Kubereters

An open-source system for automating deployment, scaling, and management of containerized applications;

Traditional >> Hypervisor >> Container

Traditional:

  No way to define resource boundaries for applications in a physical server before, run each applications on a different physical server;

Hypervisor:

  Will run multi VMs on a single physical server's CPU;

  Allow applications to be isolated between VMs and provides a level of securiy as the infomation of one application cannot be freely accessed by another     application;

  Each VM is a full machine running all the components, including its own operating system;

Container:

  Have relaxed isolation properties to share the operating system among the applications;

  Lightweight;

  A container has its own filesytem/CPU/memory/process space/..

  Are portable across clouds and OS distributions because they are decoupled from the underlying infrastrucure;

  Benifits of containers:

    1. Agile application creation and deployment: increased ease and efficiency of container image creation compared to VM image use

    2. Continuous development, integrations and deployment:

      provide for reliable and frequent container image build and deployment with quick and easy rollbacks;

    3. Dev and Ops separation of concerns: create application container images at build/release time rather than deployment time, thereby decoupling applications from infrastructure;

    4. Obervability not only surfaces OS-level information and metrics, but also application health and other signals;

    5. Environmental consistency across development, testing, and production; Runs the same on a laptop as it does in the cloud;

    6. Cloud and OS distribution portabilty: Runs on Ubuntu, RHEL, CoreOS, on-prem, Google Kubernetes Engine, and anywhrere else;

    7. Application-centric management;

    8. Loosely coupled, distributed;

    9. Resource isolation;

    10. Resource utilization;

Benefits of Kubernetes:

  1.  Service discovery and load balancing    

      kubernetes expose a container using the DNS name or using their own IP address;

      if traffic to a container is high, kubernetes is able to load balance and distribute the network traffic so that the deployment is stable;

  2.  Stroage orchestartion

      automatically mount a storage system of local storages/public cloud providers/..

  3.  Automated rollouts and rollbacks

      automake kubernets to create new containers

  4.  Self-healing

      restart fail containers, kill no-respond containers;

  5.  Automatic bin packing

      tell kubernetes how much CPU and RAM each container needs, kubernets can fit containers onto your nodes to make the best use of you resources;

Kubernetes Master

When deploying kubernetes, we wil get a cluster, which is a set of machines (nodes),

that run containerzed applications managed by kubernetes.

A cluster has at least one worker node and at least one master node;

Kubernetes Master is a collection of three processes that run on a single node in your cluster, which is designed as the master node;

Three processes:

  Kube-apiserver;

  Kube-controller-manager;

  Kube-scheduler;

Individual non-master node in cluster run two processes:

  kubelet

    which communicates with the Kubernetes Master;

    The primary node agent that runs on each node; It can register the node with tha apiserver using one of

      the host name;

      a flag to override the hostname;

      specific logic for a cloud provider;

    

  kube-proxy

    a network proxy which reflects Kubernetes networking services on each node;

    Kubernets network proxy runs on each node, this relects services as defined in the Kubernetes API on each node

    and can do simple TCP/UDP and SCTP stream forwarding or round robin TCP/UDP/SCTP forwarding across a set of backends/

    Service cluster IPs and ports are currently found through Docker-links-compatible   

 

Kubernetes Objects

Kubernetes contains serveral abstractions representing the state of system;

Basic Kubernetes objects include:

Kata-container

An open-source project and community working to build a standard implement of lightweight VM that feel and perform like containers, but provide the workload isolation and security advantages of VMs;

Kata container Components

  • Agent      -- The Kata-agent runs inside the virtual machine and sets up the container environment
  • KSM throttler   -- An optional utility that monitors containers and deduplicates memory to max container density on a host
  • Proxy      -- A process running on the host and co-ordinates access to the agent running inside the VM
  • Runtime     -- Be invoked by a container manager and provides high-level verbs to manage containersd
  • Shim        -- A process that runs on the host, acts as though it is the workload ( which actually runs inside the VM), required to be compliant with th expecations of the OCI runtime sepc
  • Hypervisor    --
  • Kernel      -- HV uses a linux kernel to boot the guest image

Docker

Following storage drivers:

  • overlay2     is the preferred storage driver, for all currently supported linux distributions, and requires no extra conf
  • aufs       is the preferred stroage driver for Docker 18.06 or older, when running on Ubuntu 14 on Kernel 3.13 which has no support or ovrlay2
  • devicemapper   is supported, but requires direct-lvm for production environments, because loopback-lvm, while zero-conf, has very poor performance.

