{"id":36057,"date":"2023-05-27T10:07:11","date_gmt":"2023-12-05T01:57:08","guid":{"rendered":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/"},"modified":"2024-04-30T06:11:37","modified_gmt":"2024-04-29T22:11:37","slug":"%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82","status":"publish","type":"post","link":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/","title":{"rendered":"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c"},"content":{"rendered":"<h1>\u9996\u5148<\/h1>\n<p>\u5728Kubernetes\u7684\u5b98\u65b9\u7f51\u9875\u4e0a\uff0c\u6709\u8bb8\u591a\u6559\u7a0b\u53ef\u4f9b\u53c2\u8003\u3002<br \/>\n\u4f5c\u4e3a\u5b66\u4e60Kubernetes\u7684\u4e00\u90e8\u5206\uff0c\u6211\u4eec\u5c06\u6df1\u5165\u7814\u7a76\u6559\u7a0b\u3002<br \/>\n\u8fd9\u6b21\u7684\u76ee\u6807\u662fConfigMap\u3002<br \/>\nhttps:\/\/kubernetes.io\/docs\/tutorials\/configuration\/configure-redis-using-configmap\/<\/p>\n<p>\u53e6\u5916\uff0c\u6211\u4eec\u4f7f\u7528\u4e86\u622a\u81f32018\u5e744\u6708\u65f6\u6700\u65b0\u7684Kubernetes\u7248\u672c1.10\u3002<\/p>\n<h1>ConfigMap\u662f\u4ec0\u4e48<\/h1>\n<p>\u4e3a\u4e86\u63d0\u9ad8\u5bb9\u5668\u7684\u53ef\u79fb\u690d\u6027\uff0cConfigMap\u53ef\u4ee5\u5c06\u914d\u7f6e\u4fe1\u606f\u4ece\u5bb9\u5668\u955c\u50cf\u4e2d\u5206\u79bb\u51fa\u6765\u3002\u5728\u672c\u6559\u7a0b\u4e2d\uff0c\u6211\u4eec\u5c06\u521b\u5efaConfigMap\u5e76\u63a2\u8ba8\u5982\u4f55\u5728Pod\u4e2d\u4f7f\u7528\u5b83\u3002<\/p>\n<h1>\u521b\u5efaConfigMap<\/h1>\n<p>\u521b\u5efa ConfigMap \u6709\u4e09\u79cd\u65b9\u6cd5\u53ef\u4f9b\u9009\u62e9\uff1a<\/p>\n<p>kubectl create -f \u3067\u4f5c\u6210\u3002YAML\u30de\u30cb\u30d5\u30a7\u30b9\u30c8\u30d5\u30a1\u30a4\u30eb\u3092\u4f5c\u6210\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3002<\/p>\n<p>kubectl create configmap \u3067\u4f5c\u6210\u3002key-value\u3092\u5b9a\u7fa9\u3057\u305f\u30d5\u30a1\u30a4\u30eb\u306e\u307f\u3067\u4f5c\u6210\u304c\u51fa\u6765\u308b\u3002<\/p>\n<p>kubectl create configmap &#8211;from-literal\u3067\u4f5c\u6210\u3002\u30b3\u30de\u30f3\u30c9\u306e\u5f15\u6570\u3067\u76f4\u63a5 key-value \u3092\u4e0e\u3048\u308b<\/p>\n<h2>1-1. \u4f7f\u7528YAML\u6e05\u5355\u6587\u4ef6\u521b\u5efa<\/h2>\n<p>\u6211\u5c06\u521b\u5efa\u4ee5\u4e0b\u7684\u6e05\u5355\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config.yaml\r\napiVersion: v1\r\ndata:\r\n  game.properties: |\r\n    enemies=aliens\r\n    lives=3\r\n    enemies.cheat=true\r\n    enemies.cheat.level=noGoodRotten\r\n    secret.code.passphrase=UUDDLRLRBABAS\r\n    secret.code.allowed=true\r\n    secret.code.lives=30\r\n  ui.properties: |\r\n    color.good=purple\r\n    color.bad=yellow\r\n    allow.textmode=true\r\n    how.nice.to.look=fairlyNice\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaConfigMap\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 config_files]# kubectl create -f \/root\/kube_yaml\/config_files\/game-config.yaml\r\nconfigmap \"game-config\" created\r\n<\/code><\/pre>\n<p>\u67e5\u770bConfigMap\u5217\u8868<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 config_files]# kubectl get configmap \r\nNAME          DATA      AGE\r\ngame-config   2         13s\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u521b\u5efa\u7684ConfigMap\u7684\u8be6\u7ec6\u4fe1\u606f<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 config_files]# kubectl describe configmap game-config \r\nName:         game-config\r\nNamespace:    default\r\nLabels:       &lt;none&gt;\r\nAnnotations:  &lt;none&gt;\r\n\r\nData\r\n====\r\ngame.properties:\r\n----\r\nenemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\n\r\nui.properties:\r\n----\r\ncolor.good=purple\r\ncolor.bad=yellow\r\nallow.textmode=true\r\nhow.nice.to.look=fairlyNice\r\n\r\nEvents:  &lt;none&gt;\r\n<\/code><\/pre>\n<p>\u4e3a\u4e86\u8fdb\u884c\u4e0b\u4e00\u6b21\u786e\u8ba4\uff0c\u5c06\u5176\u5220\u9664\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 config_files]# kubectl delete configmap game-config \r\nconfigmap \"game-config\" deleted\r\n<\/code><\/pre>\n<h2>\u4ece\u76ee\u5f55\u4e2d\u521b\u5efa<\/h2>\n<p>\u521b\u5efa\u4e00\u4e2a\u76ee\u5f55<\/p>\n<pre class=\"post-pre\"><code>\/root\/kube_yaml\/config_files\/temp_dir\r\n<\/code><\/pre>\n<p>\u5728\u5df2\u521b\u5efa\u7684\u76ee\u5f55\u4e2d\u521b\u5efa2\u4e2a\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/temp_dir\/game.properties\r\nenemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\nEOF\r\n<\/code><\/pre>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/temp_dir\/ui.properties\r\ncolor.good=purple\r\ncolor.bad=yellow\r\nallow.textmode=true\r\nhow.nice.to.look=fairlyNice\r\nEOF\r\n<\/code><\/pre>\n<p>\u5728temp_dir\u76ee\u5f55\u4e0b\u521b\u5efa\u4e86\u4e24\u4e2a\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# pwd\r\n\/root\/kube_yaml\/config_files\/temp_dir\r\n[root@sugi-kubernetes110-master01 temp_dir]# \r\n[root@sugi-kubernetes110-master01 temp_dir]# ls -la\r\ntotal 8\r\ndrwxr-xr-x 2 root root  50 Apr 30 15:42 .\r\ndrwxr-xr-x 3 root root  46 Apr 30 15:40 ..