设为首页 收藏本站
查看: 1154|回复: 0

[经验分享] [k8s]nginx-ingress配置4/7层测试

[复制链接]

尚未签到

发表于 2018-1-6 09:35:02 | 显示全部楼层 |阅读模式
root@n2:/# cat /etc/nginx/nginx.conf  daemon off;
  worker_processes 4;
  pid /run/nginx.pid;
  worker_rlimit_nofile 15360;
  worker_shutdown_timeout 10s ;
  events {
  multi_accept        on;
  worker_connections  16384;
  use                 epoll;
  }
  http {
  real_ip_header      X-Forwarded-For;
  real_ip_recursive   on;
  set_real_ip_from    0.0.0.0/0;
  geoip_country       /etc/nginx/GeoIP.dat;
  geoip_city          /etc/nginx/GeoLiteCity.dat;
  geoip_proxy_recursive on;
  vhost_traffic_status_zone shared:vhost_traffic_status:10m;
  vhost_traffic_status_filter_by_set_key $geoip_country_code country::*;
  sendfile            on;
  aio                 threads;
  aio_write           on;
  tcp_nopush          on;
  tcp_nodelay         on;
  log_subrequest      on;
  reset_timedout_connection on;
  keepalive_timeout  75s;
  keepalive_requests 100;
  client_header_buffer_size       1k;
  client_header_timeout           60s;
  large_client_header_buffers     4 8k;
  client_body_buffer_size         8k;
  client_body_timeout             60s;
  http2_max_field_size            4k;
  http2_max_header_size           16k;
  types_hash_max_size             2048;
  server_names_hash_max_size      1024;
  server_names_hash_bucket_size   64;
  map_hash_bucket_size            64;
  proxy_headers_hash_max_size     512;
  proxy_headers_hash_bucket_size  64;
  variables_hash_bucket_size      128;
  variables_hash_max_size         2048;
  underscores_in_headers          off;
  ignore_invalid_headers          on;
  include /etc/nginx/mime.types;
  default_type text/html;
  brotli on;
  brotli_comp_level 4;
  brotli_types application/xml+rss application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/plain text/x-component;
  gzip on;
  gzip_comp_level 5;
  gzip_http_version 1.1;
  gzip_min_length 256;
  gzip_types application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/plain text/x-component;
  gzip_proxied any;
  gzip_vary on;
  # Custom headers for response
  server_tokens on;
  # disable warnings
  uninitialized_variable_warn off;
  # Additional available variables:
  # $namespace
  # $ingress_name
  # $service_name
  log_format upstreaminfo '$the_real_ip - [$the_real_ip] - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent" $request_length $request_time [$proxy_upstream_name] $upstream_addr $upstream_response_length $upstream_response_time $upstream_status';
  map $request_uri $loggable {
  default 1;
  }
  access_log /var/log/nginx/access.log upstreaminfo if=$loggable;
  error_log  /var/log/nginx/error.log notice;
  resolver 192.168.14.2 valid=30s;
  # Retain the default nginx handling of requests without a "Connection" header
  map $http_upgrade $connection_upgrade {
  default          upgrade;
  ''               close;
  }
  map $http_x_forwarded_for $the_real_ip {
  default          $remote_addr;
  }
  # trust http_x_forwarded_proto headers correctly indicate ssl offloading
  map $http_x_forwarded_proto $pass_access_scheme {
  default          $http_x_forwarded_proto;
  ''               $scheme;
  }
  map $http_x_forwarded_port $pass_server_port {
  default           $http_x_forwarded_port;
  ''                $server_port;
  }
  map $http_x_forwarded_host $best_http_host {
  default          $http_x_forwarded_host;
  ''               $this_host;
  }
  map $pass_server_port $pass_port {
  443              443;
  default          $pass_server_port;
  }
  # Obtain best http host
  map $http_host $this_host {
  default          $http_host;
  ''               $host;
  }
  server_name_in_redirect off;
  port_in_redirect        off;
  ssl_protocols TLSv1.2;
  # turn on session caching to drastically improve performance
  ssl_session_cache builtin:1000 shared:SSL:10m;
  ssl_session_timeout 10m;
  # allow configuring ssl session tickets
  ssl_session_tickets on;
