作者:张坚,科大讯飞开发工程师,云原生爱好者。
大家好,我是张坚。今日来聊聊如安在 KubeSphere 中集成外置的 ES 组件。
KubeSphere 在装置完成时分能够启用日志组件,这样会装置 ES 组件并能够收集所有布置组件的日志,也能够收集审计日志,然后能够很方便的在 KubeSphere 渠道上进行日志查询。
但是在实际运用进程中发现运用 KubeSphere 本身的 ES 会很重,并且官方也主张我们将日志接入到外部的 ES 中减轻 Kubernetes 的压力。
以下为操作实战。
前置步骤
ES 集群需支撑 http 协议
1️⃣ 搭建好外部 ES 集群,运用 http 协议(非本文要点)。
测验环境 IP: 172.30.10.226,172.30.10.191,172.30.10.184
port: 9200
username: elastic
password: changeme
2️⃣ 对 ES 做负载均衡。
有三种常见的做法:
- 运用 nginx 做负载均衡;
- 单协调节点;
- 经过自定义 service 和 endpoints 负载均衡。
本文档基于第三种负载均衡计划(经过 endpoints 负载)做对接。
备份 ks-installer
办理员账号登录 KubeSphere,在渠道办理 – 集群办理 – CRD 中查找 clusterconfiguration,在自定义资源中,点击 ks-installer
挑选修正 YAML ,仿制备份。
封闭内部 ES 对接外部 ES(假如未敞开日志则省略)
集群敞开了内部 Elasticsearch,会存在如下体系组件和日志接收器
1️⃣ 体系组件:
2️⃣ 日志接收器:
容器日志、资源事情、审计日志(不敞开不会有日志接收器)
接收器地址为内部 Elasticsearch 地址:elasticsearch-logging-data.kubesphere-logging-system.svc:9200
封闭内部 ES 并卸载日志相关可插拔组件
执行指令修正 ks-installer:
$ kubectl edit cc ks-installer -n kubesphere-system
1️⃣ 卸载日志体系,将 ks-installer
参数的 logging.enabled
字段的值从 true
改为 false
。
2️⃣ 卸载事情日志体系,将 ks-installer
参数的 events.enabled
字段的值从 true
改为 false
。
3️⃣ 卸载审计日志体系,将 ks-installer
参数的 auditing.enabled
字段的值从 true
改为 false
。
4️⃣ 配置文件的最后,删去如下内容:
es:
enabledTime: 2022-08-16T10:33:18CST
status: enabled
events:
enabledTime: 2022-04-15T16:22:59CST
status: enabled
fluentbit:
enabledTime: 2022-04-15T16:19:46CST
status: enabled
logging:
enabledTime: 2022-04-15T16:22:59CST
status: enabled
执行指令检查装置进程:
$ kubectl logs -n kubesphere-system $(kubectl get pod -n kubesphere-system -l app=ks-install -o jsonpath='{.items[0].metadata.name}') -f
#日志呈现以下内容阐明重启成功
Collecting installation results ...
#####################################################
### Welcome to KubeSphere! ###
#####################################################
Console: http://172.30.9.xxx:30880
Account: admin
Password: P@88w0rd
NOTES:
1. After you log into the console, please check the
monitoring status of service components in
"Cluster Management". If any service is not
ready, please wait patiently until all components
are up and running.
