diff --git a/docs/cce/umn/ALL_META.TXT.json b/docs/cce/umn/ALL_META.TXT.json index bebc082e..250c6c81 100644 --- a/docs/cce/umn/ALL_META.TXT.json +++ b/docs/cce/umn/ALL_META.TXT.json @@ -1,48 +1,168 @@ [ + { + "uri":"en-us_topic_0000001550437509.html", + "product_code":"cce", + "code":"1", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Service Overview", + "title":"Service Overview", + "githuburl":"" + }, { "uri":"cce_01_0091.html", "product_code":"cce", - "code":"1", - "des":"Cloud Container Engine (CCE) provides highly scalable, high-performance, enterprise-class Kubernetes clusters and supports Docker containers. With CCE, you can easily dep", + "code":"2", + "des":"Cloud Container Engine (CCE) is a scalable, enterprise-class hosted Kubernetes service. With CCE, you can easily deploy, manage, and scale containerized applications in t", "doc_type":"usermanual2", - "kw":"What Is Cloud Container Engine?,User Guide", + "kw":"What Is Cloud Container Engine?,Service Overview,User Guide", "title":"What Is Cloud Container Engine?", "githuburl":"" }, { - "uri":"cce_qs_0001.html", + "uri":"cce_productdesc_0003.html", "product_code":"cce", - "code":"2", - "des":"This document provides instructions for getting started with the Cloud Container Engine (CCE).Complete the following tasks to get started with CCE.The accounts have the p", + "code":"3", + "des":"CCE is a container service built on Docker and Kubernetes. A wealth of features enable you to run container clusters at scale. CCE eases containerization thanks to its re", "doc_type":"usermanual2", - "kw":"Instruction,User Guide", - "title":"Instruction", + "kw":"Product Advantages,Service Overview,User Guide", + "title":"Product Advantages", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0007.html", + "product_code":"cce", + "code":"4", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Application Scenarios", + "title":"Application Scenarios", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0020.html", + "product_code":"cce", + "code":"5", + "des":"In CCE, you can run clusters with x86 and Arm nodes. Create and manage Kubernetes clusters. Deploy containerized applications in them. All done in CCE.Containerization re", + "doc_type":"usermanual2", + "kw":"Infrastructure and Containerized Application Management,Application Scenarios,User Guide", + "title":"Infrastructure and Containerized Application Management", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0015.html", + "product_code":"cce", + "code":"6", + "des":"Shopping apps and websites, especially during promotions and flash salesLive streaming, where service loads often fluctuateGames, where many players may go online in cert", + "doc_type":"usermanual2", + "kw":"Auto Scaling in Seconds,Application Scenarios,User Guide", + "title":"Auto Scaling in Seconds", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0017.html", + "product_code":"cce", + "code":"7", + "des":"You may receive a lot feedback and requirements for your apps or services. You may want to boost user experience with new features. Continuous integration (CI) and delive", + "doc_type":"usermanual2", + "kw":"DevOps and CI/CD,Application Scenarios,User Guide", + "title":"DevOps and CI/CD", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0018.html", + "product_code":"cce", + "code":"8", + "des":"Multi-cloud deployment and disaster recoveryRunning apps in containers on different clouds can ensure high availability. When a cloud is down, other clouds respond and se", + "doc_type":"usermanual2", + "kw":"Hybrid Cloud Architecture,Application Scenarios,User Guide", + "title":"Hybrid Cloud Architecture", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0005.html", + "product_code":"cce", + "code":"9", + "des":"This section describes the notes and constraints on using CCE.After a cluster is created, the following items cannot be changed:Number of master nodes. For example, you c", + "doc_type":"usermanual2", + "kw":"Volumes,namespace,Notes and Constraints,Service Overview,User Guide", + "title":"Notes and Constraints", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0002.html", + "product_code":"cce", + "code":"10", + "des":"CCE allows you to assign permissions to IAM users and user groups under your tenant accounts. CCE combines the advantages of Identity and Access Management (IAM) and Kube", + "doc_type":"usermanual2", + "kw":"Permissions,Service Overview,User Guide", + "title":"Permissions", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0004.html", + "product_code":"cce", + "code":"11", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Basic Concepts", + "title":"Basic Concepts", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0011.html", + "product_code":"cce", + "code":"12", + "des":"CCE provides highly scalable, high-performance, enterprise-class Kubernetes clusters and supports Docker containers. With CCE, you can easily deploy, manage, and scale co", + "doc_type":"usermanual2", + "kw":"Cluster,Node,Pod,Workload,image,image repository,job,Basic Concepts,Basic Concepts,User Guide", + "title":"Basic Concepts", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0010.html", + "product_code":"cce", + "code":"13", + "des":"Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of container clusters. It is a container orchestration tool and a leading sol", + "doc_type":"usermanual2", + "kw":"Mappings Between CCE and Kubernetes Terms,Basic Concepts,User