Understand Azure Kubernetes Service Architecture and Components

CloudA2Z
28 Mar 202021:52

Summary

TLDRIn this video series, the speaker introduces Azure Kubernetes Service (AKS), a powerful tool for managing containerized applications. The series covers the basics of AKS, comparing it with Google's Kubernetes, and delving into its features like RBAC, scaling, and monitoring. Over eight videos, viewers will learn to deploy, troubleshoot, and optimize AKS clusters, with a focus on making applications scalable and cloud-agnostic. The series aims to provide hands-on experience with AKS, including integration with tools like Prometheus and Grafana, and managing multi-tenant environments.

Takeaways

  • πŸš€ Introduction to a new series on Azure Kubernetes Service (AKS), focusing on building and understanding AKS from scratch.
  • πŸ”„ Kubernetes (K8s) is highlighted as a crucial technology for deploying scalable, cloud-agnostic applications, overcoming challenges of bare-metal dependencies.
  • 🌐 The series will cover 8 videos, focusing on key topics like understanding AKS, setting up clusters, troubleshooting, and using Azure CLI for deployment.
  • πŸ”§ Explanation of non-Role-Based Access Control (RBAC) clusters and how to manually create AKS clusters with different configurations.
  • βš™οΈ Troubleshooting techniques are discussed, including diagnosing issues like pod crashes and using Azure Monitor, Log Analytics, and Application Insights.
  • πŸ’» The series will delve into interacting with RBAC-enabled clusters using CLI, exploring concepts like nodes, pods, namespaces, and containers.
  • πŸ“Š Monitoring multi-tenant AKS clusters with tools like Prometheus and Grafana to ensure data isolation and provide customer-specific insights.
  • πŸ” Integration of Grafana dashboards with Azure Active Directory and the importance of application-specific monitoring for troubleshooting.
  • πŸ’° Discussion on cost management in multi-tenant AKS clusters, using tools like Kubecost to calculate and allocate costs based on cluster usage.
  • πŸ”’ Emphasis on security best practices, including the use of ingress controllers and app gateways to securely route traffic within AKS clusters.

Q & A

  • What is the main focus of the video series mentioned in the script?

    -The video series focuses on Azure Kubernetes Service (AKS), covering its features, differences from other Kubernetes services, and how to implement and troubleshoot AKS clusters.

  • Why did the speaker take a break before creating this new video series?

    -The speaker took a break to develop content that is useful and addresses real-life challenges in executing tasks, specifically related to AKS and Kubernetes.

  • What is Kubernetes, and how is it beneficial for application deployment?

    -Kubernetes is a platform for automating the deployment, scaling, and management of containerized applications. It allows for easy deployment, scaling, and management of applications, which can run on various environments like virtual machines, on-premises, or in the cloud.

  • How does Azure Kubernetes Service (AKS) differ from Google Kubernetes Engine (GKE)?

    -AKS is managed by Azure and includes specific components like the control plane managed by Azure, while Google Kubernetes Engine (GKE) is managed by Google. The video series will explore these differences and the advantages and limitations of using AKS over GKE.

  • What is the purpose of creating an RBAC-enabled AKS cluster?

    -An RBAC (Role-Based Access Control) enabled AKS cluster is created to manage permissions and access controls more effectively. It ensures that only authorized users can access and manage the Kubernetes resources within the cluster.

  • What is the significance of namespaces in Kubernetes?

    -Namespaces in Kubernetes are used to logically group and isolate resources within a cluster. They help in managing and organizing the deployment of different applications and resources within a Kubernetes cluster.

  • What are some of the key topics covered in the video series?

    -The series covers various topics, including understanding AKS, spinning up AKS clusters, troubleshooting issues, deploying clusters via the Azure portal and CLI, interacting with RBAC-enabled clusters, monitoring solutions, and cost management for multi-tenant AKS clusters.

  • What monitoring solutions are mentioned for AKS in the script?

    -The script mentions using Azure Monitor, Log Analytics, Prometheus, and Grafana for monitoring AKS clusters. These tools help in tracking application-specific and customer-specific data, especially in multi-tenant environments.

