×
思维导图备注
OpenShift OKD v3.10 Documentation
首页
白天
夜间
小程序
阅读
书签
我的书签
添加书签
移除书签
Core Concepts
Github
来源:RedHat
浏览
268
扫码
分享
2021-05-23 23:23:52
Overview
Containers and Images
Pods and Services
Projects and Users
Builds and Image Streams
Deployments
当前内容版权归
RedHat
或其关联方所有,如需对内容或内容相关联开源项目进行关注与资助,请访问
RedHat
.
上一篇:
下一篇:
版本
OpenShift OKD v4.15 Documentation
OpenShift OKD v4.14 Documentation
OpenShift OKD v4.13 Documentation
OpenShift OKD v4.12 Documentation
OpenShift OKD v4.11 Documentation
OpenShift OKD v4.10 Documentation
OpenShift OKD v4.9 Documentation
OpenShift OKD v4.8 Documentation
OpenShift OKD v4.7 Documentation
OpenShift OKD v4.6 Documentation
OpenShift OKD v3.11 Documentation
OpenShift OKD v3.10 Documentation
About
Welcome
What’s New?
Overview
Applications
Cartridges Versus Images
Terminology
Getting Started
Overview
Web Console Walkthrough
Command-Line Walkthrough
Setting Up a Cluster
Architecture
Overview
Infrastructure Components
Kubernetes Infrastructure
Container Registry
Web Console
Core Concepts
Overview
Containers and Images
Pods and Services
Projects and Users
Builds and Image Streams
Deployments
Additional Concepts
Authentication
Authorization
Persistent Storage
Ephemeral Storage
Source Control Management
Admission Controllers
Custom Admission Controllers
Other API Objects
Networking
Networking
OpenShift SDN
Available SDN plug-ins
Available router plug-ins
Port Forwarding
Remote Commands
Routes
Service Catalog Components
Service Catalog
Service Catalog CLI
Template Service Broker
OpenShift Ansible Broker
Container Security Guide
Introduction
Container Hosts and Multi-tenancy
Container Content
Registries
Build Process
Deployment
Securing the Container Platform
Network Security
Attached Storage
Monitoring Events and Logs
Installing Clusters
Planning Your Installation
System and Environment Requirements
Preparing Your Hosts
Configuring Your Inventory File
Example Inventory Files
Running Installation Playbooks
Installing a Stand-alone Deployment of OpenShift Container Registry
Upgrading Clusters
Upgrade Methods and Strategies
In-place Upgrades
Blue-Green Deployments
Updating Operating Systems
Configuring Clusters
Overview
Setting up the Registry
Registry Overview
Deploying a Registry on Existing Clusters
Accessing the Registry
Securing and Exposing the Registry
Extended Registry Configuration
Known Issues
Setting up a Router
Router Overview
Using the Default HAProxy Router
Deploying a Customized HAProxy Router
Configuring the HAProxy Router to Use the PROXY Protocol
Using the F5 Router Plug-in
Deploying Red Hat CloudForms
Introduction
Requirements
Configuring Role Variables
Running the Installer
Enabling Container Provider Integration
Uninstalling
Master and Node Configuration
OpenShift Ansible Broker Configuration
Adding Hosts to an Existing Cluster
Loading the Default Image Streams and Templates
Configuring Custom Certificates
Redeploying Certificates
Configuring Authentication and User Agent
Syncing groups with LDAP
Configuring LDAP failover
Configuring the SDN
Configuring Nuage SDN
Configuring Kuryr SDN
Configuring for AWS
Configuring for Red Hat Virtualization
Configuring for OpenStack
Configuring for Google Compute Engine
Configuring for Azure
Configuring for VMWare vSphere
Configuring Local Volumes
Configuring Persistent Storage
Overview
Using NFS
Using GlusterFS
Using OpenStack Cinder
Using Ceph RBD
Using AWS Elastic Block Store
Using GCE Persistent Disk