Basic concepts of docker/kubernete/kata-container的更多相关文章

  1. Kata Container 介绍

    docker容器,性能高,不安全:VM虚拟机,安全性好,性能损耗大:Kata Container轻量级虚拟机的容器,即安全,性能也高. 开源容器项目Kata Containers,旨在将虚拟机(VM) ...

  2. Basic Concepts of Block Media Recovery

    Basic Concepts of Block Media Recovery Whenever block corruption has been automatically detected, yo ...

  3. docker的网络-Container network interface(CNI)与Container network model(CNM)

    Overview 目前围绕着docker的网络,目前有两种比较主流的声音,docker主导的Container network model(CNM)和社区主导的Container network in ...

  4. (二)Basic Concepts 基本概念

    Basic Concepts There are a few concepts that are core to Elasticsearch. Understanding these concepts ...

  5. Docker入门03——Container

    1 启动容器 1.1 新建并启动 1.2 启动已终止容器 2 后台运行 3 终止 4 进入容器 5 导入和导出 5.1 导出 5.2 导入 6 删除 1 启动容器 1.1 新建并启动 docker r ...

  6. CMUSphinx Learn - Basic concepts of speech

    Basic concepts of speech Speech is a complex phenomenon. People rarely understand how is it produced ...

  7. docker Cannot start container [8] System error: exec format error

    docker Cannot start container  [8] System error: exec format error 学习了:https://www.aliyun.com/jiaoch ...

  8. Docker 容器(container)

    版权所有,未经许可,禁止转载 章节 Docker 介绍 Docker 和虚拟机的区别 Docker 安装 Docker Hub Docker 镜像(image) Docker 容器(container ...

  9. Docker实现退出container后保持继续运行的解决办法

    现象: 运行一个image,例如ubuntu14.04: 1 docker run -it --rm ubuntu:14.04 bash 退出时: 执行Ctrl+D或者执行exit 查看线程: 1 d ...

随机推荐

  1. openjudge4979 - 海贼王之伟大航路 题解

    原题链接 题目简要分析 N个点,从1号点到N号点求最短路径,且每个点都要遍历到.现在要你求出最优方案. 这道题看到后,首先的想法莫过于搜索.暴力了.这显然不太可能.而进一步思考,使用Floyed和Di ...

  2. PHP中YUM的理解

    1. YUM是什么? 1)全称:Yellow dog Updater ,Modified. 2)百度简述:是一个在Fedora和RedHat以及CentOS中的Shell前端软件包管理器.基于RPM包 ...

  3. Python中的sync和wait函数的使用

    转自这篇博文,备忘: https://blog.csdn.net/Likianta/article/details/90123678 https://www.cnblogs.com/xinghun85 ...

  4. .NET Core微服务学习-DotNetty

    DotNetty介绍: DotNetty是Azure团队仿照(几乎可以这么说)JAVA的Netty而出来的(目前已实现Netty的一部分),目前在Github上的Star有1.8K+, 地址:http ...

  5. 数组中[::-1]或[::-n]的区别,如三维数组[:,::-1,:]

    import numpy as npa=np.array([[11,12,13,14,15,16,17,18],[21,22,23,24,25,26,27,28],[31,32,33,34,35,36 ...

  6. Java8stream表达式

    // 输出:hello System.out.println(Optional.ofNullable(hello).orElse("hei")); // 输出:hei System ...

  7. 【高并发解决方案】8、Nginx/LVS/HAProxy负载均衡软件的优缺点详解

    PS:Nginx/LVS/HAProxy是目前使用最广泛的三种负载均衡软件,本人都在多个项目中实施过,参考了一些资料,结合自己的一些使用经验,总结一下. 一般对负载均衡的使用是随着网站规模的提升根据不 ...

  8. js基础闭包练习题

    题目描述 实现函数 makeClosures,调用之后满足如下条件:1.返回一个函数数组 result,长度与 arr 相同2.运行 result 中第 i 个函数,即 result[i](),结果与 ...

  9. CI隐藏入口文件index.php

    1.需要apache打开rewrite_module,然后修改httpd.conf的AllowOverride none 为AllowOverride All(里面,不同的环境目录不同) 2.在CI的 ...

  10. 木马防杀 花指令 OllyDbg

    打开木马 入口地址 添加花指令 全0的地方,可以插入花指令 保存为可执行文件 随便选择几行,右击 保存文件