  • Why is data isolation important in a multi-tenant AKS cluster?

    -Data isolation is crucial in a multi-tenant AKS cluster to ensure that each tenant's data is kept separate and secure, preventing one tenant's data from being accessed by another tenant. This is important for maintaining data privacy and security.

  • How does the script describe handling ingress traffic in AKS?

    -Ingress traffic in AKS is managed through an ingress controller, which maps DNS to the services running within the cluster. This setup ensures that external traffic is securely routed to the correct applications within the AKS cluster.

Outlines

00:00

πŸŽ₯ Introduction to Kubernetes and the Series Overview

The speaker introduces a new video series focused on Kubernetes (often referred to as 'K8s'), particularly the Azure Kubernetes Service (AKS). They highlight the importance of creating practical solutions to real-world challenges, specifically in cloud computing and scalability. The speaker discusses the differences between AKS and Google Kubernetes Engine (GKE), emphasizing the cloud-agnostic nature of AKS. The series will consist of at least eight videos, covering fundamental concepts like deploying applications on Kubernetes, understanding key terminologies, and exploring the advantages of AKS over other platforms.

05:01

πŸ”§ Kubernetes Troubleshooting and Cluster Deployment

This paragraph delves into the series' content, specifically troubleshooting Kubernetes clusters and deploying AKS clusters using both the Azure portal and command-line interfaces (CLI). It discusses the role of clusters, nodes, namespaces, and other Kubernetes components. The speaker emphasizes the importance of understanding RBAC (Role-Based Access Control) for secure and efficient cluster management. Troubleshooting techniques will be explored, focusing on monitoring tools like Azure Monitor and Application Insights to diagnose and resolve issues within the cluster.

10:01

πŸš€ Advanced Kubernetes Deployment and Multi-Tenant Solutions

This section covers more advanced topics such as deploying Kubernetes clusters with multi-tenant support. It discusses the need for data isolation and customer-specific monitoring when using a shared cluster. The speaker mentions integrating Prometheus and Grafana for detailed monitoring and analysis, ensuring that each tenant's data remains secure and separate. The paragraph highlights the importance of cost management, particularly in a multi-tenant environment, and the role of tools like KubeCost in providing insights into resource usage and expenses.

15:05

πŸ”’ Ingress Controllers and Secure Traffic Management in AKS

Here, the focus shifts to traffic management within AKS clusters, particularly the use of ingress controllers to route external traffic to the appropriate Kubernetes pods. The speaker explains how DNS mapping and secure communication protocols like SSL can be implemented to protect applications. They emphasize the need for careful management of public IPs and suggest using app gateways to enhance security. The concept of ingress controllers is further explored, including how they work with Kubernetes API servers and how admins can manage traffic flow effectively.

20:05

πŸ› οΈ Understanding the AKS Control Plane and Node Management

This final paragraph provides an in-depth explanation of the AKS control plane, managed by Azure, and how it interacts with nodes within the cluster. The speaker explains the responsibilities of cluster administrators in managing node size, scaling, and configuring autoscale settings. They describe the role of the Kubernetes API server, controller manager, and etcd storage in managing the cluster’s operations. The paragraph also touches on the billing implications of node management and how customers can optimize costs by adjusting their node configurations.

Mindmap

Keywords

πŸ’‘AKS (Azure Kubernetes Service)

AKS is a managed Kubernetes service offered by Microsoft Azure, allowing users to deploy, manage, and scale containerized applications using Kubernetes. In the video, AKS is discussed as a tool to make applications more scalable and cloud-agnostic, with a focus on its differences from Kubernetes services provided by other platforms like Google.

πŸ’‘Kubernetes

Kubernetes is an open-source platform designed to automate deploying, scaling, and operating application containers. The video explores how Kubernetes allows for the rapid deployment of applications and how Azure Kubernetes Service (AKS) builds on this foundation to offer cloud-native benefits like easier scaling and management.

