Linux/Kubernetes (Learning): Difference between revisions

From Wiki
mNo edit summary
mNo edit summary
Line 43: Line 43:
== Helm charts ==
== Helm charts ==


= Admin tasks =
== Networking ==
== Networking ==
* Ingress
* Ingress
Line 53: Line 54:
* soft network isolation
* soft network isolation
* hard network isolation
* hard network isolation
== Access management ==
* role based access control
* role, clusterrole, rolebinding, clusterrolebinding
* serviceaccounts
* kubeconfig
* client certificates
* auth services
== Backups ==
* volumes
* etcd
* secrets
== K8s Operators ==
* deploy
* user operators
== Monitoring ==
*
== Best practices ==
= User/developere tasks =
== Deployment of applications ==
* replication
* scaling up/down
* readiness/liveness probes
* init containers
== Deployment strategies ==
* canary
* blue-green
* rolling updates
== CI/CD integration ==
== Application networking ==
* Service mesh, ingress
* connections within the cluster
* Service Mesh, Message Broker


[[Category:Linux/Deployment]]
[[Category:Linux/Deployment]]
[[Category:Linux]]
[[Category:Linux]]

Revision as of 13:15, 3 December 2023

Learning topics

Control plane & worker nodes

Components

Core K8s components Other K8s components
  • pod
  • service
  • config maps
  • secrets
  • ingress
  • deployment
  • statefulSets
  • Namespaces
  • Volumes
  • control plane
    • scheduler
    • controller-manager
    • etcd
    • apiserver
  • node
    • kubelet
    • kube-proxy
    • container runtime

Practice

  • kubectl
  • manifest files (yml)

Troubleshooting & how it works

Bad practices

Helm charts

Admin tasks

Networking

  • Ingress
  • Network policies
  • pod-to-pod
  • pod-to-service
  • K8s network interface
  • network plugins
  • cluster DNS
  • soft network isolation
  • hard network isolation

Access management

  • role based access control
  • role, clusterrole, rolebinding, clusterrolebinding
  • serviceaccounts
  • kubeconfig
  • client certificates
  • auth services

Backups

  • volumes
  • etcd
  • secrets

K8s Operators

  • deploy
  • user operators

Monitoring

Best practices

User/developere tasks

Deployment of applications

  • replication
  • scaling up/down
  • readiness/liveness probes
  • init containers

Deployment strategies

  • canary
  • blue-green
  • rolling updates

CI/CD integration

Application networking

  • Service mesh, ingress
  • connections within the cluster
  • Service Mesh, Message Broker