当前位置:网站首页>Kubernetes-1.24.x feature
Kubernetes-1.24.x feature
2022-07-29 03:17:00 【Shift to containerization】
Auto roll out and rollback
Kubernetes Changes will be made to the application or its configuration step by step , At the same time, monitor the health of the application , To make sure it doesn't kill all instances at the same time . If something goes wrong ,Kubernetes Changes will be rolled back for you . Take advantage of the growing ecosystem of deployment solutions .
Service discovery and load balancing
There is no need to modify the application to use unfamiliar service discovery mechanisms .Kubernetes by Pods Provide their own IP The address and a set of Pods Single DNS name , And load balancing between them .
Storage choreography
Automatically mount the storage system of your choice , Whether from local storage 、 Public cloud providers ( Such as GCP or AWS), Or network storage system ( Such as NFS、iSCSI、Gluster、Ceph、Cinder or Flocker).
Ciphertext / Confidentiality and configuration management
Deploy and update secrets and application configuration , Without having to rebuild the image , There is no need to expose secrets in the stack configuration .
Automatic scaling
Automatically scale the container according to its resource requirements and other constraints , Without sacrificing availability . Mix workloads and optimal workloads , To improve utilization and save more resources .
Batch execution
In addition to services ,Kubernetes You can also manage batch processing and CI The workload , if necessary , You can also replace failed containers .
IPv4 / IPv6 Two channels
by Pods and Services Distribute IPv4 and IPv6 Address
Horizontal expansion
Use a simple command 、 One UI, Or according to CPU Usage automatically scales applications up and down
High fault tolerance
Restart the failed container , Replace and reschedule containers when nodes die , Kill containers that do not respond to user-defined health checks , And they will not be announced to clients until they are ready for service
Scalability of design
Without changing the upstream source code Kubernetes Add new features to the cluster
边栏推荐
- Several methods of converting object to string
- C和指针 第3章 语义“陷阱” 3.5 空指针并非字符串
- C traps and defects Chapter 3 semantic "traps" 3.9 integer overflow
- [QNX hypervisor 2.2 user manual]9.11 RAM (under update)
- 接口自动化测试实践指导(上):接口自动化需要做哪些准备工作
- Digital image processing Chapter 10 - image segmentation
- [NPM error] - NPM err code eresolve and NPM err eresolve could not resolve problems
- Does domestic ERP have a chance to beat sap?
- MySQL large table joint query optimization, large transaction optimization, avoiding transaction timeout, lock wait timeout and lock table
- shell脚本总结
猜你喜欢
随机推荐
STC单片机驱动1.8‘TFT SPI屏幕演示示例(含资料包)
What is eplato cast by Plato farm on elephant swap? Why is there a high premium?
生产部署zabbix5.0笔记
Shardingsphere's level table practice (III)
正则表达绕过waf
shell脚本总结
During the year, the first "three consecutive falls" of No. 95 gasoline returned to the "8 Yuan era"“
Redis配置缓存过期监听事件触发
C陷阱与缺陷 第2章 语法“陷阱” 2.6 “悬挂”else引发的问题
What if MySQL forgets the password
Anti vulnerability · benefit from uncertainty --- management?
Alibaba Sentinel - 工作流程及原理解析
July 28, 2022 Gu Yujia's study notes
GJB常见混淆概念
4000 多字学懂弄通 js 中 this 指向问题,顺便手写实现 call、apply 和 bind
Summarize the knowledge points of the ten JVM modules. If you don't believe it, you still don't understand it
web-uploader不能多文件上传
[robot learning] matlab kinematics and ADMAS dynamics analysis of manipulator gripper
C语言基础知识点汇总
How dare you write a resume that is proficient in concurrent programming? Why do you use a two-way linked list in AQS?








