Record a detailed installation of kubernetes and istio

Written in front First, let's talk about my machine configuration, the hot naked machine. There are three configurations as follows 10.20.1.103 4C 8G disk 50G node4 master centos7 10.20.1.104 4C 8G disk 50G node5 node centos7 10.20.1.105 4C 8G disk 50G node6 node centos7 My installation method is ba ...

Posted by blaster_master on Fri, 17 Jan 2020 02:09:07 -0800

kubernetes series tutorial kubeadm offline deployment of 1.14.1 clusters

Write before This chapter is kubernetes series tutorials The second = article mainly introduces the deployment of the kubernetes cluster through the kubeadm installation tool. Considering the limitations of the domestic network, the mirror has been downloaded to the network disk for offline deployment. 1. Overview of the environment 1.1 Instal ...

Posted by dickey on Thu, 16 Jan 2020 09:18:20 -0800

centos7 kubernetes cluster deployment

centos 7 kubernetes cluster deployment Host (virtual machine) information: [root@k8s-master ~]# cat /etc/redhat-release CentOS Linux release 7.7.1908 (Core) Node name IP k8s-master 192.168.1.86 k8s-node1 192.168.1.87 Note: 1. k8s version can be selected by yourself. Take 1.16.2 as an ex ...

Posted by bdurham on Sat, 11 Jan 2020 01:40:16 -0800

Resource object for pod in k8s (namespace, acquisition policy, restart policy, health check)

1. Resource Objects for k8s Deployment, Service and Pod are the three core resource objects of k8s Deployment: The controller of the most common stateless application that supports scaling, rolling upgrade, and so on. Service: Provides a fixed access interface for flexible, life-cycle PD objects for service discovery and service access. Pod: ...

Posted by PhotoClickr on Thu, 09 Jan 2020 11:17:29 -0800

Chapter XIII Analysis takes you through helm3 Prometheus with ease

This series of articles: Chapter 1: Nine analysis takes you through helm3 installation easilyChapter II: Nine analyses take you through the helm3 public warehouse easily Chapter III: Nine analyses take you through the helm3 private warehouse easily Chapter IV: Nine analysis takes you through helm3 chart easily Chapter V: Nine analysis takes ...

Posted by webdogjcn on Thu, 09 Jan 2020 11:12:51 -0800

How to Deeply Understand the Implementation Mechanism of EKS IAM Authenticator

1. k8s Authentication We know that apiserver has the following authentication methods: X509 Client Certs Static Token File Bootstrap Tokens Static Password File Service Account Tokens OpenID Connect Tokens Webhook Token Authentication Authenticating Proxy Typically, we use a binary self-built k8s cluster, or a kubeadm-created cluster, the ad ...

Posted by jenp on Tue, 07 Jan 2020 09:40:10 -0800

K8s creates resources using YAML files

Due to the popularity of K8s technology, enterprises of all sizes are using it now. Although it is not popularized, I believe it will happen sooner or later, so hurry up and learn more! There are two ways to create resources in K8s: command line and YAML file. This blog mainly introduces the ways to use YAML file. If you need to use command li ...

Posted by pranesh on Tue, 07 Jan 2020 09:37:56 -0800

Rescue GlusterFS Distributed Storage System

After the GlusterFS distributed storage system was migrated in a previous period of time, the phenomenon of dropping lines and intermittent happened frequently, which made it unable to work properly for a long time.Observations revealed that one of the nodes was always restarting, further revealing that only one of the four nodes in the replica ...

Posted by renesis on Mon, 06 Jan 2020 01:02:34 -0800

kubernetes-1.11.0 cluster deployment node cluster (3)

kubernetes-1.11.0 cluster deployment node cluster (3) Node configuration The components to be deployed in a single node include docker, calico, kubelet and Kube proxy. Node node makes master HA based on nginx load API Start a nginx on each node, and each nginx reversely proxy all API servers; Kubelet Kube proxy on node co ...

Posted by abushahin on Wed, 01 Jan 2020 00:02:17 -0800

k83 calico network policy

Common CNI network plug-ins include the following: Flannel: Provides network plug-in for overlay network for Kubernetes. Based on TUN/TAP tunneling technology, uses UDP to encapsulate IP messages to create overlay network. Maintains network allocation with etcd. Disadvantage: Unable to support network policy access control.Calico: A three-tier ...

Posted by celavi on Mon, 30 Dec 2019 09:57:42 -0800