Using iSCSI
Using Fibre Channel
Using Azure Disk
Using Azure File
Using FlexVolume
Using VMware vSphere volumes for persistent storage
Using Local Volume
Using Container Storage Interface (CSI)
Using OpenStack Manila shares
Dynamic Provisioning and Creating Storage Classes
Volume Security
Selector-Label Volume Binding
Enabling Controller-managed Attachment and Detachment
Persistent Volume Snapshots
Persistent Storage Examples
Overview
Sharing an NFS PV Across Two Pods
Using Ceph RBD for Persistent Storage
Using Ceph RBD for dynamic provisioning
Complete Example Using GlusterFS
Complete Example Using GlusterFS for Dynamic Provisioning
Mounting Volumes To Privileged Pods
Switching an Integrated OpenShift Container Registry to GlusterFS
Binding Persistent Volumes by Label
Using StorageClasses for Dynamic Provisioning
Using StorageClasses for Existing Legacy Storage
Configuring Azure Blob Storage for Integrated Docker Registry
Configuring Ephemeral Storage
Working with HTTP Proxies
Configuring Global Build Defaults and Overrides
Configuring Pipeline Execution
Configuring Route Timeouts
Configuring Native Container Routing
Routing from Edge Load Balancers
Aggregating Container Logs
Aggregate Logging Sizing Guidelines
Enabling Cluster Metrics
Customizing the Web Console
Deploying External Persistent Volume Provisioners
Day Two Operations Guide
Overview
Run-once tasks
Environment health checks
Creating an environment-wide backup
Host-level tasks
Project-level tasks
Docker tasks
Managing Certificates
Cluster Administration
Overview
Managing Nodes
Restoring your cluster
Replacing a master host
Managing Users
Managing Projects
Managing Pods
Managing Networking
Configuring Service Accounts
Managing Role-based Access Control
Image Policy
Image Signatures
Scoped Tokens
Monitoring Images
Managing Security Context Constraints
Scheduling
Overview
Default Scheduling
Descheduling
Custom Scheduling
Controlling Pod Placement
Advanced Scheduling
Advanced Scheduling and Node Affinity
Advanced Scheduling and Pod Affinity/Anti-affinity
Advanced Scheduling and Node Selectors
Advanced Scheduling and Taints and Tolerations
Setting Quotas
Setting Multi-Project Quotas
Setting Limit Ranges
Pruning objects
Extending the Kubernetes API with Custom Resources
Garbage Collection
Allocating Node Resources
Opaque Integer Resources
Node Problem Detector
Overcommitting
Assigning Unique External IPs for Ingress Traffic
Out of Resource Handling
Monitoring and Debugging Routers
High Availability
IPtables
Securing Builds by Strategy
Restricting Application Capabilities Using Seccomp
Sysctls
Encrypting Data at Datastore Layer
Encrypting traffic between nodes with IPsec
Building Dependency Trees
Replacing a failed etcd member
Restoring etcd quorum
Troubleshooting Networking
Diagnostics Tool
Idling Applications
Analyzing Cluster Capacity
Disabling Features using Feature Gates
Kuryr SDN Administration
Scaling and Performance Guide
Overview
Recommended Installation Practices
Recommended Host Practices
Optimizing Compute Resources
Optimizing Persistent Storage
Optimizing Ephemeral Storage
Network Optimization
Routing Optimization
Scaling Cluster Metrics
Cluster Limits
Using Cluster Loader
Using CPU Manager
Managing Huge Pages
Optimizing On GlusterFS Storage
CLI Reference
Overview
Get Started with the CLI
Managing CLI Profiles
Developer CLI Operations
Administrator CLI Operations
Differences Between oc and kubectl