πŸ’‘Containerization

Containerization involves encapsulating an application and its dependencies into a container, which can run consistently across different environments. The video highlights how Kubernetes and AKS use containerization to manage applications more efficiently, making them independent of underlying hardware or operating systems.

πŸ’‘Pods

Pods are the smallest deployable units of computing that can be created and managed in Kubernetes. Each pod contains one or more containers. The video discusses how pods are grouped under namespaces and are critical for running applications within a Kubernetes or AKS cluster.

πŸ’‘Namespaces

Namespaces in Kubernetes are used to logically separate resources within a cluster, providing a scope for names. This concept is emphasized in the video as a way to organize and manage resources such as pods and containers, particularly in multi-tenant environments.

πŸ’‘Ingress Controllers

Ingress Controllers manage external access to the services in a Kubernetes cluster, typically through HTTP. The video details how ingress controllers are used in AKS to route traffic to the appropriate pods, making them essential for exposing applications to external users securely.

πŸ’‘RBAC (Role-Based Access Control)

RBAC is a method of regulating access to computer or network resources based on the roles of individual users within an organization. The video explains the importance of RBAC in securing AKS clusters, particularly when setting up and managing permissions in a multi-tenant environment.

πŸ’‘Virtual Machine Scale Sets (VMSS)

VMSS in Azure allows you to create and manage a group of load-balanced VMs. The video covers how AKS uses VMSS to scale the underlying infrastructure of the Kubernetes clusters, providing the compute power needed to run the pods and containers.

πŸ’‘Multi-Tenancy

Multi-tenancy refers to a software architecture where a single instance of software runs on a server and serves multiple tenants. The video discusses the challenges of implementing multi-tenancy in AKS, particularly in ensuring data isolation and secure access between different customers sharing the same cluster.

πŸ’‘Cost Management

Cost Management in AKS involves tracking and optimizing the expenses associated with running Kubernetes clusters. The video highlights the importance of tools like KubeCost for monitoring resource usage and calculating costs in a multi-tenant AKS environment, allowing stakeholders to manage and reduce operational expenses effectively.

Highlights

Introduction to a new video series on Azure Kubernetes Service (AKS) that covers deploying and scaling applications with Kubernetes.

Explains the concept of AKS, focusing on how it differs from Kubernetes services provided by Google and other platforms.

The importance of AKS in making applications scalable and cloud-agnostic by removing dependencies on specific operating systems or hardware.

Discussion on the ease of deploying and scaling applications within seconds using Kubernetes, emphasizing its impact on modern IT operations.

Overview of the eight-video series, which will cover various aspects of Kubernetes, including terminology, cluster creation, and application deployment.

Details on creating a non-RBAC (Role-Based Access Control) enabled AKS cluster and understanding key parameters during the process.

Explanation of basic Kubernetes concepts like namespaces, pods, clusters, and how they relate to AKS.

Introduction to RBAC-enabled AKS clusters, including the need for Azure AD apps, API permissions, and other configurations.

Coverage of troubleshooting issues with AKS clusters, such as crash loopback errors, and using Azure monitoring tools like Azure Monitor and Application Insights.

Discussion on deploying AKS clusters via CLI using Cloud Shell and the advantages it offers over manual portal deployment.

The importance of monitoring solutions for AKS, especially in multi-tenant environments, and the introduction of Prometheus and Grafana for enhanced monitoring.

Detailed explanation of multi-tenant AKS clusters, including data isolation, monitoring customer-specific data, and integration with Prometheus and Grafana dashboards.

Introduction to cost management in multi-tenant AKS clusters using tools like KubeCost to calculate usage and billing for individual tenants.

Explanation of how Kubernetes masters are managed by Azure in AKS, focusing on the differences in control and billing compared to Google Kubernetes Engine (GKE).

Overview of the AKS control plane components like the API server, scheduler, and controller manager, and how they interact with nodes and pods.

