Basic knowledgeFirst: Docker is an open-source container, in fact this technology is not new. In the early days of Linux, there was a lightweight virtualization system like LXC. Docker is actually just a language to implement. Kubernetes means the helmsman of sailing, it's a powerful orchestration + Monitor + disaster preparedness + load management system for DockerSecond: Kubernetes is a summary and best p
First, IntroductionHeapster is a cluster-wide monitoring and event data aggregator. It natively supports kubernetes and can be run on all kubernetes settings. Heapster is run as a cluster in a group, similar to how any other kubernetes application runs. InfluxDB is an open source database written in go that is designed to handle time-series data with hi
in the previous section we discussed the services running on the Kubernetes architecture Master,This section discusses node nodes. Node is where the Pod runs, Kubernetes supports Docker, Rkt, and other container runtime. The Kubernetes components running on node have Kubelet, Kube-proxy, and Pod networks (such as flannel).KubeletKubelet is the agent of node, and
GlusterFSGlusterfs is an open-source, scale-out file system. These examples provide information about how to allow containers to use glusterfs volumes.The example assumes that you have set up the Glusterfs server cluster and is ready to use the running Glusterfs volume in the container.PrerequisiteThe Kubernetes cluster has been built.Installation of the Glusterfs clusterEnvironment IntroductionOS System: Centos 7.xGlusterfs of two nodes: 192.168.22.2
The problem of network error in Kubernetes
System environment#系统版本cat /etc/redhat-releaseCentOS Linux release 7.4.1708 (Core)#kubelet版本kubelet --versionKubernetes v1.10.0#selinux状态getenforceDisabled#系统防火墙状态systemctl status firewalld● firewalld.service - firewalld - dynamic firewall daemonLoaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; vendor preset: enabled)Active: inactive (dead) Docs: man:firewalld(1)
Pod anomaly Problem#d
Scheduler Source Analysis
The last article mainly introduces the principle kubernetes principle of Kubernetes Scheduler--schedulerThis article mainly carries on the analysis to the Kubernetes Scheduler module source code. Scheduler Source Structure
Kubernetes Scheduler module in the
This article starts with my public number clouddeveloper, and you are welcome to join me in learning cloud computing.
From the previous article we know that Kubernetes born in the borg,borg of Google in the beginning of the birth of Kubernetes has been in the internal battle of Google more than 10 years, and does not say its history has a long tradition, it is from Google that talented engineers hand, K
1. PrefaceKubernetes designed a special network model that deviates from the native Docker network model. In this design, Kubernetes defines an abstract concept: pods, each pod is a collection of containers, and there is a shared IP, and all containers share the same network namespace. Pods can communicate not only with physical machines, but also between containers across the network. Kubernetes's ip-per-pod design idea has many benefits, such as: Fr
Kubernetes 1.9 clusters use traefik to publish services
This section describes how to use traefik to publish services in the kubernetes 1.5.2 cluster environment. Traefik is deployed in the daemonset mode. The http protocol is used to connect to the api-server, and rbac is not configured. This article describes how to deploy traefik in k8s 1.9 using deployment for service release.
Before starting, You Need
This article transferred from: http://blog.csdn.net/xingwangc2014/article/details/51204224Kubernetes through the kube-apiserver as the entire cluster management portal. Apiserver is the primary management node for the entire cluster, where the user configures and organizes the cluster through Apiserver, while the interactions between the nodes in the cluster and the ETCD store interact with the Apiserver. Apiserver implements a set of Restfull interfaces that allow users to interact directly wit
1, kubernetes installation of the creation of Kubeconfig filehttps://jimmysong.io/blogs/kubernetes-create-kubeconfig/2. Easy to understand kubernetes authentication functionhttp://qinghua.github.io/kubernetes-security/3. Security Configuration of Kubernetes clusterhttp://ton
Brief Description:This article covers 3 Ubuntu machines, 1 Rke deployment Machines (192.168.3.161), 2 kubernetes cluster machines (3.162 and 3.163).On the Windows machine, download the rke_linux-amd64 from GitHub, rename it to Rke, edit the cluster.yml cluster deployment file, and upload the file to the 3.161 machine using the PSCP command provided by Putty. On the 3.161 machine, execute the rke command to deploy the cluster to the 3.162 and 3.163 mac
Brief description:This article covers 3 Ubuntu machines, 1 Rke deployment Machines (192.168.3.161), 2 kubernetes cluster machines (3.162 and 3.163).On the Windows machine, download the rke_linux-amd64 from GitHub, rename it to Rke, edit the cluster.yml cluster deployment file, and upload the file to the 3.161 machine using the PSCP command provided by Putty. On the 3.161 machine, execute the rke command to deploy the cluster to the 3.162 and 3.163 mac
Kubernetes using NFS as a shared storageKubernetes managed containers are encapsulated, and sometimes we need to put logs from the container running locally or shared storage to prevent the container from going down, and the logs can also analyze the problem. Kubernetes's shared storage scheme is currently more prevalent in three, namely: Nfs,glusterfs and Ceph.Previously wrote an article kubernetes use Glu
kubernetes clinet-go Development (I.)
Kubernetes currently provides two ways to create the required pod,service,replicationcontroller, one is through Kubectl create-f, a restful interface via HTTP, because of the work item's reason, Need to be customized according to the actual business needs of the development of K8s API, I used the library is the official, code base address: Https://github.com/
Service on the line to the top of the live pressure, carry the test, or to be said or we do things brother, remember this scene above?
The old method is a service cluster deployment, but there is always a limit, before with Ali when they have a flexible calculation can be set by the CPU's threshold to dynamically expand and shrink computing capacity, at that time the feeling is very strong, at least at that time our conventional approach is difficult to do, Did not expect to have
kubernetes Introduction
Kubernetes is a container cluster management system that Google Open-source in June 2014, using the Go language development, Kubernetes also called k8s.
K8s is a Borg container cluster management system inside Google, Borg has been operating on Google's mass production for 10 years.
K8s is mainly used for automated deployment, expansion
The previous blog has introduced the deployment of a simple kubernetes cluster, but the cluster environment does not have a reasonable network configuration. In the actual production to realize the communication of the components in the cluster, it is necessary to use the network plug-in provided by the third party.Flannel binary Installation1. Download Fannel componentswget https://github.com/coreos/flannel/releases/download/v0.10.0/flannel-v0.10.0-l
Configmap Description of KubernetesIn this blog post, let's say a question about customizing the configuration in the pod of kubernetes.We know that in almost all application development, configuration file changes are involved, such as in the Web program, the need to connect to the database, cache, and even queues. And one of our applications starts with writing the first line of code, going through the development environment, the test environment, the pre-release environment only to the final
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.