VMware SIG Deep Dive into Kubernetes Schedulinglabels to affect the scheduler’s placement of pods. This is used to spread pods across availability zones, while still respecting resource access and availability concerns. When Kubernetes runs on vSphere Agenda 4 Kubernetes default scheduling How it works Utilizing Zones to improve scheduling Using vSphere tags to define regions and zones – add cloud provider What is NUMA? How to solve potential issues ranking is driven by priorities - this is extensible and configurable with a default list (e.g. zones) 8 Kubenetes scheduling What does the scheduler do: As pod are created, they are place in a queue0 码力 | 28 页 | 1.85 MB | 1 年前3
vmware组Kubernetes on vSphere Deep Dive KubeCon China VMware SIGlabels to affect the scheduler’s placement of pods. This is used to spread pods across availability zones, while still respecting resource access and availability concerns. When Kubernetes runs on vSphere 4 Kubernetes default scheduling How it works Utilizing Zones to improve scheduling Using vSphere tags to define regions and zones – add cloud provider What is NUMA? How to solve potential ranking is driven by priorities - this is extensible and configurable with a default list (e.g. zones) 8 Kubenetes scheduling What does the scheduler do: As pod are created, they are place in a queue0 码力 | 25 页 | 2.22 MB | 1 年前3
Over engineeringthe core of Kubernetes kopsClusterName }} {{ end }} # --------------------------------------------------------------- # Zones (Availability Zones) # # For every availability zone # - 1 Utility/Public subnet # - 1 NGW for the instances) # --------------------------------------------------------------- {{ range $zone := .Zones }} # --------------------------------------------------------------- # Utility Subnet # # This ClusterName }} {{ end }} # --------------------------------------------------------------- # Zones (Availability Zones) # # For every availability zone # - 1 Utility/Public subnet # - 1 NGW for the0 码力 | 75 页 | 4.56 MB | 1 年前3
Kubernetes 异常配置检测框架安装自动运维工具 自动安装依赖 firewalld 网络未知原因导致异常 Node Pod eth0 调用 iptables 增加阻断规则 FORWARD_IN_ZONES_SOURCE FORWARD_OUT_ZONES 容器网络不通 异常 VS 异常检测 ? 云原生操作系统 自检 安全模式 检测工具 … 操作系统 NPD 运行模式 • 集群节点(DaemonSet0 码力 | 31 页 | 9.57 MB | 1 年前3
Kubernetes开源书 - 周立译者按:可⽤区举例:AWS可⽤区:http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions- availability-zones.html 在可⽤区之间传播Node的⼀个关键原因是:当整个区域停⽌时,⼯作负载可以转移到健康区域。因此,当⼀个区域中 的所有Node都不健康时,那么Node Controller就以正常速率 容器的源码: http.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) { duration := time.Now().Sub(started) if duration.Seconds() > 10 { w.WriteHeader(500) w.Write([]byte(fmt yaml⽂件上,调⽤ kubectl replace -f 也可实现相同的效果。 27-Ingress Resources 128 Failing across availability zones(跨可⽤区的故障) 不同cloud provider之间,跨故障域的流量传播技术有所不同。有关详细信息,请查看Ingress Controller相关的⽂档。 有关在federated clu0 码力 | 135 页 | 21.02 MB | 1 年前3
VMware SIG Intro to the vSphere Cloud ProviderProvider Why it exists Handles C/R/U/D of storage volumes Coordinate storage with availability zones Controls advanced storage functionalities like Snapshots A plug-in mechanism • allows Kubernetes0 码力 | 12 页 | 425.38 KB | 1 年前3
K8S安装部署开放服务spec: volumes: - name: host-time hostPath: path: "/etc/localtime" volumeMounts: - name: host-time mountPath: "/etc/localtime" volumes: - name: host-time hostPath: path: "/etc/localtime" volumeMounts: //注意有多个! - name: host-time mountPath: "/etc/localtime" volumes: - name: host-time hostPath: path: "/etc/localtime" volumeMounts: //注意有 5 处 - name: host-time mountPath: "/etc/localtime"0 码力 | 54 页 | 1.23 MB | 1 年前3
Advancing the Tactical Edge with K3s and SUSE RGSinnova- tive edge computing solution, SmartEdge, addresses the increasing need to gather data in real time and perform analysis at the point of collection, supplying imme- diate insight which results in faster as battlefields. The an- alytics enabled and performed by Smart- Edge allow battalions to make real-time, data-driven decisions which dramatically improve operational outcomes and in- crease the probability battlefield, “At the tactical edge, time is a weapon. With edge computing and pro- cessing at the point of data collection, we will give warfighters access to real-time, data-driven insights so they can0 码力 | 8 页 | 888.26 KB | 1 年前3
秘钥管理秘钥Turtles all the way down - Securely managing Kubernetes Secretsconfigurations, API keys, and other small bits of information needed by applications at build or run time Why protect secrets? ● Attractive target ○ Controls access or use of sensitive resources ● Common compromised ○ Time available for attempts to penetrate physical, procedural, and logical access ○ Time available for computationally intensive cryptanalytic attacks ● A cryptoperiod is the time during which for keys that have reached the end of their cryptoperiod (for example, after a defined period of time has passed and/or after a certain amount of cipher-text has been produced by a given key) https://www0 码力 | 52 页 | 2.84 MB | 1 年前3
在大规模Kubernetes集群上实现高SLO的方法which can represent user experience. SLO is the object that try to meets all SLIs in a period of time. SLA = SLO + Punishment. SLA/SLO/SLI What we concern about Large k8s Cluster What happened about unhealthy nodes may not be delivered in time, success rate would decrease consequently. 4. Centralized Components Availability A ratio value indicates the time in which the cluster is available. It is master components. The success standard and reason classification The success standard: Pod Feature Time limit Success condition Pod RestartPolicy=Always 1min (example value) the status of {.Status.Conditions0 码力 | 11 页 | 4.01 MB | 1 年前3
共 25 条
- 1
- 2
- 3













