/images/avatar.png

kubeadm concept and practice

1. kubeadm knowledge map Kubeadm is a tool to implement the k8s environment quickly. Also you don’t need to care about the configure environment, just know how to bootstrap it. Master the basically command to use kubeadm. 2. Kubeadm practice 2.1 The practice environment Google cloud instance Linux system. 2.2 Environment configure Install container (Docker) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 # 安装 Docker CE ## 设置仓库 ### 安装软件包以允许 apt 通过 HTTPS 使用存储库 apt-get update && apt-get install \ apt-transport-https ca-certificates curl software-properties-common ### 新增 Docker 的 官方 GPG 秘钥 curl -fsSL https://download.

Cloud Tech,Container And K8S Sharing

Part 1: For this part, comprise of the basic knowledges including Cloud history, container technology and k8s etc. 1. Cloud Technology 1.1 The History Of Cloud computing ​ https://skyao.io/learning-cloudnative/introduction/history.html IaaS: Infrastructure as a service PaaS: Platform as a service SaaS: Software as a service 1.2 Cloud Native ​ https://skyao.io/learning-cloudnative/introduction/background.html 1.3 DevOps And Strengths ​ https://www.qikegu.com/docs/4262 ​ https://skyao.io/learning-cloudnative/devops/ 2. Container Technologies 2.1 Virtualization Technology Virtualization refers to the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources etc.

Secret And ConfigMap

1. Background Up to now, perhaps you haven’t had to pass any kind of configuration data to the apps. Because almost all apps require configuration, which shouldn’t be baked into to the built app itself. This article shows two ways to pass the configuration data to the apps. 2. Secret Secret is for the information you’ve passed to the containers is sensitive. K8s provides a separate object called a Secret. There are 4 ways to create the Secret.

K8S Deployment Strategies

1. Background We always deploy the final version applications to the production env. There are several ways to ensure the release production stably and safety. Below sections are k8s deployment strategies. 2. The Strategies There are 4 ways to do the production release. 1) Rolling-update. 2) Recreate. 3) Blue/Green. 4) Canary. Below is the details. Recreate Update This is very clumsy way to update. Destory V1 application then create V2 application.

K8S Network

K8S network is divided into 3 levels. From inside to outside, there are 3 types: 1) Container Network. 2) Intra-Cluster Network. 3) External Cluster Network. Below is the details, 1. Container Network Docker networking is limited within the host itself. By default, it creates a virtual bridge named docker0 and for each container it allocates a virtual ethane which get attached to the bridge docker0. So, in Docker two containers can communicate with each other if they resident on the same host.