1. Single etcd node (for test and Development)
I used to develop and test an etcd node, and started the command to directly create an etcd (I have added the bin directory of the etcd installation directory TO THE PATH environment variable ), then, the startup information shows that the
First, Introduction"A highly-available key value store for shared configuration and service discovery."ETCD is a distributed service system developed by CoreOS, and the raft protocol is adopted internally as the consistency algorithm. As a highly available configuration sharing, service discovery key-value storage System, ETCD has the following features:1) Simple: Simple installation configuration, and the
have any effect;Swarm manager needs to know which swarm node, which requires "service discovery" (with registration to find), swarm service discovery methods are many, here are two main experiments, that is, through the Docker hub token and ETCD;(1) As mentioned in the previous article that Docker-machine,docker-machine is integrated with Docker swarm, the Docker hub token is made by applying a token to the Docker hub token via Swarm, Then add all of
Environment :etcd01:192.168.93.201,centos7.2etcd02:192.168.93.203,centos7.2etcd03:192.168.93.203,centos7.2Software version:etcd:2.3.7Implementation steps:With ETCD1 deployment as an example, the other 2 host steps are the same:Installing ETCD[email protected] ~]# Yum install etcd-yModifying a configuration fileVi/etc/etcd//etcd.confEtcd_name=etcd01Etcd_data_dir=
ETCD stand-alone modeSetting environment variablesExport hostip= "192.168.12.50"Execute the following command to open the ETCD client connection ports 4001 and 2379, ETCD interconnect Port 2380If this is the first time this command is executed, Docker will download the latest ETCD official imageDocker run-d-v/usr/share
download to the server with your browser and then execute the following commandTo add executable permissions to Cfssl:chmod +x cfssl_linux-amd64 cfssljson_linux-amd64 cfssl-certinfo_linux-amd64Then move the file to this location:MV Cfssl_linux-amd64/usr/local/bin/cfsslMV Cfssljson_linux-amd64/usr/local/bin/cfssljsonMV Cfssl-certinfo_linux-amd64/usr/local/bin/cfssl-certinfo2. Generate certificateCertificate Usage in k8s componentsCreate a folder in the server, landlord I was in the Mkdir/home/ss
Label:.gzetcdrefatitarget toolarturllis # Backup ETCD data etcdctl backup--DATA-DIR/VAR/LIB/ETCD/DEFAULT.ETCD--backup-dir/root/etcd71 ETCD backup uses ETCD command etcdctl for etc Backup, the script is as follows: #!/bin/bashdate_time= ' date +%y%m%d ' Etcdctl backup--data-dir/var/lib/
Refer to my previous article (Click here) to introduce a key issue in the etcd cluster environment:
Which of the three etcd nodes should be accessed by clustering )???
(1) Any of the three read operations can be performed, even if it is not a leader
(2) For write operations, it seems that only the leader can be connected to write data.
I have a cluster composed of three nodes (127.0.0.1: 4001, 127.0.0.1:
New to buy notebook, reinstall ETCD, record it;
Three systems are centos7.3 virtual machines: IP addresses are: 192.168.23.128-130
Introduce a more clumsy way, suitable for beginners
Installation steps:
1) Yum Install-y Etcd
2 Modify the 9 parameters in the configuration file
Node1 node:
[Root@bxhvm01 ~]# grep-v "^#"/etc/etcd/etcd.conf etcd_name=etcd01 "etcd_dat
This is a creation in
Article, where the information may have evolved or changed.
As early as November 2013, in the raft paper can only be downloaded to the draft version on the Internet, I have written a blog on its brief analysis. Over the past 4 years, various raft agreements have been extensively explained, and raft has indeed been widely used. One of the most well-known applications is ETCD. Etcd the
This is a creation in
Article, where the information may have evolved or changed.
1, about ETCD
ETCD is a service discovery tool similar to zookeeper.Reference Introduction:http://dockone.io/article/667Https://coreos.com/blog/performance-of-etcd.htmlETCD Performance Comparison:
2, build the environment
Under Linux: Install the latest 3.1.1
https://github.com/coreos/
Option explicit'Vss provided ini provided already releasedPrivate srcsafe_ini as string'Vss connected zookeeper IDPrivate user_id as string'Vss is connected to zookeeper without zookeeperPrivate user_password as string'Vss RootPrivate vss_root as string'Worker worker?Private output_dir as string'Too many threads have been transferred too many threads have been transferredPrivate mobjfilesystem as FileSystem
ETCD Simple Installation
1. Installation of Go
You can download the binary package directly on the website: https://golang.org/dl/
Https://storage.googleapis.com/golang/go1.6.3.linux-amd64.tar.gz
Set Environment variables:
Export path= $PATH:/usr/local/go/bin/
Installation of 2.ETCD
Here is the way to compile:
git clone https://github.com/coreos/etcd.git
cd Etcd
"Small and medium-sized team landing Configuration Center," The article describes how to build a configuration center based on ETCD+CONFD, finally mentioned ETCD security issues when said can use account password Authentication to achieve secure access, how to open authentication and how to design access to access it? This article will give you a detailed explanation
Certification notes
This is a creation in
Article, where the information may have evolved or changed.
Source: Personal blog Address: http://www.damonyi.cc/?p=194
The project uses the ETCD database to store the container's information and the application's domain name information, and ETCD the Golang code of the operation.
1. Write container information to the specified directory
C, err: = Common. Getetcdclient () if err! = Ni
[[email protected] ~]# Vim/etc/salt/master =============> at the bottom of the configuration file, add the following contentEtcd_pillar_config:etcd.host:10.0.0.7etcd.port:4001Ext_pillar:-Etcd:etcd_pillar_config root=/salt/haproxy/[Email protected] ~]#/etc/init.d/salt-master restartStopping salt-master daemon: [OK]Starting Salt-master daemon: [OK]Set a key here:[Email protected] ~]# curl-s http://10.0.0.7:2379/v2/keys/salt/haproxy/backend_www_oldboyedu_com/web-node1-XPUT-d Value= "10.0.0.7:8080"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.