This is the multi-page printable view of this section. Click here to print.
2019
Cluster Overprovisioning
A tutorial was added that describes how to create an overprovisioning of cluster nodes for scaling and failover. This is desired when you have a work load that you need to scale up quickly without waiting for the new cluster nodes to be created and join the cluster.
A similar problem occurs when crashing a node from the Hyperscaler. This must be replaced by Kubernetes as fast as possible. The solution can be the overprovisioning of nodes.
Learn more on Cluster Overprovisioning.
Feature Flags in Kubernetes Applications
Feature flags are used to change the behavior of a program at runtime without forcing a restart.
Although they are essential in a native cloud environment, they cannot be implemented without significant effort on some platforms. Kubernetes has made this trivial. Here we will implement them through labels and annotations, but you can also implement them by connecting directly to the Kubernetes API Server.
Possible Use Cases
- Turn on/off a specific instance
- Turn on/off the profiling of a specific instance
- Change the logging level, to capture detailed logs during a specific event
- Change caching strategy at runtime
- Change timeouts in production
- Toggle on/off some special verification
Manually Adding a Node to an Existing Cluster
Gardener has an excellent ability to automatically scale machines for the cluster. From the point of view of scalability, there is no need for manual intervention.
This tutorial is useful for those end-users who need specifically configured nodes, which are not yet supported by Gardener. For example: an end-user who wants some workload that requires runnc
instead of runc
as container runtime.
Learn more on Adding Nodes to a Cluster.
Organizing Access Using kubeconfig Files
The kubectl command-line tool uses kubeconfig
files to find the information it needs in order to choose a cluster and communicate with its API server.
What happens if the kubeconfig file of your production cluster is leaked or published by accident?
Since there is no possibility to rotate or revoke the initial kubeconfig, there is only one way to protect your infrastructure or application if the kubeconfig has leaked - delete the cluster.
Learn more on Organizing Access Using kubeconfig Files.