在 Kubernetes 上安装
了解如何在 Kubernetes 上安装 RDI
本指南介绍如何使用 RDI Helm Chart 在 Kubernetes (K8s) 上安装。您还可以在 VM 上安装 RDI。
安装将创建以下 K8s 对象:
- 一个名为
rdi
. - RDI 运算符、指标导出器和 API 服务器的部署。
- 一个服务账户以及 RDI作员的角色和角色绑定。
- 具有 RDI Redis 数据库详细信息的不同组件的 Configmap。
- 具有 RDI Redis 数据库凭证和 TLS 证书的密钥。
您可以在 OpenShift 和其他 K8s 发行版上使用此安装 包括云提供商的 K8s 托管集群。
您可以从下载中心或您自己的私有映像注册表中提取 RDI 映像。
安装之前
在运行 Helm 之前完成以下步骤:
- 在 Redis Enterprise 集群上创建 RDI 数据库。
- 如果您不想使用默认密码,请为 RDI 数据库创建用户(请参阅访问控制 更多信息)。
- 从下载中心下载 RDI helm chart tar 文件。
- 如果要使用私有镜像注册表,请使用 RDI 镜像进行准备。
创建 RDI 数据库
RDI 使用 Redis Enterprise 集群上的数据库来存储其状态 信息。这需要 Redis Enterprise v6.4 或更高版本。
-
使用 Redis 控制台创建具有 250MB RAM 的数据库,其中包含一个主数据库和一个副本数据库。
-
如果要为生产环境部署 RDI,请使用密码保护此数据库 和 TLS。
-
将数据库的逐出策略设置为
noeviction
.请注意,您不能使用rladmin
, 因此,您必须使用管理 UI 或使用以下 REST API 命令来执行此作:curl -v -k -d '{"eviction_policy": "noeviction"}' \ -u '<USERNAME>:<PASSWORD>' \ -H "Content-Type: application/json" \ -X PUT https://<CLUSTER_FQDN>:9443/v1/bdbs/<BDB_UID>
-
Set the database's data persistence to AOF - fsync every 1 sec. Note that you can't set this using
rladmin
, so you must either do it using the admin UI or with the following REST API commands:curl -v -k -d '{"data_persistence":"aof"}' \ -u '<USERNAME>:<PASSWORD>' \ -H "Content-Type: application/json" -X PUT https://<CLUSTER_FQDN>:9443/v1/bdbs/<BDB_UID> curl -v -k -d '{"aof_policy":"appendfsync-every-sec"}' \ -u '<USERNAME>:<PASSWORD>' \ -H "Content-Type: application/json" \ -X PUT https://<CLUSTER_FQDN>:9443/v1/bdbs/<BDB_UID>
-
Ensure that the RDI database is not clustered. RDI will not work correctly if the RDI database is clustered, but it is OK for the target database to be clustered.
You should then provide the details of this database in the values.yaml
file as described below.
Using a private image registry
Add the RDI images from the
download center
to your local registry.
The example below shows how to specify the registry and image pull secret in the
values.yaml
file for the Helm chart:
global:
imagePullSecrets: []
# - name: "image-pull-secret"
image:
registry: docker.io
repository: redis
To pull images from a local registry, you must provide the image pull secret and in some cases also set the permissions. Follow the links below to learn how to use a private registry with:
- Rancher
- OpenShift
- Amazon Elastic Kubernetes Service (EKS)
- Google Kubernetes Engine (GKE)
- Azure Kubernetes Service (AKS)
Install the RDI Helm chart
-
Scaffold the default values.yaml
file from the chart into a local
rdi-values.yaml
file:
helm show values rdi-<rdi-tag>.tar.gz > rdi-values.yaml
-
Open the rdi-values.yaml
file you just created and set the appropriate
values for your installation
(see The values.yaml
file below for the full set of
available values).
-
Start the installation:
helm install rdi rdi-<rdi-tag>.tar.gz -f rdi-values.yaml
Note:
By default, RDI will be installed in a namespace called
rdi
. If you want to use a custom namespace, pass the option
--namespace <custom-namespace>
to the helm install
command.
The values.yaml
file
The annotated values.yaml
file below describes the values you can set for the RDI Helm installation.
At a minimum, you must set the values of RDI_REDIS_HOST
and RDI_REDIS_PORT
in the global.rdiSysConfig
section and also RDI_REDIS_PASSWORD
and
JWT_SECRET_KEY
in global.rdiSysSecret
to enable the basic connection to the
RDI database. RDI uses the value in JWT_SECRET_KEY
to encrypt the
JSON web token (JWT) token used by RDI API. Best practice is
to generate a value containing 32 random bytes of data (equivalent to 256
bits) and then encode this value as ASCII characters. Use the following
command to generate the random key from the
urandom
special file:
head -c 32 /dev/urandom | base64
Note:
If you want to use
Redis Insight
to connect to your RDI deployment from outside the K8s cluster, you
must enable TLS.
