Kubernetes Important Concept UnderstandingKubernetes is currently the most mainstream container orchestration tool, the next generation of distributed architecture of the king. 2018 Kubernetes The first version 1.10 has been released. Here's a look at some of the basic concepts of kubernetes.The kubernetes divides the machines in the cluster into master nodes and
ObjectiveIn the kubernetes, most of our resources are created through
1
Kubelet create-f Resource.yaml
Just opened to see the time inevitably some confused, do not understand grammar, do not know how to write; Today this article introduces Kubernetes construct syntax.Construct syntax is actually the Kubelet format into the API post data, submitted to Apiserver, so here suppor
Pokemon per second processing of Go cloud data storage (expected vs Actual)
This can happen, and you should be prepared for it as well. This is also the article in this series to mention. In this series of tutorials we'll show you what you need to track, why you're tracking them, and what you need to do to deal with possible root causes.
We'll show you each indicator, how to track it, and what you can do to take action. We will use different tools to collect and analyze this data.
For those who are interested in this offline event, please click here to sign up for a free ticket.In March this year, Docker had just finished its 5 birthday, and for five years, Docker had gradually matured in technology and practice, and embraced kubernetes at the end of last year.May 19, NetEase Cloud will co-host Docker Meetup, invite industry Docker deep practice enterprise, share in container, micro-service and
Tags: composition instance provider application Application class version style implementationThe lifespan of kubernetes pods is limited and they are not resurrected, so although each pod has its own IP address, these IP addresses are unreliable and disappear as the pod dies. This poses a problem, if some of the pod's collections (called backends) are other pods of the cluster (called frontends), how do these frontends find and always know which backe
In a cluster with TLS enabled, each time the cluster interacts with identity authentication, using Kubeconfig (i.e., certificates) and token two authentication methods is the simplest and most common authentication method.Take Kubectl as an example to introduce the configuration of Kubeconfig. Kubectl is just a go-written executable program that can be used by any node in the cluster as long as the appropriate Kubeconfig is configured for Kubectl. Kubectl Default is to find files with file names
Kubernetes+docker the cloud platform in CentOS7 installation on the system 1. Run VIRTUALBOX5. 2. Install the CENTOS7 system.Note: Select the basic server typeThe installation process is slightly. 3. Modify the computer IP and computer name.1) Nmtui1.Modify Host Name:NMCLI General hostname slave1.smartmap.com2.Modify Network ConnectionsNMCLI Connection Edit ENP0S3Nmcli> Goto IPv4Nmcli ipv4> Set Method manualNMCLI ipv4> Set Addresses 192.168.1.203/16N
By default, Kubernetes has a certificate validity period of 1 years when initializing a cluster. Manually generating certificates can avoid this problem.
Pull git code
git clone https://github.com/fandaye/k8s-tls.git CD k8s-tls/2. Edit the configuration file ' Apiserver.json ' file in the Hosts section, add the corresponding Kubernetes master node hostname and IP address to ', ' number interv
Reference article:1. Kubernetes Learning Resources1, "Kubernetes and cloud-native application" series of kubernetes system architecture and design concept2, [Docker Professional introduction website Dockerinfo] (Dockerinfo-docker container Technology tutorial, docker information dissemination and service platform)3, [Docker Professional introduction website Docko
Summary
Project Background (XX Bank customer): The private cloud on the k8s to run like MySQL in the state of the database services, performance and latency are relatively sensitive, not like the web bias application of stateless delay performance almost acceptable. But the network performance and delay is poor based on overlay mode, and the network architecture is more complex. And banks need to be simple and controllable for IP network management. Sr-iov is based on hardware implementation of
After the initial completion of the Kubernetes cluster architecture, by building some monitoring components, we have been able to achieve
Graphical monitoring of status information and resource conditions for each node,pod
Scaling and scaling of replicateset through scale
View the run log for each pod by kubectl logs or dashboard
However, the scale of the nodes in the distributed architecture is often very large, a typical produc
Service account for Kubernetes
Service Account RoleThe service account is designed to facilitate the process within the pod to invoke the Kubernetes API or other external services.
Service Account Usage ScenariosProcesses running in the pod need to invoke the Kubernetes API and other services of the non-Kubernetes
[TOC]DescriptionThere is no detailed explanation of the Kubernetes's service exposure and Traefik's principles. The Traefik principle can be consulted in the official documentation: https://docs.traefik.io/, This document can also be consulted about the service exposure of kubernetes and the rationale for using Traefik as a kubernetes ingress: https://mritd.me/2016/12/06/ Try-traefik-on-
At the beginning of the k8s, there will always be a lot of pits, because it is open source projects, the version is always updated, so be always concerned about the version you use there are different commands and parameters.This pit is for k8s to be able to pull the mirror in the private vault when the pod is built. According to the official website or online information, you can record the private library authentication information by creating secret. The following are the specific practices:F
This is a creation in
Article, where the information may have evolved or changed.
A service is a process, that:1. is designed to do a small number of things (often just one).2. Have no user interface and is invoked solely via some kind of APIs.An application, on the other hand, was pretty much the opposite of that. It has a user interface (even if it's just a command line) and often performs lots of different tasks. It can also expose an API, bu
appropriate pod is created, and the old pod will continue to generate new pods when it is removed enough .Deployment rollback View Deployment Details$ kubectl describe deploymentView deployment's release history$ kubectl rollout history deployment/nginx-deploymentcan be rolled back to any previous version$ kubectl rollout undo deployment/nginx-deploymentdeployment "nginx-deployment" rolled back$ kubectl rollout undo deployment/nginx-deployment --to-revision=2deployment "nginx-deployment" rolled
Preparatory work1. Three Ubuntu hosts:Operating system: UBUNTU-16.04.1-SERVER-AMD64Docker1. Install using the command sudo apt-get install Dockersudo apt-get install Docker#运行docker服务端Dockerd2. Add the current user to the Docker group, or you'll need to add sudo super privilege to each run of Docker, which is troublesomesudo groupadd Dockersudo gpasswd-a Nwlab DockerView User group information Vi/etc/group or groups NwlabDocker version to see if it ta
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.