Guide", + "title":"Mappings Between CCE and Kubernetes Terms", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0012.html", + "product_code":"cce", + "code":"14", + "des":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.Regions are divided based on geographical", + "doc_type":"usermanual2", + "kw":"Regions and AZs,Basic Concepts,User Guide", + "title":"Regions and AZs", + "githuburl":"" + }, + { + "uri":"cce_productdesc_0008.html", + "product_code":"cce", + "code":"15", + "des":"CCE works with the following cloud services and requires permissions to access them.", + "doc_type":"usermanual2", + "kw":"Elastic Cloud Server (ECS),Virtual Private Cloud (VPC),Elastic Load Balance (ELB),cloud storage for ", + "title":"Related Services", "githuburl":"" }, { "uri":"cce_bulletin_0000.html", "product_code":"cce", - "code":"3", + "code":"16", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Product Bulletin", "title":"Product Bulletin", "githuburl":"" }, - { - "uri":"cce_bulletin_0054.html", - "product_code":"cce", - "code":"4", - "des":"When performing operations such as creating, deleting, and scaling clusters, do not change user permission in the Identity and Access Management (IAM) console. Otherwise,", - "doc_type":"usermanual2", - "kw":"the node will become unready,Risky Operations on Cluster Nodes,Product Bulletin,User Guide", - "title":"Risky Operations on Cluster Nodes", - "githuburl":"" - }, { "uri":"cce_bulletin_0003.html", "product_code":"cce", - "code":"5", + "code":"17", "des":"This section explains versioning in CCE, and the policies for Kubernetes version support.Version number: The format is x.y.z, where x.y is the major version and z is the ", "doc_type":"usermanual2", "kw":"Kubernetes Version Support Mechanism,Product Bulletin,User Guide", @@ -52,7 +172,7 @@ { "uri":"cce_bulletin_0068.html", "product_code":"cce", - "code":"6", + "code":"18", "des":"To ensure that stable and reliable Kubernetes versions are available during your use of CCE, CCE provides the Kubernetes version support mechanism. A new supported versio", "doc_type":"usermanual2", "kw":"CCE Cluster Version Release Notes,Product Bulletin,User Guide", @@ -62,8 +182,8 @@ { "uri":"cce_bulletin_0301.html", "product_code":"cce", - "code":"7", - "des":"CCE nodes in Hybrid clusters can run on EulerOS 2.5, EulerOS 2.9 and CentOS 7.7. The following table lists the supported patches for these OSs.The OS patches and verifica", + "code":"19", + "des":"CCE nodes in Hybrid clusters can run on EulerOS 2.5, EulerOS 2.9, CentOS 7.7 and Ubuntu 22.04. The following table lists the supported patches for these OSs.The OS patche", "doc_type":"usermanual2", "kw":"OS Patch Notes for Cluster Nodes,Product Bulletin,User Guide", "title":"OS Patch Notes for Cluster Nodes", @@ -72,7 +192,7 @@ { "uri":"cce_bulletin_0169.html", "product_code":"cce", - "code":"8", + "code":"20", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Security Vulnerability Responses", @@ -82,7 +202,7 @@ { "uri":"cce_bulletin_0011.html", "product_code":"cce", - "code":"9", + "code":"21", "des":"High-risk vulnerabilities:CCE fixes vulnerabilities as soon as possible after the Kubernetes community detects them and releases fixing solutions. The fixing policies are", "doc_type":"usermanual2", "kw":"Vulnerability Fixing Policies,Security Vulnerability Responses,User Guide", @@ -92,7 +212,7 @@ { "uri":"CVE-2021-4034.html", "product_code":"cce", - "code":"10", + "code":"22", "des":"Recently, a security research team disclosed a privilege escalation vulnerability (CVE-2021-4034, also dubbed PwnKit) in PolKit's pkexec. Unprivileged users can gain full", "doc_type":"usermanual2", "kw":"Linux Polkit Privilege Escalation Vulnerability (CVE-2021-4034),Security Vulnerability Responses,Use", @@ -102,7 +222,7 @@ { "uri":"cce_bulletin_0206.html", "product_code":"cce", - "code":"11", + "code":"23", "des":"The Linux Kernel SACK vulnerabilities have been fixed. This section describes the solution to these vulnerabilities.On June 18, 2019, Red Hat released a security notice, ", "doc_type":"usermanual2", "kw":"Notice on Fixing Linux Kernel SACK Vulnerabilities,Security Vulnerability Responses,User Guide", @@ -110,29 +230,109 @@ "githuburl":"" }, { - "uri":"cce_10_0477.html", + "uri":"cce_qs_0000.html", "product_code":"cce", - "code":"12", - "des":"In clusters earlier than v1.21, a token is obtained by mounting the secret of the service account to a pod. Tokens obtained this way are permanent. This approach is no lo", + "code":"24", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", - "kw":"Service Account Token Security Improvement,Product Bulletin,User Guide", - "title":"Service Account Token Security Improvement", + "kw":"Getting Started", + "title":"Getting Started", "githuburl":"" }, { - "uri":"cce_01_9994.html", + "uri":"cce_qs_0001.html", "product_code":"cce", - "code":"13", - "des":"CCE works closely with multiple cloud services to support computing, storage, networking, and monitoring functions. When you log in to the CCE console for the first time,", + "code":"25", + "des":"This section describes how to use Cloud Container Engine (CCE) and provides frequently asked questions (FAQs) to help you quickly get started with CCE.Complete the follow", "doc_type":"usermanual2", - "kw":"Obtaining Resource Permissions,User Guide", - "title":"Obtaining Resource Permissions", + "kw":"Introduction,Getting Started,User