\r\n-rw-r--r-- 1 root root 158 Apr 30 15:42 game.properties\r\n-rw-r--r-- 1 root root  83 Apr 30 15:42 ui.properties\r\n<\/code><\/pre>\n<p>\u8bf7\u6307\u5b9a\u76ee\u5f55\u5e76\u521b\u5efaConfigMap\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl create configmap game-config --from-file=\/root\/kube_yaml\/config_files\/temp_dir\r\nconfigmap \"game-config\" created\r\n<\/code><\/pre>\n<p>\u67e5\u770b ConfigMap \u7684\u5217\u8868<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl get configmap \r\nNAME          DATA      AGE\r\ngame-config   2         12s\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u5df2\u521b\u5efa\u7684ConfigMap\u7684\u8be6\u7ec6\u4fe1\u606f\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl describe configmap game-config \r\nName:         game-config\r\nNamespace:    default\r\nLabels:       &lt;none&gt;\r\nAnnotations:  &lt;none&gt;\r\n\r\nData\r\n====\r\ngame.properties:\r\n----\r\nenemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\n\r\nui.properties:\r\n----\r\ncolor.good=purple\r\ncolor.bad=yellow\r\nallow.textmode=true\r\nhow.nice.to.look=fairlyNice\r\n\r\nEvents:  &lt;none&gt;\r\n<\/code><\/pre>\n<p>\u4e3a\u4e86\u8fdb\u884c\u4e0b\u4e00\u8f6e\u7684\u786e\u8ba4, \u6211\u4eec\u5c06\u5220\u9664\u5b83<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl delete configmap game-config \r\nconfigmap \"game-config\" deleted\r\n<\/code><\/pre>\n<h2>\u4ece\u6587\u4ef6\u4e2d\u521b\u5efa<\/h2>\n<p>\u9009\u62e9\u4e00\u4e2a\u57282-1\u4e2d\u521b\u5efa\u7684\u6587\u4ef6\uff0c\u5e76\u8fdb\u884c\u521b\u5efa\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl create configmap game-config-1 --from-file=\/root\/kube_yaml\/config_files\/temp_dir\/game.properties\r\n<\/code><\/pre>\n<p>\u67e5\u770bConfigMap\u7684\u5217\u8868\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl get configmap \r\nNAME            DATA      AGE\r\ngame-config-1   1         12s\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u521b\u5efa\u7684ConfigMap\u7684\u8be6\u7ec6\u4fe1\u606f\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl describe configmap game-config-1 \r\nName:         game-config-1\r\nNamespace:    default\r\nLabels:       &lt;none&gt;\r\nAnnotations:  &lt;none&gt;\r\n\r\nData\r\n====\r\ngame.properties:\r\n----\r\nenemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\n\r\nEvents:  &lt;none&gt;\r\n<\/code><\/pre>\n<h2>3-1. \u901a\u8fc7\u547d\u4ee4\u7684\u53c2\u6570\u8fdb\u884c\u521b\u5efa<\/h2>\n<pre class=\"post-pre\"><code>kubectl create configmap special-config --from-literal=special.how=very --from-literal=special.type=charm\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u521b\u5efa\u7684ConfigMap\u7684\u8be6\u7ec6\u4fe1\u606f\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl describe configmap special-config \r\nName:         special-config\r\nNamespace:    default\r\nLabels:       &lt;none&gt;\r\nAnnotations:  &lt;none&gt;\r\n\r\nData\r\n====\r\nspecial.how:\r\n----\r\nvery\r\nspecial.type:\r\n----\r\ncharm\r\nEvents:  &lt;none&gt;\r\n<\/code><\/pre>\n<p>\u7531\u4e8e\u4f7f\u7528&#8221;describe&#8221;\u547d\u4ee4\u4e0d\u591f\u76f4\u89c2\uff0c\u5982\u679c\u4f7f\u7528&#8221;get -o yaml&#8221;\u547d\u4ee4\uff0c\u5c31\u53ef\u4ee5\u66f4\u6e05\u6670\u5730\u67e5\u770b\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 temp_dir]# kubectl get configmap special-config -o yaml\r\napiVersion: v1\r\ndata:\r\n  special.how: very\r\n  special.type: charm\r\nkind: ConfigMap\r\nmetadata:\r\n  creationTimestamp: 2018-04-30T06:52:28Z\r\n  name: special-config\r\n  namespace: default\r\n  resourceVersion: \"194751\"\r\n  selfLink: \/api\/v1\/namespaces\/default\/configmaps\/special-config\r\n  uid: 0c220c18-4c43-11e8-baee-0050569817ee\r\n<\/code><\/pre>\n<p>\u4e3a\u4e86\u8fdb\u884c\u4e0b\u4e00\u6b21\u786e\u8ba4\uff0c\u6211\u4f1a\u5220\u9664\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl delete configmap special-config\r\n<\/code><\/pre>\n<h1>\u5728Pod\u7684\u73af\u5883\u53d8\u91cf\u4e2d\u4f7f\u7528ConfigMap\u3002<\/h1>\n<h2>\u5728\u4e0d\u4f7f\u7528ConfigMap\u7684\u60c5\u51b5\u4e0b\uff0c\u67e5\u770b\u5bb9\u5668\u5185\u7684\u73af\u5883\u53d8\u91cf\u3002<\/h2>\n<p>\u9996\u5148\uff0c\u521b\u5efa\u4e00\u4e2a\u4e0d\u9644\u52a0 ConfigMap \u7684 BusyBox\uff0c\u5c06\u5bb9\u5668\u5185\u7684\u73af\u5883\u53d8\u91cf\u8f93\u51fa\u5230\u6807\u51c6\u8f93\u51fa\uff0c\u5e76\u901a\u8fc7 `kubectl logs` \u547d\u4ee4\u8fdb\u884c\u786e\u8ba4\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/noenv_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"\/bin\/sh\", \"-c\", \"env\" ]\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/noenv_pod.yaml\r\n<\/code><\/pre>\n<p>\u786e\u8ba4\u5df2\u5b8c\u6210<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl get pod -o wide\r\nNAME            READY     STATUS      RESTARTS   AGE       IP            NODE\r\ndapi-test-pod   0\/1       Completed   0          2m        10.244.1.13   sugi-kubernetes110-node01.localdomain\r\n<\/code><\/pre>\n<p>\u4f7f\u7528kubectl logs\u547d\u4ee4\uff0c\u68c0\u67e5\u5bb9\u5668\u5185\u7684\u73af\u5883\u53d8\u91cf\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl logs dapi-test-pod \r\nKUBERNETES_SERVICE_PORT=443\r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\n[root@sugi-kubernetes110-master01 ~]# \r\n<\/code><\/pre>\n<p>\u5220\u9664pod<\/p>\n<pre class=\"post-pre\"><code>kubectl delete pod dapi-test-pod\r\n<\/code><\/pre>\n<h2>\u4f7f\u7528\u4e00\u4e2aConfigMap\u6765\u9a8c\u8bc1\u5bb9\u5668\u5185\u7684\u73af\u5883\u53d8\u91cf\u3002<\/h2>\n<p>\u521b\u5efa\u4ee5\u4e0b\u7684ConfigMap<br \/>\n\u6211\u8ba4\u4e3a\u5c06\u73af\u5883\u53d8\u91cf\u6784\u6210\u591a\u5c42\u7ed3\u6784\u7684\u65b9\u5f0f\u5728\u5e94\u7528\u5230Pod\u4e0a\u65f6\u662f\u5f88\u4e0d\u65b9\u4fbf\u7684\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config.yaml\r\napiVersion: v1\r\ndata:\r\n  game.properties: |\r\n    enemies=aliens\r\n    lives=3\r\n    enemies.cheat=true\r\n    enemies.cheat.level=noGoodRotten\r\n    secret.code.passphrase=UUDDLRLRBABAS\r\n    secret.code.allowed=true\r\n    secret.code.lives=30\r\n  ui.properties: |\r\n    color.good=purple\r\n    color.bad=yellow\r\n    allow.textmode=true\r\n    how.nice.to.look=fairlyNice\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efa