlab-deployment.yaml