Guide", + "title":"Introduction", + "githuburl":"" + }, + { + "uri":"cce_qs_0006.html", + "product_code":"cce", + "code":"26", + "des":"Before using CCE, you need to make the following preparations:Creating an IAM userObtaining Resource Permissions(Optional) Creating a VPC(Optional) Creating a Key PairIf ", + "doc_type":"usermanual2", + "kw":"VPC,Preparations,Getting Started,User Guide", + "title":"Preparations", + "githuburl":"" + }, + { + "uri":"cce_qs_0008.html", + "product_code":"cce", + "code":"27", + "des":"This section describes how to quickly create a CCE cluster. In this example, the default or simple configurations are in use.If you have not created a cluster, a wizard p", + "doc_type":"usermanual2", + "kw":"Creating a Kubernetes Cluster,Getting Started,User Guide", + "title":"Creating a Kubernetes Cluster", + "githuburl":"" + }, + { + "uri":"cce_qs_0003.html", + "product_code":"cce", + "code":"28", + "des":"You can use images to quickly create a single-pod workload that can be accessed from public networks. This section describes how to use CCE to quickly deploy an Nginx app", + "doc_type":"usermanual2", + "kw":"Creating a Deployment (Nginx) from an Image,Getting Started,User Guide", + "title":"Creating a Deployment (Nginx) from an Image", + "githuburl":"" + }, + { + "uri":"cce_qs_0007.html", + "product_code":"cce", + "code":"29", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Deploying WordPress and MySQL That Depend on Each Other", + "title":"Deploying WordPress and MySQL That Depend on Each Other", + "githuburl":"" + }, + { + "uri":"cce_qs_0009.html", + "product_code":"cce", + "code":"30", + "des":"WordPress was originally a blog platform based on PHP and MySQL. It is gradually evolved into a content management system. You can set up your own blog website on any ser", + "doc_type":"usermanual2", + "kw":"Overview,Deploying WordPress and MySQL That Depend on Each Other,User Guide", + "title":"Overview", + "githuburl":"" + }, + { + "uri":"cce_qs_0004.html", + "product_code":"cce", + "code":"31", + "des":"WordPress must be used together with MySQL. WordPress runs the content management program while MySQL serves as a database to store data.The WordPress and MySQL images ha", + "doc_type":"usermanual2", + "kw":"Step 1: Create a MySQL Workload,Deploying WordPress and MySQL That Depend on Each Other,User Guide", + "title":"Step 1: Create a MySQL Workload", + "githuburl":"" + }, + { + "uri":"cce_qs_0005.html", + "product_code":"cce", + "code":"32", + "des":"WordPress was originally a blog platform based on PHP and MySQL. It is gradually evolved into a content management system. You can set up your own blog website on any ser", + "doc_type":"usermanual2", + "kw":"Step 2: Create a WordPress Workload,Deploying WordPress and MySQL That Depend on Each Other,User Gui", + "title":"Step 2: Create a WordPress Workload", + "githuburl":"" + }, + { + "uri":"cce_10_0054.html", + "product_code":"cce", + "code":"33", + "des":"During service deployment or running, you may trigger high-risk operations at different levels, causing service faults or interruption. To help you better estimate and av", + "doc_type":"usermanual2", + "kw":"High-Risk Operations and Solutions,User Guide", + "title":"High-Risk Operations and Solutions", "githuburl":"" }, { "uri":"cce_10_0091.html", "product_code":"cce", - "code":"14", + "code":"34", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Clusters", @@ -142,7 +342,7 @@ { "uri":"cce_10_0002.html", "product_code":"cce", - "code":"15", + "code":"35", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Cluster Overview", @@ -152,8 +352,8 @@ { "uri":"cce_10_0430.html", "product_code":"cce", - "code":"16", - "des":"Kubernetes allows you to easily deploy and manage containerized application and facilitates container scheduling and orchestration.For developers, Kubernetes is a cluster", + "code":"36", + "des":"Kubernetes is an open source container orchestration engine for automating deployment, scaling, and management of containerized applications.For developers, Kubernetes is", "doc_type":"usermanual2", "kw":"Basic Cluster Information,Cluster Overview,User Guide", "title":"Basic Cluster Information", @@ -162,7 +362,7 @@ { "uri":"cce_10_0342.html", "product_code":"cce", - "code":"17", + "code":"37", "des":"The following table lists the differences between CCE Turbo clusters and CCE clusters:The QingTian architecture consists of data plane (software-hardware synergy) and man", "doc_type":"usermanual2", "kw":"CCE Turbo Clusters and CCE Clusters,Cluster Overview,User Guide", @@ -172,7 +372,7 @@ { "uri":"cce_10_0349.html", "product_code":"cce", - "code":"18", + "code":"38", "des":"kube-proxy is a key component of a Kubernetes cluster. It is responsible for load balancing and forwarding between a Service and its backend pod.CCE supports two forwardi", "doc_type":"usermanual2", "kw":"Comparing iptables and IPVS,Cluster Overview,User Guide", @@ -182,7 +382,7 @@ { "uri":"cce_10_0068.html", "product_code":"cce", - "code":"19", + "code":"39", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Release Notes", @@ -192,7 +392,7 @@ { "uri":"cce_10_0467.html", "product_code":"cce", - "code":"20", + "code":"40", "des":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.25.Kubernetes 1", "doc_type":"usermanual2", "kw":"CCE Kubernetes 1.25 Release Notes,Release Notes,User Guide", @@ -202,7 +402,7 @@ { "uri":"cce_10_0468.html", "product_code":"cce", - "code":"21", + "code":"41", "des":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.23.Changes in C", "doc_type":"usermanual2", "kw":"CCE Kubernetes 1.23 Release Notes,Release Notes,User Guide", @@ -212,7 +412,7 @@ { "uri":"cce_10_0469.html", "product_code":"cce", - "code":"22", + "code":"42", "des":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.21.Kubernetes 1", "doc_type":"usermanual2", "kw":"CCE Kubernetes 1.21 Release Notes,Release Notes,User Guide", @@ -222,7 +422,7 @@ { "uri":"cce_10_0470.html", "product_code":"cce", - "code":"23", + "code":"43", "des":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.19.Kubernetes 1", "doc_type":"usermanual2", "kw":"CCE Kubernetes 1.19 Release Notes,Release Notes,User Guide", @@ -232,7 +432,7 @@ { "uri":"cce_10_0471.html", "product_code":"cce", - "code":"24", + "code":"44", "des":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.17.All resource", "doc_type":"usermanual2", "kw":"CCE Kubernetes 1.17 Release Notes,Release Notes,User Guide", @@ -242,7 +442,7 @@ { "uri":"cce_10_0298.html", "product_code":"cce", - "code":"25", + "code":"45", "des":"CCE Turbo clusters run on a cloud native infrastructure that features software-hardware synergy to support passthrough networking, high security and reliability, and inte", "doc_type":"usermanual2", "kw":"Creating a CCE Turbo Cluster,Clusters,User Guide", @@ -252,7 +452,7 @@ { "uri":"cce_10_0028.html", "product_code":"cce", - "code":"26", + "code":"46", "des":"On the CCE console, you can easily create Kubernetes clusters. Kubernetes can manage container clusters at scale. A cluster manages a group of node resources.In CCE, you ", "doc_type":"usermanual2", "kw":"Creating a CCE Cluster,Clusters,User Guide", @@ -262,7 +462,7 @@ { "uri":"cce_10_0140.html", "product_code":"cce", - "code":"27", + "code":"47", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Using kubectl to Run a Cluster", @@ -272,7 +472,7 @@ { "uri":"cce_10_0107.html", "product_code":"cce", - "code":"28", + "code":"48", "des":"This section uses a CCE cluster as an example to describe how to connect to a CCE cluster using kubectl.When you access a cluster using kubectl, CCE uses thekubeconfig.js", "doc_type":"usermanual2", "kw":"Connecting to a Cluster Using kubectl,Using kubectl to Run a Cluster,User Guide", @@ -282,7 +482,7 @@ { "uri":"cce_10_0367.html", "product_code":"cce", - "code":"29", + "code":"49", "des":"A Subject Alternative Name (SAN) can be signed in to a cluster server certificate. A SAN is usually used by the client to verify the server validity in TLS handshakes. Sp", "doc_type":"usermanual2", "kw":"Customizing a Cluster Certificate SAN,Using kubectl to Run a Cluster,User Guide", @@ -292,7 +492,7 @@ { "uri":"cce_10_0139.html", "product_code":"cce", - "code":"30", + "code":"50", "des":"getThe get command displays one or many resources of a cluster.This command prints a table of the most important information about all resources, including cluster nodes,", "doc_type":"usermanual2", "kw":"Common kubectl Commands,Using kubectl to Run a Cluster,User Guide", @@ -302,7 +502,7 @@ { "uri":"cce_10_0215.html", "product_code":"cce", - "code":"31", + "code":"51", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Upgrading a Cluster", @@ -312,7 +512,7 @@ { "uri":"cce_10_0197.html", "product_code":"cce", - "code":"32", + "code":"52", "des":"To enable interoperability from one Kubernetes installation to the next, you must upgrade your Kubernetes clusters before the maintenance period ends.After the latest Kub", "doc_type":"usermanual2", "kw":"Upgrade Overview,Upgrading a Cluster,User Guide", @@ -322,17 +522,97 @@ { "uri":"cce_10_0302.html", "product_code":"cce", - "code":"33", + "code":"53", "des":"Before the upgrade, you can check whether your cluster can be upgraded and which versions are available on the CCE console. For details, see Upgrade Overview.Upgraded clu", "doc_type":"usermanual2", "kw":"Before You Start,Upgrading a Cluster,User Guide", "title":"Before You Start", "githuburl":"" }, + { + "uri":"cce_10_0560.html", + "product_code":"cce", + "code":"54", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Post-Upgrade Verification", + "title":"Post-Upgrade Verification", + "githuburl":"" + }, + { + "uri":"cce_10_0561.html", + "product_code":"cce", + "code":"55", + "des":"After the cluster is upgraded, check whether the services are running normal.Different services have different verification mode. Select a suitable one and verify the ser", + "doc_type":"usermanual2", + "kw":"Service Verification,Post-Upgrade Verification,User Guide", + "title":"Service Verification", + "githuburl":"" + }, + { + "uri":"cce_10_0562.html", + "product_code":"cce", + "code":"56", + "des":"Check whether unexpected pods exist in the cluster.Check whether there are pods restart unexpectedly in the cluster.Go to the CCE console and access the cluster console. ", + "doc_type":"usermanual2", + "kw":"Pod Check,Post-Upgrade Verification,User Guide", + "title":"Pod Check", + "githuburl":"" + }, + { + "uri":"cce_10_0563.html", + "product_code":"cce", + "code":"57", + "des":"Check whether the nodes are running properly.Check whether the node network is normal.Check whether the container network is normal.The node status reflects whether the n", + "doc_type":"usermanual2", + "kw":"Node and Container Network Check,Post-Upgrade Verification,User Guide", + "title":"Node and Container Network