当前位置:网站首页>Several schemes of traffic exposure in kubernetes cluster
Several schemes of traffic exposure in kubernetes cluster
2022-06-25 07:04:00 【KubeSphere】
author :KaliArch( Xue Lei ), some Cloud MSP Service provider product leader , Familiar with enterprise high availability / High concurrency architecture , Including hybrid Cloud Architecture 、 Remote disaster recovery , Skilled enterprises DevOps Transformation and optimization , be familiar with Shell/Python/Go And so on , be familiar with Kubernetes、 Docker、 Cloud native 、 Micro service architecture, etc .
background
Use... In business Kubernetes When editing management , Access to the north-south traffic of the service , stay Kuberentes There are usually several schemes in , This paper briefly introduces the access scheme .
Traffic access scheme
Kuberentes The community has adopted the scheme of adding entry points to the cluster , Solve the management of external traffic .
adopt kube-proxy Acting as agent
Usually in the simplest test or personal development environment , Can pass kubectl port-forward To start a kube-proxy The internal service of the process agent to the host node where the command is executed , If the host has a public network IP, And the forwarding listening port is 0.0.0.0 You can access the service through the public network , This method can represent a single Pod, perhaps Deployment, perhaps Servcie.
$ kubectl port-forward -hForward one or more local ports to a pod. This command requires the node to have 'socat' installed. Use resource type/name such as deployment/mydeployment to select a pod. Resource type defaults to 'pod' if omitted. If there are multiple pods matching the criteria, a pod will be selected automatically. The forwarding session endswhen the selected pod terminates, and rerun of the command is needed to resume forwarding.Examples: # Listen on ports 5000 and 6000 locally, forwarding data to/from ports 5000 and 6000 in the pod kubectl port-forward pod/mypod 5000 6000 # Listen on ports 5000 and 6000 locally, forwarding data to/from ports 5000 and 6000 in a pod selected by thedeployment kubectl port-forward deployment/mydeployment 5000 6000 # Listen on port 8443 locally, forwarding to the targetPort of the service's port named "https" in a pod selected bythe service kubectl port-forward service/myservice 8443:https # Listen on port 8888 locally, forwarding to 5000 in the pod kubectl port-forward pod/mypod 8888:5000 # Listen on port 8888 on all addresses, forwarding to 5000 in the pod kubectl port-forward --address 0.0.0.0 pod/mypod 8888:5000 # Listen on port 8888 on localhost and selected IP, forwarding to 5000 in the pod kubectl port-forward --address localhost,10.19.21.23 pod/mypod 8888:5000 # Listen on a random port locally, forwarding to 5000 in the pod kubectl port-forward pod/mypod :5000NodePort The way
The second most commonly used is NodePort The way , take K8s in service The type of is changed to NodePort The way , You will get a port range of 30000-32767 Host port within the port range , The same host has a public network IP Service exposure can be realized , however NodePort It will occupy the host port , One Service Corresponding to one NodePort, This method has only four layers , It can't be done SSL Uninstallation of certificate , If the service is forwarded to a single Node Node NodePort High availability is not possible , It's usually needed in NodePort Add multiple back ends with load balancing before NodePort High availability has been achieved .

LoadBalancer
four layers
Layer 4 traffic forwarding one LB The port of can only correspond to one Service,Servcie Of Type by NodePort, For example, see the figure below ,LoadBalancer Upper 88 The port is forwarded to the back end NodePort Of 32111 port , Corresponding to servcieA;LB Upper 8080 The port is forwarded to the back end NodePort32001 port ; This scheme can be implemented by adding multiple NodePort To achieve high availability , But because of the four layers, it is impossible to realize SSL The uninstall , Corresponding NodePort Need to be in LB Occupy one port .

Seven layers
The seventh floor can be achieved by LB Domain name forwarding , One domain name port corresponds to multiple ports Service, As shown in the figure, it can be according to path route ,/cmp Corresponding NodePort Of 32111,/gateway Corresponding NodePort Of 32000 port , Not only can you achieve high availability , And seven layers can realize SSL uninstall .

Currently, the general public cloud LB Levels have four and seven levels of functionality , When used together, flexible business traffic exposure can be achieved .
Ingress
stay K8s in , There are Ingress Resources to forward a single domain name to according to different paths or other configuration rules K8 Different within the cluster Service, But user requests require access Ingress Realize the controller's NodePort for example Ingress-nginx Of Controller Of Service Of NodePort, For specific business domain names, there is generally no port , Therefore, it usually needs a layer in front 80/443 Port forwarding .
commonly Ingress Of Controller There are many solutions in the industry , For example, the more famous Ingress—nginx/Ingress-traefik etc. .

LoadBalancer + Ingress
As shown in the figure below, there is a four layer at the front LB Implement port 80/443 Forward to ingress-provider Of Service Of NodePort,K8s There are multiple configurations in the cluster service.