  # slightly reduce the time-to-first-byte
  ssl_buffer_size 4k;
  # allow configuring custom ssl ciphers
  ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
  ssl_prefer_server_ciphers on;
  ssl_ecdh_curve auto;
  proxy_ssl_session_reuse on;
  upstream kube-public-spring-web {
  # Load balance algorithm; empty for round robin, which is the default
  least_conn;
  keepalive 32;
  server 10.2.54.4:8080 max_fails=0 fail_timeout=0;
  }
  upstream upstream-default-backend {
  # Load balance algorithm; empty for round robin, which is the default
  least_conn;
  keepalive 32;
  server 10.2.30.3:8080 max_fails=0 fail_timeout=0;
  }
  ## start server _
  server {
  server_name _ ;
  listen 80 default_server reuseport backlog=511;
  listen [::]:80 default_server reuseport backlog=511;
  set $proxy_upstream_name "-";
  listen 443  default_server reuseport backlog=511 ssl http2;
  listen [::]:443  default_server reuseport backlog=511 ssl http2;
  # PEM sha: 20103470e60aa51135afee9244c7c831559f04b8
  ssl_certificate                         /ingress-controller/ssl/default-fake-certificate.pem;
  ssl_certificate_key                     /ingress-controller/ssl/default-fake-certificate.pem;
  more_set_headers                        "Strict-Transport-Security: max-age=15724800; includeSubDomains;";
  location / {
  set $proxy_upstream_name "upstream-default-backend";
  set $namespace      "";
  set $ingress_name   "";
  set $service_name   "";
  port_in_redirect off;
  client_max_body_size                    "1m";
  proxy_set_header Host                   $best_http_host;
  # Pass the extracted client certificate to the backend
  proxy_set_header ssl-client-cert        "";
  proxy_set_header ssl-client-verify      "";
  proxy_set_header ssl-client-dn          "";
  # Allow websocket connections
  proxy_set_header                        Upgrade           $http_upgrade;
  proxy_set_header                        Connection        $connection_upgrade;
  proxy_set_header X-Real-IP              $the_real_ip;
  proxy_set_header X-Forwarded-For        $the_real_ip;
  proxy_set_header X-Forwarded-Host       $best_http_host;
  proxy_set_header X-Forwarded-Port       $pass_port;
  proxy_set_header X-Forwarded-Proto      $pass_access_scheme;
  proxy_set_header X-Original-URI         $request_uri;
  proxy_set_header X-Scheme               $pass_access_scheme;
  # Pass the original X-Forwarded-For
  proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for;
  # mitigate HTTPoxy Vulnerability
  # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/
  proxy_set_header Proxy                  "";
  # Custom headers to proxied server
  proxy_connect_timeout                   5s;
  proxy_send_timeout                      60s;
  proxy_read_timeout                      60s;
  proxy_redirect                          off;
  proxy_buffering                         off;
  proxy_buffer_size                       "4k";
  proxy_buffers                           4 "4k";
  proxy_request_buffering                 "on";
  proxy_http_version                      1.1;
  proxy_cookie_domain                     off;
  proxy_cookie_path                       off;
  # In case of errors try the next upstream server before returning an error
  proxy_next_upstream                     error timeout invalid_header http_502 http_503 http_504;
  proxy_pass http://upstream-default-backend;
  }
  # health checks in cloud providers require the use of port 80
  location /healthz {
  access_log off;
  return 200;
  }
  # this is required to avoid error if nginx is being monitored
  # with an external software (like sysdig)
  location /nginx_status {
  allow 127.0.0.1;
  allow ::1;
  deny all;
  access_log off;
  stub_status on;
  }
  }
  ## end server _
  ## start server spring.maotai.com
  server {
  server_name spring.maotai.com ;
  listen 80;
  listen [::]:80;
  set $proxy_upstream_name "-";
