linux部署k8s

news/2024/11/23 3:29:11/

linux部署k8s

  • 0、k8s的前世今生
  • 1、下载k8s
  • 2、k8s文档
    • 2.1、容器化部署的优越性
      • 2.1.1、Traditional deployment era
      • 2.1.2、Virtualized deployment era
      • 2.1.3、Container deployment era
  • 3、安装k8s
    • 3.1、Install kubectl on Linux
    • 3.2、

0、k8s的前世今生

参考链接: https://kubernetes.io/blog/2015/04/borg-predecessor-to-kubernetes/

1、下载k8s

下载链接: https://kubernetes.io/releases/download/#binaries

2、k8s文档

k8s介绍: https://kubernetes.io/docs/concepts/overview/

k8s下载:https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.27.md#downloads-for-v1271

k8s安装:https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/

2.1、容器化部署的优越性

在这里插入图片描述

2.1.1、Traditional deployment era

Early on, organizations ran applications on physical servers. 
There was no way to define resource boundaries for applications 
in a physical server, and this caused resource allocation issues. 
For example, if multiple applications run on a physical server, 
there can be instances where one application would take up most 
of the resources, and as a result, the other applications would 
underperform. A solution for this would be to run each 
application on a different physical server. But this did not 
scale as resources were underutilized, and it was expensive for 
organizations to maintain many physical servers.

2.1.2、Virtualized deployment era

As a solution, virtualization was introduced. It allows you to 
run multiple Virtual Machines (VMs) on a single physical server's 
CPU. Virtualization allows applications to be isolated between 
VMs and provides a level of security as the information of one 
application cannot be freely accessed by another application.Virtualization allows better utilization of resources in a 
physical server and allows better scalability because an 
application can be added or updated easily, reduces hardware 
costs, and much more. With virtualization you can present a set 
of physical resources as a cluster of disposable virtual 
machines.Each VM is a full machine running all the components, including 
its own operating system, on top of the virtualized hardware.

2.1.3、Container deployment era

Containers are similar to VMs, but they have relaxed isolation 
properties to share the Operating System (OS) among the 
applications. Therefore, containers are considered lightweight. 
Similar to a VM, a container has its own filesystem, share of 
CPU, memory, process space, and more. As they are decoupled from 
the underlying infrastructure, they are portable across clouds 
and OS distributions.

Containers have become popular because they provide extra benefits, such as:

  1. Agile application creation and deployment: increased ease and efficiency of container image creation compared to VM image use.
  2. Continuous development, integration, and deployment: provides for reliable and frequent container image build and deployment with quick and efficient rollbacks (due to image immutability).
  3. Dev and Ops separation of concerns: create application container images at build/release time rather than deployment time, thereby decoupling applications from infrastructure.
  4. Observability: not only surfaces OS-level information and metrics, but also application health and other signals.
  5. Environmental consistency across development, testing, and production: runs the same on a laptop as it does in the cloud.
  6. Cloud and OS distribution portability: runs on Ubuntu, RHEL, CoreOS, on-premises, on major public clouds, and anywhere else.
  7. Application-centric management: raises the level of abstraction from running an OS on virtual hardware to running an application on an OS using logical resources.
  8. Loosely coupled, distributed, elastic, liberated micro-services: applications are broken into smaller, independent pieces and can be deployed and managed dynamically – not a monolithic stack running on one big single-purpose machine.
  9. Resource isolation: predictable application performance.
  10. Resource utilization: high efficiency and density.

3、安装k8s

3.1、Install kubectl on Linux

https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#install-kubectl-on-linux

3.2、


http://www.ppmy.cn/news/61474.html

相关文章

ETO、MTO、ATO与MTS(按单设计、按单生产、按单装配和库存生产)

按照企业组织生产的特点,可以把制造企业划分为ETO、ATO、MTO与MTS(按单设计、按单装配、按单生产和库存生产)四种生产类型。 按单设计(Engineer To Order,ETO)   在这种生产类型下,一种产品在…

读书:《素书新解》(一)

黄石公的《素书》,分六章:原始、正道、求人之志、本德宗道、遵义、安礼,共132句,1636字。 夫道、德、仁、义、礼,五者一体也。 我问了一下ChatGPT,给出五者的更详细的解释。 道、德、仁、义、礼是中国传…

浅谈明日方舟游戏系统

主要玩法:敌方阵营从敌方初始点进入战斗并且沿着怪物前进路线行驶到己方保护目标。玩家可以通过部署干员守护己方保护目标,防止敌方阵营进入;当保护目标的生命值为0时,则战斗失败,任务结束。 1 干员系统 1.1 职业分支…

【人工智能与深度学习】基于能量的模型(续——损失函数)

【人工智能与深度学习】基于能量的模型(续——损失函数) 架构和损失泛函数设计一个好的损失函数损失函数示例能量损失 (Energy Loss)负对数似然损失 (Negative Log-Likelihood Loss)感知器损失 (Perceptron Loss)广义边际损失示例合页损失 (Hinge Loss)对数损失(Log Loss)平…

身份鉴别解读与技术实现分析(1)

6.1.4.1 身份鉴别 本项要求包括: a) 应对登录的用户进行身份标识和鉴别,身份标识具有唯一性,身份鉴别信息具有复杂度要求并定期更换; b) 应具有登录失败处理功能,应配置并启用结束会话、限制非法登录次数和当登录连接超时自动退出等相关措施 在等级保护体系中,级别越高…

k8s二进制安装部署(详细)(3主2从)

目录 kubeadm 和二进制安装 k8s 适用场景分析 多 master 节点高可用架构图 集群环境准备 部署过程 修改主机内核参数(所有节点) 配置阿里云的repo源(所有节点) 配置国内安装 docker 和 containerd 的阿里云的 repo 源 配置…

【Java开发】Spring Cloud 11:Gateway 配置 ssl 证书(https、http、域名访问)

最近研究给微服务项目配置 ssl 证书,如此才可以对接微信小程序(需要使用 https 请求)。传统单体项目来说,首先往项目中添加证书文件,然后在配置文件中配置 ssl 证书路径、密码等相关信息;那么微服务这么多项…

php脚本自动跳转地址的代码几种写法

PHP实现URL地址跳转的几种方法代码 实例&#xff1a;一行URL跳转代码 PHP <? $url$_GET[“url”];header(“Location:”.”http://”.$url);?> 2. PHP <?php $url $_GET[‘url’]; Header(“Location:$url”); ?> 如保存为aaa.php,可以实现aaa.php?urlw…