ConfigMap<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/game-config.yaml\r\n<\/code><\/pre>\n<p>\u521b\u5efa\u4e00\u4e2a\u7528\u4e8e\u5c06ConfigMap\u5b9a\u4e49\u4e3a\u73af\u5883\u53d8\u91cf\uff08env\uff09\u7684Pod\u7684\u6e05\u5355\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"\/bin\/sh\", \"-c\", \"env\" ]\r\n      env:\r\n        # Define the environment variable\r\n        - name: SPECIAL_LEVEL_KEY\r\n          valueFrom:\r\n            configMapKeyRef:\r\n              # The ConfigMap containing the value you want to assign to SPECIAL_LEVEL_KEY\r\n              name: game-config\r\n              # Specify the key associated with the value\r\n              key: game.properties\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u67e5\u770bPod\u5217\u8868\uff0c\u5e76\u786e\u8ba4\u72b6\u6001\u4e3a\u201c\u5df2\u5b8c\u6210\u201d\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl get pod -o wide\r\nNAME            READY     STATUS      RESTARTS   AGE       IP            NODE\r\ndapi-test-pod   0\/1       Completed   0          19s       10.244.2.12   sugi-kubernetes110-node02.localdomain\r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u68c0\u67e5\u65e5\u5fd7\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl logs dapi-test-pod \r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT=443\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\nSPECIAL_LEVEL_KEY=enemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\n[root@sugi-kubernetes110-master01 ~]# \r\n<\/code><\/pre>\n<p>\u901a\u8fc7\u6307\u5b9aConfigMap\uff0c\u53ef\u4ee5\u770b\u5230\u4ee5\u4e0b\u7684\u503c\u5df2\u7ecf\u88ab\u6dfb\u52a0\u5230\u73af\u5883\u53d8\u91cf\u4e2d\u3002<br \/>\n\u7531\u4e8e\u5728pod\u7684manifest\u6587\u4ef6\u4e2d\u6307\u5b9a\u4e86SPECIAL_LEVEL_KEY\uff0c\u5e76\u4e0eConfigMap\u8fdb\u884c\u4e86\u6df7\u5408\uff0c\u5bfc\u81f4\u8f93\u51fa\u7684\u73af\u5883\u53d8\u91cf\u5448\u73b0\u51fa\u5fae\u5999\u7684\u72b6\u6001\u3002\u53ea\u6709\u7b2c\u4e00\u4e2a\u73af\u5883\u53d8\u91cf\u4ee5&#8221;SPECIAL_LEVEL_KEY=enemies=aliens&#8221;\u7684\u5f62\u5f0f\u5b58\u5728\u3002<\/p>\n<pre class=\"post-pre\"><code>SPECIAL_LEVEL_KEY=enemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\n<\/code><\/pre>\n<p>\u6211\u8981\u5220\u9664Pod\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl delete pod dapi-test-pod\r\n<\/code><\/pre>\n<p>\u8c03\u6574env_pod\u7684\u73af\u5883\u53d8\u91cf\u6307\u5b9a\u65b9\u6cd5\uff0c\u901a\u8fc7\u5c06spec.containers.env\u6539\u4e3aspec.containers.envFrom\u3002<br \/>\n\u5728&#8221;spec.containers.env&#8221;\u4e2d\uff0c\u9700\u8981\u9010\u4e2a\u6307\u5b9a\u6bcf\u4e2a\u73af\u5883\u53d8\u91cf\uff0c\u975e\u5e38\u5197\u957f\uff0c\u4f46\u4f7f\u7528envFrom\u53ef\u4ee5\u4e00\u6b21\u8bfb\u53d6\u591a\u4e2a\u73af\u5883\u53d8\u91cf\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"\/bin\/sh\", \"-c\", \"env\" ]\r\n      envFrom:\r\n        # Define the environment variable\r\n        - configMapRef:\r\n            # The ConfigMap containing the value you want to assign to SPECIAL_LEVEL_KEY\r\n            name: game-config\r\n            # Specify the key associated with the value\r\n            # key: game.properties\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u65e5\u5fd7<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl logs dapi-test-pod \r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT=443\r\nui.properties=color.good=purple\r\ncolor.bad=yellow\r\nallow.textmode=true\r\nhow.nice.to.look=fairlyNice\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\ngame.properties=enemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\n<\/code><\/pre>\n<p>\u6211\u53ea\u6458\u5f55\u4e86ConfigMap\u4e2d\u5b9a\u4e49\u7684\u90e8\u5206\u3002<br \/>\n\u7136\u800c\uff0c\u591a\u6bb5\u914d\u7f6e\u7684\u90e8\u5206\u5185\u5bb9\u786e\u5b9e\u53d8\u5f97\u5fae\u5999\u3002<\/p>\n<pre class=\"post-pre\"><code>ui.properties=color.good=purple\r\ncolor.bad=yellow\r\nallow.textmode=true\r\nhow.nice.to.look=fairlyNice\r\ngame.properties=enemies=aliens\r\nlives=3\r\nenemies.cheat=true\r\nenemies.cheat.level=noGoodRotten\r\nsecret.code.passphrase=UUDDLRLRBABAS\r\nsecret.code.allowed=true\r\nsecret.code.lives=30\r\n<\/code><\/pre>\n<p>\u505c\u6b62\u4f7f\u7528ConfigMap\u7684\u591a\u5c42\u6784\u5efa\uff0c\u6539\u4e3a\u4ee5Flat\u65b9\u5f0f\u5b9a\u4e49\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config.yaml\r\napiVersion: v1\r\ndata:\r\n  game.properties.enemies: 'aliens'\r\n  game.properties.lives: '3'\r\n  game.properties.enemies.cheat: 'true'\r\n  game.properties.enemies.cheat.level: 'noGoodRotten'\r\n  game.properties.secret.code.passphrase: 'UUDDLRLRBABAS'\r\n  game.properties.secret.code.allowed: 'true'\r\n  game.properties.secret.code.lives: '30'\r\n  ui.properties.color.good: 'purple'\r\n  ui.properties.color.bad: 'yellow'\r\n  ui.properties.allow.textmode: 'true'\r\n  ui.properties.how.nice.to.look: 'fairlyNice'\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config\r\nEOF\r\n<\/code><\/pre>\n<p>\u91cd\u65b0\u521b\u5efaConfigMap\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/game-config.yaml\r\n<\/code><\/pre>\n<p>\u91cd\u65b0\u521b\u5efaPod\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u68c0\u67e5\u65e5\u5fd7\u3002\u60a8\u53ef\u4ee5\u786e\u8ba4\u5b83\u4eec\u4ee5\u826f\u597d\u7684\u65b9\u5f0f\u540c\u65f6\u52a0\u8f7d\u3002<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl logs dapi-test-pod \r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT=443\r\nui.properties.how.nice.to.look=fairlyNice\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nui.properties.color.good=purple\r\ngame.properties.enemies=aliens\r\ngame.properties.lives=3\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\ngame.properties.secret.code.passphrase=UUDDLRLRBABAS\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\ngame.properties.enemies.cheat.level=noGoodRotten\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nui.properties.allow.textmode=true\r\ngame.properties.enemies.cheat=true\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\ngame.properties.secret.code.lives=30\r\ngame.properties.secret.code.allowed=true\r\nui.properties.color.bad=yellow\r\n<\/code><\/pre>\n<p>\u5220\u9664 