mirror of
https://github.com/bigchaindb/bigchaindb.git
synced 2024-10-13 13:34:05 +00:00
Minor fixes to k8s setup (#1735)
* Fix typo in docs * Minor documentation fixes. * Update mongodb monitoring agent to latest version. * Update mongodb backup agent to latest version. * Bugfix in mongodb backup agent.
This commit is contained in:
parent
4175feb8b7
commit
2e40ad96f2
@ -204,7 +204,7 @@ Step 5: Assign DNS Name to the NGINX Public IP
|
|||||||
**Set up DNS mapping in Azure.**
|
**Set up DNS mapping in Azure.**
|
||||||
Select the current Azure resource group and look for the ``Public IP``
|
Select the current Azure resource group and look for the ``Public IP``
|
||||||
resource. You should see at least 2 entries there - one for the Kubernetes
|
resource. You should see at least 2 entries there - one for the Kubernetes
|
||||||
master and the other for the MongoDB instance. You may have to ``Refresh`` the
|
master and the other for the NGINX instance. You may have to ``Refresh`` the
|
||||||
Azure web page listing the resources in a resource group for the latest
|
Azure web page listing the resources in a resource group for the latest
|
||||||
changes to be reflected.
|
changes to be reflected.
|
||||||
Select the ``Public IP`` resource that is attached to your service (it should
|
Select the ``Public IP`` resource that is attached to your service (it should
|
||||||
@ -543,7 +543,7 @@ Step 13: Configure Users and Access Control for MongoDB
|
|||||||
.. code:: bash
|
.. code:: bash
|
||||||
|
|
||||||
$ mongo --host localhost --port 27017 --verbose --ssl \
|
$ mongo --host localhost --port 27017 --verbose --ssl \
|
||||||
--sslCAFile /etc/mongod/ssl/ca.pem \
|
--sslCAFile /etc/mongod/ca/ca.pem \
|
||||||
--sslPEMKeyFile /etc/mongod/ssl/mdb-instance.pem
|
--sslPEMKeyFile /etc/mongod/ssl/mdb-instance.pem
|
||||||
|
|
||||||
* Initialize the replica set using:
|
* Initialize the replica set using:
|
||||||
@ -857,13 +857,13 @@ To test the NGINX instance with HTTPS and 3scale integration:
|
|||||||
|
|
||||||
.. code:: bash
|
.. code:: bash
|
||||||
|
|
||||||
$ nslookup ngx-https-instance-0
|
$ nslookup ngx-instance-0
|
||||||
|
|
||||||
$ dig +noall +answer _public-secure-cluster-port._tcp.ngx-https-instance-0.default.svc.cluster.local SRV
|
$ dig +noall +answer _public-secure-cluster-port._tcp.ngx-instance-0.default.svc.cluster.local SRV
|
||||||
|
|
||||||
$ dig +noall +answer _public-mdb-port._tcp.ngx-https-instance-0.default.svc.cluster.local SRV
|
$ dig +noall +answer _public-mdb-port._tcp.ngx-instance-0.default.svc.cluster.local SRV
|
||||||
|
|
||||||
$ dig +noall +answer _public-insecure-cluster-port._tcp.ngx-https-instance-0.default.svc.cluster.local SRV
|
$ dig +noall +answer _public-insecure-cluster-port._tcp.ngx-instance-0.default.svc.cluster.local SRV
|
||||||
|
|
||||||
$ wsc -er wss://<cluster-fqdn>/api/v1/streams/valid_transactions
|
$ wsc -er wss://<cluster-fqdn>/api/v1/streams/valid_transactions
|
||||||
|
|
||||||
@ -887,4 +887,4 @@ If you are using the NGINX with HTTPS support, use ``https`` instead of
|
|||||||
``http`` above.
|
``http`` above.
|
||||||
|
|
||||||
Use the Python Driver to send some transactions to the BigchainDB node and
|
Use the Python Driver to send some transactions to the BigchainDB node and
|
||||||
verify that your node or cluster works as expected.