Extending the CLI
Developer Guide
Overview
Application Life Cycle Management
Planning Your Development Process
Creating New Applications
Promoting Applications Across Environments
Authentication
Authorization
Projects
Migrating Applications
Overview
Database Applications
Web Framework Applications
QuickStart Examples
Continuous Integration and Deployment
Webhooks and Action Hooks
S2I Tool
Support Guide
Tutorials
Overview
Quickstart Templates
Ruby on Rails
Setting Up a Nexus Mirror
OpenShift Pipeline Builds
Binary Builds
Builds
How Builds Work
Basic Build Operations
Build Inputs
Build Output
Build Strategy Options
Build Environment
Triggering Builds
Build Hooks
Build Run Policy
Advanced Build Operations
Troubleshooting
Deployments
How Deployments Work
Basic Deployment Operations
Deployment Strategies
Advanced Deployment Strategies
Kubernetes Deployments Support
Templates
Opening a Remote Shell to Containers
Service Accounts
Managing Images
Quotas and Limit Ranges
Injecting Information into Pods Using Pod Presets
Getting Traffic into a Cluster
Overview
Using a Router
Using a Load Balancer
Using a Service ExternalIP
Using a NodePort
Routes
Integrating External Services
Using Device Manager
Using Device Plug-ins
Secrets
ConfigMaps
Downward API
Projected Volumes
Using Daemonsets
Pod Autoscaling
Managing Volumes
Using Persistent Volumes
Expanding Persistent Volumes
Executing Remote Commands
Copying Files
Port Forwarding
Shared Memory
Application Health
Events
Managing Environment Variables
Jobs
OpenShift Pipeline
Cron Jobs
Create from URL
Creating an object from a custom resource definition
Application memory sizing
Creating Images
Overview
Guidelines
Image Metadata
S2I Requirements
Testing S2I Images
Custom Builder
Using Images
Source-to-Image (S2I)
Overview
Java
Node.js
Perl
PHP
Python
Ruby
Customizing S2I Images
Database Images
Overview
MySQL
PostgreSQL
MongoDB
MariaDB
Other Images
Overview
Jenkins
Jenkins Slaves
Other Container Images
Source-to-Image (S2I)
Ansible Playbook Bundle Development Guide
Introduction
CLI Tooling
Writing APBs
Getting Started
Reference
REST API Reference
Overview
Examples
/apis/v1
v1.APIResourceList
v1.APIVersions
v1.Binding
v1.ComponentStatus
v1.ConfigMap
v1.Endpoints
v1.Event
v1.LimitRange
v1.Namespace
v1.Node
v1.PersistentVolume
v1.PersistentVolumeClaim
v1.Pod
v1.PodTemplate
v1.ReplicationController
v1.ResourceQuota
v1.Secret
v1.SecurityContextConstraints
v1.Service
v1.ServiceAccount
v1.APIGroup
v1.APIGroupList
/apis/apps/v1beta1
v1beta1.ControllerRevision
v1beta1.Deployment
v1beta1.StatefulSet
/apis/autoscaling/v1
v1.HorizontalPodAutoscaler
/apis/batch/v1
v1.Job
/apis/batch/v2alpha1
v2alpha1.CronJob
v2alpha1.ScheduledJob
/apis/extensions/v1beta1
v1beta1.DaemonSet
v1beta1.Deployment
v1beta1.Ingress
v1beta1.NetworkPolicy
v1beta1.PodSecurityPolicy
v1beta1.ReplicaSet
v1beta1.ThirdPartyResource
/apis/policy/v1beta1
v1beta1.PodDisruptionBudget
/apis/authentication.k8s.io/v1
v1.TokenReview
/apis/authentication.k8s.io/v1beta1
v1beta1.TokenReview
/apis/authorization.k8s.io/v1
v1.LocalSubjectAccessReview
v1.SelfSubjectAccessReview
v1.SubjectAccessReview
/apis/authorization.k8s.io/v1beta1
v1beta1.LocalSubjectAccessReview
v1beta1.SelfSubjectAccessReview
v1beta1.SubjectAccessReview
/apis/rbac.authorization.k8s.io/v1beta1
v1beta1.ClusterRole
v1beta1.ClusterRoleBinding
v1beta1.Role
v1beta1.RoleBinding
/apis/certificates.k8s.io/v1beta1
