kubeplus
percona-xtradb-cluster-operator
Our great sponsors
kubeplus | percona-xtradb-cluster-operator | |
---|---|---|
38 | 3 | |
595 | 491 | |
2.9% | 2.9% | |
7.9 | 9.3 | |
about 1 month ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubeplus
- Traditional Shared Hosting on Kubernetes?
-
Kubebouncer - Custom admission controller webhooks
We went through this migration/upgrade in our KubePlus project (https://github.com/cloud-ark/kubeplus). It has an embedded webhook in it, fyi.
-
Is it a good idea to use k8s namespace-based multitenancy for delivering managed service of an application?
Thanks for the pointer. As per this document, 'Multi-customer tenancy' seems to be the closest to the managed/hosted application use case. Has anyone used KubePlus solution referenced here?
Yeah, any pointers for the challenges you faced, or any additional case study documentation will be helpful. Do you think solution like https://github.com/cloud-ark/kubeplus can be useful to simplify automation?
You might want to check out - KubePlus (https://github.com/cloud-ark/kubeplus), which has already been referenced in the thread and is exactly designed for building managed application services. I am the originator and core contributor to this project. KubePlus is a Kubernetes Operator that takes an application Helm chart and represents it as a Kubernetes API (CRD) on the cluster. This API allows you to create instances of the application in separate namespaces automatically ensuring a secure perimeter around each instance using NetworkPolicy, Resource Quota, and RBAC. These soft multi-tenancy measures are already mentioned in the thread along with the namespace. KubePlus has automated all of them for you under an API. This API not only allows the creation of the application instances but also supports day-2 operations such as monitoring, troubleshooting, and upgrades to simplify the end-to-end functioning of any managed application service. We are currently seeing interest from teams that want to create managed services for different types of containerized applications, including open-source platforms such as WordPress, Moodle, Ozone/OpenMRS, AI/ML workloads, etc. KubePlus has been tested successfully with all (90+) Bitnami Helm charts. For anyone who wants to deliver a managed application with minimal / no Kubernetes access to their customers, KubePlus can help by accelerating the implementation of namespace-based multi-tenancy on Kubernetes. With the ability to set NetworkPolicy and Resource Quota per application instance, the blast radius is restricted, if something goes wrong in an application instance. KubePlus does not need admin permissions on your cluster. This makes it possible to use KubePlus to manage your application instances on your customer's cluster as well.
-
Writing a Kubernetes Operator
We have an FAQ about Operators here: https://github.com/cloud-ark/kubeplus/blob/master/Operator-F...
It should be helpful if you are new to the Operator concept.
Operators are generally useful for handling domain-specific actions - for example, performing database backups, installing plugins on Moodle/Wordpress, etc. If you are looking for application deployment then a Helm chart should be sufficient.
-
Kubernetes for SaaS with multi-instance
A more commerical offering is from Cloudark who have designed a specific solution for operating your Helm application as a SaaS offering. I have never used it (ArgoCD being my poison) but you might find it fits your usecase better
-
What is your experience with operators?
You might also want to checkout Operator guidelines and Operator FAQ: - Operator Maturity Model guidelines: https://github.com/cloud-ark/kubeplus/blob/master/Guidelines.md
-
Does anybody need a Kubernetes Operator for auto renewing SSL certificates?
The project that is getting some traction recently is our KubePlus Operator that delivers Helm charts as-a-service: https://github.com/cloud-ark/kubeplus
-
Feedback wanted on pod resource metrics before GA promotion
When you say capacity planning, can you elaborate on some use-case(s) that are being targeted with this feature? Is the idea that knowing the actual usage directly from the scheduler can help deployers, either from outside the cluster or in-cluster via GitOps, make informed decisions such as configuring node selectors on any future Pods? The reason I ask this is - in our project (KubePlus - https://github.com/cloud-ark/kubeplus ) we support Node selector policies at Helm chart level. This enables, for example, to create a Helm release on a specific worker node. Currently KubePlus is not using any metrics data to decide whether a particular node has enough spare capacity to accommodate the incoming Helm release. If the Pod metrics are available from the scheduler then we can correlate those with the nodes on which the Pods are running and then decide whether a node has enough remaining capacity to support the resources of the Helm release.
percona-xtradb-cluster-operator
-
How do you make OS upgrades without downtime?
Percona has a good option for that.
- Opensource K8s operator developed in Go to contribute
What are some alternatives?
vcluster - vCluster - Create fully functional virtual Kubernetes clusters - Each vcluster runs inside a namespace of the underlying k8s cluster. It's cheaper than creating separate full-blown clusters and it offers better multi-tenancy and isolation than regular namespaces.
capsule - Multi-tenancy and policy-based framework for Kubernetes.
labs
kots - KOTS provides the framework, tools and integrations that enable the delivery and management of 3rd-party Kubernetes applications, a.k.a. Kubernetes Off-The-Shelf (KOTS) Software.
istio - Connect, secure, control, and observe services.
crossplane - The Cloud Native Control Plane
mongodb-kubernetes-operator - MongoDB Community Kubernetes Operator
sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets
porter - Porter enables you to package your application artifact, client tools, configuration and deployment logic together as an installer that you can distribute, and install with a single command.
moco - MySQL operator on Kubernetes using GTID-based semi-synchronous replication.
helm-charts - Komodor.io public helm charts
deckhouse - Kubernetes platform from Flant