|
verify that your node or cluster works as expected.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
docker build -t bigchaindb/mongodb-backup-agent:3.2 .
|
docker build -t bigchaindb/mongodb-backup-agent:3.4 .
|
||||||
|
|
||||||
docker push bigchaindb/mongodb-backup-agent:3.2
|
docker push bigchaindb/mongodb-backup-agent:3.4
|
||||||
|
@ -15,7 +15,7 @@ if [[ -z "${mms_api_keyfile_path:?MMS_API_KEYFILE_PATH not specified. Exiting!}"
|
|||||||
-z "${mms_groupid_keyfile_path:?MMS_GROUPID_KEYFILE_PATH not specified. Exiting!}" ]]; then
|
-z "${mms_groupid_keyfile_path:?MMS_GROUPID_KEYFILE_PATH not specified. Exiting!}" ]]; then
|
||||||
exit 1
|
exit 1
|
||||||
else
|
else
|
||||||
echo MMS_API_KEYFILE_PATH="$mms_api_key"
|
echo MMS_API_KEYFILE_PATH="$mms_api_keyfile_path"
|
||||||
echo MMS_GROUPID_KEYFILE_PATH="$mms_groupid_keyfile_path"
|
echo MMS_GROUPID_KEYFILE_PATH="$mms_groupid_keyfile_path"
|
||||||
echo CA_CRT_PATH="$ca_crt_path"
|
echo CA_CRT_PATH="$ca_crt_path"
|
||||||
echo BACKUP_PEM_PATH="$backup_pem_path"
|
echo BACKUP_PEM_PATH="$backup_pem_path"
|
||||||
|
@ -24,7 +24,7 @@ spec:
|
|||||||
terminationGracePeriodSeconds: 10
|
terminationGracePeriodSeconds: 10
|
||||||
containers:
|
containers:
|
||||||
- name: mdb-backup
|
- name: mdb-backup
|
||||||
image: bigchaindb/mongodb-backup-agent:3.2
|
image: bigchaindb/mongodb-backup-agent:3.4
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
env:
|
env:
|
||||||
- name: MMS_API_KEYFILE_PATH
|
- name: MMS_API_KEYFILE_PATH
|
||||||
@ -62,4 +62,4 @@ spec:
|
|||||||
- name: cloud-manager-credentials
|
- name: cloud-manager-credentials
|
||||||
secret:
|
secret:
|
||||||
secretName: cloud-manager-credentials
|
secretName: cloud-manager-credentials
|
||||||
defaultMode: 0404
|
defaultMode: 0404
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
docker build -t bigchaindb/mongodb-monitoring-agent:3.0 .
|
docker build -t bigchaindb/mongodb-monitoring-agent:3.1 .
|
||||||
|
|
||||||
docker push bigchaindb/mongodb-monitoring-agent:3.0
|
docker push bigchaindb/mongodb-monitoring-agent:3.1
|
||||||
|
@ -24,7 +24,7 @@ spec:
|
|||||||
terminationGracePeriodSeconds: 10
|
terminationGracePeriodSeconds: 10
|
||||||
containers:
|
containers:
|
||||||
- name: mdb-mon
|
- name: mdb-mon
|
||||||
image: bigchaindb/mongodb-monitoring-agent:3.0
|
image: bigchaindb/mongodb-monitoring-agent:3.1
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
env:
|
env:
|
||||||
- name: MMS_API_KEYFILE_PATH
|
- name: MMS_API_KEYFILE_PATH
|
||||||
@ -62,4 +62,4 @@ spec:
|
|||||||
- name: cloud-manager-credentials
|
- name: cloud-manager-credentials
|
||||||
secret:
|
secret:
|
||||||
secretName: cloud-manager-credentials
|
secretName: cloud-manager-credentials
|
||||||
defaultMode: 0404
|
defaultMode: 0404
|
||||||
|
Loading…
x
Reference in New Issue
Block a user