v1beta1.CertificateSigningRequest
/apis/networking.k8s.io/v1
v1.NetworkPolicy
/apis/storage.k8s.io/v1
v1.StorageClass
/apis/storage.k8s.io/v1beta1
v1beta1.StorageClass
/apis/apps.openshift.io/v1
v1.DeploymentConfig
/apis/authorization.openshift.io/v1
v1.ClusterRole
v1.ClusterRoleBinding
v1.LocalResourceAccessReview
v1.LocalSubjectAccessReview
v1.ResourceAccessReview
v1.Role
v1.RoleBinding
v1.RoleBindingRestriction
v1.SelfSubjectRulesReview
v1.SubjectAccessReview
v1.SubjectRulesReview
/apis/build.openshift.io/v1
v1.Build
v1.BuildConfig
/apis/image.openshift.io/v1
v1.Image
v1.ImageSignature
v1.ImageStream
v1.ImageStreamImage
v1.ImageStreamImport
v1.ImageStreamMapping
v1.ImageStreamTag
/apis/network.openshift.io/v1
v1.ClusterNetwork
v1.EgressNetworkPolicy
v1.HostSubnet
v1.NetNamespace
/apis/oauth.openshift.io/v1
v1.OAuthAccessToken
v1.OAuthAuthorizeToken
v1.OAuthClient
v1.OAuthClientAuthorization
/apis/project.openshift.io/v1
v1.Project
v1.ProjectRequest
/apis/quota.openshift.io/v1
v1.AppliedClusterResourceQuota
v1.ClusterResourceQuota
/apis/route.openshift.io/v1
v1.Route
/apis/security.openshift.io/v1
v1.PodSecurityPolicyReview
v1.PodSecurityPolicySelfSubjectReview
v1.PodSecurityPolicySubjectReview
v1.SecurityContextConstraints
/apis/template.openshift.io/v1
v1.BrokerTemplateInstance
v1.Template
v1.TemplateInstance
/apis/user.openshift.io/v1
v1.Group
v1.Identity
v1.User
v1.UserIdentityMapping
/oapi/v1
v1.AppliedClusterResourceQuota
v1.Build
v1.BuildConfig
v1.ClusterNetwork
v1.ClusterResourceQuota
v1.ClusterRole
v1.ClusterRoleBinding
v1.DeploymentConfig
v1.DeploymentConfigRollback
v1.EgressNetworkPolicy
v1.Group
v1.HostSubnet
v1.Identity
v1.Image
v1.ImageSignature
v1.ImageStream
v1.ImageStreamImage
v1.ImageStreamImport
v1.ImageStreamMapping
v1.ImageStreamTag
v1.LocalResourceAccessReview
v1.LocalSubjectAccessReview
v1.NetNamespace
v1.OAuthAccessToken
v1.OAuthAuthorizeToken
v1.OAuthClient
v1.OAuthClientAuthorization
v1.PodSecurityPolicyReview
v1.PodSecurityPolicySelfSubjectReview
v1.PodSecurityPolicySubjectReview
v1.ProcessedTemplate
v1.Project
v1.ProjectRequest
v1.ResourceAccessReview
v1.Role
v1.RoleBinding
v1.RoleBindingRestriction
v1.Route
v1.SelfSubjectRulesReview
v1.SubjectAccessReview
v1.SubjectRulesReview
v1.Template
v1.User
v1.UserIdentityMapping
/apis/authorization.k8s.io/v1beta1
/apis/rbac.authorization.k8s.io/v1beta1
/apis/authentication.k8s.io/v1beta1
/apis/authorization.openshift.io/v1
/api/v1
/apis/apps.openshift.io/v1
/apis/apps/v1beta1
/apis/authentication.k8s.io/v1
/apis/authorization.k8s.io/v1
/apis/autoscaling/v1
/apis/batch/v1
/apis/batch/v2alpha1
/apis/build.openshift.io/v1
/apis/extensions/v1beta1
/apis/image.openshift.io/v1
/apis/network.openshift.io/v1
/apis/networking.k8s.io/v1
/apis/oauth.openshift.io/v1
/apis/policy/v1beta1
/apis/project.openshift.io/v1
/apis/quota.openshift.io/v1
/apis/route.openshift.io/v1
/apis/security.openshift.io/v1
/apis/storage.k8s.io/v1
/apis/storage.k8s.io/v1beta1
/apis/template.openshift.io/v1
/apis/user.openshift.io/v1
/apis/v1
/oapi/v1
/apis/certificates.k8s.io/v1beta1
暂无相关搜索结果!
本文档使用
BookStack
构建
×
分享,让知识传承更久远
×
文章二维码
手机扫一扫,轻松掌上读
×
文档下载
普通下载
下载码下载(免登录无限下载)
你与大神的距离,只差一个APP
请下载您需要的格式的文档,随时随地,享受汲取知识的乐趣!
PDF
文档
EPUB
文档
MOBI
文档
温馨提示
每天每在网站阅读学习一分钟时长可下载一本电子书,每天连续签到可增加阅读时长
下载码方式下载:免费、免登录、无限制。
免费获取下载码
下载码
文档格式
PDF
EPUB
MOBI
码上下载
×
微信小程序阅读
您与他人的薪资差距,只差一个随时随地学习的小程序
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度