Rancher 用户手册 v1.0................... 5 2.2. 操作说明 .................................................. 5 3. 镜像库凭证配置 .................................................................................................. 应用搜索查询 ............................................. 22 6.3. UI 查看应用配置 .......................................... 24 6.4. 应用配置更新 ............................................. 25 6.5. 添加附加容器(Sidecar) 查看应用 yaml 配置文件 .................................... 27 6.7. 应用配置导出 ............................................. 28 6.8. 应用容器日志查询 ......................................... 28 6.9. POD 终端登录 ...0 码力 | 35 页 | 6.47 MB | 1 年前3
企业云原生的探索与落地深圳沙龙-RacherLabs-20-11-14/应用容器化最佳实践十二因素应用(Twelve-factor App) 基准代码 依赖 配置 后端服务 构建、发布、运行 进程 端口绑定 并发 易处理 开发环境与线上环境等价 日志 管理进程 © Copyright 2020 Rancher Labs. All Rights Reserved. Confidential 应用容器化一般流程 分析解耦 基础镜像 配置管理 制作镜像 应用编排 运行测试 • 组成模块分析 应用分析解耦 ✓ 应用开发语言或平台及对应版本 ✓ 应用技术架构、运行环境及组件依赖 ✓ 应用运行包大小、一般启动时长、是否有启停脚本 ✓ 应用当前软硬件监控、调用链监控、日志分析方案 ✓ 应用当前配置管理方式、是否有健康检查接口 ✓ 应用是否实现状态数据外部化管理(如Session会话) ✓ 系统部署架构及当前生产高可用方案 ✓ 系统目前日常及特殊高峰期资源使用情况(CPU、内存等) ✓ 通过ConfigMap管理可变应用配置 一般应用普遍会有从配置文件、命令行参数或者环境变量中读取一些配置信息的需求,Kubernetes提供了 ConfigMap资源对象来实现配置管理,可以通过以下几种方式来使用ConfigMap配置Pod中的容器: • 容器 entrypoint 的命令行参数 • 容器的环境变量 • 在只读卷里面添加一个文件,应用读取 • 编写代码在 Pod 中运行,应用通过使用0 码力 | 28 页 | 3.47 MB | 1 年前3
Cloud Native Contrail Networking
Installation and Life Cycle ManagementGuide for Rancher RKE2
and third-party tools. • Scale CN2 by adding or removing nodes. • Configure CN2 by using custom resource definitions (CRDs). 2 • Upgrade CN2 software by applying updated manifests. • Uninstall CN2 by Kubernetes control plane components to manage all CN2 resources. You configure CN2 resources using custom resource definitions (CRDs). Network data plane The network data plane resides on all nodes and interacts and status monitoring. 6 Table 2: CN2 Components Pod Name Where Description Configuration Plane1 contrail-k8s-apiserver Control Plane Node This pod is an aggregated API server that is the entry point0 码力 | 72 页 | 1.01 MB | 1 年前3
Deploying and ScalingKubernetes with Rancher
.................................................................................... 7 1.3.9 Resource Monitoring .................................................................................... cluster management capabilities that can handle scheduling, service discovery, load balancing, resource monitoring and isolation, and more. For years, Google has used a cluster manager called Borg to of a larger cluster on which you can run your applications. Pod A co-located group of containers and their storage is called a pod. For example, it makes sense to have database processes and data0 码力 | 66 页 | 6.10 MB | 1 年前3
[Buyers Guide_DRAFT_REVIEW_V3] Rancher 2.6, OpenShift, Tanzu, AnthosFeature SUSE Rancher OpenShift Tanzu Anthos Active Directory and LDAP Support 4 4 4 2 Pod and Network Security Policies 4 3 2 2 Configurable Adherence to CIS 4 3 2 2 Global RBAC large scale of resource-limited and or remote locations. K3s is a lightweight Kubernetes distribution originally developed by the SUSE Rancher team that can run in remote, resource-constrained environments the Tanzu Mission Control and Tanzu Observability SaaS solutions. This solution did not consider resource-constrained environments or a management solution that does not include additional paid VMware0 码力 | 39 页 | 488.95 KB | 1 年前3
CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4(Automated) 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Automated) 1.1.2 Ensure that the API server pod specification file ownership is set to root:root 3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictive (Automated) 1.1.4 Ensure that the controller manager pod specification file ownership is set to (Automated) 1.1.5 Ensure that the scheduler pod specification file permissions are set to 644 or more restrictive (Automated) 1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root0 码力 | 132 页 | 1.12 MB | 1 年前3
CIS Benchmark Rancher Self-Assessment Guide - v2.4Worker Node Configuration Files 4.2 Kubelet 5 Kubernetes Policies 5.1 RBAC and Service Accounts 5.2 Pod Security Policies 5.3 Network Policies and CNI CIS Benchmark Rancher Self-Assessment Guide - v2.4 Node Security Configuration 1.1 Master Node Configuration Files 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable All configuration is passed in as arguments at container run time. 1.1.2 Ensure that the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE0 码力 | 54 页 | 447.77 KB | 1 年前3
CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5Worker Node Configuration Files 4.2 Kubelet 5 Kubernetes Policies 5.1 RBAC and Service Accounts 5.2 Pod Security Policies CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5 2 52 53 5.3 Network Node Security Configuration 1.1 Master Node Configuration Files 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable All configuration is passed in as arguments at container run time. 1.1.2 Ensure that the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE0 码力 | 54 页 | 447.97 KB | 1 年前3
Rancher CIS Kubernetes v.1.4.0 Benchmark Self
AssessmentThis admission controller should only be used where Pod Security Policies cannot be used on the cluster, as it can interact poorly with certain Pod Security Policies Several system services (such as Ensure that the --terminated-pod-gc-threshold argument is set as appropriate (Scored) Audit docker inspect kube-controller-manager | jq -e '.[0].Args[] | match("--terminated-pod-gc-threshold=\\d+").string' string' Returned Value: --terminated-pod-gc-threshold=1000 Result: Pass 1.3.2 - Ensure that the --profiling argument is set to false (Scored) Audit docker inspect kube-controller-manager | jq -e '0 码力 | 47 页 | 302.56 KB | 1 年前3
Hardening Guide - Rancher v2.3.3+o t h e kube-api s e c t i on u n d e r services: services: kube_api: always_pull_images: true pod_security_policy: true service_node_port_range: 30000-32767 event_rate_limit: enabled: true 8 audit_log: b e r n e t e s c on t r ol l e r m an age r . • 1. 3. 1 - E n s u r e t h at t h e --terminated-pod-gc-threshold ar gu m e n t i s s e t as ap p r op r i at e ( S c or e d ) • 1. 3. 2 - E n s u r e i f y t h e f ol l ow i n g op t i on s ar e s e t i n t h e command s e c t i on : --terminated-pod-gc-threshold=1000 --profiling=false --address=127.0.0.1 --feature-gates="RotateKubeletServerCertificate=true"0 码力 | 44 页 | 279.78 KB | 1 年前3
共 18 条
- 1
- 2