Transcripts

play00:00

hey guys so after a long time that you

play00:03

guys back with some more excitement

play00:06

series so this time we're gonna talk

play00:09

about a case from scratch so I took a

play00:13

time a while a break before making many

play00:17

videos I've talked to you know they make

play00:20

something useful because basically we

play00:23

require to you know always make

play00:26

solutions around the challenges which we

play00:29

face day to day life and executing

play00:32

executing your particular tasks so a

play00:35

case is a the booming consul booming

play00:39

concept which has come up so a case is

play00:41

nothing but I should Cuban at his

play00:43

service so what is that you community

play00:45

service does so and how it is different

play00:48

from different you know the Cuban IT

play00:51

service from the Google itself okay so

play00:53

and this particular series we're gonna

play00:56

talk a lot about a kiss and we'll have a

play01:02

lot of hands-on on integration like if

play01:05

your organization is selecting or

play01:07

picking up a solution for picking up a

play01:12

solution to build a case or a security

play01:15

service why you would require as your

play01:18

community service because I would

play01:21

trigger a required because you know I

play01:22

have applications which are running on a

play01:25

virtual machine or which are running on

play01:26

on-premise and I want to make it more

play01:29

scalable and more cloud agnostic okay

play01:32

sorry to make cloud agnostic you need to

play01:35

cut out the bare metal dependency which

play01:38

your application would be having but you

play01:41

know it can be your application can only

play01:43

run on Windows your application can only

play01:45

run on a Linux machine open to further

play01:47

are any other machines or which has been

play01:50

tightly coupled or the even you know it

play01:53

can be run on VM a VMware like that so

play01:57

so the Kuban it is came like worried

play02:00

like a few years back and it had made

play02:03

lot of impact because the ease of

play02:05

deploying applications within cycle

play02:08

within seconds and spinning of

play02:10

applications and people

play02:11

you can you can say in a scaling of

play02:13

applications are also so easy so so my

play02:19

this particular area cities will have

play02:22

many of the things like you know so it

play02:25

will be the cities would be constituting

play02:27

of at least eight videos as of now and

play02:30

each of these videos will try to get

play02:33

into some objectives which would clear

play02:36

many of the Cuban it is terminologies

play02:39

which are bit hard to understand of the

play02:41

Cuban it is or the application how does

play02:43

actually you can deploy an application

play02:45

to the Cuban itis cluster what is

play02:47

replica where the namespaces what are

play02:49

parts what are class in the world

play02:51

exactly there is cluster and there are

play02:54

lot more things about it and how exactly

play02:57

you know like or why did the Microsoft

play03:00

had gone to you know get this particular

play03:02

product donation platform so there are a

play03:05

lot of things which comes hand in hand

play03:09

with Cuban artists and which other

play03:11

particular services like the Dhaka swamp

play03:13

which was initially I can say it's a pre

play03:16

you know pretty concept of Cuban artists

play03:19

but it couldn't click and that's a

play03:22

product from Microsoft but why did Cuban

play03:25

it is has clicked so good so you will

play03:27

understand the you know occur with the

play03:30

entire sales going on going on like will

play03:34

be having lot of videos not these eight

play03:37

videos so let's pick up like what

play03:40

particular you know videos or what

play03:43

particular concepts we gonna cover so

play03:45

the first video would are in the series

play03:47

word which is today they'll be covering

play03:50

up understanding as your Cuba needed

play03:52

service and how exactly differs from the

play03:55

version that Google publishes the Cuban

play03:58

itis and we'll see also the limitations

play04:03

of using a case not Cuban it is from the

play04:08

Google and and advantages obviously and

play04:11

then we will go through words you know

play04:14

the second video would cover spinning on

play04:16

a case cluster basically an on our back

play04:20

enabled a case cluster we will be gonna

play04:23

create manually