Pod<\/p>\n<pre class=\"post-pre\"><code>kubectl delete pod dapi-test-pod\r\n<\/code><\/pre>\n<h2>\u4f7f\u7528\u591a\u4e2aConfigMap\u6765\u68c0\u67e5\u5bb9\u5668\u5185\u7684\u73af\u5883\u53d8\u91cf\u3002<\/h2>\n<p>\u521b\u5efa\u7b2c\u4e8c\u4e2aConfigMap<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\napiVersion: v1\r\ndata:\r\n  test.env: 'ceder'\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config-2\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efa ConfigMap<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\n<\/code><\/pre>\n<p>\u4fee\u6539Pod\u7684\u6e05\u5355\u6587\u4ef6<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"\/bin\/sh\", \"-c\", \"env\" ]\r\n      envFrom:\r\n        # Define the environment variable\r\n        - configMapRef:\r\n            name: game-config\r\n        - configMapRef:\r\n            name: game-config-2\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u521b\u5efa\u4e00\u4e2aPod\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u65e5\u5fd7<br \/>\n\u53ef\u4ee5\u770b\u5230\u591a\u4e2aConfigMap\u6b63\u5e38\u52a0\u8f7d<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl logs dapi-test-pod \r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT=443\r\nui.properties.how.nice.to.look=fairlyNice\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nui.properties.color.good=purple\r\ngame.properties.lives=3\r\ngame.properties.enemies=aliens\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\ngame.properties.secret.code.passphrase=UUDDLRLRBABAS\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\ntest.env=ceder\r\ngame.properties.enemies.cheat.level=noGoodRotten\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nui.properties.allow.textmode=true\r\ngame.properties.enemies.cheat=true\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\ngame.properties.secret.code.lives=30\r\ngame.properties.secret.code.allowed=true\r\nui.properties.color.bad=yellow\r\n<\/code><\/pre>\n<h2>\u66f4\u65b0 ConfigMap<\/h2>\n<p>\u521b\u5efaPod\u7684\u6e05\u5355\u6587\u4ef6<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"sleep\", \"3600\" ]\r\n      envFrom:\r\n        # Define the environment variable\r\n        - configMapRef:\r\n            name: game-config\r\n        - configMapRef:\r\n            name: game-config-2\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u4f7f\u7528bash\u8fdb\u884c\u8fdc\u7a0b\u767b\u5f55<\/p>\n<pre class=\"post-pre\"><code>kubectl exec -it dapi-test-pod sh\r\n<\/code><\/pre>\n<p>\u786e\u8ba4\u73af\u5883\u53d8\u91cf<\/p>\n<pre class=\"post-pre\"><code>\/ # env\r\nKUBERNETES_SERVICE_PORT=443\r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nui.properties.how.nice.to.look=fairlyNice\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nui.properties.color.good=purple\r\ngame.properties.enemies=aliens\r\ngame.properties.lives=3\r\nTERM=xterm\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\ngame.properties.secret.code.passphrase=UUDDLRLRBABAS\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\ntest.env=ceder\r\ngame.properties.enemies.cheat.level=noGoodRotten\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nui.properties.allow.textmode=true\r\ngame.properties.enemies.cheat=true\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\ngame.properties.secret.code.lives=30\r\ngame.properties.secret.code.allowed=true\r\nui.properties.color.bad=yellow\r\n<\/code><\/pre>\n<p>\u4fee\u6539\u6e05\u5355\u6587\u4ef6<br \/>\n\u5c06test.env\u4ececeder\u66f4\u6539\u4e3asugi<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\napiVersion: v1\r\ndata:\r\n  test.env: 'sugi'\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config-2\r\nEOF\r\n<\/code><\/pre>\n<p>\u5e94\u7528\u66f4\u6539<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl apply -f \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\nWarning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply\r\nconfigmap \"game-config-2\" configured\r\n<\/code><\/pre>\n<p>\u786e\u8ba4<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl get configmap game-config-2 -o yaml\r\napiVersion: v1\r\ndata:\r\n  test.env: sugi\r\nkind: ConfigMap\r\nmetadata:\r\n  annotations:\r\n    kubectl.kubernetes.io\/last-applied-configuration: |\r\n      {\"apiVersion\":\"v1\",\"data\":{\"test.env\":\"sugi\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"name\":\"game-config-2\",\"namespace\":\"default\"}}\r\n  creationTimestamp: 2018-04-30T16:47:42Z\r\n  name: game-config-2\r\n  namespace: default\r\n  resourceVersion: \"243453\"\r\n  selfLink: \/api\/v1\/namespaces\/default\/configmaps\/game-config-2\r\n  uid: 331bb48c-4c96-11e8-baee-0050569817ee\r\n<\/code><\/pre>\n<p>\u5df2\u7ecf\u521b\u5efa\u7684Pod\u7684\u73af\u5883\u53d8\u91cf\u4e0d\u4f1a\u88ab\u66f4\u6539\u3002\u5b83\u4ecd\u7136\u4fdd\u6301\u4e3aceder\u7684\u72b6\u6001\u3002<\/p>\n<pre class=\"post-pre\"><code>\/ # env\r\nKUBERNETES_SERVICE_PORT=443\r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nui.properties.how.nice.to.look=fairlyNice\r\nHOSTNAME=dapi-test-pod\r\nSHLVL=1\r\nHOME=\/root\r\nui.properties.color.good=purple\r\ngame.properties.enemies=aliens\r\ngame.properties.lives=3\r\nTERM=xterm\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\ngame.properties.secret.code.passphrase=UUDDLRLRBABAS\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\ntest.env=ceder\r\ngame.properties.enemies.cheat.level=noGoodRotten\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nui.properties.allow.textmode=true\r\ngame.properties.enemies.cheat=true\r\nPWD=\/\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\ngame.properties.secret.code.lives=30\r\ngame.properties.secret.code.allowed=true\r\nui.properties.color.bad=yellow\r\n<\/code><\/pre>\n<h1>\u5c06ConfigMap\u4f5c\u4e3aVolume\u6302\u8f7d\u5230Pod\u4e2d\u3002<\/h1>\n<h2>\u4f7f\u7528\u4e00\u4e2aConfigMap\u5c06\u6587\u4ef6\u4f5c\u4e3a\u5377\u6302\u8f7d\u5230\u5bb9\u5668\u5185\u90e8\u3002<\/h2>\n<p>\u521b\u5efaPod\u7684\u6e05\u5355\u6587\u4ef6\u3002<br \/>\n\u5728spec.volumes\u4e0b\u5b9a\u4e49\u4e86\u4e00\u4e2a\u540d\u4e3aconfig-volume\u7684configmap\u5377\u3002<br \/>\n\u5728spec.container.volumeMounts\u4e0b\u5b9a\u4e49\u4e86\u5c06\u5176\u6302\u8f7d\u5230\/etc\/config\u76ee\u5f55\u4e0b\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"sleep\", \"3600\" ]\r\n      volumeMounts:\r\n      - name: config-volume\r\n        mountPath: \/etc\/config\r\n  volumes:\r\n    - name: config-volume\r\n      configMap:\r\n        # Provide the name of the ConfigMap containing the files you want\r\n        # to add to the container\r\n        name: game-config\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u6267\u884cBusybox\u7684shell\uff0c\u5e76\u901a\u8fc7\u8fdc\u7a0b\u767b\u5f55\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl exec -it dapi-test-pod sh\r\n<\/code><\/pre>\n<p>\u60a8\u53ef\u4ee5\u786e\u8ba4\u8be5\u76ee\u5f55\u4e0a\u662f\u5426\u5b58\u5728\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>\/ # cd \/etc\/config\/\r\n\/etc\/config # \r\n\/etc\/config # ls -la\r\ntotal 8\r\ndrwxrwxrwx    3 root     root          4096 Apr 30 17:04 .\r\ndrwxr-xr-x    1 root     root            20 Apr 30 17:04 ..\r\ndrwxr-xr-x    2 root     root          4096 Apr 30 17:04 ..2018_04_30_17_04_33.366860462\r\nlrwxrwxrwx    1 root     root            31 Apr 30 17:04 ..data -&gt; ..2018_04_30_17_04_33.366860462\r\nlrwxrwxrwx    1 root     root            30 Apr 30 17:04 game.properties.enemies -&gt; ..data\/game.properties.enemies\r\nlrwxrwxrwx    1 root     root            36 Apr 30 17:04 game.properties.enemies.cheat -&gt; ..data\/game.properties.enemies.cheat\r\nlrwxrwxrwx    1 root     root            42 Apr 30 17:04 game.properties.enemies.cheat.level -&gt; ..data\/game.properties.enemies.cheat.level\r\nlrwxrwxrwx    1 root     root            28 Apr 30 17:04 game.properties.lives -&gt; ..data\/game.properties.lives\r\nlrwxrwxrwx    1 root     root            42 Apr 30 17:04 game.properties.secret.code.allowed -&gt; ..data\/game.properties.secret.code.allowed\r\nlrwxrwxrwx    1 root     root            40 Apr 30 17:04 game.properties.secret.code.lives -&gt; ..data\/game.properties.secret.code.lives\r\nlrwxrwxrwx    1 root     root            45 Apr 30 17:04 game.properties.secret.code.passphrase -&gt; ..data\/game.properties.secret.code.passphrase\r\nlrwxrwxrwx    1 root     root            35 Apr 30 17:04 ui.properties.allow.textmode -&gt; ..data\/ui.properties.allow.textmode\r\nlrwxrwxrwx    1 root     root            30 Apr 30 17:04 ui.properties.color.bad -&gt; ..data\/ui.properties.color.bad\r\nlrwxrwxrwx    1 root     root            31 Apr 30 17:04 ui.properties.color.good -&gt; ..data\/ui.properties.color.good\r\nlrwxrwxrwx    1 root     root            37 Apr 30 17:04 ui.properties.how.nice.to.look -&gt; ..data\/ui.properties.how.nice.to.look\r\n<\/code><\/pre>\n<p>\u6587\u4ef6\u7684\u5185\u5bb9\u4e5f\u5df2\u7ecf\u88ab\u6b63\u786e\u5b9a\u4e49<\/p>\n<pre class=\"post-pre\"><code>\/etc\/config # cat game.properties.enemies\r\naliens\/etc\/config # \r\n\/etc\/config # \r\n\/etc\/config # cat game.properties.lives\r\n3\/etc\/config # \r\n<\/code><\/pre>\n<p>\u5220\u9664Pod<\/p>\n<pre class=\"post-pre\"><code>kubectl delete pod dapi-test-pod\r\n<\/code><\/pre>\n<h2>\u5728\u5bb9\u5668\u5185\u4ee5\u6587\u4ef6\u7684\u5f62\u5f0f\u6302\u8f7d\u591a\u4e2aConfigMap\u3002<\/h2>\n<p>\u4fee\u6539Pod\u7684\u6e05\u5355\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/env_pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: dapi-test-pod\r\nspec:\r\n  containers:\r\n    - name: test-container\r\n      image: k8s.gcr.io\/busybox\r\n      command: [ \"sleep\", \"3600\" ]\r\n      volumeMounts:\r\n      - name: config-volume1\r\n        mountPath: \/etc\/config-volume1\r\n      - name: config-volume2\r\n        mountPath: \/etc\/config-volume2\r\n  volumes:\r\n    - name: config-volume1\r\n      configMap:\r\n        # Provide the name of the ConfigMap containing the files you want\r\n        # to add to the container\r\n        name: game-config\r\n    - name: config-volume2\r\n      configMap:\r\n        # Provide the name of the ConfigMap containing the files you want\r\n        # to add to the container\r\n        name: game-config-2\r\n  restartPolicy: Never\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/env_pod.yaml\r\n<\/code><\/pre>\n<p>\u4f7f\u7528BusyBox\u7684shell\u542f\u52a8\u4e00\u4e2a\u65b0\u7684\u5b9e\u4f8b\uff0c\u5e76\u8fdb\u884c\u8fdc\u7a0b\u767b\u5f55\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl exec -it dapi-test-pod sh\r\n<\/code><\/pre>\n<p>\u5728\/etc\u76ee\u5f55\u4e0b\uff0c\u5df2\u7ecf\u521b\u5efa\u4e86config-volume1\u548cconfig-volume2\u4e24\u4e2a\u76ee\u5f55\u3002<\/p>\n<pre class=\"post-pre\"><code>\/etc # pwd\r\n\/etc\r\n\/etc # \r\n\/etc # ls -la\r\ntotal 80\r\ndrwxr-xr-x    1 root     root            50 Apr 30 17:14 .\r\ndrwxr-xr-x    1 root     root            40 Apr 30 17:14 ..