Book Image

IoT Edge Computing with MicroK8s

By : Karthikeyan Shanmugam
Book Image

IoT Edge Computing with MicroK8s

By: Karthikeyan Shanmugam

Overview of this book

Are you facing challenges with developing, deploying, monitoring, clustering, storing, securing, and managing Kubernetes in production environments as you're not familiar with infrastructure technologies? MicroK8s - a zero-ops, lightweight, and CNCF-compliant Kubernetes with a small footprint is the apt solution for you. This book gets you up and running with production-grade, highly available (HA) Kubernetes clusters on MicroK8s using best practices and examples based on IoT and edge computing. Beginning with an introduction to Kubernetes, MicroK8s, and IoT and edge computing architectures, this book shows you how to install, deploy sample apps, and enable add-ons (like DNS and dashboard) on the MicroK8s platform. You’ll work with multi-node Kubernetes clusters on Raspberry Pi and networking plugins (such as Calico and Cilium) and implement service mesh, load balancing with MetalLB and Ingress, and AI/ML workloads on MicroK8s. You’ll also understand how to secure containers, monitor infrastructure and apps with Prometheus, Grafana, and the ELK stack, manage storage replication with OpenEBS, resist component failure using a HA cluster, and more, as well as take a sneak peek into future trends. By the end of this book, you’ll be able to use MicroK8 to build and implement scenarios for IoT and edge computing workloads in a production environment.
Table of Contents (24 chapters)
1
Part 1: Foundations of Kubernetes and MicroK8s
4
Part 2: Kubernetes as the Preferred Platform for IOT and Edge Computing
7
Part 3: Running Applications on MicroK8s
14
Part 4: Deploying and Managing Applications on MicroK8s
21
Frequently Asked Questions About MicroK8s

Configuring Connectivity for Containers

We learned how to set up a MicroK8s Raspberry Pi multi-node cluster, deploy a sample application, and perform rolling updates on the deployed application in the previous chapter. We also figured out how to scale the deployed application. We also learned about a few best practices for designing a Kubernetes cluster that is scalable, secure, and highly optimized. In this and the following chapters, we’ll continue to implement various use cases of common edge-computing applications using MicroK8s. Kubernetes provides several ways for exposing Services to the outside world.

In this chapter, we'll continue with our next use case, which is about container network connectivity on MicroK8s. Each Pod in the Kubernetes network model is assigned its own Internet Protocol (IP) address by default. As a result, you won’t have to explicitly link or network Pods together, and you shouldn’t have to bother with mapping container ports...