play04:24

but I understand all the parameters

play04:26

which we will be king in into the portal

play04:30

so so we will go and be create resource

play04:33

and we sell it something is Cuban it is

play04:36

service and you know whatever these key

play04:39

parameters which you can see will be

play04:41

trying to explain and after that like

play04:44

basically keep a note this would be non

play04:48

are back cluster which means the non

play04:50

role based access control particular

play04:53

cluster which will not work or the

play04:55

cluster users cannot login or cannot

play04:58

take advantage of our back feature which

play05:00

is provided by Azure Active Directory

play05:02

but yes we will discuss upon few

play05:05

terminologies clusters nodes namespaces

play05:07

sports containers applications sorry you

play05:10

deploying to continuous and we will

play05:11

define how how about you know English

play05:13

control and English is booked and the

play05:16

third video would be having you know

play05:18

more of troubleshooting issues with the

play05:20

cluster so if your part is not running

play05:22

if your pod collapses and like things

play05:26

like if you deploy something and your

play05:28

pod goes into the crash loopback and

play05:30

there are a lot of parameters which are

play05:32

pasted you know daily day to day basis

play05:36

by many of the engineers so and we will

play05:39

try to debug with the default monitoring

play05:42

which are given by I shot like if you

play05:45

take an example that is your monitor the

play05:47

log and analytics or the OEMs in a built

play05:49

on it or you know that we have few

play05:53

features of application in sites which

play05:54

have been enabled on top of it but it

play05:57

won't be enough visible directly to you

play06:00

so those things we're gonna discuss on

play06:01

video 3 and video for would be more of

play06:04

spinning on a case cluster on Azure

play06:08

portal but why are the CLI which means

play06:11

we're gonna use are either cloud shell

play06:13

to deploy us a cluster but this would be

play06:17

an our back and a blue cluster so the

play06:20

are by cannibal questions would require

play06:22

lot of changes you know you need 80 apps

play06:24

server app ad app and client ad hab and

play06:28

you would need certain API permissions

play06:31

and in order to allow API permissions

play06:34

you would require admin

play06:36

okay and so this particular cannibal

play06:41

cluster would provide boost you with a

play06:43

lot of different features which you're

play06:46

gonna have and for your kind information

play06:49

so CLM provides a lot of different

play06:51

beaches which you can enable which you

play06:54

can't actually do with the portal and

play06:56

the manual way right now as of today on

play07:00

20th March 2008 and going forward we

play07:06

will be looking onto the video 5 so it

play07:09

would see about more interacting with

play07:12

our back and I will enable aqueous

play07:14

cluster there are a few of the

play07:16

differences which you will find with the

play07:18

normal without or non-arabic you know

play07:22

you can say like as an on our back

play07:24

cannibal clusters and our back and

play07:26

edible clusters how they differ you will

play07:28

be coming to know we'll be using large

play07:31

cute little cute little commands for

play07:34

provisioning deep provisioning part

play07:35

spinning up of containers draining nodes

play07:37

and will understand replica sex how

play07:41

exactly they're gonna work probably we

play07:43

will go more into availability zones and

play07:45

lot of different concepts and the video

play07:48

six will have the monitoring solutions

play07:50

you know since the native default

play07:53

solutions modeling solutions which are

play07:55

provided by sure are not enough if you

play07:58

are going for your a case clusters which

play08:02

is multi-tenant support which means you

play08:05

will be using a single cluster but

play08:07

you'll be sharing with various different

play08:09

customers various different applications

play08:11

so when you do that you need to take

play08:14

care of a data isolation you do not mix

play08:16

up our customers data with another

play08:18

customer strata or you do not reveal the

play08:20

secrets all the certificates which have

play08:22

been installed for one particular

play08:24

customer with that other particular

play08:26

customer because at the end of the day

