etcdctl查看k8s资源信息

背景

k8s中的网络配置和对象状态信息都会保存到etcd中,所以我们可以通过etcdctl查看保存在数据库中的信息

常用操作

  • 查看etcd的各个节点的状态

    [root@master3 ~]# etcdctl --endpoints="10.197.115.27:2379,10.197.115.25:2379,10.197.115.26:2379" --cacert=/etc/ssl/etcd/ssl/ca.pem --cert=/etc/ssl/etcd/ssl/member-master3.pem --key=/etc/ssl/etcd/ssl/member-master3-key.pem endpoint health
    10.197.115.25:2379 is healthy: successfully committed proposal: took = 11.379015ms
    10.197.115.26:2379 is healthy: successfully committed proposal: took = 19.969601ms
    10.197.115.27:2379 is healthy: successfully committed proposal: took = 27.590939ms

  • k8s所有的资源信息都保存在/registry中

    [root@master3 ~]# etcdctl --endpoints="10.197.115.27:2379,10.197.115.25:2379,10.197.115.26:2379" --cacert=/etc/ssl/etcd/ssl/ca.pem --cert=/etc/ssl/etcd/ssl/member-master3.pem --key=/etc/ssl/etcd/ssl/member-master3-key.pem --prefix --keys-only=true get /registry
    /registry/apiextensions.k8s.io/customresourcedefinitions/apiservices.management.cattle.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/applications.argoproj.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/applicationsets.argoproj.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/appprojects.argoproj.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/apps.catalog.cattle.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/authconfigs.management.cattle.io
    /registry/apiextensions.k8s.io/customresourcedefinitions/bgpconfigurations.crd.projectcalico.org
    /registry/apiextensions.k8s.io/customresourcedefinitions/bgppeers.crd.projectcalico.org
    /registry/apiextensions.k8s.io/customresourcedefinitions/blockaffinities.crd.projectcalico.org
    /registry/apiextensions.k8s.io/customresourcedefinitions/caliconodestatuses.crd.projectcalico.org
    /registry/apiextensions.k8s.io/customresourcedefinitions/clusterinformations.crd.projectcalico.org
    /registry/apiextensions.k8s.io/customresourcedefinitions/clusterregistrationtokens.management.cattle.io

  • 查看保存在registry中的信息,这里以/registry/clusterroles/system:kube-dns为例

    [root@master3 ~]# etcdctl --endpoints="10.197.115.27:2379,10.197.115.25:2379,10.197.115.26:2379" --cacert=/etc/ssl/etcd/ssl/ca.pem --cert=/etc/ssl/etcd/ssl/member-master3.pem --key=/etc/ssl/etcd/ssl/member-master3-key.pem --prefix --keys-only=false get /registry/clusterroles/system:kube-dns

相关推荐
Waay1 小时前
图文详解|K8s Pod内部结构
docker·云原生·kubernetes
码点滴1 小时前
CRI-O选型与容器运行时标准
开发语言·人工智能·架构·kubernetes·cri-o
openFuyao2 小时前
以开源之力,突破多样化算力困局——openFuyao开源一周年背后的故事
人工智能·云原生·开源·openfuyao·多样化算力·集群软件
JiaWen技术圈2 小时前
IaC 双引擎:Terraform + Ansible 完整最佳实践
云原生·ansible·terraform
万里侯3 小时前
Kubernetes成本优化:降低云原生基础设施成本的完整指南
微服务·容器·k8s
r-t-H5 小时前
KVM虚拟化与Docker基础实践-第二章
阿里云·docker·容器
牛奶咖啡137 小时前
k8s容器编排技术实践——OpenEuler安装部署k8s
kubernetes·信创·containerd配置加速器·openeuler安装k8s·k8s的常见安装方式·彻底关闭swap·工作节点使用kubectl
老码观察7 小时前
K8s 容器化部署的宿主机资源规划的踩坑实录
docker·容器·kubernetes
步步为营DotNet7 小时前
深入.NET 11:.NET Aspire 在云原生资源编排与管理的卓越实践
云原生·.net
我是谁??7 小时前
【6】基于 Docker + YOLOv8 的模型部署实战(GTX1660S + Ubuntu22.04)
yolo·docker·容器