Check", + "githuburl":"" + }, + { + "uri":"cce_10_0564.html", + "product_code":"cce", + "code":"58", + "des":"Check whether the label is lost.Check whether there are unexpected taints.Go to the CCE console, access the cluster console, and choose Nodes in the navigation pane. On t", + "doc_type":"usermanual2", + "kw":"Node Label and Taint Check,Post-Upgrade Verification,User Guide", + "title":"Node Label and Taint Check", + "githuburl":"" + }, + { + "uri":"cce_10_0565.html", + "product_code":"cce", + "code":"59", + "des":"Check whether nodes can be created in the cluster.Go to the CCE console and access the cluster console. Choose Nodes in the navigation pane, and click Create Node.If node", + "doc_type":"usermanual2", + "kw":"New Node Check,Post-Upgrade Verification,User Guide", + "title":"New Node Check", + "githuburl":"" + }, + { + "uri":"cce_10_0566.html", + "product_code":"cce", + "code":"60", + "des":"Check whether pods can be created on the existing nodes after the cluster is upgraded.Check whether pods can be created on new nodes after the cluster is upgraded.After c", + "doc_type":"usermanual2", + "kw":"New Pod Check,Post-Upgrade Verification,User Guide", + "title":"New Pod Check", + "githuburl":"" + }, + { + "uri":"cce_10_0567.html", + "product_code":"cce", + "code":"61", + "des":"After the cluster is upgraded, you need to reset the nodes that fail to be upgraded.Go back to the previous step or view the upgrade details on the upgrade history page t", + "doc_type":"usermanual2", + "kw":"Node Skipping Check for Reset,Post-Upgrade Verification,User Guide", + "title":"Node Skipping Check for Reset", + "githuburl":"" + }, { "uri":"cce_10_0120.html", "product_code":"cce", - "code":"34", + "code":"62", "des":"You can upgrade your clusters to a newer Kubernetes version on the CCE console.Before the upgrade, learn about the target version to which each CCE cluster can be upgrade", "doc_type":"usermanual2", "kw":"Performing Replace/Rolling Upgrade,Upgrading a Cluster,User Guide", @@ -342,7 +622,7 @@ { "uri":"cce_10_0301.html", "product_code":"cce", - "code":"35", + "code":"63", "des":"You can upgrade your clusters to a newer version on the CCE console.Before the upgrade, learn about the target version to which each CCE cluster can be upgraded in what w", "doc_type":"usermanual2", "kw":"Performing In-place Upgrade,Upgrading a Cluster,User Guide", @@ -352,17 +632,447 @@ { "uri":"cce_10_0210.html", "product_code":"cce", - "code":"36", + "code":"64", "des":"This section describes how to migrate services from a cluster of an earlier version to a cluster of a later version in CCE.This operation is applicable when a cross-versi", "doc_type":"usermanual2", "kw":"Migrating Services Across Clusters of Different Versions,Upgrading a Cluster,User Guide", "title":"Migrating Services Across Clusters of Different Versions", "githuburl":"" }, + { + "uri":"cce_10_0550.html", + "product_code":"cce", + "code":"65", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Troubleshooting for Pre-upgrade Check Exceptions", + "title":"Troubleshooting for Pre-upgrade Check Exceptions", + "githuburl":"" + }, + { + "uri":"cce_10_0549.html", + "product_code":"cce", + "code":"66", + "des":"The system performs a comprehensive pre-upgrade check before the cluster upgrade. If the cluster does not meet the pre-upgrade check conditions, the upgrade cannot contin", + "doc_type":"usermanual2", + "kw":"Performing Pre-upgrade Check,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Performing Pre-upgrade Check", + "githuburl":"" + }, + { + "uri":"cce_10_0431.html", + "product_code":"cce", + "code":"67", + "des":"Check the following aspects:Check whether the node is available.Check whether the node OS supports the upgrade.Check whether there are unexpected node pool tags in the no", + "doc_type":"usermanual2", + "kw":"Checking the Node,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Node", + "githuburl":"" + }, + { + "uri":"cce_10_0432.html", + "product_code":"cce", + "code":"68", + "des":"Check whether the current user is in the upgrade blocklist.CCE temporarily disables the cluster upgrade function due to the following reasons:The cluster is identified as", + "doc_type":"usermanual2", + "kw":"Checking the Blocklist,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Blocklist", + "githuburl":"" + }, + { + "uri":"cce_10_0433.html", + "product_code":"cce", + "code":"69", + "des":"Check the following aspects:Check whether the add-on status is normal.Check whether the add-on supports the target version.Scenario 1: The add-on status is abnormal.Log i", + "doc_type":"usermanual2", + "kw":"Checking the Add-on,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Add-on", + "githuburl":"" + }, + { + "uri":"cce_10_0434.html", + "product_code":"cce", + "code":"70", + "des":"Check whether the current HelmRelease record contains discarded Kubernetes APIs that are not supported by the target cluster version. If yes, the Helm chart may be unavai", + "doc_type":"usermanual2", + "kw":"Checking the Helm Chart,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Helm Chart", + "githuburl":"" + }, + { + "uri":"cce_10_0435.html", + "product_code":"cce", + "code":"71", + "des":"Check whether CCE can connect to your master nodes.Contact technical support.", + "doc_type":"usermanual2", + "kw":"Checking the Master Node SSH Connectivity,Troubleshooting for Pre-upgrade Check Exceptions,User Guid", + "title":"Checking the Master Node SSH