OpenShift OKD v3.10 Documentation
首页
白天
夜间
下载
阅读记录
书签管理
我的书签
添加书签
移除书签
编辑文档
Architecture
来源 1
浏览
318
扫码
打印
2021-05-23 23:24:15
Additional Concepts
上一篇:
下一篇:
发布点评
About
Welcome
Ansible Playbook Bundle Development Guide
Introduction
CLI Tooling
Writing APBs
Getting Started
Reference
Architecture
Additional Concepts
Ephemeral Storage
Source Control Management
Other API Objects
Authentication
Persistent Storage
Admission Controllers
Custom Admission Controllers
Authorization
Core Concepts
Containers and Images
Projects and Users
Overview
Deployments
Pods and Services
Builds and Image Streams
Infrastructure Components
Container Registry
Web Console
Kubernetes Infrastructure
Networking
Port Forwarding
Available SDN plug-ins
Remote Commands
Available router plug-ins
Routes
OpenShift SDN
Networking
Service Catalog Components
Service Catalog
OpenShift Ansible Broker
Service Catalog CLI
Template Service Broker
Overview
CLI Reference
Managing CLI Profiles
Administrator CLI Operations
Differences Between oc and kubectl
Extending the CLI
Get Started with the CLI
Overview
Developer CLI Operations
Cluster Administration
Encrypting Data at Datastore Layer
Scoped Tokens
Assigning Unique External IPs for Ingress Traffic
Managing Security Context Constraints
Allocating Node Resources
Replacing a master host
Image Policy
Pruning objects
Overview
Managing Users
Disabling Features using Feature Gates
Setting Limit Ranges
Garbage Collection
Overcommitting
Monitoring Images
Troubleshooting Networking
Restoring your cluster
Setting Multi-Project Quotas
Idling Applications
Monitoring and Debugging Routers
Out of Resource Handling
Analyzing Cluster Capacity
Diagnostics Tool
Sysctls
Securing Builds by Strategy
High Availability
Kuryr SDN Administration
Managing Role-based Access Control
Opaque Integer Resources
Extending the Kubernetes API with Custom Resources
IPtables
Setting Quotas
Restricting Application Capabilities Using Seccomp
Replacing a failed etcd member
Encrypting traffic between nodes with IPsec
Building Dependency Trees
Managing Pods
Scheduling
Descheduling
Advanced Scheduling and Taints and Tolerations
Controlling Pod Placement
Advanced Scheduling and Node Affinity
Advanced Scheduling and Node Selectors
Advanced Scheduling and Pod Affinity/Anti-affinity
Overview
Custom Scheduling
Advanced Scheduling
Default Scheduling
Managing Networking
Node Problem Detector
Managing Projects
Configuring Service Accounts
Managing Nodes
Image Signatures
Restoring etcd quorum
Configuring Clusters
Adding Hosts to an Existing Cluster
Configuring the SDN
Loading the Default Image Streams and Templates
Configuring Nuage SDN
Configuring Custom Certificates
Configuring for OpenStack
Deploying External Persistent Volume Provisioners
Configuring for Google Compute Engine
Configuring Global Build Defaults and Overrides
OpenShift Ansible Broker Configuration
Configuring Pipeline Execution
Configuring for Azure
Configuring LDAP failover
Working with HTTP Proxies
Syncing groups with LDAP
Configuring for Red Hat Virtualization
Configuring for AWS
Enabling Cluster Metrics
Configuring Route Timeouts
Redeploying Certificates
Customizing the Web Console
Configuring for VMWare vSphere
Configuring Local Volumes
Configuring Ephemeral Storage
