Record a detailed installation of kubernetes and istio
Written in front
First, let's talk about my machine configuration, the hot naked machine. There are three configurations as follows
10.20.1.103 4C 8G disk 50G node4 master centos7
10.20.1.104 4C 8G disk 50G node5 node centos7
10.20.1.105 4C 8G disk 50G node6 node centos7
My installation method is ba ...
Posted by blaster_master on Fri, 17 Jan 2020 02:09:07 -0800
kubernetes series tutorial kubeadm offline deployment of 1.14.1 clusters
Write before
This chapter is kubernetes series tutorials The second = article mainly introduces the deployment of the kubernetes cluster through the kubeadm installation tool. Considering the limitations of the domestic network, the mirror has been downloaded to the network disk for offline deployment.
1. Overview of the environment
1.1 Instal ...
Posted by dickey on Thu, 16 Jan 2020 09:18:20 -0800
centos7 kubernetes cluster deployment
centos 7 kubernetes cluster deployment
Host (virtual machine) information:
[root@k8s-master ~]# cat /etc/redhat-release
CentOS Linux release 7.7.1908 (Core)
Node name
IP
k8s-master
192.168.1.86
k8s-node1
192.168.1.87
Note:
1. k8s version can be selected by yourself. Take 1.16.2 as an ex ...
Posted by bdurham on Sat, 11 Jan 2020 01:40:16 -0800
Resource object for pod in k8s (namespace, acquisition policy, restart policy, health check)
1. Resource Objects for k8s
Deployment, Service and Pod are the three core resource objects of k8s
Deployment: The controller of the most common stateless application that supports scaling, rolling upgrade, and so on.
Service: Provides a fixed access interface for flexible, life-cycle PD objects for service discovery and service access.
Pod: ...
Posted by PhotoClickr on Thu, 09 Jan 2020 11:17:29 -0800
Chapter XIII Analysis takes you through helm3 Prometheus with ease
This series of articles:
Chapter 1: Nine analysis takes you through helm3 installation easilyChapter II: Nine analyses take you through the helm3 public warehouse easily
Chapter III: Nine analyses take you through the helm3 private warehouse easily
Chapter IV: Nine analysis takes you through helm3 chart easily
Chapter V: Nine analysis takes ...
Posted by webdogjcn on Thu, 09 Jan 2020 11:12:51 -0800
How to Deeply Understand the Implementation Mechanism of EKS IAM Authenticator
1. k8s Authentication
We know that apiserver has the following authentication methods:
X509 Client Certs
Static Token File
Bootstrap Tokens
Static Password File
Service Account Tokens
OpenID Connect Tokens
Webhook Token Authentication
Authenticating Proxy
Typically, we use a binary self-built k8s cluster, or a kubeadm-created cluster, the ad ...
Posted by jenp on Tue, 07 Jan 2020 09:40:10 -0800
K8s creates resources using YAML files
Due to the popularity of K8s technology, enterprises of all sizes are using it now. Although it is not popularized, I believe it will happen sooner or later, so hurry up and learn more!
There are two ways to create resources in K8s: command line and YAML file. This blog mainly introduces the ways to use YAML file. If you need to use command li ...
Posted by pranesh on Tue, 07 Jan 2020 09:37:56 -0800
Rescue GlusterFS Distributed Storage System
After the GlusterFS distributed storage system was migrated in a previous period of time, the phenomenon of dropping lines and intermittent happened frequently, which made it unable to work properly for a long time.Observations revealed that one of the nodes was always restarting, further revealing that only one of the four nodes in the replica ...
Posted by renesis on Mon, 06 Jan 2020 01:02:34 -0800
kubernetes-1.11.0 cluster deployment node cluster (3)
kubernetes-1.11.0 cluster deployment node cluster (3)
Node configuration
The components to be deployed in a single node include docker, calico, kubelet and Kube proxy. Node node makes master HA based on nginx load API
Start a nginx on each node, and each nginx reversely proxy all API servers;
Kubelet Kube proxy on node co ...
Posted by abushahin on Wed, 01 Jan 2020 00:02:17 -0800
k83 calico network policy
Common CNI network plug-ins include the following:
Flannel: Provides network plug-in for overlay network for Kubernetes. Based on TUN/TAP tunneling technology, uses UDP to encapsulate IP messages to create overlay network. Maintains network allocation with etcd. Disadvantage: Unable to support network policy access control.Calico: A three-tier ...
Posted by celavi on Mon, 30 Dec 2019 09:57:42 -0800