Connectivity", + "githuburl":"" + }, + { + "uri":"cce_10_0436.html", + "product_code":"cce", + "code":"72", + "des":"Check the following aspects:Check the node status.Check whether the auto scaling function of the node pool is disabled.Scenario 1: The node pool status is abnormal.Log in", + "doc_type":"usermanual2", + "kw":"Checking the Node Pool,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Node Pool", + "githuburl":"" + }, + { + "uri":"cce_10_0437.html", + "product_code":"cce", + "code":"73", + "des":"Check whether the security group allows the master node to access nodes using ICMP.Log in to the VPC console, choose Access Control > Security Groups, and enter the targe", + "doc_type":"usermanual2", + "kw":"Checking the Security Group,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking the Security Group", + "githuburl":"" + }, + { + "uri":"cce_10_0439.html", + "product_code":"cce", + "code":"74", + "des":"Check whether the node needs to be migrated.For the 1.15 cluster that is upgraded from 1.13 in rolling mode, you need to migrate (reset or create and replace) all nodes b", + "doc_type":"usermanual2", + "kw":"To-Be-Migrated Node,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"To-Be-Migrated Node", + "githuburl":"" + }, + { + "uri":"cce_10_0440.html", + "product_code":"cce", + "code":"75", + "des":"Check whether there are discarded resources in the clusters.Scenario 1: The PodSecurityPolicy resource object has been discarded since clusters of v1.25.Run the kubectl g", + "doc_type":"usermanual2", + "kw":"Discarded Kubernetes Resource,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Discarded Kubernetes Resource", + "githuburl":"" + }, + { + "uri":"cce_10_0441.html", + "product_code":"cce", + "code":"76", + "des":"Read the version compatibility differences and ensure that they are not affected.The patch upgrade does not involve version compatibility differences.", + "doc_type":"usermanual2", + "kw":"Compatibility Risk,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Compatibility Risk", + "githuburl":"" + }, + { + "uri":"cce_10_0442.html", + "product_code":"cce", + "code":"77", + "des":"Check whether cce-agent on the current node is of the latest version.If cce-agent is not of the latest version, the automatic update fails. This problem is usually caused", + "doc_type":"usermanual2", + "kw":"Node CCEAgent Version,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node CCEAgent Version", + "githuburl":"" + }, + { + "uri":"cce_10_0443.html", + "product_code":"cce", + "code":"78", + "des":"Check whether the CPU usage of the node exceeds 90%.Upgrade the cluster during off-peak hours.Check whether too many pods are deployed on the node. If yes, reschedule pod", + "doc_type":"usermanual2", + "kw":"Node CPU Usage,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node CPU Usage", + "githuburl":"" + }, + { + "uri":"cce_10_0444.html", + "product_code":"cce", + "code":"79", + "des":"Check the following aspects:Check whether the key CRD packageversions.version.cce.io of the cluster is deleted.Check whether the cluster key CRD network-attachment-defini", + "doc_type":"usermanual2", + "kw":"CRD Check,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"CRD Check", + "githuburl":"" + }, + { + "uri":"cce_10_0445.html", + "product_code":"cce", + "code":"80", + "des":"Check the following aspects:Check whether the key data disks on the node meet the upgrade requirements.Check whether the /tmp directory has 500 MB available space.During ", + "doc_type":"usermanual2", + "kw":"Node Disk,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Disk", + "githuburl":"" + }, + { + "uri":"cce_10_0446.html", + "product_code":"cce", + "code":"81", + "des":"Check the following aspects:Check whether the DNS configuration of the current node can resolve the OBS address.Check whether the current node can access the OBS address ", + "doc_type":"usermanual2", + "kw":"Node DNS,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node DNS", + "githuburl":"" + }, + { + "uri":"cce_10_0447.html", + "product_code":"cce", + "code":"82", + "des":"Check whether the key directory /var/paas on the nodes contain files with abnormal owners or owner groups.CCE uses the /var/paas directory to manage nodes and store file ", + "doc_type":"usermanual2", + "kw":"Node Key Directory File Permissions,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Key Directory File Permissions", + "githuburl":"" + }, + { + "uri":"cce_10_0448.html", + "product_code":"cce", + "code":"83", + "des":"Check whether the kubelet on the node is running properly.Scenario 1: The kubelet status is abnormal.If the kubelet is abnormal, the node is unavailable. Restore the node", + "doc_type":"usermanual2", + "kw":"Kubelet,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Kubelet", + "githuburl":"" + }, + { + "uri":"cce_10_0449.html", + "product_code":"cce", + "code":"84", + "des":"Check whether the memory usage of the node exceeds 90%.Upgrade the cluster during off-peak hours.Check whether too many pods are deployed on the node. If yes, reschedule ", + "doc_type":"usermanual2", + "kw":"Node Memory,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Memory", + "githuburl":"" + }, + { + "uri":"cce_10_0450.html", + "product_code":"cce", + "code":"85", + "des":"Check whether the clock synchronization server ntpd or chronyd of the node is running properly.Scenario 1: ntpd is running abnormally.Log in to the node and