Routing from Edge Load Balancers
Aggregate Logging Sizing Guidelines
Aggregating Container Logs
Deploying Red Hat CloudForms
Uninstalling
Introduction
Running the Installer
Configuring Role Variables
Enabling Container Provider Integration
Requirements
Persistent Storage Examples
Complete Example Using GlusterFS
Using Ceph RBD for dynamic provisioning
Configuring Azure Blob Storage for Integrated Docker Registry
Overview
Using StorageClasses for Dynamic Provisioning
Using Ceph RBD for Persistent Storage
Sharing an NFS PV Across Two Pods
Complete Example Using GlusterFS for Dynamic Provisioning
Using StorageClasses for Existing Legacy Storage
Switching an Integrated OpenShift Container Registry to GlusterFS
Binding Persistent Volumes by Label
Mounting Volumes To Privileged Pods
Setting up a Router
Using the Default HAProxy Router
Router Overview
Configuring the HAProxy Router to Use the PROXY Protocol
Using the F5 Router Plug-in
Deploying a Customized HAProxy Router
Setting up the Registry
Extended Registry Configuration
Registry Overview
Known Issues
Deploying a Registry on Existing Clusters
Securing and Exposing the Registry
Accessing the Registry
Overview
Master and Node Configuration
Configuring Native Container Routing
Configuring Kuryr SDN
Configuring Authentication and User Agent
Configuring Persistent Storage
Using GlusterFS
Using OpenStack Cinder
Using Fibre Channel
Using Azure Disk
Using FlexVolume
Volume Security
Using VMware vSphere volumes for persistent storage
Using iSCSI
Using Ceph RBD
Using Azure File
Using OpenStack Manila shares
Using Container Storage Interface (CSI)
Using GCE Persistent Disk
Using NFS
Using Local Volume
Dynamic Provisioning and Creating Storage Classes
Selector-Label Volume Binding
Using AWS Elastic Block Store
Overview
Enabling Controller-managed Attachment and Detachment
Persistent Volume Snapshots
Container Security Guide
Securing the Container Platform
Container Content
Build Process
Container Hosts and Multi-tenancy
Attached Storage
Introduction
Network Security
Monitoring Events and Logs
Registries
Deployment
Creating Images
Testing S2I Images
Custom Builder
Overview
Image Metadata
S2I Requirements
Guidelines
Day Two Operations Guide
Project-level tasks
Creating an environment-wide backup
Docker tasks
Host-level tasks
Managing Certificates
Run-once tasks
Overview
Environment health checks
Developer Guide
OpenShift Pipeline
Cron Jobs
Secrets
Port Forwarding
Pod Autoscaling
Projects
Copying Files
Downward API
ConfigMaps
Application memory sizing
Events
Authorization
Overview
Routes
Application Health
Using Device Plug-ins
Authentication
Shared Memory
Expanding Persistent Volumes
Service Accounts
Jobs
Managing Volumes
Managing Images
Managing Environment Variables
Projected Volumes
Opening a Remote Shell to Containers
Integrating External Services
Create from URL
Executing Remote Commands
Injecting Information into Pods Using Pod Presets
Using Daemonsets
Quotas and Limit Ranges
Using Device Manager
Application Life Cycle Management
Creating New Applications
Planning Your Development Process
Promoting Applications Across Environments
Builds
Build Environment
Build Output
Build Hooks
Build Run Policy
Build Strategy Options
