TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bootstrapping Kubernetes Google Cloud Platform without scripts

153 pointsby kelseyhightoweralmost 8 years ago

6 comments

runeksalmost 8 years ago
Is it me, or does it seem weird to encrypt your secrets by uploading the secret key to GCP (contained in the config .yaml file)? I assume the controller instances are operated by Google in this[1] example.<p>Moreover, is there any sensible way at all to encrypt secrets without baking the secret key into your image? I can’t think of any.<p>I want to deploy an app that makes use of one or more fairly important secrets, but I haven’t found a sensible way to make it auto-scale while keeping the secrets on-premise.<p>As far as I can see, the only sensible solution is to create in-cloud&#x2F;off-premise secret keys that can only be accessed by images signed with an on-premise secret key.<p>So,<p>1. Create secret key on an offline, on-premise machine<p>2. Produce application image, transfer to offline machine, sign with on-premise secret key<p>3. Create off-premise (in-cloud) secret, which can only be accessed by images signed with the on-premise secret key<p>4. Upload app image and signature to the cloud, allowing only this image access to the in-cloud secret<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;kelseyhightower&#x2F;kubernetes-the-hard-way&#x2F;blob&#x2F;1.7.4&#x2F;docs&#x2F;06-data-encryption-keys.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kelseyhightower&#x2F;kubernetes-the-hard-way&#x2F;b...</a>
评论 #15141508 未加载
评论 #15142560 未加载
评论 #15142430 未加载
评论 #15141407 未加载
评论 #15148408 未加载
评论 #15142029 未加载
评论 #15141499 未加载
limaalmost 8 years ago
I can highly recommend OpenShift and its Ansible deployment scripts. Documentation is very well-written and complete.<p>It takes care of all the annoying parts of Kubernetes and even has services like a full-featured Docker registry with ACLs and so on, a Docker build system and even a centralized logging mechanism (all optional, of course).<p>Running it in production. Couldn&#x27;t be happier.
sleepybrettalmost 8 years ago
The best way to actually understand how the kube components relate to each other and work together is to follow this guide.
MandieDalmost 8 years ago
Going through the previous version of this tutorial really helped me, even though we&#x27;re doing IBM Cloud private on-prem + Bluemix Container Service (don&#x27;t ask.)<p>It works pretty well with Cloud Shell, in case you have corporate firewall issues. If your session is interrupted, run the commands that set the region and region zone again.<p>I can confirm that it costs about $6&#x2F;day that the machines are provisioned, and is well worth it, but remember to run all the clean-up steps in the last chapter when you&#x27;re done or if you&#x27;re not going to finish it right away.
djb_hackernewsalmost 8 years ago
This is great. I have been looking at Kubernetes for sometime and have struggled with adapting it to our deployment model. A lot of the tools and tutorials want someone to sit and run commands in order to start controllers and worker nodes but that doesn&#x27;t make sense in our automated environment. What we really want is a way to bake AMIs etc that have everything ready to go and when we do a deployment or scale out it is as simple as starting an instance. This collection of labs lays a lot of that out and I think this is something we can work with.
评论 #15141237 未加载
hoshalmost 8 years ago
I did something similar off of CoreOS&#x27;s tutorial. So while I&#x27;m missing a lot of understanding of the newer functionality, going through this was worth it.
评论 #15151030 未加载