Practice tutorial: using Pod security strategy to strengthen K8S security

This article comes from Rancher Labs   What is Pod security policy?   Kubernetes Pod security policy (PSP) is an important component of kubernetes security section. Pod security policy is a cluster level resource, used to control pod security related options, and also a mechanism to enhance kubernetes workload security. Kubernetes platform te ...

Posted by ld0121 on Tue, 17 Mar 2020 03:26:27 -0700

Kubedge deployment ~ Kubernetes 1.17.4 deployment

This paper introduces how to deploy Kubernetes 1.17.4 cluster using kubeadm on ubuntu 18.04 64 bit dual core CPU virtual machine. The network plug-in is flannel v0.11.0, and the image source is alicloud 1, Install docker apt-get install docker.io Execute the following command to create a new / etc/ ...

Posted by steamPunk on Tue, 17 Mar 2020 00:37:39 -0700

docker deployment Django project (front and back end separation project)

First step Switch yum source: https://blog.csdn.net/wangshuminjava/article/details/84380308 The second step 1. Install docker https://www.runoob.com/docker/centos-docker-install.html Modify the docker image source: https://blog.csdn.net/l848168/article/details/83378298 2. Install docker compos ...

Posted by realchamp on Sun, 15 Mar 2020 00:39:41 -0700

Installing php extension in docker

Some extensions of php Using the keyword docker PHP ext install directly in the Dockerfile file   RUN docker-php-ext-install -j$(nproc) iconv \ && docker-php-ext-configure gd --with-freetype-dir=/usr/include/ --with-jpeg-dir=/usr/include/ \ && docker-php-ext-install -j$(nproc) ...

Posted by Tristan Wells on Sat, 14 Mar 2020 23:41:05 -0700

07-docker port mapping associated with container

Port mappings are associated with containers In addition to network access, docker provides two capabilities to meet the basic requirements of service access: one is to allow mapping of service ports applied within containers to local host hosts, and the other is to enable quick access through container names between multiple containers throug ...

Posted by n1tr0b on Fri, 13 Mar 2020 11:16:24 -0700

Advanced features of redis billion level data filtering and bloon filter

1, Brief introduction of bloon filter Last time, we learned to use HyperLogLog to estimate big data. It is very valuable and can solve many statistical requirements with low accuracy. But if we want to know whether a certain value is already in the HyperLogLog structure, it can't help. It only provi ...

Posted by tywin on Fri, 13 Mar 2020 08:32:34 -0700

Installing docker under linux

Currently, docker is very popular. Of course, compared with k8s, docker is slightly less powerful, but it is still widely used and convenient. Here are two ways to install docker First type: yum source installation This method is relatively simple to install, but first make sure that yum is install ...

Posted by rjs34 on Fri, 13 Mar 2020 02:28:35 -0700

Troubleshooting process of excessive consumption of a file handle

Background: With the business iteration, some projects are reconstructed with nodejs and deployed to k8s environment. In order to facilitate analysis, the last version of the code increases the function of output log. Phenomenon: Half a day after the launch, it was found that there was an alarm of too many open files in the R & D feedback ...

Posted by scottreid1974 on Thu, 12 Mar 2020 20:15:05 -0700

Kubernetes Beginner k8s Cluster Environment Setup

Reference QianFeng Li Weimin brief introduction Kubernetes, created and managed by Google in 2014, is an open source version of Borg, Google's 10-year-old large-scale container management technology.Is a container cluster management system, is an open source platform, can achieve automatic deployment ...

Posted by iloveyou on Wed, 11 Mar 2020 22:59:37 -0700

Prepare for CKA's daily question - day 2 | Daemonset, docking storage CSI knowledge points

This activity is held on WeChat official account (my small bowl soup), and there is book delivery activity. You can't take part in the book delivery activity if you take part in the question answering here! Pick up another article. Prepare for CKA daily question - day 1 Yesterday's examination questions Which of the following Daemonset yaml i ...

Posted by neostrife on Wed, 11 Mar 2020 04:28:35 -0700