The full values.yaml
file is shown below:
# Default RDI values in YAML format.
# Variables to template configuration.
global:
# Set this property when using a private image repository.
# Provide an array of image pull secrets.
# Example:
# imagePullSecrets:
# - name: pullSecret1
# - name: pullSecret2
imagePullSecrets:
- name: docker-config-jfrog
# DO NOT modify this value.
vmMode: false
# Indicates whether the deployment is intended for an OpenShift environment.
openShift: false
image:
# Overrides the image tag for all RDI components.
# tag: 0.0.0
# If using a private repository, update the default values accordingly.
# Docker registry.
registry: docker.io
# Docker image repository.
repository: redis
# Configuration for the RDI ConfigMap.
rdiSysConfig:
# Log level for all RDI components. Valid options: DEBUG, INFO, ERROR.
# If specific component log levels are not set, this value will be used.
RDI_LOG_LEVEL: INFO
# Log level for the RDI API. Valid options: DEBUG, INFO, ERROR.
# If not set, RDI_LOG_LEVEL will be used.
# RDI_LOG_LEVEL_API: INFO
# Log level for the RDI Operator. Valid options: DEBUG, INFO, ERROR.
# If not set, RDI_LOG_LEVEL will be used.
# RDI_LOG_LEVEL_OPERATOR: INFO
# Log level for the RDI processor. Valid options: DEBUG, INFO, ERROR.
# If not set, RDI_LOG_LEVEL will be used.
# RDI_LOG_LEVEL_PROCESSOR: INFO
# Specifies whether the RDI is configured to use TLS.
RDI_REDIS_SSL: false
# RDI_IMAGE_REPO: redis
# This value must be set to the same tag as global.image.tag.
# RDI_IMAGE_TAG: ""
# If using a private repository, set this value to the same secret name as in global.imagePullSecrets.
# RDI_IMAGE_PULL_SECRET: []
# The service IP of the RDI database.
# RDI_REDIS_HOST: ""
# The port for the RDI database.
# RDI_REDIS_PORT: ""
# Enable authentication for the RDI API.
# RDI_API_AUTH_ENABLED: "1"
# Specifies whether the API Collector should be deployed.
# RDI_API_COLLECTOR_ENABLED: "0"
# Configuration for the RDI Secret.
rdiSysSecret:
# Username and password for RDI database.
# If using the default password, keep the username as an empty string.
# RDI_REDIS_USERNAME: ""
# RDI_REDIS_PASSWORD: ""
# Uncomment this property when using a TLS connection from RDI to its Redis database.
# DO NOT modify this value.
# RDI_REDIS_CACERT: /etc/certificates/rdi_db/cacert
# Uncomment these properties when using an mTLS connection from RDI to its Redis database.
# DO NOT modify these values.
# RDI_REDIS_CERT: /etc/certificates/rdi_db/cert
# RDI_REDIS_KEY: /etc/certificates/rdi_db/key
# The passphrase used to get the private key stored in the secret store when using mTLS.
# RDI_REDIS_KEY_PASSPHRASE: ""
# The key used to encrypt the JWT token used by RDI API. Best practice is for this
# to contain 32 random bytes encoded as ASCII characters (equivalent to 256 bits of
# data). See `The values.yaml file` section above to learn how to generate the key.
# JWT_SECRET_KEY: ""
rdiDbSSLSecret:
# Set to `true` when using a TLS connection from RDI to its Redis database.
enabled: false
# The content of the CA certificate PEM file.
# Uncomment and set this property when using a TLS connection from RDI to its Redis database.
# cacert: ""
# The content of the certificate PEM file.
# Uncomment and set this property when using an mTLS connection from RDI to its Redis database.
# cert: ""
# The content of the private key PEM file.
# Uncomment and set this property when using an mTLS connection from RDI to its Redis database.
# key: ""
# Container default security context.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
allowPrivilegeEscalation: false
# Set `isOpenshift` to `true` if deploying on OpenShift.
reloader:
reloader:
isOpenshift: false
deployment:
containerSecurityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
securityContext:
runAsUser: null
# Configuration of the RDI Operator.
operator:
image:
name: rdi-operator
# Specify an imagePullPolicy.
# ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
pullPolicy: IfNotPresent
# Extra optional options for liveness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
liveness:
failureThreshold: 6
periodSeconds: 10
# Extra optional options for readiness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
readiness:
failureThreshold: 6
periodSeconds: 30
# Extra optional options for startup probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
startup:
failureThreshold: 60
periodSeconds: 5
fluentd:
image:
name: rdi-fluentd
# Specify an imagePullPolicy.
# ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
pullPolicy: IfNotPresent
rdiLogsHostPath: "/opt/rdi/logs"
podLogsHostPath: "/var/log/pods"
logrotateMinutes: "5"
rdiMetricsExporter:
image:
name: rdi-monitor
# Specify an imagePullPolicy.
# ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
pullPolicy: IfNotPresent
# The RDI metrics service is set to ClusterIP, allowing access only from within the cluster.
# ref: http://kubernetes.io/docs/user-guide/services/
service:
protocol: TCP
port: 9121
targetPort: 9121
type: ClusterIP
# Configure extra options for liveness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
liveness:
failureThreshold: 6
periodSeconds: 10
# Configure extra options for readiness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
readiness:
failureThreshold: 6
periodSeconds: 30
# Configure extra options for startupProbe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
startup:
failureThreshold: 60
periodSeconds: 5
# Configuration for the ServiceMonitor, which is used to scrape metrics from the RDI metrics service.
serviceMonitor:
# Set to `true` to activate the ServiceMonitor.
enabled: false
# The endpoint from which Prometheus will scrape metrics.
path: /metrics
# Configuration of the RDI API.
apiServer:
image:
name: rdi-api
# Specify an imagePullPolicy.
# ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
pullPolicy: IfNotPresent
# The RDI API service is set to ClusterIP, allowing access only from within the cluster.
# ref: http://kubernetes.io/docs/user-guide/services/
service:
type: ClusterIP
name: rdi-api
port: 8080
targetPort: 8081
# Configure extra options for liveness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
liveness:
failureThreshold: 6
periodSeconds: 10
# Configure extra options for readiness probe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
readiness:
failureThreshold: 6
periodSeconds: 30
# Configure extra options for startupProbe.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
startup:
failureThreshold: 60
periodSeconds: 5
# Expose the RDI API service to be accessed from outside the cluster.
# ref: http://kubernetes.io/docs/user-guide/services/
ingress:
# When `enabled` is set to `true`, RDI API Ingress will be created.
enabled: false
# ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
# className: ""
# Ingress resources configure routes based on the requested host.
# The optional Host field defines the hosts for routing. If omitted, it matches all hosts.
# Example:
# hosts:
# - example.com
# - another-example.com
# Annotations to be added to the IngressClass resource.
# Example:
# annotations:
# kubernetes.io/ingress.class: "nginx"
# nginx.ingress.kubernetes.io/rewrite-target: /
tls:
# Specifies whether the Ingress should be configured to use TLS.
enabled: false
# When `enabled` is set to `true`, set this property to the content of the crt file.
# crt: ""
# When `enabled` is set to `true`, set this property to the content of the key file.
# key: ""
# When `openShift` is set to `true`, Route will be created automatically.
# Route exposes RDI API outside the cluster.
route:
tls:
# Specifies whether the Route should be configured to use TLS.
enabled: false
# When `enabled` is set to `true`, set this property to the content of the crt file.
# crt: ""
# When `enabled` is set to `true`, set this property to the content of the key file.
# key: ""
collectorSourceMetricsExporter:
# The collector-source metrics service is set to ClusterIP, allowing access only from within the cluster.
# ref: http://kubernetes.io/docs/user-guide/services/
service:
type: ClusterIP
port: 9092
targetPort: 19000
# Configuration for the ServiceMonitor, which is used to scrape metrics from the collector-source metrics service.
serviceMonitor:
# Set to `true` to activate the ServiceMonitor.
enabled: false
# The endpoint from which Prometheus will scrape metrics.
path: /metrics
Check the installation
To verify the status of the K8s deployment, run the following command:
helm list -n monitoring -n rdi
The output looks like the following. Check that <logical_chart_name>
is listed.
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
<logical_chart_name> rdi 1 2024-10-10 16:53... +0300 IDT deployed rdi-1.0.0
Also, check that the following pods have Running
status:
kubectl get pod -n rdi
NAME READY STATUS RESTARTS AGE
rdi-api-<id> 1/1 Running 0 29m
rdi-metric-<id>l 1/1 Running 0 29m
rdi-operator-<id> 1/1 Running 0 29m
<logical_chart_name>-reloader-<id> 1/1 Running 0 29m
collector-api-<id> 1/1 Running 0 29m
You can verify that the RDI API works by adding the server in
Redis Insight.
Using ingress controllers
You must ensure that an appropriate
ingress controller
is available in your K8s cluster to expose the RDI API service via the K8s
Ingress
resource. Follow the documentation of your cloud provider or of
the ingress controller to install the controller correctly.
Using the nginx
ingress controller on AKS
On AKS, if you want to use the open source
nginx
ingress controller
rather than the
AKS application routing add-on,
follow the AKS documentation for
creating an unmanaged ingress controller.
Specifically, ensure that one or both of the following Helm chart values is set:
controller.service.annotations."service\.beta\.kubernetes\.io/azure-load-balancer-health-probe-request-path"=/healthz
controller.service.externalTrafficPolicy=Local
Prepare your source database
You must also configure your source database to use the CDC connector. See the
Prepare source databases
section to learn how to do this.
Deploy a pipeline
When the Helm installation is complete and you have prepared the source database for CDC,
you are ready to start using RDI.
Use Redis Insight to
configure and
deploy
your pipeline.
Uninstall RDI
If you want to remove your RDI K8s installation, first run
the following commands. (If you installed with a custom namespace then
replace rdi
with the name of your namespace.)
helm uninstall rdi -n rdi
kubectl delete namespace rdi
If you also want to delete the keys from your RDI database, connect to it with
redis-cli
and run a
FLUSHALL
command.
On this page