Ingress-nginx Detailed explanation
In the above schemes , Are useful to Ingress,Nginx-ingress by Nginx Officially provided implementation K8s ingress Resource plan , meanwhile Kubernetes Officials have also provided information based on Nginx Realized Ingress programme .
Nginx Ingress By the resource object Ingress、Ingress controller 、Nginx Three parts ,Ingress The goal of the controller is to build and complete a configuration file (nginx.conf), It mainly detects that the configuration file is overloaded after being changed Nginx Realization , But not just in Upstream Overload on change Nginx( Modify when deploying the application Endpoints), Use lua-nginx-module Realization .
According to the figure below, we can better understand Ingress-nginx Usage scenarios of .

The following information is shown in the figure :
- One K8s colony
- Cluster user management 、 user A And the user B, They use Kubernetes API Using clusters .
- client A And the client B, They connect to the application deployed by the corresponding user A and B.
- IC, from Admin Deploy in namespace nginx-ingress Medium pod in , And pass ConfigMap nginx-ingress To configure .Admin Typically, at least two... Are deployed pod To achieve redundancy .IC Use Kubernetes API Get the latest entry resources created in the cluster , And then allocate according to these resources NGINX.
- Applications A By the user A In namespace A Two pods are deployed in the middle . In order to pass through the host A.example.com To their clients ( The client A) Expose applications , user A Create an entry A.
- user B In namespace B There's one in the middle pod Applications for B. In order to pass through the host B.example.com To their clients ( The client B) Expose applications , user B establish VirtualServer B.
- Public endpoint , It is located in IC In front of the pod . This is usually a TCP Load Balancer ( cloud 、 Software or hardware ), Or this load balancer and NodePort Combination of services . client A and B Connect to their applications through public endpoints .
Yellow and purple arrows indicate connections related to client traffic , The black arrow indicates that Kubernetes API The interview of .
For simplicity , There are not many necessary Kubernetes resources , Such as deployment and service , Administrators and users also need to create these resources .
other
stay K8s in , Usually cloud vendors LB General cloud vendors provide adaptation CNI, Will be creating K8s Cluster will be created automatically LB Type of servcie, Like Ali's ACK, Tencent's TKE, Huawei's CCE etc. , But in our self built or personal test scenarios , Open source Metallb It's a good choice , Its function is through K8s The original way to provide LB Type of Service Support , Open the box , Of course, there is Qingyun technology KubeSphere The team's open source load balancer plug-in OpenELB, For physical machines (Bare-metal)、 edge (Edge) And a load balancer plug-in designed for a privatized environment , Can be used as Kubernetes、K3s、KubeSphere Of LB The plug-in is exposed outside the cluster “LoadBalancer” Type of service . stay 2021 year 11 Month entered CNCF The sandbox (Sandbox) trusteeship , It also solves the problem that users will Kubernetes The cluster is deployed on bare metal , Or privatize the environment, especially the physical machine or edge cluster ,Kubernetes It does not provide LoadBalancer The pain points , Provide the same user experience as cloud based load balancers .
This article by the blog one article many sends the platform OpenWrite Release !
边栏推荐
- 基于 KubeSphere 的分级管理实践
- Analysis on the output, market scale and development status of China's children's furniture industry in 2020 and the competition pattern of children's furniture enterprises [figure]
- What is the real future of hardware engineers?
- Atomic alpha development board -- SD card and EMMC burning tool
- Unity get resource path
- 【他字字不提爱,却句句都是爱】
- [ACNOI2022]王校长的构造
- [ros2] Why use ros2? Introduction to ros2 system characteristics
- Bcrypt password encryption kalrry
- 活动报名|Apache Pulsar x KubeSphere 在线 Meetup 火热来袭
猜你喜欢

Hongmeng learning notes: creating layouts using XML

Modify the default log level

Capable people never complain about the environment!

joda. Time get date summary

レ / leilei

Ht513 I2S input 2.8W mono class D audio power amplifier IC

Want to self-study SCM, do you have any books and boards worth recommending?

Acwing / 2004. Mauvaise écriture

Cloning and importing DOM nodes

了解zbrush雕刻软件,以及游戏建模的分析
随机推荐
父爱的表达方式
Modify the default log level
[Shangshui Shuo series] day 5
[acnoi2022] the structure of President Wang
Wan Yin revealed that he was rejected by MIT in this way: "the department doesn't like you". He confronted the principal and realized
Why did Yanjing Beer come here?
Make fertilizer Safi from crop residues locally to increase yield by 30% and improve soil
In depth inventory: 23 vscode plug-in artifacts that improve development efficiency and aesthetics
Qcom--lk phase I2C interface configuration scheme -i2c6
[learn shell programming easily]-5. Plan tasks
有能力的人从不抱怨大环境!
Cs8683 (120W mono class D power amplifier IC)
Esp8266 & sg90 steering gear & Lighting Technology & Arduino
【2022黑马程序员】SQL优化
Error reported during vivado simulation common 17-39
Coffee script unmatched outent error
Analysis of China's food cold chain logistics, output of quick-frozen noodles and rice products and operation of major enterprises in 2021 [figure]
CTFHub-Web-信息泄露-目录遍历
Uncaught TypeError: Cannot read properties of undefined (reading ‘prototype‘)
Torchserve pit avoidance Guide