play08:27

when you say it's a single cluster so

play08:30

the beam the metal which is underneath

play08:32

you know the drives can be accessed by

play08:34

the other particular users in the class

play08:37

right so how we gonna tackle or how we

play08:41

gonna build a system a multi-tenant a

play08:44

case cluster so and monitoring solutions

play08:49

we gonna talk about

play08:50

and you know like when we built

play08:53

multi-tenant systems obviously you know

play08:56

the demotic solutions also need to be

play08:58

very impact you know impact Oh or should

play09:02

get the analysis of the application

play09:06

specific customer specific data or it

play09:08

should only monitor the customer

play09:09

specific data not others

play09:10

so for that only be have integration

play09:13

have integrated Prometheus which ease us

play09:17

like Prometheus is a different

play09:19

installation but in order to make our

play09:21

life easy I just made it as a container

play09:24

image and I use that image and then I

play09:28

spin up on the same cluster where we

play09:30

have this aqueous cluster be running and

play09:32

we will use at Ravenna which is a

play09:35

beautiful which produces beautiful

play09:36

charts and he'll be very interested and

play09:41

then like it would give very application

play09:43

or you know customer specific data which

play09:47

with which you can also use to you know

play09:49

troubleshoot the issues with your

play09:51

cluster or the pods usage or the

play09:53

namespace usage or the containers usage

play09:56

and going forward like we will go on the

play09:59

video seven which will have integration

play10:01

of graph on the dashboards with Azure

play10:04

Active Directory I'll show this how it

play10:07

gonna look exactly in the next next

play10:10

portion and the video eight would be

play10:13

having you know the cost is main for

play10:15

every particular tenant admins or

play10:17

stakeholders because they need to

play10:19

calculate and when you go with a multi

play10:22

tenant a case clusters you need to

play10:24

calculate his per specific individuals

play10:27

or per customer calculation so much they

play10:29

are using how much the load they are

play10:32

putting on the cluster basing upon then

play10:34

you would be calculating the cost and

play10:36

producing a bill for them so for that

play10:38

we'll be integrating with queue cost has

play10:40

a basic preliminary thing and then we

play10:43

will you know while we make all of these

play10:46

particular pcs and hands-on will be pro

play10:50

and we'll be putting up more of the

play10:52

videos going forward so let's go and try

play10:57

to understand what exactly is

play11:02

I should Cuban it service so so you must

play11:06

be knowing about Cuban artists so Cuban

play11:08

artists provides what you can do with

play11:10

Cuban a disease like you have an

play11:13

application then you can take your

play11:15

application and you continue nice its

play11:18

containerize it or make an image make a

play11:20

docker image out of it and then you

play11:22

deploy on to any of the services like

play11:26

like you can push on to the Dorcas form

play11:28

or you can have something known as your

play11:31

Cuban Air Service or Cuban at ease or

play11:33

directly ok so what happens so when he

play11:36

use our Cuban it is a key s it is

play11:39

community service so so this is a plane

play11:44

this is a particular portion which a

play11:46

case I can say which would have your

play11:49

pots and you have which will have a

play11:52

component like Cuban at this API okay

play11:55

and then you have certain components

play11:57

which dumps your particular logs into or

play12:00

interact with the ERM for the hie see

play12:03

and what happens you know when you spin

play12:06

up an aqueous cluster it provisions a

play12:08

few things like the cluster can be

play12:12

provisioned with the help of nodes like

play12:15

the cluster can have notes or the

play12:18

cluster can have the virtual machine

play12:20

scales it's so the virtual machine skill

play12:23

sets will internally will have nodes

play12:24

okay and note when I say it's it's and

play12:29

the background is just virtual machines

play12:30

so the virtual machines who are the

play12:33

nodes so you can see the ek is cluster

play12:35

will have a cluster will have nodes

play12:37

nodes are like virtual machines it can

play12:40

be under be emesis so via mrs.

