logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Jim Bugwadia, Jayashree Ramanathan, Anca Sailer, Robert Ficcaglia
2022-10-27

Kubernetes policies can help simplify management particularly of multiple clusters, scale Day 2 operations, and automate security and resiliency and software engineering concerns, thereby optimizing cost of operations. Policies also serve as the building block to help enforce multi-cluster governance and deliver continuous compliance and readiness for audits. The Kubernetes Policy Working Group (WG) focuses on defining overall architecture recommendations and guidance on both current policy related implementations as well as future policy related proposals in Kubernetes. Join this session to find out about the working groups current and upcoming projects, and also learn how you can get involved to learn and contribute.
Authors: Wei Huang, Chen Wang, Yuan Chen, Yibo Zhuang
2022-10-26

kube-scheduler is a key component of kubernetes. It has evolved with many new features over the years. In order to better use and manage kubernetes to meet practical needs of today’s increasingly diverse workloads in large production clusters with complex configurations, it’s essential to understand how kube-scheduler works, what features are available, and how to properly configure and manage them. This tutorial will review the basics of kube-scheduler, including kube-scheduler basic features, scheduling framework, scheduler plugins and profiles, how to configure kube-scheduler with different parameters, plugins and multiple profiles, and how to test and evaluate kube-scheduler on a local machine and in a cluster. The tutorial will present the latest scheduling features and how to use them. Advanced topics such as bin-packing, scheduling scalability, batch support, and how to extend the default kube-scheduler with custom scheduler plugins will be introduced too. The tutorial includes demos and hands-on sessions and is suited for kubernetes administers, users and developers, from beginning to advanced levels. The audience is expected to come prepared with a personal laptop with kubernetes, e.g., Minikube, installed.
Authors: Cynthia Thomas
2022-10-25

tldr - powered by Generative AI

The presentation discusses IP management challenges faced by Kubernetes cluster operators and the solutions introduced by the Kubernetes networking team to mitigate these challenges.
  • Kubernetes clusters require IP addressing for network communication between pods and agents on nodes.
  • Assigning large IP blocks for Kubernetes constructs can cause fragmentation problems within organizations and make it difficult to migrate workloads to new clusters.
  • The Kubernetes networking team has introduced solutions such as single stack IPv6 and IPv4 only support, dual stack IPv4 and IPv6 support, and multiple cluster ciders support for node ipam to address these challenges.
  • Upcoming solutions include multiple service ciders and reserving static and dynamic allocation for service IP ranges.
  • Best practices for Kubernetes IP management include starting with a smaller application allocation for IP address ciders and gradually building up, and moving towards IPv6.
  • The networking community is being asked for feedback on the possibility of mixed mode services.
Authors: Carlos Sanchez
2022-05-20

tldr - powered by Generative AI

Optimizing resource usage in Kubernetes clusters through hibernation and workload distribution
  • Built hibernation and workload distribution systems to optimize resource usage
  • Applied at both application and infrastructure levels
  • Recommendations for setting CPU and memory requests and limits
  • Use of standard VMs with CPU to memory ratio based on application usage
  • Explicitly setting JVM heap size to avoid surprises
Authors: Jeremy Olmsted-Thompson, Laura Lorenz, Paul Morie
2022-05-19

tldr - powered by Generative AI

The presentation is about showcasing the AWS cloud map MCS controller for Kubernetes and its interaction with the about API and MCS API.
  • The AWS cloud map MCS controller for Kubernetes is showcased in the presentation.
  • The controller is built on top of AWS cloud map and interacts with the about API and MCS API.
  • The presentation demonstrates the creation of service exports and imports between two EKS clusters.
  • The AWS cloud map services created for the namespace are also shown.
  • The audience is encouraged to join the bi-weekly meetings of the Sig multi-cluster to provide input and bring up new ideas.
Authors: Dawn Foster, Catherine Paganini
2022-05-19

tldr - powered by Generative AI

The presentation discusses the importance of governance and contributor strategy in managing open source projects within the Cloud Native Computing Foundation (CNCF).
  • The CNCF provides resources and templates for governance and contributor strategy to help manage open source projects.
  • Governance helps align expectations and decision-making processes within a community.
  • Contributor strategy involves motivating and incentivizing contributors to participate in non-code contributions.
  • Maintainer circles provide a supportive community for CNCF maintainers to connect and exchange ideas.
  • The CNCF encourages participation and contribution to their resources and community.
Authors: Jim Bugwadia, Aradhna Chetal, Jayashree Ramanathan, Robert Ficcaglia
2021-10-13

tldr - powered by Generative AI

The conference presentation discusses the importance of policy-based governance and automation in improving security and operational efficiency in Kubernetes.
  • Customers need a policy management system that is multi-cluster and oriented towards splitting clusters into different application teams.
  • Existing IT operational processes and tools should be combined with policy-based governance to achieve automated governance.
  • Policy-based operations are becoming increasingly important in Kubernetes, especially for securing it and achieving compliance.
  • Policy management is a configuration management problem that can help achieve desired configuration state for every control at every layer of the software stack.
  • Customers are starting to convert homegrown scripts into policies and apply policy management techniques to automate security controls.