run the syste", + "doc_type":"usermanual2", + "kw":"Node Clock Synchronization Server,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Clock Synchronization Server", + "githuburl":"" + }, + { + "uri":"cce_10_0451.html", + "product_code":"cce", + "code":"86", + "des":"Check whether the OS kernel version of the node is supported by CCE.Running nodes depend on the initial standard kernel version when they are created. CCE has performed c", + "doc_type":"usermanual2", + "kw":"Node OS,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node OS", + "githuburl":"" + }, + { + "uri":"cce_10_0452.html", + "product_code":"cce", + "code":"87", + "des":"Check whether the number of CPUs on the master node is greater than 2.If the number of CPUs on the master node is 2, contact technical support to expand the number to 4 o", + "doc_type":"usermanual2", + "kw":"Node CPU Count,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node CPU Count", + "githuburl":"" + }, + { + "uri":"cce_10_0453.html", + "product_code":"cce", + "code":"88", + "des":"Check whether the Python commands are available on a node.If the command output is not 0, the check fails.Install Python before the upgrade.", + "doc_type":"usermanual2", + "kw":"Node Python Command,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Python Command", + "githuburl":"" + }, + { + "uri":"cce_10_0455.html", + "product_code":"cce", + "code":"89", + "des":"Check whether the nodes in the cluster are ready.Scenario 1: The nodes are in the unavailable status.Log in to the CCE console and access the cluster console. Choose Node", + "doc_type":"usermanual2", + "kw":"Node Readiness,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Readiness", + "githuburl":"" + }, + { + "uri":"cce_10_0456.html", + "product_code":"cce", + "code":"90", + "des":"Check whether journald of a node is normal.Log in to the node and run the systemctl is-active systemd-journald command to query the running status of journald. If the com", + "doc_type":"usermanual2", + "kw":"Node journald,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node journald", + "githuburl":"" + }, + { + "uri":"cce_10_0457.html", + "product_code":"cce", + "code":"91", + "des":"Check whether the containerd.sock file exists on the node. This file affects the startup of container runtime in the Euler OS.Scenario: The Docker used by the node is the", + "doc_type":"usermanual2", + "kw":"containerd.sock Check,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"containerd.sock Check", + "githuburl":"" + }, + { + "uri":"cce_10_0458.html", + "product_code":"cce", + "code":"92", + "des":"Before the upgrade, check whether an internal error occurs.If this check fails, contact technical support.", + "doc_type":"usermanual2", + "kw":"Internal Error,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Internal Error", + "githuburl":"" + }, + { + "uri":"cce_10_0459.html", + "product_code":"cce", + "code":"93", + "des":"Check whether inaccessible mount points exist on the node.Scenario: There are inaccessible mount points on the node.If network NFS (such as OBS, SFS, and SFS) is used by ", + "doc_type":"usermanual2", + "kw":"Node Mount Point,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Mount Point", + "githuburl":"" + }, + { + "uri":"cce_10_0460.html", + "product_code":"cce", + "code":"94", + "des":"Check whether the taint, as shown in Table 1, exists on the node.Taint checklistNameImpactnode.kubernetes.io/upgradeNoScheduleScenario 1: The node is skipped during the c", + "doc_type":"usermanual2", + "kw":"Kubernetes Node Taint,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Kubernetes Node Taint", + "githuburl":"" + }, + { + "uri":"cce_10_0478.html", + "product_code":"cce", + "code":"95", + "des":"Check whether the current everest add-on has compatibility restrictions. See Table 1.The current everest add-on has compatibility restrictions and cannot be upgraded with", + "doc_type":"usermanual2", + "kw":"everest Restriction Check,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"everest Restriction Check", + "githuburl":"" + }, + { + "uri":"cce_10_0479.html", + "product_code":"cce", + "code":"96", + "des":"Check whether the current cce-controller-hpa add-on has compatibility restrictions.The current cce-controller-hpa add-on has compatibility restrictions. An add-on that ca", + "doc_type":"usermanual2", + "kw":"cce-hpa-controller Restriction Check,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"cce-hpa-controller Restriction Check", + "githuburl":"" + }, + { + "uri":"cce_10_0480.html", + "product_code":"cce", + "code":"97", + "des":"Check whether the current cluster version and the target version support enhanced CPU policy.Scenario: The current cluster version uses the enhanced CPU management policy", + "doc_type":"usermanual2", + "kw":"Enhanced CPU Management Policy,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Enhanced CPU Management Policy", + "githuburl":"" + }, + { + "uri":"cce_10_0484.html", + "product_code":"cce", + "code":"98", + "des":"Check whether the container runtime and network components on the user node are healthy.If a component is abnormal, log in to the node to check the status of the abnormal", + "doc_type":"usermanual2", + "kw":"User Node Components Health,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"User Node Components Health", + "githuburl":"" + }, + { + "uri":"cce_10_0485.html", + "product_code":"cce", + "code":"99", + "des":"Check