\r\ndrwxrwxrwx    3 root     root          4096 Apr 30 17:14 config-volume1\r\ndrwxrwxrwx    3 root     root            75 Apr 30 17:14 config-volume2\r\n-rw-rw-r--    1 root     root           466 Feb 27  2014 fstab\r\n-rw-rw-r--    1 root     root           344 Feb 27  2014 group\r\n-rw-r--r--    1 root     root            14 Apr 30 17:14 hostname\r\n-rw-r--r--    1 root     root           209 Apr 30 17:14 hosts\r\ndrwxrwxr-x    2 root     root            82 May 22  2014 init.d\r\n-rw-rw-r--    1 root     root          1086 May 22  2014 inittab\r\n-rw-rw-r--    1 root     root          1180 Feb 27  2014 inputrc\r\ndrwxr-xr-x    2 root     root           123 May 22  2014 iproute2\r\n-rw-rw-r--    1 root     root            21 May 22  2014 issue\r\n-rw-r--r--    1 root     root             0 May 22  2014 ld.so.conf\r\ndrwxrwxr-x    2 root     root             6 Feb 27  2014 ld.so.conf.d\r\nlrwxrwxrwx    1 root     root            12 Apr 30 17:14 mtab -&gt; \/proc\/mounts\r\ndrwxrwxr-x    8 root     root           138 May 22  2014 network\r\n-rw-rw-r--    1 root     root           439 Feb 27  2014 nsswitch.conf\r\n-rw-r--r--    1 root     root            95 May 22  2014 os-release\r\n-rw-r--r--    1 root     root           596 Feb 27  2014 passwd\r\n-rw-rw-r--    1 root     root          1836 Feb 27  2014 profile\r\n-rw-rw-r--    1 root     root          2744 Feb 27  2014 protocols\r\n-rw-rw-r--    1 root     root           512 Feb 27  2014 random-seed\r\n-rw-r--r--    1 root     root           115 Apr 30 17:14 resolv.conf\r\n-rw-rw-r--    1 root     root           386 Feb 27  2014 securetty\r\n-rw-rw-r--    1 root     root         10873 Feb 27  2014 services\r\n-rw-------    1 root     root           346 May 22  2014 shadow\r\n\/etc # \r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u786e\u8ba4\u6bcf\u4e2a\u76ee\u5f55\u3002<\/p>\n<pre class=\"post-pre\"><code>\/etc\/config-volume1 # pwd\r\n\/etc\/config-volume1\r\n\/etc\/config-volume1 # \r\n\/etc\/config-volume1 # ls -la\r\ntotal 8\r\ndrwxrwxrwx    3 root     root          4096 Apr 30 17:14 .\r\ndrwxr-xr-x    1 root     root            50 Apr 30 17:14 ..\r\ndrwxr-xr-x    2 root     root          4096 Apr 30 17:14 ..2018_04_30_17_14_44.399765545\r\nlrwxrwxrwx    1 root     root            31 Apr 30 17:14 ..data -&gt; ..2018_04_30_17_14_44.399765545\r\nlrwxrwxrwx    1 root     root            30 Apr 30 17:14 game.properties.enemies -&gt; ..data\/game.properties.enemies\r\nlrwxrwxrwx    1 root     root            36 Apr 30 17:14 game.properties.enemies.cheat -&gt; ..data\/game.properties.enemies.cheat\r\nlrwxrwxrwx    1 root     root            42 Apr 30 17:14 game.properties.enemies.cheat.level -&gt; ..data\/game.properties.enemies.cheat.level\r\nlrwxrwxrwx    1 root     root            28 Apr 30 17:14 game.properties.lives -&gt; ..data\/game.properties.lives\r\nlrwxrwxrwx    1 root     root            42 Apr 30 17:14 game.properties.secret.code.allowed -&gt; ..data\/game.properties.secret.code.allowed\r\nlrwxrwxrwx    1 root     root            40 Apr 30 17:14 game.properties.secret.code.lives -&gt; ..data\/game.properties.secret.code.lives\r\nlrwxrwxrwx    1 root     root            45 Apr 30 17:14 game.properties.secret.code.passphrase -&gt; ..data\/game.properties.secret.code.passphrase\r\nlrwxrwxrwx    1 root     root            35 Apr 30 17:14 ui.properties.allow.textmode -&gt; ..data\/ui.properties.allow.textmode\r\nlrwxrwxrwx    1 root     root            30 Apr 30 17:14 ui.properties.color.bad -&gt; ..data\/ui.properties.color.bad\r\nlrwxrwxrwx    1 root     root            31 Apr 30 17:14 ui.properties.color.good -&gt; ..data\/ui.properties.color.good\r\nlrwxrwxrwx    1 root     root            37 Apr 30 17:14 ui.properties.how.nice.to.look -&gt; ..data\/ui.properties.how.nice.to.look\r\n<\/code><\/pre>\n<pre class=\"post-pre\"><code>\/etc\/config-volume2 # pwd\r\n\/etc\/config-volume2\r\n\/etc\/config-volume2 # \r\n\/etc\/config-volume2 # ls -la\r\ntotal 0\r\ndrwxrwxrwx    3 root     root            75 Apr 30 17:14 .\r\ndrwxr-xr-x    1 root     root            50 Apr 30 17:14 ..\r\ndrwxr-xr-x    2 root     root            22 Apr 30 17:14 ..2018_04_30_17_14_44.848559988\r\nlrwxrwxrwx    1 root     root            31 Apr 30 17:14 ..data -&gt; ..2018_04_30_17_14_44.848559988\r\nlrwxrwxrwx    1 root     root            15 Apr 30 17:14 test.env -&gt; ..data\/test.env\r\n<\/code><\/pre>\n<h2>\u66f4\u65b0\u914d\u7f6e\u6620\u5c04\u4e2d\u7684 ConfigMap\u3002<\/h2>\n<p>\u4fee\u6539\u6e05\u5355\u6587\u4ef6<br \/>\n\u5c06test.env\u4ececeder\u66f4\u6539\u4e3asugi<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\napiVersion: v1\r\ndata:\r\n  test.env: 'sugi'\r\nkind: ConfigMap\r\nmetadata:\r\n  name: game-config-2\r\nEOF\r\n<\/code><\/pre>\n<p>\u5e94\u7528\u66f4\u6539<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl apply -f \/root\/kube_yaml\/config_files\/game-config-2.yaml\r\nWarning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply\r\nconfigmap \"game-config-2\" configured\r\n<\/code><\/pre>\n<p>\u6211\u4f1a\u786e\u8ba4<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 ~]# kubectl get configmap game-config-2 -o yaml\r\napiVersion: v1\r\ndata:\r\n  test.env: sugi\r\nkind: ConfigMap\r\nmetadata:\r\n  annotations:\r\n    kubectl.kubernetes.io\/last-applied-configuration: |\r\n      {\"apiVersion\":\"v1\",\"data\":{\"test.env\":\"sugi\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"name\":\"game-config-2\",\"namespace\":\"default\"}}\r\n  creationTimestamp: 2018-04-30T16:47:42Z\r\n  name: game-config-2\r\n  namespace: default\r\n  resourceVersion: \"243453\"\r\n  selfLink: \/api\/v1\/namespaces\/default\/configmaps\/game-config-2\r\n  uid: 331bb48c-4c96-11e8-baee-0050569817ee\r\n<\/code><\/pre>\n<p>\u6211\u5728 \u6302\u8f7d\u4e3a\u5377 \u7684 busybox \u5bb9\u5668\u4e0a\u68c0\u67e5 