Preface

Just Another Packet

Since the inception of networking two computers together, networking has been a crucial part of our infrastructure. The network has grown into layers and layers of complexity to support a multitude of use cases, and the advent of containers and projects like Mesophere and Kubernetes have not changed that. Contributors of Kubernetes have attempted to abstract networking complexity for developers. Computer Science is just that, abstraction upon abstraction. Kubernetes and its networking api is another abstraction to make it easier and faster to deploy applications for consumption. What about the administrator who has to manage Kubernetes? This book intends to dispel the mysticism around the abstractions Kubernetes puts in place, to guide administrators through the layers of complexity and help you realize it’s not just another packet.

Who this book is for

According to 451 Research: Application containers will be a $2.7bn market by 2020. This explosive growth in the container market underscores the need for IT professionals to be knowledgeable in how to deploy, manage, and troubleshoot containers.

This book is intended to be read from beginning to end for new Network, Linux or Cluster administrators where that Kuberenetes abstracts their efforts or can be used by more experienced DevOps Engineers to jump to specific topics for which they find themselves needing to be upskilled. Administrators of all three disciplines need to all need to be familiar with how to operate Kubernetes at scale.

In this book, readers will find the information required to navigate the layers of complexity that come with running a Kubernetes network. This book will peel back the abstractions that Kubernetes puts in place so that developers have a similar experience across deployments on-prim, in the cloud, and with managed services. Engineers responsible for production clusters operations and network up time will use this book to bridge the gap in their knowledge of those abstractions.

What you will learn

By the end of this book the reader will understand:

  • The Kubernetes networking model
  • CNCF Container Network Interface Project and how to choose one for their clusters
  • Networking and Linux primitives that power Kubernetes
  • Relationship between the abstractions powering the Kubernetes Network

And the reader will be able to:

  • Deploy and Manage a production scale network for Kubernetes Clusters
  • Troubleshoot underlying network related to applications issues inside a Kubernetes cluster

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Constant width italic

Shows text that should be replaced with user-supplied values or by values determined by context.

Tip

This element signifies a tip or suggestion.

Note

This element signifies a general note.

Warning

This element indicates a warning or caution.

Using Code Examples

Supplemental material (code examples, exercises, etc.) is available for download at https://github.com/oreillymedia/title_title.

If you have a technical question, or a problem using the code examples, please send email to .

This book is here to help you get your job done. In general, if example code is offered with this book, you may use it in your programs and documentation. You do not need to contact us for permission unless you’re reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing examples from O’Reilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your product’s documentation does require permission.

We appreciate, but generally do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: “Book Title by Some Author (O’Reilly). Copyright 2012 Some Copyright Holder, 978-0-596-xxxx-x.”

If you feel your use of code examples falls outside fair use or the permission given above, feel free to contact us at .

O’Reilly Online Learning

Note

For more than 40 years, O’Reilly Media has provided technology and business training, knowledge, and insight to help companies succeed.

Our unique network of experts and innovators share their knowledge and expertise through books, articles, and our online learning platform. O’Reilly’s online learning platform gives you on-demand access to live training courses, in-depth learning paths, interactive coding environments, and a vast collection of text and video from O’Reilly and 200+ other publishers. For more information, visit http://oreilly.com.

How to Contact Us

Please address comments and questions concerning this book to the publisher:

  • O’Reilly Media, Inc.
  • 1005 Gravenstein Highway North
  • Sebastopol, CA 95472
  • 800-998-9938 (in the United States or Canada)
  • 707-829-0515 (international or local)
  • 707-829-0104 (fax)

We have a web page for this book, where we list errata, examples, and any additional information. You can access this page at http://www.oreilly.com/catalog/catalogpage.

Email to comment or ask technical questions about this book.

For news and information about our books and courses, visit http://oreilly.com.

Find us on Facebook: http://facebook.com/oreilly.

Follow us on Twitter: http://twitter.com/oreillymedia.

Watch us on YouTube: http://www.youtube.com/oreillymedia.

Acknowledgments

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset