seo优化

This commit is contained in:
huanqing.shao
2019-09-21 00:42:52 +08:00
parent 20d15a141c
commit affcfef338
62 changed files with 412 additions and 301 deletions

View File

@ -18,7 +18,7 @@ description: 使用 Kuboard 在 Kubernetes 上安装监控套件,并对 exampl
假设您已进入 example 名称空间,如下图所示:
![image-20190723121433809](./import.assets/image-20190723121433809.png)
![Kubernetes教程在Kuboard中监控-进入名称空间](./import.assets/image-20190723121433809.png)
@ -34,41 +34,41 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
* 将鼠标移到 ***设置*** 菜单
![image-20190723150525017](./monitor.assets/image-20190723150525017.png)
![Kubernetes教程在Kuboard中监控-进入监控套件安装页](./monitor.assets/image-20190723150525017.png)
* 点击 ***监控套件 - example***
![image-20190723150616633](./monitor.assets/image-20190723150616633.png)
![Kubernetes教程在Kuboard中监控-进入监控套件安装页](./monitor.assets/image-20190723150616633.png)
* 点击 ***全局监控套件 / 查找并安装***
![image-20190723150853277](./monitor.assets/image-20190723150853277.png)
![Kubernetes教程在Kuboard中监控-安装全局监控套件-查找](./monitor.assets/image-20190723150853277.png)
* 点击 ***资源层监控套件 / 安装***
![image-20190723151045112](./monitor.assets/image-20190723151045112.png)
![Kubernetes教程在Kuboard中监控-安装全局监控套件-安装](./monitor.assets/image-20190723151045112.png)
* 点击 ***全局监控套件 / 资源层监控套件 / 安装***
![image-20190723151103353](./monitor.assets/image-20190723151103353.png)
![Kubernetes教程在Kuboard中监控-安装全局监控套件-安装](./monitor.assets/image-20190723151103353.png)
* 根据向导提示,完成工作负载的导入
![image-20190723151339137](./monitor.assets/image-20190723151339137.png)
![Kubernetes教程在Kuboard中监控-安装全局监控套件-导入对应的工作负载](./monitor.assets/image-20190723151339137.png)
* 点击 ***资源层监控套件 / 初始化***
由于下载镜像需要时间您可能需要等待5-10分钟后才能成功执行初始化。初始化成功的话您将看到如下提示信息。
![image-20190723151357262](./monitor.assets/image-20190723151357262.png)
![Kubernetes教程在Kuboard中监控-安装全局监控套件-初始化](./monitor.assets/image-20190723151357262.png)
### 安装名称空间监控套件
* 点击 ***名称空间监控套件 example / 查找并安装***
![image-20190723151422460](./monitor.assets/image-20190723151422460.png)
![Kubernetes教程在Kuboard中监控-安装名称空间监控套件-查找](./monitor.assets/image-20190723151422460.png)
* 重复前述过程,安装监控套件
@ -80,7 +80,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
安装完成后,界面如下图所示:
![image-20190723151711230](./monitor.assets/image-20190723151711230.png)
![Kubernetes教程在Kuboard中监控-安装名称空间监控套件-安装](./monitor.assets/image-20190723151711230.png)
### 查看监控套件的工作负载
@ -90,7 +90,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
> 全局监控套件安装在 kube-system 名称空间
![image-20190723151804727](./monitor.assets/image-20190723151804727.png)
![Kubernetes教程在Kuboard中监控-查看监控套件-全局](./monitor.assets/image-20190723151804727.png)
## 重启 example 容器组
@ -112,7 +112,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
> * Kubernetes 在启动容器组时,根据 imagePullPolicy 的设置 Always将会尝试从镜像仓库抓取最新镜像这一特性可以用于开发环境和测试环境的版本更新因为您的 devops 系统肯能不会为 daily build 生成新的镜像标签;
> * 此处删除容器组的目的是,重新启动容器,以便容器中的监控探针能够检测到其对应监控套件的存在。
![image-20190723151845303](./monitor.assets/image-20190723151845303.png)
![Kubernetes教程在Kuboard中监控-重启容器组](./monitor.assets/image-20190723151845303.png)
* 在列表中选择
@ -128,31 +128,31 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
* web-example-xxxxxx-xxxx
![image-20190723151902003](./monitor.assets/image-20190723151902003.png)
![Kubernetes教程在Kuboard中监控-重启容器组-选中容器组](./monitor.assets/image-20190723151902003.png)
* 点击 ***删除*** 按钮
![image-20190723151914994](./monitor.assets/image-20190723151914994.png)
![Kubernetes教程在Kuboard中监控-重启容器组-删除容器组](./monitor.assets/image-20190723151914994.png)
* 点击 ***确定***
![image-20190723151932871](./monitor.assets/image-20190723151932871.png)
![Kubernetes教程在Kuboard中监控-重启容器组-确认删除容器组](./monitor.assets/image-20190723151932871.png)
* 点击 ***应用***
![image-20190723151951910](./monitor.assets/image-20190723151951910.png)
![Kubernetes教程在Kuboard中监控-重启容器组-执行](./monitor.assets/image-20190723151951910.png)
* 等待,直到容器组调整完成
![image-20190723152020605](./monitor.assets/image-20190723152020605.png)
![Kubernetes教程在Kuboard中监控-重启容器组-等待执行过程](./monitor.assets/image-20190723152020605.png)
* 点击 ***后退***
![image-20190723152040219](./monitor.assets/image-20190723152040219.png)
![Kubernetes教程在Kuboard中监控-重启容器组-查看结果](./monitor.assets/image-20190723152040219.png)
## 查看监控信息
@ -162,13 +162,13 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
如果您在下图中没有看到 ***Nginx 监控*** ***容器组监控*** 等,请刷新您的页面,因为监控套件初始化之后需要刷新页面才能加载并显示。
![image-20190723152124196](./monitor.assets/image-20190723152124196.png)
![Kubernetes教程在Kuboard中监控-查看Nginx监控、容器组监控入口](./monitor.assets/image-20190723152124196.png)
* 点击 ***所在节点监控***
可查看所在节点的资源使用情况监控信息
![image-20190718104156232](./monitor.assets/image-20190718104156232.png)
![Kubernetes教程在Kuboard中监控-查看所在节点监控](./monitor.assets/image-20190718104156232.png)
@ -180,7 +180,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
* 点击 Nginx 监控
![image-20190718104729472](./monitor.assets/image-20190718104729472.png)
![Kubernetes教程在Kuboard中监控-查看Nginx监控](./monitor.assets/image-20190718104729472.png)
@ -190,7 +190,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
* 点击 ***持久层 / example db***
* 点击 ***MySQL 监控***
![image-20190718105420599](./monitor.assets/image-20190718105420599.png)
![Kubernetes教程在Kuboard中监控-查看MySQL监控](./monitor.assets/image-20190718105420599.png)
@ -200,7 +200,7 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
* 点击 ***微服务层 / example***
* 点击 ***Java 虚拟机监控***
![image-20190718105641651](./monitor.assets/image-20190718105641651.png)
![Kubernetes教程在Kuboard中监控-查看Java虚拟机监控](./monitor.assets/image-20190718105641651.png)
@ -208,10 +208,10 @@ kubectl -n kube-system create secret generic etcd-certs --from-file=/etc/kuberne
****微服务层 / example*** 中点击 ***链路追踪***
![image-20190718120957255](./monitor.assets/image-20190718120957255.png)
![Kubernetes教程在Kuboard中监控-查看链路追踪信息](./monitor.assets/image-20190718120957255.png)
![image-20190718121133160](./monitor.assets/image-20190718121133160.png)
![Kubernetes教程在Kuboard中监控-查看链路追踪信息-APM](./monitor.assets/image-20190718121133160.png)