Book Image

Hands-On Kubernetes on Windows

By : Piotr Tylenda
Book Image

Hands-On Kubernetes on Windows

By: Piotr Tylenda

Overview of this book

With the adoption of Windows containers in Kubernetes, you can now fully leverage the flexibility and robustness of the Kubernetes container orchestration system in the Windows ecosystem. This support will enable you to create new Windows applications and migrate existing ones to the cloud-native stack with the same ease as for Linux-oriented cloud applications. This practical guide takes you through the key concepts involved in packaging Windows-distributed applications into containers and orchestrating these using Kubernetes. You'll also understand the current limitations of Windows support in Kubernetes. As you advance, you'll gain hands-on experience deploying a fully functional hybrid Linux/Windows Kubernetes cluster for development, and explore production scenarios in on-premises and cloud environments, such as Microsoft Azure Kubernetes Service. By the end of this book, you'll be well-versed with containerization, microservices architecture, and the critical considerations for running Kubernetes in production environments successfully.
Table of Contents (23 chapters)
1
Section 1: Creating and Working with Containers
5
Section 2: Understanding Kubernetes Fundamentals
9
Section 3: Creating Windows Kubernetes Clusters
12
Section 4: Orchestrating Windows Containers Using Kubernetes

Chapter 11: Configuring Applications to Use Kubernetes Features

  1. The general principle of namespaces is providing resource quotas and a scope for object names. You will organize the namespaces depending on the size of your cluster and your team.
  2. The readiness probe is used to determine whether a given container is ready to accept traffic. The liveness probe is used to detect whether a container needs to be restarted.
  3. The wrong configuration of this probe can result in cascading failures in your services and container restart loops.
  4. requests specifies the guaranteed amount of a given resource provided by the system. limits specifies the maximum amount of a given resource provided by the system.
  5. Avoiding thrashing (replica count fluctuating frequently).
  6. ConfigMaps and Secrets can hold technically any type of data consisting of key-value pairs. The purpose of Secrets is keeping sensitive...