当前位置:网站首页>Redis deployment of cloud native kubesphere
Redis deployment of cloud native kubesphere
2022-04-23 12:39:00 【Love pocket sky】
1、 Reference use docker Deploy redis Steps for
1.1、 Prepare out of container persistence redis The path to the configuration file
mkdir -p /mydata/redis/conf
1.2、 Get ready redis Profile contents ,vim /mydata/redis/conf/redis.conf
## Configuration example appendonly yes port 6379 bind 0.0.0.01.3、docker start-up redis
docker run -d -p 6379:6379 --restart=always \ -v /mydata/redis/conf/redis.conf:/etc/redis/redis.conf \ -v /mydata/redis-01/data:/data \ --name redis-01 redis:6.2.5 \ redis-server /etc/redis/redis.conf
2、kubesphere Yes redis Deployment Analysis
1、 Deployment Analysis
/data: take redis Persistent data files to pvc Resources
/etc/redis: Put... In this directory redis.conf The file is mapped to ConfigMap in
redis-server /etc/redis/redis.conf: Execute... With this command redis Start command
3、 Start deployment ConfigMap To map redis.conf Configuration information
1、 Enter the configuration center -》 To configure
![]()
2、 Start creating configuration file
Click Create :
ok, The configuration file is mounted !
4、 Now let's start creating redis Stateful replica set of
1、 Enter the path to create a stateful replica set
2、 Start to create
Click next :
Continue setting down redis Resources for :
Next, configure the startup command :
Click synchronize host time zone :
preservation , And then click next :
Click next :
![]()
Here we want to add Volume template , Because we didn't create the storage volume in advance :
Click save :
Next, click mount configuration file :
Click save :
![]()
Click Create :
The final result :
5、 visit redis
1、 The default is intranet access
First, let's access and view through the terminal intranet :
2、 You can see that we use the mount volume template ,kubesphere By default, we created pvc
3、 Create out of cluster access
![]()
![]()
![]()
The creation is complete :
Use client access on the Internet redis, You can see that the exposed ports above are 30142:
6、 It can be adjusted dynamically with one key redis replications
For example, we choose 3 individual :
![]()
版权声明
本文为[Love pocket sky]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231236522970.html
边栏推荐
- Fashion cloud learning - input attribute summary
- BUUCTF WEB [BUUCTF 2018]Online Tool
- How to solve the computer system card?
- 风尚云网学习-input属性总结
- leetcode:437. Path sum III [DFS selected or not selected?]
- Recommended programming AIDS: picture tool snipaste
- Luogu p5540 [balkanoi2011] timeismoney | minimum product spanning tree problem solution
- SQL exercise (I)
- 网站首页文件被攻击篡改的形式有哪些
- 网络信息安全之零信任
猜你喜欢

STM32 project transplantation: transplantation between chip projects of different models: Ze to C8

Pre competition practice of TIANTI competition
![[redis series] redis learning 13. Redis often asks simple interview questions](/img/4c/2440af6daa26a0ca6cb64f32bf138e.png)
[redis series] redis learning 13. Redis often asks simple interview questions

QT double buffer drawing

天梯赛赛前练习

Everything can be expected in the future | one 2022 campus recruitment officially opened

【unity笔记】L4Unity中的基础光照

Use source insight to view and edit source code

One way ANOVA of SPSS

使用Source Insight查看编辑源代码
随机推荐
Debug Jest test cases in VSCode, debug Jest test cases in VSCode, middle note basedir=$(dirname "$" (echo "$0" sed -e -e, s, \ \, / "-e").
使用Source Insight查看编辑源代码
Qt一个进程运行另一个进程
只是不断地建构平台,不断地收拢流量,并不能够做好产业互联网
Introduction to metalama 4 Use fabric to manipulate items or namespaces
Pagoda panel command line help tutorial (including resetting password)
栈和队列a
Recommended programming AIDS: picture tool snipaste
甲辰篇 創世紀《「內元宇宙」聯載》
一个平面设计师的异想世界|ONES 人物
STM32 control stepper motor (ULN2003 + 28byj)
NBIOT的AT指令
Qt进程间通信
网站首页文件被攻击篡改的形式有哪些
网络信息安全之零信任
How do traditional enterprises cope with digital transformation? These books give you the answer
SPSS之单因素方差分析
Everything can be expected in the future | one 2022 campus recruitment officially opened
BUUCTF WEB [BJDCTF2020]The mystery of ip
S2-062 remote command execution vulnerability recurrence (cve-2021-31805)







Next, configure the startup command :
preservation , And then click next :














