51CTO has launched the short video function - you can pay attention to it
![Lecturer](https://s1.51ctocdn.cn/images/202308/d2194e006ab6bb0f722757e3550e0141dfc569.png)
Kill 99% of the traditional O&M, and improve the efficiency of code launch by a hundredfold: build a CICD pipeline based on Jenkins and k8s This video shows the automated deployment of code through the combination of Kubernetes and Continuous Integration and Continuous Deployment (CI/CD). Start the automatic DevOps pipeline with one button, and automatically complete the whole process from code submission to running in different environments. The whole steps of creating a pipeline are demonstrated, including code pulling, build testing, image building, image pushing to the Harbor warehouse, and deployment in the Kubernetes cluster. This process simplifies the work from development to operation and maintenance, and realizes the integration of development, operation and maintenance. As a result, technicians can focus more on coding instead of frequently operating the deployment process. It is suitable for technicians interested in automated deployment, container technology and DevOps process. 05:10 69 thousand How does kubernetes modify kernel parameters This video shows the modification of Linux kernel parameters and the loading steps of the kernel module BR net filter to bridge and forward network traffic. It explains how to enable IP6tables and IP forwarding and ensure the communication between Docker containers by modifying the configuration file/etc/sysctl.d/docker.conf. The video further guides how to make these configurations still take effect after the system restarts. The module can be automatically loaded by editing the/etc/rc.d/rc.local file and giving appropriate permissions. In addition, the Docker configuration, especially the setting of the image accelerator, is also mentioned to optimize the pulling speed of container images. The content is suitable for system administrators, network engineers, and DevOps projects who want to optimize the Linux system running container environment. 08:21 42 thousand The complete process of deploying any code or service in the K8S cluster Han Jianchao, a senior K8S architect, explained the whole process of code and service deployment to Kubernetes (K8S). The first step of the process includes that the development team builds the code in the K8S environment, and the next step involves packaging the code or service into an image and uploading it to the private image warehouse. Then it explains the use of Pod to deploy services, and emphasizes that in order to deal with the dynamic IP problem of Pod, it is necessary to create a service or use Ingress controller to carry out a seven layer proxy. Finally, complete the entire deployment process and master the use of monitoring system and log platform for maintenance. The content is aimed at K8S developers, operation and maintenance engineers, testers and technicians interested in Kubernetes. 03:00 10 thousand Internet architecture development trend The course first explains the basic knowledge of containers, emphasizing that even though students have access to Kubernetes (K8S) and the container orchestration platform, they still need to understand container operations, such as using Docker commands for basic operations and test images. Then we will talk about the development of Internet architecture from physical server to virtualization technology, emphasizing the improvement of resource utilization and service management. While virtualization provides an independent environment, it introduces more difficult management problems, which leads to the generation of cloud computing and container orchestration systems, such as the example of K8S for container orchestration. It further explains how container technology can improve the flexibility of service deployment and resource utilization, ultimately leading to the rise of cloud native technology, especially K8S. The content is intended for developers, system administrators, cloud computing experts, K8S operators and those interested in cloud native technology who want to deeply understand the container and its role in modern Internet architecture. 06:17 29 thousand What is a container The container technology and its differences and advantages from traditional virtualization technology are explained. Taking Docker as an example, this paper explains the container concept and application scenarios, and analyzes the container's ability to be closed, independent, and rapidly deployed. It emphasizes the importance of containers in production, and explains how images contain basic environment and business code. Containers are entities that run images. The performance comparison between container and virtual machine is proposed, and the container is faster, lighter, and the development trend of container management platform is pointed out. The content is suitable for technicians who want to have a deep understanding of containers and seek performance optimization. 07:36 22 thousand Docker searches and downloads images The video content focuses on the application of Docker technology in image acquisition. First, it explains the two categories of images: basic images and user-defined images. It points out that users need to download basic images first to start learning Docker. It also explains in detail how to download images from different sources (including Docker officials and domestic sources), how to improve download speed through configuration, and how to identify and manage images. This article explains how to export and import image transmission in an intranet environment, so as to facilitate the use of an environment that cannot connect to the Internet directly. The content is suitable for beginners and developers who want to improve the efficiency of Docker operations. 09:48 20 thousand Operation and maintenance interview: talk about RAID and understand the system The video content discusses several configuration methods and characteristics of RAID, including RAID 0, RAID 1, RAID 5 and RAID 10. RAID 0 provides high-speed read and write capability but lacks redundancy. It is suitable for situations with high read and write speed requirements, such as exploring clusters. RAID 1 improves data reliability through mirroring, and is suitable for applications requiring high redundancy, such as monitoring systems. RAID 5 balances read-write performance and redundancy, and is commonly used in enterprise applications. RAID 10 combines the advantages of RAID 0 and RAID 1, providing high speed and redundancy, but at a high cost. The content explains the applicable scenarios of each configuration mode and the consideration of enterprise selection, which is very suitable for IT professionals who want to understand the configuration and applicability of different disk arrays. 07:23 18 thousand How to publish services on K8s The video describes the concept and core components of service publishing on the Kubernetes platform (KPS), including inter service and external user oriented communication traffic: "north-south traffic" and "east-west traffic". This article describes how to use Service resources to manage pod access internally, and how to use Ingress resources to handle external access and route to corresponding services. It details the load balancing strategy for service deployment, such as using NGNIX or the load balancer provided by cloud services on the front end, such as Alibaba Cloud SLB. At the same time, it explains how services can access each other through service discovery, and obtain information such as the IP address of the corresponding service through a registry such as Eureka. The content is suitable for technicians interested in Kubernetes platform architecture, service publishing process and the load balancing and service discovery mechanism behind it. 07:37 17 thousand
![[2024] Kubernetes/k8s+DevOps cloud native full stack technology: based on the world's top 1000 practical courses](https://s2.51cto.com/images/202309/22/4965d170c9c66953422d6b2ecaf80e98.png?x-oss-process=image)
![[2024] K8s whole stack technology intensive lecture: high paid practical kubernetes course [introduction to practical combat] real cases of big factories](https://s2.51cto.com/images/202309/27/e08b15dc07846d89d79a441a7dadbd9c.png?x-oss-process=image)
![Kubernetes/k8s full stack technology explanation+enterprise level practical project course](https://s2.51cto.com/images/avater/202012/66ef25f34dbdb43f386622bce641dfd1db6c24.jpg?x-oss-process=image)
![Quick Reference Guide to K8S Common Faults](https://s2.51cto.com/images/202309/22/b8f1c0a8919642c4b5df306239a90749.png?x-oss-process=image)
![K8s/kubernetes installation uses+ceph to implement backend persistent storage](https://s2.51cto.com/images/avater/202107/c37fc684205274f97596611d2d86261306d2d1.jpg?x-oss-process=image)
![K8S+DevOps cloud native full stack technology: high paid practical Kubernetes courses based on the world's top 500 (free experience version)](https://s2.51cto.com/images/202206/06/5da169ac23cd4ec6dc2df6c0a24a5aa6.png?x-oss-process=image)
![Unlock K8s from zero](https://s2.51cto.com/images/avater/202101/4205f526129538eba94727e974fd175bf39d7a.jpg?x-oss-process=image)
![[2024] K8S/Kubernetes version upgrade](https://s2.51cto.com/images/avater/202212/d235b12255e38a55e85061c56e20af42f7e692.jpg?x-oss-process=image)