ConfigMap\u3002\u636e\u8bf4\u66f4\u65b0\u9700\u8981\u4e00\u5b9a\u65f6\u95f4\u3002\u5728\u6211\u7684\u60c5\u51b5\u4e0b\uff0c\u66f4\u6539\u7acb\u5373\u751f\u6548\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl exec -it dapi-test-pod sh\r\n<\/code><\/pre>\n<pre class=\"post-pre\"><code>\/etc\/config-volume2 # pwd\r\n\/etc\/config-volume2\r\n\/etc\/config-volume2 # \r\n\/etc\/config-volume2 # cat test.env \r\nsugi\/etc\/config-volume2 # \r\n<\/code><\/pre>\n<h1>RealWorld\u793a\u4f8b\uff1aRedis\u4e0eConfigMap\u3002<\/h1>\n<p>\u8bf7\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u521b\u5efaConfiMap\u3002<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/redis-config\r\nmaxmemory 2mb\r\nmaxmemory-policy allkeys-lru\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaConfigMap<\/p>\n<pre class=\"post-pre\"><code>kubectl create configmap example-redis-config --from-file=\/root\/kube_yaml\/config_files\/redis-config\r\n<\/code><\/pre>\n<p>\u786e\u8ba4<\/p>\n<pre class=\"post-pre\"><code>[root@sugi-kubernetes110-master01 config_files]# kubectl get configmap example-redis-config -o yaml\r\napiVersion: v1\r\ndata:\r\n  redis-config: |\r\n    maxmemory 2mb\r\n    maxmemory-policy allkeys-lru\r\nkind: ConfigMap\r\nmetadata:\r\n  creationTimestamp: 2018-04-30T17:41:36Z\r\n  name: example-redis-config\r\n  namespace: default\r\n  resourceVersion: \"244715\"\r\n  selfLink: \/api\/v1\/namespaces\/default\/configmaps\/example-redis-config\r\n  uid: baacb60b-4c9d-11e8-baee-0050569817ee\r\n<\/code><\/pre>\n<p>\u5236\u4f5cPod\u7684\u6e05\u5355\u6587\u4ef6<\/p>\n<pre class=\"post-pre\"><code>cat &lt;&lt;'EOF' &gt; \/root\/kube_yaml\/config_files\/redis-pod.yaml\r\napiVersion: v1\r\nkind: Pod\r\nmetadata:\r\n  name: redis\r\nspec:\r\n  containers:\r\n  - name: redis\r\n    image: kubernetes\/redis:v1\r\n    env:\r\n    - name: MASTER\r\n      value: \"true\"\r\n    ports:\r\n    - containerPort: 6379\r\n    resources:\r\n      limits:\r\n        cpu: \"0.1\"\r\n    volumeMounts:\r\n    - mountPath: \/redis-master-data\r\n      name: data\r\n    - mountPath: \/redis-master\r\n      name: config\r\n  volumes:\r\n    - name: data\r\n      emptyDir: {}\r\n    - name: config\r\n      configMap:\r\n        name: example-redis-config\r\n        items:\r\n        - key: redis-config\r\n          path: redis.conf\r\nEOF\r\n<\/code><\/pre>\n<p>\u521b\u5efaPod<\/p>\n<pre class=\"post-pre\"><code>kubectl create -f \/root\/kube_yaml\/config_files\/redis-pod.yaml\r\n<\/code><\/pre>\n<p>\u6211\u5c06\u8fdc\u7a0b\u767b\u5f55\u5230Pod\u3002<\/p>\n<pre class=\"post-pre\"><code>kubectl exec -it redis bash\r\n<\/code><\/pre>\n<p>\u9996\u5148\uff0c\u6211\u4eec\u4f1a\u68c0\u67e5\u73af\u5883\u53d8\u91cf\u3002\u6211\u4eec\u5df2\u7ecf\u786e\u8ba4&#8221;Master = true&#8221;\u88ab\u6b63\u786e\u6307\u5b9a\u5e76\u6210\u529f\u5730\u751f\u6548\u3002<\/p>\n<pre class=\"post-pre\"><code>root@redis:\/redis-master# env\r\nMASTER=true\r\nHOSTNAME=redis\r\nREDIS_DOWNLOAD_URL=http:\/\/download.redis.io\/releases\/redis-2.8.19.tar.gz\r\nKUBERNETES_PORT_443_TCP_PORT=443\r\nKUBERNETES_PORT=tcp:\/\/10.96.0.1:443\r\nTERM=xterm\r\nKUBERNETES_SERVICE_PORT=443\r\nKUBERNETES_SERVICE_HOST=10.96.0.1\r\nPATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin\r\nPWD=\/redis-master\r\nSHLVL=1\r\nHOME=\/root\r\nKUBERNETES_PORT_443_TCP_PROTO=tcp\r\nREDIS_DOWNLOAD_SHA1=3e362f4770ac2fdbdce58a5aa951c1967e0facc8\r\nREDIS_VERSION=2.8.19\r\nKUBERNETES_SERVICE_PORT_HTTPS=443\r\nKUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\r\nKUBERNETES_PORT_443_TCP=tcp:\/\/10.96.0.1:443\r\nOLDPWD=\/redis-master-data\r\n_=\/usr\/bin\/env\r\n<\/code><\/pre>\n<p>\u5c06ConfigMap\u6302\u8f7d\u5230\/redis-master\uff0c\u5e76\u67e5\u770b\u8be5\u76ee\u5f55\u3002<\/p>\n<pre class=\"post-pre\"><code>root@redis:\/redis-master# pwd\r\n\/redis-master\r\nroot@redis:\/redis-master# \r\nroot@redis:\/redis-master# ls -la\r\ntotal 0\r\ndrwxrwxrwx 3 root root 77 Apr 30 17:42 .\r\ndrwxr-xr-x 1 root root 42 Apr 30 17:45 ..\r\ndrwxr-xr-x 2 root root 24 Apr 30 17:42 ..2018_04_30_17_42_54.142107158\r\nlrwxrwxrwx 1 root root 31 Apr 30 17:42 ..data -&gt; ..2018_04_30_17_42_54.142107158\r\nlrwxrwxrwx 1 root root 17 Apr 30 17:42 redis.conf -&gt; ..data\/redis.conf\r\n<\/code><\/pre>\n<p>\u67e5\u770b\u6587\u4ef6\u5185\u5bb9<\/p>\n<pre class=\"post-pre\"><code>root@redis:\/redis-master# cat redis.conf \r\nmaxmemory 2mb\r\nmaxmemory-policy allkeys-lru\r\n<\/code><\/pre>\n<p>Redis\u5bb9\u5668\u955c\u50cf\u88ab\u8bbe\u8ba1\u6210\u53ef\u4ee5\u52a0\u8f7d&#8221;\/redis-master\/redis.conf&#8221;\u6587\u4ef6\uff0c\u5e76\u901a\u8fc7\u4e0eConfigFile\u914d\u5408\uff0c\u52a8\u6001\u5730\u6307\u5b9aRedis\u8fdb\u7a0b\u7684\u5185\u5b58\u76f8\u5173\u914d\u7f6e\u3002<\/p>\n<p>\u6253\u5f00 Redis \u7684 CLI \u5e76\u8fdb\u884c\u786e\u8ba4\u3002<\/p>\n<pre class=\"post-pre\"><code>root@redis:\/etc# redis-cli\r\n127.0.0.1:6379&gt; CONFIG GET maxmemory\r\n1) \"maxmemory\"\r\n2) \"2097152\"\r\n127.0.0.1:6379&gt; \r\n127.0.0.1:6379&gt; CONFIG GET maxmemory-policy\r\n1) \"maxmemory-policy\"\r\n2) \"allkeys-lru\"\r\n<\/code><\/pre>\n<h1>\u8bf7\u63d0\u4f9b\u7f51\u9875\u94fe\u63a5<\/h1>\n<p>\u5173\u4e8e envFrom\uff1a<\/p>\n<p>\u8bf7\u70b9\u51fb\u4ee5\u4e0b\u94fe\u63a5\u4e86\u89e3\u66f4\u591a\u4fe1\u606f\uff1a<\/p>\n<p>https:\/\/qiita.com\/tkusumi\/items\/cf7b096972bfa2810800<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9996\u5148 \u5728Kubernetes\u7684\u5b98\u65b9\u7f51\u9875\u4e0a\uff0c\u6709\u8bb8\u591a\u6559\u7a0b\u53ef\u4f9b\u53c2\u8003\u3002 \u4f5c\u4e3a\u5b66\u4e60Kubernetes\u7684\u4e00\u90e8\u5206\uff0c\u6211\u4eec\u5c06\u6df1 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-36057","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.5 (Yoast SEO v21.