play12:42

advantages are different so which we are

play12:44

going to speak about it and the nodes

play12:47

will have something called as thoughts

play12:50

and the parts are categorized or you

play12:54

know grouped under namespaces so when we

play12:57

talk many many things about cuba cuban

play13:00

it is we have a logical grouping or in

play13:04

cuban at a service like namespaces so

play13:06

and namespaces are sort of you know

play13:09

resource groups and isha and you can

play13:11

take advantage of the namespaces and our

play13:14

to segregate you resources segregate

play13:17

your pots segregate what if the

play13:20

resources you're going to spin on that

play13:21

particular pots and the respective pots

play13:25

you can segregate the ingresses so

play13:28

basically the increases are nothing

play13:30

because if you have a acres cluster or a

play13:33

single cluster the single cluster may be

play13:35

having lot of namespaces and lot of

play13:37

namespaces may have parts and each part

play13:39

will be having containers running so in

play13:43

the container you have your application

play13:45

okay so how does that traffic you know

play13:48

the user are sitting outside the world

play13:51

but know exactly re-routed exactly into

play13:55

the application which is running inside

play13:57

the container which is running inside

play13:59

the pot and which is running inside a

play14:02

purse pacific cluster so this is where

play14:04

you know you have for the concept of

play14:06

ingress controller English which

play14:09

actually maps of with your dns DNS

play14:12

mapping like if you use a certificate or

play14:14

you need to do end dienes mapping where

play14:17

in the dns you know for the dns

play14:20

providers like gue dairy or any of the

play14:22

or you can use ISO DNS itself to map

play14:25

your particular service which is running

play14:27

inside your container which is inside a

play14:30

pot expose outside to the world okay so

play14:33

so I want to make it more secure and you

play14:36

don't you will not be an oak we don't

play14:38

suggest to create your own public IP to

play14:40

expose outside to the world rather use

play14:42

an app gateway for your enterprise and

play14:45

tag your particular ap in your

play14:48

particular ipace and the half gateway

play14:51

and and and then tag that particular IP

play14:55

intent externally to the DNS provider so

play14:59

whenever you use the type something

play15:00

called as X Y Z dot my Cuban it service

play15:04

it would resolute back to the hop

play15:06

gateway and that gateway knows where

play15:08

exactly your application is sitting okay

play15:11

and then it would follow that particular

play15:12

traffic to here and then if you use SSL

play15:15

or has TTP s lot of traffic then you can

play15:20

cut off the extra traffic and just read

play15:22

out your has to TP calls to your

play15:24

particular very particular to your

play15:26

container so that you

play15:28

like there's a concept something called

play15:30

is a termination which you can use and

play15:33

and you can also mention like the

play15:36

traffic if it is coming they are the

play15:38

English controller you can mention how

play15:40

much data of you know UK you you were

play15:43

try to allow or you know you would allow

play15:46

to come inside your application because

play15:49

if you are sharing your cluster in that

play15:51

in that cases you can split the request

play15:55

you know see the applications to split

play15:57

the request into chance and Allah only a

play15:59

specific size of data to come and and

play16:03

you can mention HTTP requests for word

play16:05

is everything and those things will come

play16:07

up you will come to know slowly and this

play16:10

is how you know like the requests so if

play16:13

I want to in if if as an admin I guess

play16:17

admin if I want to communicate to what

play16:20

tube shuttle commands so the cue cuddle

play16:23

commands always interact with Cuba near

play16:25

sapa ok you do not interact with ports

play16:27

or containers directly but it would it

play16:30

would always delegate your command the

play16:32

cuticle come out like you know you will

play16:34

say in cucuta come on like spinner pods

play16:38

so the EBS over inside the eks would

play16:41

listen to you first and you can interact

play16:44

with the clout clumps and you can

play16:46

interact the bash or anything but for

play16:49

that you are your admin the cluster

play16:51

admin should give you a cube config file

play16:53

and i'll train track to with the

play16:56

specific cluster so what is the cube

play16:58

config file ham so the cube config file

play17:01

have very specific information about you

play17:04

know which particular cluster you have

play17:07

access to and which particular resource

play17:10

ities which particular resource group or

play17:12

subscription it is and you can you know

play17:14

that gives you context or in a set of

play17:17

context to you know start a session with

play17:20

your cabinet is a PS over so that's

play17:23

that's one way bare admins order you

play17:25

know or the developers would interact

