capsule
kubeplus
Our great sponsors
capsule | kubeplus | |
---|---|---|
4 | 29 | |
793 | 400 | |
3.8% | 2.0% | |
9.1 | 8.4 | |
6 days ago | 27 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
capsule
-
How we reduced Kubernetes Clusters Sprawl by adopting Vclusters: An Introduction
At the end is just a tool which helps to achieve multi tenancy(with all pros and cons) in Kubernetes. It takes a different approach from capsule for example as you have a dedicated control plane for each tenant which means you have an isolated api server that you can spin up in a matter of seconds and lets you also achieve better resource utilizations by using the same nodes shared among all tenants
- Is it anti-pattern to have multiple environments under a single namespace?
-
k8s based platform
For multi tenancy you could use this: https://github.com/clastix/capsule
- RBAC for developer self-service?
kubeplus
-
One user per pod with Kubernetes or other container orchestration tools
We have been helping organizations build such multi-instance multi-tenant cloud-native applications. We start with an application Helm chart and create separate release of it per customer/user of that organization. We have an open source Kubernetes Operator that aids in this: https://github.com/cloud-ark/kubeplus
-
What is your experience with operators?
You might also want to checkout Operator guidelines and Operator FAQ: - Operator Maturity Model guidelines: https://github.com/cloud-ark/kubeplus/blob/master/Guidelines.md
-
Does anybody need a Kubernetes Operator for auto renewing SSL certificates?
The project that is getting some traction recently is our KubePlus Operator that delivers Helm charts as-a-service: https://github.com/cloud-ark/kubeplus
-
Are there default limits for available memory for pods/namespaces/nodes/etc?
I don't think there are any default values set for both cpu and memory. But by explicitly adding Pod cpu and memory resource requests and limits, you can ensure that K8s will grant that much resources to your application Pods. In case your application is available as a Helm chart, you can use our project KubePlus (https://github.com/cloud-ark/kubeplus) to define cpu and memory resource requests and limits at Helm chart level. KubePlus will mutate the Pods that are part of a Helm release to include the configured policies. The project README has an example. A detailed example is here: https://cloud-ark.github.io/kubeplus/docs/html/html/index.html
-
Feedback wanted on pod resource metrics before GA promotion
When you say capacity planning, can you elaborate on some use-case(s) that are being targeted with this feature? Is the idea that knowing the actual usage directly from the scheduler can help deployers, either from outside the cluster or in-cluster via GitOps, make informed decisions such as configuring node selectors on any future Pods? The reason I ask this is - in our project (KubePlus - https://github.com/cloud-ark/kubeplus ) we support Node selector policies at Helm chart level. This enables, for example, to create a Helm release on a specific worker node. Currently KubePlus is not using any metrics data to decide whether a particular node has enough spare capacity to accommodate the incoming Helm release. If the Pod metrics are available from the scheduler then we can correlate those with the nodes on which the Pods are running and then decide whether a node has enough remaining capacity to support the resources of the Helm release.
-
How to get to the next Level in Kubernetes?
Kubernetes Operators FAQ: https://github.com/cloud-ark/kubeplus/blob/master/Operator-FAQ.md
-
Managing Kubernetes from within Kubernetes
Good to know that you are developing an Operator for this custom automation to be run inside the cluster. While Operators initially were targeted towards managing some stateful application's life-cycle in Kubernetes-native manner on the cluster (such as a database), now-a-days their scope has extended to handle automation for the cluster itself (like what you are doing) and to perform reconciliation actions on things that are outside the cluster as well (think provisioning of cloud managed services). So you are on the right track here. And since you mention that you might be looking for some feedback on the Operator once it reaches some level of completeness, I thought of sharing following pointers that can help while you are developing your Operator: 1. Operator FAQ: https://github.com/cloud-ark/kubeplus/blob/master/Operator-FAQ.md 2. Operator Maturity Model: https://github.com/cloud-ark/kubeplus/blob/master/Operator-Maturity-Model.md
-
Redis running on Kubernetes - Is there some reference architecture for that?
The Redis Operator defines a Custom Resource (RedisEnterpriseCluster). The Operator creates several k8s resources behind the scene as part of handling this Custom Resource. Here is a graphical output showing all the resources that are created by the Operator: https://github.com/cloud-ark/kubeplus/blob/master/examples/redislabs/redis.png
-
Best Practice for cluster roles for an MSP.
In our KubePlus project (https://github.com/cloud-ark/kubeplus) we abstract MSP and their consumers under Provider and Consumer APIs. These are Kubernetes-native APIs that form the focal point of defining RBAC policies for providers (MSP team) and the consumers.
-
Minikube VM. Iām having all sorts of trouble getting minikube to work. Does anyone know of a vm or lxc/LXD that is ready to go?
Note that you can skip cloning the repo. Just curl the Vagrantfile from to get started: https://github.com/cloud-ark/kubeplus/blob/master/Vagrantfile
What are some alternatives?
vcluster - vcluster - Create fully functional virtual Kubernetes clusters - Each vcluster runs inside a namespace of the underlying k8s cluster. It's cheaper than creating separate full-blown clusters and it offers better multi-tenancy and isolation than regular namespaces.
kiosk - kiosk š¢ Multi-Tenancy Extension For Kubernetes - Secure Cluster Sharing & Self-Service Namespace Provisioning
labs
crossplane - Cloud Native Control Planes
kots - KOTS provides the framework, tools and integrations that enable the delivery and management of 3rd-party Kubernetes applications, a.k.a. Kubernetes Off-The-Shelf (KOTS) Software.
sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets
redis-enterprise-k8s-docs
kamaji - Build and operate Kubernetes at scale with a fraction of operational burden.
porter - Porter enables you to package your application artifact, client tools, configuration and deployment logic together as a versioned bundle that you can distribute, and install with a single command.
helm-charts - Komodor.io public helm charts
flink-on-k8s-operator - Kubernetes operator for managing the lifecycle of Apache Flink and Beam applications.