Advanced Build Operations
How Builds Work
Triggering Builds
Build Inputs
Basic Build Operations
Troubleshooting
Deployments
Basic Deployment Operations
Deployment Strategies
How Deployments Work
Advanced Deployment Strategies
Kubernetes Deployments Support
Getting Traffic into a Cluster
Using a Service ExternalIP
Using a Load Balancer
Overview
Using a NodePort
Using a Router
Migrating Applications
Webhooks and Action Hooks
Database Applications
S2I Tool
Overview
QuickStart Examples
Web Framework Applications
Support Guide
Continuous Integration and Deployment
Tutorials
Overview
Binary Builds
Ruby on Rails
Setting Up a Nexus Mirror
OpenShift Pipeline Builds
Quickstart Templates
Using Persistent Volumes
Creating an object from a custom resource definition
Templates
Getting Started
Command-Line Walkthrough
Setting Up a Cluster
Web Console Walkthrough
Overview
Installing Clusters
Running Installation Playbooks
Configuring Your Inventory File
Installing a Stand-alone Deployment of OpenShift Container Registry
System and Environment Requirements
Example Inventory Files
Planning Your Installation
Preparing Your Hosts
REST API Reference
Examples
Overview
/apis/authorization.k8s.io/v1beta1
/apis/authorization.k8s.io/v1beta1
v1beta1.LocalSubjectAccessReview
v1beta1.SubjectAccessReview
v1beta1.SelfSubjectAccessReview
/apis/rbac.authorization.k8s.io/v1beta1
/apis/rbac.authorization.k8s.io/v1beta1
v1beta1.Role
v1beta1.ClusterRoleBinding
v1beta1.RoleBinding
v1beta1.ClusterRole
/apis/authentication.k8s.io/v1beta1
/apis/authorization.openshift.io/v1
/apis/authentication.k8s.io/v1beta1
v1beta1.TokenReview
/apis/authorization.openshift.io/v1
v1.Role
v1.LocalSubjectAccessReview
v1.SelfSubjectRulesReview
v1.ClusterRoleBinding
v1.SubjectRulesReview
v1.SubjectAccessReview
v1.ResourceAccessReview
v1.LocalResourceAccessReview
v1.ClusterRole
v1.RoleBinding
v1.RoleBindingRestriction
/api/v1
/apis/apps.openshift.io/v1
/apis/apps/v1beta1
/apis/authentication.k8s.io/v1
/apis/authorization.k8s.io/v1
/apis/autoscaling/v1
/apis/batch/v1
/apis/batch/v2alpha1
/apis/build.openshift.io/v1
/apis/extensions/v1beta1
/apis/image.openshift.io/v1
/apis/network.openshift.io/v1
/apis/networking.k8s.io/v1
/apis/oauth.openshift.io/v1
/apis/policy/v1beta1
/apis/project.openshift.io/v1
/apis/quota.openshift.io/v1
/apis/route.openshift.io/v1
/apis/security.openshift.io/v1
/apis/storage.k8s.io/v1
/apis/storage.k8s.io/v1beta1
/apis/template.openshift.io/v1
/apis/user.openshift.io/v1
/apis/v1
/oapi/v1
/apis/apps/v1beta1
v1beta1.Deployment
v1beta1.StatefulSet
v1beta1.ControllerRevision
/apis/apps.openshift.io/v1
v1.DeploymentConfig
/apis/authentication.k8s.io/v1
v1.TokenReview
/apis/authorization.k8s.io/v1
v1.SubjectAccessReview
v1.LocalSubjectAccessReview
v1.SelfSubjectAccessReview
/apis/autoscaling/v1
v1.HorizontalPodAutoscaler
/apis/batch/v1
v1.Job
/apis/batch/v2alpha1
v2alpha1.CronJob
v2alpha1.ScheduledJob
/apis/build.openshift.io/v1
v1.Build
v1.BuildConfig
/apis/extensions/v1beta1
v1beta1.ThirdPartyResource
v1beta1.DaemonSet
v1beta1.PodSecurityPolicy
v1beta1.Ingress
v1beta1.ReplicaSet
v1beta1.NetworkPolicy
v1beta1.Deployment
/apis/image.openshift.io/v1
v1.ImageStreamImage
v1.ImageStreamMapping
v1.ImageStreamImport
v1.ImageStreamTag
