From 5f8aff1b88007006515c463a20cc3ea4ab5cffa8 Mon Sep 17 00:00:00 2001 From: =?utf8?q?=E5=88=98=E6=B4=AA=E9=9D=92?= Date: Sat, 12 Sep 2020 23:24:30 +0800 Subject: [PATCH] =?utf8?q?chore:=20=E6=95=B4=E7=90=86=E4=B8=AA=E4=BA=BA?= =?utf8?q?=E4=B8=AD=E5=BF=83=E9=83=A8=E7=BD=B2=E8=84=9A=E6=9C=AC=EF=BC=8C?= =?utf8?q?=E5=8D=87=E7=BA=A7=E4=B8=AA=E4=BA=BA=E4=B8=AD=E5=BF=83=E9=83=A8?= =?utf8?q?=E7=BD=B2=E9=95=9C=E5=83=8F=201.0.3-SNAPSHOT?= MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit --- .../4.4.personal-security-center-bff.yaml | 8 ++++---- .../4.5.personal-security-center-zuul.yaml | 15 +++++++++++---- 2 files changed, 15 insertions(+), 8 deletions(-) diff --git a/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.4.personal-security-center-bff.yaml b/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.4.personal-security-center-bff.yaml index dc93b54..c60604d 100644 --- a/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.4.personal-security-center-bff.yaml +++ b/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.4.personal-security-center-bff.yaml @@ -126,7 +126,7 @@ data: #PERSONAL_SECURITY_CENTER_SA_API_CLIENT_AUTH_TRUSTSTORE_PASSWORD: "" - TPAS_FILE_API_URL: http://agent-service-svc.thirdparty-agent-service.svc.cluster.local:8080/api/v1/tpas/file/db + TPAS_FILE_API_URL: http://agent-service-svc.thirdparty-agent-service.svc.cluster.local:8080/api/v1/tpas/file/minio TPAS_MAIL_API_URL: http://agent-service-svc.thirdparty-agent-service.svc.cluster.local:8080/api/v1/tpas/mail/smtp TPAS_SMS_API_URL: http://agent-service-svc.thirdparty-agent-service.svc.cluster.local:8080/api/v1/tpas/sms/console TPAS_CLIENT_AUTH_ENABLED: "false" @@ -197,7 +197,7 @@ spec: containers: - name: personal-security-center-bff # 若使用了学校搭设的私有仓库,请修改 - image: harbor.supwisdom.com/personal-security-center/personal-security-bff:1.0.2-SNAPSHOT + image: harbor.supwisdom.com/personal-security-center/personal-security-bff:1.0.3-SNAPSHOT imagePullPolicy: Always ports: - containerPort: 8080 @@ -217,9 +217,9 @@ spec: name: personal-security-center-bff-template-env resources: requests: - memory: "400Mi" + memory: "512Mi" limits: - memory: "400Mi" + memory: "512Mi" readinessProbe: httpGet: path: /actuator/health diff --git a/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.5.personal-security-center-zuul.yaml b/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.5.personal-security-center-zuul.yaml index edd1b43..2dca8d6 100644 --- a/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.5.personal-security-center-zuul.yaml +++ b/deploy-manifests/k8s-rancher/1.authx-service/6.personal-security-center/4.5.personal-security-center-zuul.yaml @@ -24,6 +24,11 @@ data: LOGGING_LEVEL_COM_SUPWISDOM_INSTITUTE_PERSONAL_SECURITY_CENTER: INFO + SPRING_REDIS_JEDIS_POOL_MAXACTIVE: "800" + SPRING_REDIS_JEDIS_POOL_MAXIDLE: "100" + SPRING_REDIS_JEDIS_POOL_MINIDLE: "100" + + ZUUL_HOST_MAX_PER_ROUTE_CONNECTIONS: "1000" ZUUL_HOST_MAX_TOTAL_CONNECTIONS: "1000" @@ -48,7 +53,7 @@ data: #INFRAS_SECURITY_JWT_KEY_STORE_PASSWORD: "changeit" INFRAS_SECURITY_JWT_TOKEN_GENERATE_TYPE: cas - INFRAS_SECURITY_JWT_TOKEN_DECRYPT_KEY_PRIVATE_KEY_PEM_PKCS8: "" + #INFRAS_SECURITY_JWT_TOKEN_DECRYPT_KEY_PRIVATE_KEY_PEM_PKCS8: "" INFRAS_SECURITY_JWT_TOKEN_SIGNING_KEY_URL: "http://cas-server-site-webapp-svc.cas-server.svc.cluster.local:8080/cas/jwt/publicKey" @@ -137,7 +142,7 @@ spec: containers: - name: personal-security-center-zuul # 若使用了学校搭设的私有仓库,请修改 - image: harbor.supwisdom.com/personal-security-center/personal-security-zuul:1.0.2-SNAPSHOT + image: harbor.supwisdom.com/personal-security-center/personal-security-zuul:1.0.3-SNAPSHOT imagePullPolicy: Always ports: - containerPort: 8080 @@ -147,15 +152,17 @@ spec: envFrom: - configMapRef: name: jvm-env + - secretRef: + name: redis-env-secret - secretRef: name: personal-security-center-zuul-env-secret - configMapRef: name: personal-security-center-zuul-env resources: requests: - memory: "400Mi" + memory: "512Mi" limits: - memory: "400Mi" + memory: "512Mi" readinessProbe: httpGet: path: /actuator/health -- 2.17.1