  location / {
  set $proxy_upstream_name "kube-public-spring-web";
  set $namespace      "kube-public";
  set $ingress_name   "spring";
  set $service_name   "spring";
  port_in_redirect off;
  client_max_body_size                    "1m";
  proxy_set_header Host                   $best_http_host;
  # Pass the extracted client certificate to the backend
  proxy_set_header ssl-client-cert        "";
  proxy_set_header ssl-client-verify      "";
  proxy_set_header ssl-client-dn          "";
  # Allow websocket connections
  proxy_set_header                        Upgrade           $http_upgrade;
  proxy_set_header                        Connection        $connection_upgrade;
  proxy_set_header X-Real-IP              $the_real_ip;
  proxy_set_header X-Forwarded-For        $the_real_ip;
  proxy_set_header X-Forwarded-Host       $best_http_host;
  proxy_set_header X-Forwarded-Port       $pass_port;
  proxy_set_header X-Forwarded-Proto      $pass_access_scheme;
  proxy_set_header X-Original-URI         $request_uri;
  proxy_set_header X-Scheme               $pass_access_scheme;
  # Pass the original X-Forwarded-For
  proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for;
  # mitigate HTTPoxy Vulnerability
  # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/
  proxy_set_header Proxy                  "";
  # Custom headers to proxied server
  proxy_connect_timeout                   5s;
  proxy_send_timeout                      60s;
  proxy_read_timeout                      60s;
  proxy_redirect                          off;
  proxy_buffering                         off;
  proxy_buffer_size                       "4k";
  proxy_buffers                           4 "4k";
  proxy_request_buffering                 "on";
  proxy_http_version                      1.1;
  proxy_cookie_domain                     off;
  proxy_cookie_path                       off;
  # In case of errors try the next upstream server before returning an error
  proxy_next_upstream                     error timeout invalid_header http_502 http_503 http_504;
  proxy_pass http://kube-public-spring-web;
  }
  }
  ## end server spring.maotai.com
  # default server, used for NGINX healthcheck and access to nginx stats
  server {
  # Use the port 18080 (random value just to avoid known ports) as default port for nginx.
  # Changing this value requires a change in:
  # https://github.com/kubernetes/ingress-nginx/blob/master/controllers/nginx/pkg/cmd/controller/nginx.go
  listen 18080 default_server reuseport backlog=511;
  listen [::]:18080 default_server reuseport backlog=511;
  set $proxy_upstream_name "-";
  location /healthz {
  access_log off;
  return 200;
  }
  location /nginx_status {
  set $proxy_upstream_name "internal";
  vhost_traffic_status_display;
  vhost_traffic_status_display_format html;
  }
  location / {
  set $proxy_upstream_name "upstream-default-backend";
  proxy_pass          http://upstream-default-backend;
  }
  }
  }
  stream {
  log_format log_stream [$time_local] $protocol $status $bytes_sent $bytes_received $session_time;
  access_log /var/log/nginx/access.log log_stream;
  error_log  /var/log/nginx/error.log;
  # TCP services
  upstream tcp-3306-default-mysql-3306 {
  server                  10.2.30.2:3306;
  }
  server {
  listen                  3306;
  listen                  [::]:3306;
  proxy_timeout           600s;
  proxy_pass              tcp-3306-default-mysql-3306;
  }
  # UDP services
  upstream udp-53-kube-system-kube-dns-53 {
  server                  10.2.54.9:53;
  }
  server {
  listen                  53 udp;
  listen                  [::]:53 udp;
  proxy_responses         1;
  proxy_timeout           600s;
  proxy_pass              udp-53-kube-system-kube-dns-53;
  }

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-432139-1-1.html 上篇帖子: k8s 健康检查 下篇帖子: k8s启动Pod遇到CrashLoopBackOff的解决方法
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表