针对以下问题,我把targetPort名称改为了cloud-access-s,可以解决问题吗:
Error from server (Invalid): error when applying patch:
{"metadata":{"annotations":{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"metadata\":{\"annotations\":{\"service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags\":\"Category=dev,Product=vms,ServiceType=biz\",\"service.beta.kubernetes.io/aws-load-balancer-backend-protocol\":\"tcp\",\"service.beta.kubernetes.io/aws-load-balancer-nlb-target-type\":\"ip\",\"service.beta.kubernetes.io/aws-load-balancer-scheme\":\"internet-facing\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-cert\":\"arn:aws:acm:ap-southeast-1:242777933053:certificate/74ff9ed2-8bcc-492d-b845-15308bace4e8\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy\":\"ELBSecurityPolicy-TLS13-1-2-Res-2021-06\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-ports\":\"443,446\",\"service.beta.kubernetes.io/aws-load-balancer-type\":\"external\"},\"labels\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"name\":\"vms-core-server-cloud-access-pa-fw-v1\",\"namespace\":\"dev3-vms\"},\"spec\":{\"externalTrafficPolicy\":\"Cluster\",\"loadBalancerClass\":\"service.k8s.aws/nlb\",\"ports\":[{\"name\":\"cloud-access-443\",\"port\":443,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access\"},{\"name\":\"cloud-access-446\",\"port\":446,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access-short\"}],\"selector\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"type\":\"LoadBalancer\"}}\n","service.beta.kubernetes.io/aws-load-balancer-ssl-ports":"443,446"}},"spec":{"$setElementOrder/ports":[{"port":443},{"port":446}],"ports":[{"name":"cloud-access-446","port":446,"protocol":"TCP","targetPort":"cloud-access-short"}]}}
to:
Resource: "/v1, Resource=services", GroupVersionKind: "/v1, Kind=Service"
Name: "vms-core-server-cloud-access-pa-fw-v1", Namespace: "dev3-vms"
Object: &{map["apiVersion":"v1" "kind":"Service" "metadata":map["annotations":map["field.cattle.io/publicEndpoints":"[{\"addresses\":[\"k8s-dev3vms-vmscores-34e737e260-900592ab7128577c.elb.ap-southeast-1.amazonaws.com\"],\"port\":443,\"protocol\":\"TCP\",\"serviceName\":\"dev3-vms:vms-core-server-cloud-access-pa-fw-v1\",\"allNodes\":false}]" "kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"metadata\":{\"annotations\":{\"service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags\":\"Category=dev,Product=vms,ServiceType=biz\",\"service.beta.kubernetes.io/aws-load-balancer-backend-protocol\":\"tcp\",\"service.beta.kubernetes.io/aws-load-balancer-nlb-target-type\":\"ip\",\"service.beta.kubernetes.io/aws-load-balancer-scheme\":\"internet-facing\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-cert\":\"arn:aws:acm:ap-southeast-1:242777933053:certificate/74ff9ed2-8bcc-492d-b845-15308bace4e8\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy\":\"ELBSecurityPolicy-TLS13-1-2-Res-2021-06\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-ports\":\"443\",\"service.beta.kubernetes.io/aws-load-balancer-type\":\"external\"},\"labels\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"name\":\"vms-core-server-cloud-access-pa-fw-v1\",\"namespace\":\"dev3-vms\"},\"spec\":{\"externalTrafficPolicy\":\"Cluster\",\"loadBalancerClass\":\"service.k8s.aws/nlb\",\"ports\":[{\"name\":\"cloud-access-443\",\"port\":443,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access\"}],\"selector\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"type\":\"LoadBalancer\"}}\n" "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags":"Category=dev,Product=vms,ServiceType=biz" "service.beta.kubernetes.io/aws-load-balancer-backend-protocol":"tcp" "service.beta.kubernetes.io/aws-load-balancer-nlb-target-type":"ip" "service.beta.kubernetes.io/aws-load-balancer-scheme":"internet-facing" "service.beta.kubernetes.io/aws-load-balancer-ssl-cert":"arn:aws:acm:ap-southeast-1:242777933053:certificate/74ff9ed2-8bcc-492d-b845-15308bace4e8" "service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy":"ELBSecurityPolicy-TLS13-1-2-Res-2021-06" "service.beta.kubernetes.io/aws-load-balancer-ssl-ports":"443" "service.beta.kubernetes.io/aws-load-balancer-type":"external"] "creationTimestamp":"2025-06-03T01:56:23Z" "finalizers":["service.k8s.aws/resources"] "labels":map["app.kubernetes.io/name":"vms-core-server" "region":"ap-southeast-1"] "managedFields":[map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:annotations":map[".":map[] "f:kubectl.kubernetes.io/last-applied-configuration":map[] "f:service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags":map[] "f:service.beta.kubernetes.io/aws-load-balancer-backend-protocol":map[] "f:service.beta.kubernetes.io/aws-load-balancer-nlb-target-type":map[] "f:service.beta.kubernetes.io/aws-load-balancer-scheme":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-cert":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-ports":map[] "f:service.beta.kubernetes.io/aws-load-balancer-type":map[]] "f:labels":map[".":map[] "f:app.kubernetes.io/name":map[] "f:region":map[]]] "f:spec":map["f:allocateLoadBalancerNodePorts":map[] "f:externalTrafficPolicy":map[] "f:internalTrafficPolicy":map[] "f:loadBalancerClass":map[] "f:ports":map[".":map[] "k:{\"port\":443,\"protocol\":\"TCP\"}":map[".":map[] "f:name":map[] "f:port":map[] "f:protocol":map[] "f:targetPort":map[]]] "f:selector":map[] "f:sessionAffinity":map[] "f:type":map[]]] "manager":"kubectl-client-side-apply" "operation":"Update" "time":"2025-06-03T01:56:23Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:finalizers":map[".":map[] "v:\"service.k8s.aws/resources\"":map[]]]] "manager":"controller" "operation":"Update" "time":"2025-06-03T01:56:25Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:annotations":map["f:field.cattle.io/publicEndpoints":map[]]]] "manager":"agent" "operation":"Update" "time":"2025-06-03T01:56:35Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:status":map["f:loadBalancer":map["f:ingress":map[]]]] "manager":"controller" "operation":"Update" "subresource":"status" "time":"2025-06-03T01:56:35Z"]] "name":"vms-core-server-cloud-access-pa-fw-v1" "namespace":"dev3-vms" "resourceVersion":"1811930015" "uid":"00d7ae1e-c95d-4de0-816f-3f1d70e4bc00"] "spec":map["allocateLoadBalancerNodePorts":%!q(bool=true) "clusterIP":"172.28.158.97" "clusterIPs":["172.28.158.97"] "externalTrafficPolicy":"Cluster" "internalTrafficPolicy":"Cluster" "ipFamilies":["IPv4"] "ipFamilyPolicy":"SingleStack" "loadBalancerClass":"service.k8s.aws/nlb" "ports":[map["name":"cloud-access-443" "nodePort":'\u7b88' "port":'\u01bb' "protocol":"TCP" "targetPort":"cloud-access"]] "selector":map["app.kubernetes.io/name":"vms-core-server" "region":"ap-southeast-1"] "sessionAffinity":"None" "type":"LoadBalancer"] "status":map["loadBalancer":map["ingress":[map["hostname":"k8s-dev3vms-vmscores-34e737e260-900592ab7128577c.elb.ap-southeast-1.amazonaws.com"]]]]]}
for: "/mnt/hgfs/code/devops_cicd/k8s-values/vms-core-server/dev/ap-southeast-1/networking/service.yaml": Service "vms-core-server-cloud-access-pa-fw-v1" is invalid: spec.ports[1].targetPort: Invalid value: "cloud-access-short": must be no more than 15 characters
Error from server (Invalid): error when applying patch:
{"metadata":{"annotations":{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"metadata\":{\"annotations\":{\"service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags\":\"Category=dev,Product=vms,ServiceType=biz\",\"service.beta.kubernetes.io/aws-load-balancer-backend-protocol\":\"tcp\",\"service.beta.kubernetes.io/aws-load-balancer-nlb-target-type\":\"ip\",\"service.beta.kubernetes.io/aws-load-balancer-scheme\":\"internet-facing\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-cert\":\"arn:aws:acm:ap-southeast-1:242777933053:certificate/e667c161-e7b0-4faa-a21e-23df5cb5f2d4\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy\":\"ELBSecurityPolicy-TLS13-1-2-Res-2021-06\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-ports\":\"443,446\",\"service.beta.kubernetes.io/aws-load-balancer-type\":\"external\"},\"labels\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"name\":\"vms-core-server-cloud-access-pa-fw-v2\",\"namespace\":\"dev3-vms\"},\"spec\":{\"externalTrafficPolicy\":\"Cluster\",\"loadBalancerClass\":\"service.k8s.aws/nlb\",\"ports\":[{\"name\":\"cloud-access-443\",\"port\":443,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access\"},{\"name\":\"cloud-access-446\",\"port\":446,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access-short\"}],\"selector\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"type\":\"LoadBalancer\"}}\n","service.beta.kubernetes.io/aws-load-balancer-ssl-ports":"443,446"}},"spec":{"$setElementOrder/ports":[{"port":443},{"port":446}],"ports":[{"name":"cloud-access-446","port":446,"protocol":"TCP","targetPort":"cloud-access-short"}]}}
to:
Resource: "/v1, Resource=services", GroupVersionKind: "/v1, Kind=Service"
Name: "vms-core-server-cloud-access-pa-fw-v2", Namespace: "dev3-vms"
Object: &{map["apiVersion":"v1" "kind":"Service" "metadata":map["annotations":map["field.cattle.io/publicEndpoints":"[{\"addresses\":[\"k8s-dev3vms-vmscores-06e8d001e9-56d1eb711ad5ef14.elb.ap-southeast-1.amazonaws.com\"],\"port\":443,\"protocol\":\"TCP\",\"serviceName\":\"dev3-vms:vms-core-server-cloud-access-pa-fw-v2\",\"allNodes\":false}]" "kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"metadata\":{\"annotations\":{\"service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags\":\"Category=dev,Product=vms,ServiceType=biz\",\"service.beta.kubernetes.io/aws-load-balancer-backend-protocol\":\"tcp\",\"service.beta.kubernetes.io/aws-load-balancer-nlb-target-type\":\"ip\",\"service.beta.kubernetes.io/aws-load-balancer-scheme\":\"internet-facing\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-cert\":\"arn:aws:acm:ap-southeast-1:242777933053:certificate/e667c161-e7b0-4faa-a21e-23df5cb5f2d4\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy\":\"ELBSecurityPolicy-TLS13-1-2-Res-2021-06\",\"service.beta.kubernetes.io/aws-load-balancer-ssl-ports\":\"443\",\"service.beta.kubernetes.io/aws-load-balancer-type\":\"external\"},\"labels\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"name\":\"vms-core-server-cloud-access-pa-fw-v2\",\"namespace\":\"dev3-vms\"},\"spec\":{\"externalTrafficPolicy\":\"Cluster\",\"loadBalancerClass\":\"service.k8s.aws/nlb\",\"ports\":[{\"name\":\"cloud-access-443\",\"port\":443,\"protocol\":\"TCP\",\"targetPort\":\"cloud-access\"}],\"selector\":{\"app.kubernetes.io/name\":\"vms-core-server\",\"region\":\"ap-southeast-1\"},\"type\":\"LoadBalancer\"}}\n" "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags":"Category=dev,Product=vms,ServiceType=biz" "service.beta.kubernetes.io/aws-load-balancer-backend-protocol":"tcp" "service.beta.kubernetes.io/aws-load-balancer-nlb-target-type":"ip" "service.beta.kubernetes.io/aws-load-balancer-scheme":"internet-facing" "service.beta.kubernetes.io/aws-load-balancer-ssl-cert":"arn:aws:acm:ap-southeast-1:242777933053:certificate/e667c161-e7b0-4faa-a21e-23df5cb5f2d4" "service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy":"ELBSecurityPolicy-TLS13-1-2-Res-2021-06" "service.beta.kubernetes.io/aws-load-balancer-ssl-ports":"443" "service.beta.kubernetes.io/aws-load-balancer-type":"external"] "creationTimestamp":"2025-06-03T01:56:23Z" "finalizers":["service.k8s.aws/resources"] "labels":map["app.kubernetes.io/name":"vms-core-server" "region":"ap-southeast-1"] "managedFields":[map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:annotations":map[".":map[] "f:kubectl.kubernetes.io/last-applied-configuration":map[] "f:service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags":map[] "f:service.beta.kubernetes.io/aws-load-balancer-backend-protocol":map[] "f:service.beta.kubernetes.io/aws-load-balancer-nlb-target-type":map[] "f:service.beta.kubernetes.io/aws-load-balancer-scheme":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-cert":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-negotiation-policy":map[] "f:service.beta.kubernetes.io/aws-load-balancer-ssl-ports":map[] "f:service.beta.kubernetes.io/aws-load-balancer-type":map[]] "f:labels":map[".":map[] "f:app.kubernetes.io/name":map[] "f:region":map[]]] "f:spec":map["f:allocateLoadBalancerNodePorts":map[] "f:externalTrafficPolicy":map[] "f:internalTrafficPolicy":map[] "f:loadBalancerClass":map[] "f:ports":map[".":map[] "k:{\"port\":443,\"protocol\":\"TCP\"}":map[".":map[] "f:name":map[] "f:port":map[] "f:protocol":map[] "f:targetPort":map[]]] "f:selector":map[] "f:sessionAffinity":map[] "f:type":map[]]] "manager":"kubectl-client-side-apply" "operation":"Update" "time":"2025-06-03T01:56:23Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:finalizers":map[".":map[] "v:\"service.k8s.aws/resources\"":map[]]]] "manager":"controller" "operation":"Update" "time":"2025-06-03T01:56:25Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:metadata":map["f:annotations":map["f:field.cattle.io/publicEndpoints":map[]]]] "manager":"agent" "operation":"Update" "time":"2025-06-03T01:56:36Z"] map["apiVersion":"v1" "fieldsType":"FieldsV1" "fieldsV1":map["f:status":map["f:loadBalancer":map["f:ingress":map[]]]] "manager":"controller" "operation":"Update" "subresource":"status" "time":"2025-06-03T01:56:36Z"]] "name":"vms-core-server-cloud-access-pa-fw-v2" "namespace":"dev3-vms" "resourceVersion":"1811930087" "uid":"4e0986af-5226-44d3-8a52-5a48b113bb39"] "spec":map["allocateLoadBalancerNodePorts":%!q(bool=true) "clusterIP":"172.28.167.238" "clusterIPs":["172.28.167.238"] "externalTrafficPolicy":"Cluster" "internalTrafficPolicy":"Cluster" "ipFamilies":["IPv4"] "ipFamilyPolicy":"SingleStack" "loadBalancerClass":"service.k8s.aws/nlb" "ports":[map["name":"cloud-access-443" "nodePort":'\u7ca0' "port":'\u01bb' "protocol":"TCP" "targetPort":"cloud-access"]] "selector":map["app.kubernetes.io/name":"vms-core-server" "region":"ap-southeast-1"] "sessionAffinity":"None" "type":"LoadBalancer"] "status":map["loadBalancer":map["ingress":[map["hostname":"k8s-dev3vms-vmscores-06e8d001e9-56d1eb711ad5ef14.elb.ap-southeast-1.amazonaws.com"]]]]]}
for: "/mnt/hgfs/code/devops_cicd/k8s-values/vms-core-server/dev/ap-southeast-1/networking/service.yaml": Service "vms-core-server-cloud-access-pa-fw-v2" is invalid: spec.ports[1].targetPort: Invalid value: "cloud-access-short": must be no more than 15 characters