2. Please change the default password after login.
#####################################################
https://kubesphere.io 2022-08-04 15:53:14
#####################################################
执行指令卸载相关可插拔组件:
###### 卸载 KubeSphere 日志体系
$ kubectl delete inputs.logging.kubesphere.io -n kubesphere-logging-system tail
###### 卸载 KubeSphere 事情体系
$ helm delete ks-events -n kubesphere-logging-system
###### 卸载 KubeSphere 审计
$ helm uninstall kube-auditing -n kubesphere-logging-system
$ kubectl delete crd rules.auditing.kubesphere.io
$ kubectl delete crd webhooks.auditing.kubesphere.io
###### 卸载包括 Elasticsearch 的日志体系
$ kubectl delete crd fluentbitconfigs.logging.kubesphere.io
$ kubectl delete crd fluentbits.logging.kubesphere.io
$ kubectl delete crd inputs.logging.kubesphere.io
$ kubectl delete crd outputs.logging.kubesphere.io
$ kubectl delete crd parsers.logging.kubesphere.io
$ kubectl delete deployments.apps -n kubesphere-logging-system fluentbit-operator
$ helm uninstall elasticsearch-logging --namespace kubesphere-logging-system
$ kubectl delete deployment logsidecar-injector-deploy -n kubesphere-logging-system
$ kubectl delete ns kubesphere-logging-system
卸载进程中可能呈现如下异常:
crd 资源删去时呈现问题,尝试运用如下指令
$ kubectl patch crd/crd名称 -p '{"metadata":{"finalizers":[]}}' --type=merge
创立 namespace
$ kubectl create ns kubesphere-logging-system
自定义 service 负载均衡 ES 节点
es-service.yaml
apiVersion: v1
kind: Service
metadata:
labels:
app: es-service
name: es-service
namespace: kubesphere-logging-system
spec:
ports:
- port: 9200
name: es
protocol: TCP
targetPort: 9200
es-endpoints.yaml
ip 地址修正为真实要对接的 ES 集群节点的 IP 地址。
apiVersion: v1
kind: Endpoints
metadata:
labels:
app: es-service
name: es-service
namespace: kubesphere-logging-system
subsets:
- addresses:
- ip: 172.30.10.***
- ip: 172.30.10.***
- ip: 172.30.10.***
ports:
- port: 9200
name: es
protocol: TCP
执行指令创立自定义 SVC:
$ kubectl apply -f es-service.yaml -n kubesphere-logging-system
$ kubectl apply -f es-endpoints.yaml -n kubesphere-logging-system
#检查svc
$ kubectl get svc -n kubesphere-logging-system
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
es-service ClusterIP 109.233.8.178 <none> 9200/TCP 10d
#检查endpoints
$ kubectl get ep -n kubesphere-logging-system
NAME ENDPOINTS AGE es-service 172.30.10.***:9200,172.30.10.***:9200,172.30.10.***:9200 10d
“渠道办理-集群办理-应用负载-服务”查找 es-service。
es-service 服务地址:es-service.kubesphere-logging-system.svc。
敞开日志并对接外部 ES
在渠道办理 – 集群办理 – CRD 中查找 clusterconfiguration,在自定义资源中,点击 ks-installer
,修正配置:
敞开容器日志、审计日志别离修正
logging.enabled: true
auditing.enabled: true
修正外部 ES 配置
es.basicAuth.enabled: true
es.basicAuth.password
es.basicAuth.username
es.externalElasticsearchUrl
es.externalElasticsearchPort
修正日志保存日期(默许 7 天)
logMaxAge
修正日志索引前缀(默许 logstash)
elkPrefix(开发:dev,测验:sit,出产:prod)
apiVersion: installer.kubesphere.io/v1alpha1
kind: ClusterConfiguration
metadata:
labels:
version: v3.2.1
name: ks-installer
namespace: kubesphere-system
spec:
alerting:
enabled: false
auditing:
enabled: true # false改为true
...
es:
basicAuth:
enabled: true # false改为true
password: '****' # 暗码
username: '****' # 用户名
data:
volumeSize: 20Gi
elkPrefix: sit #开发:dev 测验:sit 出产:prod
externalElasticsearchPort: '9200' # 端口
externalElasticsearchUrl: es-service.kubesphere-logging-system.svc # 修正es-service
logMaxAge: 7 #默许7天即可
master:
volumeSize: 4Gi
...
执行指令检查装置进程
$ kubectl logs -n kubesphere-system $(kubectl get pod -n kubesphere-system -l app=ks-install -o jsonpath='{.items[0].metadata.name}') -f
#日志呈现以下内容阐明重启成功
Collecting installation results ...
#####################################################
### Welcome to KubeSphere! ###
#####################################################
Console: http://172.30.9.xxx:30880
Account: admin
Password: P@88w0rd
NOTES:
1. After you log into the console, please check the
monitoring status of service components in
"Cluster Management". If any service is not
ready, please wait patiently until all components
are up and running.
2. Please change the default password after login.
#####################################################
https://kubesphere.io 2022-08-04 15:53:14
#####################################################
执行指令,检查对应的 ConfigMap 配置:
$ kubectl get configmap kubesphere-config -n kubesphere-system -o yaml
#要点如下,看es的配置是否现已生效,host是否为自定义SVC,以及用户名暗码索引是否正确
logging:
host: http://es-service.kubesphere-logging-system.svc:9200
basicAuth: True
username: "****" #此处为你填写的正确用户名
password: "****" #此处为你填写的正确暗码
indexPrefix: ks-sit-log #不同环境对应dev\sit\prod
auditing:
enable: true
webhookURL: https://kube-auditing-webhook-svc.kubesphere-logging-system.svc:6443/audit/webhook/event
host: http://es-service.kubesphere-logging-system.svc:9200
basicAuth: True
username: "****" #此处为你填写的正确用户名
password: "****" #此处为你填写的正确暗码
indexPrefix: ks-sit-auditing #不同环境对应dev\sit\prod
执行指令修正对应 output(假如已主动修正则不需求手动修正):
-
修正 host
-
修正索引 (开发、测验、出产前缀别离对应 ks-dev-、ks-sit-、ks-prod-)
#修正es的output
$ kubectl edit output es -n kubesphere-logging-system
#修正host 和 logstashPrefix
# host: es-service.kubesphere-logging-system.svc
# logstashPrefix: ks-对应环境-log
#如下:
spec:
es:
generateID: true
host: es-service.kubesphere-logging-system.svc # host地址
httpPassword:
valueFrom:
secretKeyRef:
key: password
name: elasticsearch-credentials
httpUser:
valueFrom:
secretKeyRef:
key: username
name: elasticsearch-credentials
logstashFormat: true
logstashPrefix: ks-sit-log # 修正此处为对应环境的日志索引
port: 9200
timeKey: '@timestamp'
matchRegex: '(?:kube|service)\.(.*)'
#修正es-auditing的output
$ kubectl edit output es-auditing -n kubesphere-logging-system
#修正host 和 logstashPrefix
# host: es-service.kubesphere-logging-system.svc
# logstashPrefix: ks-对应环境-auditing
#如下
spec:
es:
generateID: true
host: es-service.kubesphere-logging-system.svc # host地址
httpPassword:
valueFrom:
secretKeyRef:
key: password
name: elasticsearch-credentials
httpUser:
valueFrom:
secretKeyRef:
key: username
name: elasticsearch-credentials
logstashFormat: true
logstashPrefix: ks-sit-auditing # 修正此处为对应环境的日志索引
port: 9200
match: kube_auditing
重启 ks-apiserver
$ kubectl rollout restart deployment ks-apiserver -n kubesphere-system
验证
$ kubectl get po -n kubesphere-logging-system
NAME READY STATUS RESTARTS AGE
elasticsearch-logging-curator-elasticsearch-curator-276864h2xt2 0/1 Error 0 38h
elasticsearch-logging-curator-elasticsearch-curator-276864wc6bs 0/1 Completed 0 38h
elasticsearch-logging-curator-elasticsearch-curator-276879865wl 0/1 Completed 0 14h
elasticsearch-logging-curator-elasticsearch-curator-276879l7xpf 0/1 Error 0 14h
fluent-bit-4vzq5 1/1 Running 0 47h
fluent-bit-6ckvm 1/1 Running 0 25h
fluent-bit-6jt8d 1/1 Running 0 47h
fluent-bit-88crg 1/1 Running 0 47h
fluent-bit-9ps6z 1/1 Running 0 47h
fluent-bit-djhtx 1/1 Running 0 47h
fluent-bit-dmpfv 1/1 Running 0 47h
fluent-bit-dtr7z 1/1 Running 0 47h
fluent-bit-flxbt 1/1 Running 0 47h
fluent-bit-fnxdk 1/1 Running 0 47h
fluent-bit-gqbrl 1/1 Running 0 47h
fluent-bit-kbzsj 1/1 Running 0 47h
fluent-bit-lbnnh 1/1 Running 0 47h
fluent-bit-nq4g8 1/1 Running 0 47h
fluent-bit-q5shz 1/1 Running 0 47h
fluent-bit-qrb7v 1/1 Running 0 47h
fluent-bit-r26fk 1/1 Running 0 47h
fluent-bit-rfrpd 1/1 Running 0 47h
fluent-bit-s8869 1/1 Running 0 47h
fluent-bit-sp5k4 1/1 Running 0 47h
fluent-bit-vjvhl 1/1 Running 0 47h
fluent-bit-xkksv 1/1 Running 0 47h
fluent-bit-xrlz4 1/1 Running 0 47h
fluentbit-operator-745bf5559f-vnz8w 1/1 Running 0 47h
kube-auditing-operator-84857bf967-ftbjr 1/1 Running 0 47h
kube-auditing-webhook-deploy-64cfb8c9f8-hf8g8 1/1 Running 0 47h
kube-auditing-webhook-deploy-64cfb8c9f8-zf4rd 1/1 Running 0 47h
logsidecar-injector-deploy-5fb6fdc6dd-fj5vm 2/2 Running 0 47h
logsidecar-injector-deploy-5fb6fdc6dd-qbhdg 2/2 Running 0 47h
日志接收器:
查询审计日志:
本文由博客一文多发渠道 OpenWrite 发布!