play17:27

with cluster but yes if once you have

play17:32

applications installed on thorn but on

play17:34

your rake is cluster so the traffic need

play17:37

to come it comes with a different way it

play17:39

comes from the Erb gateway or any of the

play17:42

Kuipers you expose with an external load

play17:44

balancer so you when you do that and

play17:47

that in the traffic's and you know the

play17:49

applications are exposed to add this way

play17:51

so your external users will not come the

play17:55

request will not come any at any point

play17:57

with the API so rather the admin the

play18:00

developers will have four can the

play18:02

traffix would come them a piece of but

play18:05

the external traffic comes always from

play18:07

the outside world

play18:08

deadly to the pause and to the

play18:10

continuous not to where the episode and

play18:13

if you go the same thing like the

play18:18

terminators have something called as

play18:19

masters and the nodes concept so in as

play18:23

you accumulate a service if we speak

play18:25

about the differences how what how it

play18:27

differs from the cumulative service from

play18:29

the Google so the Cuban it is master

play18:32

which we have in Asia Cuba in the

play18:35

service is maintained by I shop there

play18:38

are a few of the things which they want

play18:40

to make in control and it's not on the

play18:42

Cuban notice master how frequently or

play18:45

have load it's taking up it or not

play18:47

matters because I sure gives as a

play18:49

service to you and it's it's not

play18:51

billable the only available things with

play18:55

the ICCA's cluster is your nodes so what

play18:58

sort of or what size of nodes and you

play19:00

know that you are running would be the

play19:02

only you know for particular particular

play19:05

parameter which would reduce you a lot

play19:08

of billing ok so if you if you spin up a

play19:11

node with you know basic size or that

play19:13

acquired size only that would be great

play19:16

you can save a lot of cars and for that

play19:18

for those you know for how to cut cause

play19:21

this particular particular course and

play19:24

other other consents we have something

play19:27

called as you know the cube cost and

play19:29

other monitoring solutions or cost

play19:32

monitoring solutions which we have which

play19:34

would be discussing in in video 7 and 8

play19:36

which would really help you in cutting

play19:39

out chlorophyll costs and so the

play19:42

cumulative master bits which we talked

play19:44

which we're talking about so the

play19:45

developer admins of the operators would

play19:48

interact with the API server and API

play19:50

server will have something called as

play19:52

controller controller manager scheduler

play19:55

and it would have in at City storage so

play19:57

where the context we know about the

play20:00

developer information who is interacting

play20:03

with the cluster would be stored in here

play20:05

for for future purposes like you know

play20:08

like setting up the session

play20:09

frequent sessions and other stuff and

play20:13

this particular particular portion is

play20:16

called as a control plane and because

play20:19

you do lot of control control of your

play20:21

nodes and pawns by this particular

play20:23

control plane and the users aren't

play20:25

directly as I said they integrate and

play20:28

they come with the app gateway or the

play20:30

extra load balances so this is how the

play20:32

users are coming to your queue proxy and

play20:34

then and the queue proxy or the ingress

play20:37

proxy or the ingress is what you define

play20:39

they would come and come through that so

play20:41

increases would also tackle with you

play20:44

your proxy the the request which come

play20:47

would come to the queue proxy and then

play20:49

would be redirected to the pots with the

play20:51

use of ingresses so in our series we

play20:55

would be using engines which is widely

play20:57

used to configure our ingress

play20:59

controllers and ingresses and reroute

play21:01

the traffic if we go ahead and try to

play21:06

understand a bit more about the control

play21:08

plane and so this is the control and as

play21:11

I said like I sure manage that

play21:14

particular control plane it Marisol

play21:16

let's see let's see

play21:17

yet City City Stories the API server and

play21:21

the scheduler if something if we are

play21:22

defining like the nodes when they should

play21:25

start and stop

play21:26

so the that that would be you know - by

play21:29

shot and the controller manager is

play21:31

managed by a short you just need to

play21:33

interact with cubicle thematts so the

play21:35

customer what the manage is the nodes

play21:37

the size of the nodes the number of

play21:39

nodes in the number of replicas of nodes

play21:41

they want to scale up scale down you can

play21:44

set auto scale on top of it if you're

play21:47

using something called as via missus

play21:49

okay and your custom or custom

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
KubernetesAzureCloud ComputingContainersDevOpsTutorialMicroservicesVirtual MachinesScalabilityCloud Agnostic