v1.ImageStream
v1.ImageSignature
v1.Image
/apis/network.openshift.io/v1
v1.NetNamespace
v1.HostSubnet
v1.ClusterNetwork
v1.EgressNetworkPolicy
/apis/networking.k8s.io/v1
v1.NetworkPolicy
/apis/oauth.openshift.io/v1
v1.OAuthAuthorizeToken
v1.OAuthAccessToken
v1.OAuthClientAuthorization
v1.OAuthClient
/apis/policy/v1beta1
v1beta1.PodDisruptionBudget
/apis/project.openshift.io/v1
v1.ProjectRequest
v1.Project
/apis/quota.openshift.io/v1
v1.ClusterResourceQuota
v1.AppliedClusterResourceQuota
/apis/route.openshift.io/v1
v1.Route
/apis/security.openshift.io/v1
v1.PodSecurityPolicyReview
v1.PodSecurityPolicySelfSubjectReview
v1.PodSecurityPolicySubjectReview
v1.SecurityContextConstraints
/apis/storage.k8s.io/v1
v1.StorageClass
/apis/storage.k8s.io/v1beta1
v1beta1.StorageClass
/apis/template.openshift.io/v1
v1.TemplateInstance
v1.Template
v1.BrokerTemplateInstance
/apis/user.openshift.io/v1
v1.Group
v1.Identity
v1.User
v1.UserIdentityMapping
/apis/v1
v1.Pod
v1.Namespace
v1.Node
v1.ConfigMap
v1.ComponentStatus
v1.APIResourceList
v1.SecurityContextConstraints
v1.ServiceAccount
v1.LimitRange
v1.ResourceQuota
v1.Event
v1.Endpoints
v1.APIGroup
v1.Binding
v1.APIGroupList
v1.PodTemplate
v1.Secret
v1.PersistentVolume
v1.PersistentVolumeClaim
v1.APIVersions
v1.ReplicationController
v1.Service
/oapi/v1
v1.ImageStreamMapping
v1.SelfSubjectRulesReview
v1.Route
v1.PodSecurityPolicySelfSubjectReview
v1.RoleBinding
v1.Template
v1.PodSecurityPolicySubjectReview
v1.LocalResourceAccessReview
v1.ImageStream
v1.Group
v1.ClusterRole
v1.OAuthAuthorizeToken
v1.DeploymentConfigRollback
v1.Identity
v1.AppliedClusterResourceQuota
v1.BuildConfig
v1.LocalSubjectAccessReview
v1.EgressNetworkPolicy
v1.User
v1.ImageStreamTag
v1.OAuthClientAuthorization
v1.ImageSignature
v1.OAuthAccessToken
v1.ResourceAccessReview
v1.DeploymentConfig
v1.ClusterNetwork
v1.Build
v1.ClusterResourceQuota
v1.ProjectRequest
v1.Image
v1.SubjectRulesReview
v1.UserIdentityMapping
v1.ProcessedTemplate
v1.ClusterRoleBinding
v1.Project
v1.Role
v1.ImageStreamImage
v1.ImageStreamImport
v1.PodSecurityPolicyReview
v1.NetNamespace
v1.HostSubnet
v1.SubjectAccessReview
v1.OAuthClient
v1.RoleBindingRestriction
/apis/certificates.k8s.io/v1beta1
/apis/certificates.k8s.io/v1beta1
v1beta1.CertificateSigningRequest
Scaling and Performance Guide
Optimizing Compute Resources
Routing Optimization
Scaling Cluster Metrics
Optimizing On GlusterFS Storage
Managing Huge Pages
Network Optimization
Optimizing Ephemeral Storage
Cluster Limits
Using Cluster Loader
Overview
Optimizing Persistent Storage
Recommended Host Practices
Using CPU Manager
Recommended Installation Practices
Upgrading Clusters
Updating Operating Systems
Upgrade Methods and Strategies
Blue-Green Deployments
In-place Upgrades
Using Images
Database Images
Overview
PostgreSQL
MariaDB
MongoDB
MySQL
Other Images
Overview
Jenkins
Other Container Images
Jenkins Slaves
Source-to-Image (S2I)
Python
Java
Overview
Perl
PHP
Node.js
Ruby
Customizing S2I Images
Source-to-Image (S2I)
What’s New?
Overview
Terminology
Applications
Cartridges Versus Images
暂无相关搜索结果!
本文档使用
全库网
构建
×
思维导图备注
×
文章二维码
手机扫一扫,轻松掌上读
×
文档下载
请下载您需要的格式的文档,随时随地,享受汲取知识的乐趣!
PDF
文档
EPUB
文档
MOBI
文档
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度