QCon北京2017/智能化运维/Self Hosted Infrastructure:以自动运维 Kubernetes 为例cluster Need an initial control plane to bootstrap a self-hosted cluster Bootkube: ● Acts as a temporary control plane long enough to be replaced by a self-hosted control plane. ● Run only on very loss of control plane components (Kubernetes) Power cycling the entire control plane (Kubernetes) Permanent loss of control plane (External tool) Disaster Recovery Permanent loss of control plane ●0 码力 | 73 页 | 1.58 MB | 1 年前3
多雲一體就是現在:
GOOGLE CLOUD 的
KUBERNETES
混合雲戰略installation ● Private container registry support ● Latest 3 versions of k8s ● High-availability control plane ● Auto-repair Installation and Configuration $ gke-on-prem create cluster --dry-run Welcome gke-on-prem-vsphere-1.10.3... DONE Path to kubeconfig for the GKE On-Prem Admin Control Plane (leave empty to create it): A GKE On-Prem Control Plane will be created. Would you like to use existing CA? [1] I'll GCP Services Google Kubernetes Engine Node Control Plane Node “Bring-your-own” Kubernetes Node Control Plane Node GKE On-Prem Node Control Plane Node Hybrid Use Cases Legacy Software Local0 码力 | 32 页 | 2.77 MB | 1 年前3
k8s操作手册 2.3kubeadm init --config /etc/kubeadm-init.yaml #初始化集群 当出现Your Kubernetes control-plane has ini�alized successfully!这行时说明初始化 k8s成功了 记住最后2行命令,是用来让node结点加入集群的命令(含token) ★第2章、部署k8s版本>=1 kubeadm init --config /etc/kubeadm-init.yaml #初始化集群 当出现Your Kubernetes control-plane has ini�alized successfully!这行时说明初始化 k8s成功了 记住最后2行命令,是用来让node结点加入集群的命令(含token) ★附、crictl命令 csi-node-driver-fn7zd 2/2 Running 2 (10m ago) 11m # Remove the taints on the control plane so that you can schedule pods on it. # kubectl describe node master1.cof-lee.com | grep0 码力 | 126 页 | 4.33 MB | 1 年前3
第29 期| 2023 年9 月- 技术雷达© Thoughtworks, Inc. All Rights Reserved. 采纳 42. dbt 43. Mermaid 44. Ruff 45. Snyk 试验 46. AWS Control Tower 47. Bloc 48. cdk-nag 49. Checkov 50. Chromatic 51. Cilium 52. 云服务的碳足迹 53. 容器结构测试 54. Devbox Thoughtworks, Inc. All Rights Reserved. 工具 采纳 42. dbt 43. Mermaid 44. Ruff 45. Snyk 试验 46. AWS Control Tower 47. Bloc 48. cdk-nag 49. Checkov 50. Chromatic 51. Cilium 52. 云服务的碳足迹 53. 容器结构测试 54. Devbox Thoughtworks, Inc. All Rights Reserved. 27 46. AWS Control Tower 试验 在 AWS 中,多团队的账户管理是一项挑战,尤其是在设置和治理方面。AWS Control Tower 通过简化设置和自 动化治理来应对这个挑战,并通过防护措施应对监管要求。AWS Control Tower 内置了一个账户工厂,帮助自 动化账户的配置流程。您可以通过账户工厂0 码力 | 43 页 | 2.76 MB | 1 年前3
Kubernetes Native DevOps PracticeArchitecture and Features • CRD and operator design • Pipeline / Stage/ Task / Task Template / Version Control • Logging, monitoring, autoscaling, high availability • Extensibility / Integration • CI/CD Architecture and Features • CRD and operator design • Pipeline/Stage/Task/Task Template/Version Control/UI generation/Volume... • Logging, monitoring, autoscaling, high availability • Extensibility/Integration Job status Pipeline / Stage / Task Task Template Pipeline / Stage / Task build logs Version Control sync / watch clean history jobs Basic Concepts(partial) Repository Managed Project Pipeline0 码力 | 21 页 | 6.39 MB | 1 年前3
Amazon Elastic Kubernetes Service (EKS) 初探秘its Affiliates. All rights reserved. Amazon Confidential Amazon EKS 服务路线图摘要 已发布 - Amazon EKS control plane logs - Support for public IP space in VPC - Amazon EKS: Deep Learning Benchmarking Utility NODE 配置 升级 加固 监控 NETWORK 配置 VPC 网络策略 路由表 NACLs 数据 网络流量保护 客户端加密 服务端加密 EKS CONTROL PLANE CONTROL PLANE 配置 PRIVATE CONTROL RBAC 策略 © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved0 码力 | 39 页 | 1.83 MB | 1 年前3
Model and Operate Datacenter by Kubernetes at eBay (提交版)PoP Database Frontend VM Kubernetes plays magic api etcd kind: metadata: spec: control loop control loop control loop container VIP volume W I S B : W h a t i t s h o u l d b e Converge0 码力 | 25 页 | 3.60 MB | 1 年前3
vmware组Kubernetes on vSphere Deep Dive KubeCon China VMware SIGalso supports an underlying tier of high availability and automated placement options, for both control plane and worker nodes. 2 levels of scheduling and resource management are active. Currently enforcement takes place Kubernetes -> container runtime -> Linux -> hypervisor (optional) Kubernetes control plane manages desired policy. Enforcement passes Pod -> container runtime -> Linux OS Cgroups trigger automated evacuation before host failure. 25 Configuring HA restart priority Ensure etcd, control plane starts first, and Prodsystems before others0 码力 | 25 页 | 2.22 MB | 1 年前3
VMware SIG Deep Dive into Kubernetes Schedulingalso supports an underlying tier of high availability and automated placement options, for both control plane and worker nodes. 2 levels of scheduling and resource management are active. Currently no enforcement takes place Kubernetes -> container runtime -> Linux -> hypervisor (optional) Kubernetes control plane manages desired policy. Enforcement passes Pod -> container runtime -> Linux OS Cgroups are trigger automated evacuation before host failure. 26 Configuring HA restart priority Ensure etcd, control plane starts first, and Prodsystems before others 27 The VMware SIG Charter Link to join group:0 码力 | 28 页 | 1.85 MB | 1 年前3
Kubernetes安全求生指南©2019 VMware, Inc. 7 關閉公開存取 (Disable public access) 實施角色型存取權控管 (Implement role-based access control) 將 Kubernetes密鑰加密 (Encrypt secrets at rest) 設置 Kubernetes 的許可控制器 (Configure admission controllers) org/benchmark/kubernetes/ 控制措施 如何查核 如何查核 參考資訊 預設配置 原因理由 如何查核 1. 控制平面元件 (Control Plane Components) 2. etcd 狀態資料庫 3. 控制平面設置 (Control Plane Configuration) 4. 工作節點 (Worker Node) 5. 政策 (Policies) ©20190 码力 | 23 页 | 2.14 MB | 1 年前3
共 23 条
- 1
- 2
- 3













