cat k8s-events-elasticsearch.yaml# 采集k8s事件(events)到elasticsearch
# https://github.com/AliyunContainerService/kube-eventer
---
apiVersion: apps/v1
kind: Deployment
metadata:labels:name: kube-eventername: kube-eventernamespace: kube-system
spec:replicas: 1selector:matchLabels:app: kube-eventertemplate:metadata:labels:app: kube-eventerannotations: scheduler.alpha.kubernetes.io/critical-pod: ''spec:dnsPolicy: ClusterFirstWithHostNetserviceAccount: kube-eventercontainers:- image: registry.aliyuncs.com/acs/kube-eventer-amd64:v1.2.0-484d9cd-aliyunname: kube-eventercommand:- "/kube-eventer"- "--source=kubernetes:https://kubernetes.default"# elasticsearch- --sink=elasticsearch:http://10.10.2.139:9200?sniff=false&ver=7&index=k8s-event-prod&cluster_name=prodenv:- name: TZvalue: "Asia/Shanghai" volumeMounts:- name: localtimemountPath: /etc/localtimereadOnly: true- name: zoneinfomountPath: /usr/share/zoneinforeadOnly: trueresources:requests:cpu: 100mmemory: 100Milimits:cpu: 500mmemory: 250Mivolumes:- name: localtimehostPath:path: /etc/localtime- name: zoneinfohostPath:path: /usr/share/zoneinfo
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: kube-eventer
rules:- apiGroups:- ""resources:- configmaps- eventsverbs:- get- list- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:name: kube-eventer
roleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: kube-eventer
subjects:- kind: ServiceAccountname: kube-eventernamespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:name: kube-eventernamespace: kube-system