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c - Blog - Silicon Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.silicloud.com\/zh\/blog\/\u5c1d\u8bd5\u8fdb\u884ckubernetes-1-10\u6559\u7a0b\uff08configmap\uff09\u7684\u64cd\u4f5c\u3002\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c\" \/>\n<meta property=\"og:description\" content=\"\u9996\u5148 \u5728Kubernetes\u7684\u5b98\u65b9\u7f51\u9875\u4e0a\uff0c\u6709\u8bb8\u591a\u6559\u7a0b\u53ef\u4f9b\u53c2\u8003\u3002 \u4f5c\u4e3a\u5b66\u4e60Kubernetes\u7684\u4e00\u90e8\u5206\uff0c\u6211\u4eec\u5c06\u6df1 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.silicloud.com\/zh\/blog\/\u5c1d\u8bd5\u8fdb\u884ckubernetes-1-10\u6559\u7a0b\uff08configmap\uff09\u7684\u64cd\u4f5c\u3002\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog - Silicon Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T01:57:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T22:11:37+00:00\" \/>\n<meta name=\"author\" content=\"\u6587, \u7fd4\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u6587, \u7fd4\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/\",\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/\",\"name\":\"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c - Blog - Silicon Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#website\"},\"datePublished\":\"2023-12-05T01:57:08+00:00\",\"dateModified\":\"2024-04-29T22:11:37+00:00\",\"author\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/64d5cc7727fffbff2f9a2a8da1de3e5c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9875\",\"item\":\"https:\/\/www.silicloud.com\/zh\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#website\",\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/\",\"name\":\"Blog - Silicon Cloud\",\"description\":\"\",\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/64d5cc7727fffbff2f9a2a8da1de3e5c\",\"name\":\"\u6587, \u7fd4\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/920c3d673e0bccacc98e5e6b7149bb3c22edd8d39cb753e5d7d7e471498118a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/920c3d673e0bccacc98e5e6b7149bb3c22edd8d39cb753e5d7d7e471498118a1?s=96&d=mm&r=g\",\"caption\":\"\u6587, \u7fd4\"},\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/author\/wenxiang\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Blog - Silicon Cloud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c - Blog - Silicon Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.silicloud.com\/zh\/blog\/\u5c1d\u8bd5\u8fdb\u884ckubernetes-1-10\u6559\u7a0b\uff08configmap\uff09\u7684\u64cd\u4f5c\u3002\/","og_locale":"zh_CN","og_type":"article","og_title":"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c","og_description":"\u9996\u5148 \u5728Kubernetes\u7684\u5b98\u65b9\u7f51\u9875\u4e0a\uff0c\u6709\u8bb8\u591a\u6559\u7a0b\u53ef\u4f9b\u53c2\u8003\u3002 \u4f5c\u4e3a\u5b66\u4e60Kubernetes\u7684\u4e00\u90e8\u5206\uff0c\u6211\u4eec\u5c06\u6df1 [&hellip;]","og_url":"https:\/\/www.silicloud.com\/zh\/blog\/\u5c1d\u8bd5\u8fdb\u884ckubernetes-1-10\u6559\u7a0b\uff08configmap\uff09\u7684\u64cd\u4f5c\u3002\/","og_site_name":"Blog - Silicon Cloud","article_published_time":"2023-12-05T01:57:08+00:00","article_modified_time":"2024-04-29T22:11:37+00:00","author":"\u6587, \u7fd4","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"\u6587, \u7fd4","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"18 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/","url":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/","name":"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c - Blog - Silicon Cloud","isPartOf":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/#website"},"datePublished":"2023-12-05T01:57:08+00:00","dateModified":"2024-04-29T22:11:37+00:00","author":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/64d5cc7727fffbff2f9a2a8da1de3e5c"},"breadcrumb":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9875","item":"https:\/\/www.silicloud.com\/zh\/blog\/"},{"@type":"ListItem","position":2,"name":"\u5c1d\u8bd5\u8fdb\u884cKubernetes 1.10\u6559\u7a0b\uff08ConfigMap\uff09\u7684\u64cd\u4f5c"}]},{"@type":"WebSite","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#website","url":"https:\/\/www.silicloud.com\/zh\/blog\/","name":"Blog - Silicon Cloud","description":"","inLanguage":"zh-Hans"},{"@type":"Person","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/64d5cc7727fffbff2f9a2a8da1de3e5c","name":"\u6587, \u7fd4","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/920c3d673e0bccacc98e5e6b7149bb3c22edd8d39cb753e5d7d7e471498118a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/920c3d673e0bccacc98e5e6b7149bb3c22edd8d39cb753e5d7d7e471498118a1?s=96&d=mm&r=g","caption":"\u6587, \u7fd4"},"url":"https:\/\/www.silicloud.com\/zh\/blog\/author\/wenxiang\/"},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%b0%9d%e8%af%95%e8%bf%9b%e8%a1%8ckubernetes-1-10%e6%95%99%e7%a8%8b%ef%bc%88configmap%ef%bc%89%e7%9a%84%e6%93%8d%e4%bd%9c%e3%80%82\/#local-main-organization-logo","url":"","contentUrl":"","caption":"Blog - Silicon Cloud"}]}},"_links":{"self":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/36057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/comments?post=36057"}],"version-history":[{"count":2,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/36057\/revisions"}],"predecessor-version":[{"id":90179,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/36057\/revisions\/90179"}],"wp:attachment":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/media?parent=36057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/categories?post=36057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/tags?post=36057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}