whether the Kubernetes, container runtime, and network components of the controller node are healthy.If a component on the controller node is abnormal, contact tech", + "doc_type":"usermanual2", + "kw":"Controller Node Components Health,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Controller Node Components Health", + "githuburl":"" + }, + { + "uri":"cce_10_0486.html", + "product_code":"cce", + "code":"100", + "des":"Check whether the resources of Kubernetes components, such as etcd and kube-controller-manager, exceed the upper limit.Solution 1: Reducing Kubernetes resourcesSolution 2", + "doc_type":"usermanual2", + "kw":"Memory Resource Limit of Kubernetes Components,Troubleshooting for Pre-upgrade Check Exceptions,User", + "title":"Memory Resource Limit of Kubernetes Components", + "githuburl":"" + }, + { + "uri":"cce_10_0487.html", + "product_code":"cce", + "code":"101", + "des":"The system scans the audit logs of the past day to check whether the user calls the deprecated APIs of the target Kubernetes version.Due to the limited time range of audi", + "doc_type":"usermanual2", + "kw":"Checking Deprecated Kubernetes APIs,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Checking Deprecated Kubernetes APIs", + "githuburl":"" + }, + { + "uri":"cce_10_0488.html", + "product_code":"cce", + "code":"102", + "des":"If IPv6 is enabled for a CCE Turbo cluster, check whether the target cluster version supports IPv6.CCE Turbo clusters support IPv6 since v1.23. This feature is available ", + "doc_type":"usermanual2", + "kw":"IPv6 Capability of a CCE Turbo Cluster,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"IPv6 Capability of a CCE Turbo Cluster", + "githuburl":"" + }, + { + "uri":"cce_10_0489.html", + "product_code":"cce", + "code":"103", + "des":"Check whether NetworkManager of a node is normal.Log in to the node and run the systemctl is-active NetworkManager command to query the running status of NetworkManager. ", + "doc_type":"usermanual2", + "kw":"Node NetworkManager,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node NetworkManager", + "githuburl":"" + }, + { + "uri":"cce_10_0490.html", + "product_code":"cce", + "code":"104", + "des":"Check the ID file format.", + "doc_type":"usermanual2", + "kw":"Node ID File,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node ID File", + "githuburl":"" + }, + { + "uri":"cce_10_0491.html", + "product_code":"cce", + "code":"105", + "des":"When you upgrade a CCE cluster to v1.19 or later, the system checks whether the following configuration files have been modified in the background:/opt/cloud/cce/kubernet", + "doc_type":"usermanual2", + "kw":"Node Configuration Consistency,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Configuration Consistency", + "githuburl":"" + }, + { + "uri":"cce_10_0492.html", + "product_code":"cce", + "code":"106", + "des":"Check whether the configuration files of key components exist on the node.The following table lists the files to be checked.Contact technical support to restore the confi", + "doc_type":"usermanual2", + "kw":"Node Configuration File,Troubleshooting for Pre-upgrade Check Exceptions,User Guide", + "title":"Node Configuration File", + "githuburl":"" + }, + { + "uri":"cce_10_0493.html", + "product_code":"cce", + "code":"107", + "des":"Check whether the current CoreDNS key configuration Corefile is different from the Helm Release record. The difference may be overwritten during the add-on upgrade, affec", + "doc_type":"usermanual2", + "kw":"Checking CoreDNS Configuration Consistency,Troubleshooting for Pre-upgrade Check Exceptions,User Gui", + "title":"Checking CoreDNS Configuration Consistency", + "githuburl":"" + }, { "uri":"cce_10_0031.html", "product_code":"cce", - "code":"37", + "code":"108", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Managing a Cluster", @@ -372,17 +1082,17 @@ { "uri":"cce_10_0213.html", "product_code":"cce", - "code":"38", + "code":"109", "des":"CCE allows you to manage cluster parameters, through which you can let core components work under your very requirements.This function is supported only in clusters of v1", "doc_type":"usermanual2", - "kw":"Managing Cluster Components,Managing a Cluster,User Guide", - "title":"Managing Cluster Components", + "kw":"Cluster Configuration Management,Managing a Cluster,User Guide", + "title":"Cluster Configuration Management", "githuburl":"" }, { "uri":"cce_10_0212.html", "product_code":"cce", - "code":"39", + "code":"110", "des":"This section describes how to delete a cluster.Deleting a cluster will delete the nodes in the cluster (excluding accepted nodes), data disks attached to the nodes, workl", "doc_type":"usermanual2", "kw":"Deleting a Cluster,Managing a Cluster,User Guide", @@ -392,7 +1102,7 @@ { "uri":"cce_10_0214.html", "product_code":"cce", - "code":"40", + "code":"111", "des":"If you do not need to use a cluster temporarily, you are advised to hibernate the cluster.After a cluster is hibernated, resources such as workloads cannot be created or ", "doc_type":"usermanual2", "kw":"Hibernating and Waking Up a Cluster,Managing a Cluster,User Guide", @@ -402,7 +1112,7 @@ { "uri":"cce_10_0602.html", "product_code":"cce", - "code":"41", + "code":"112", "des":"If overload control is enabled, concurrent requests are dynamically controlled based on the resource pressure of master nodes to keep them and the cluster available.The c", "doc_type":"usermanual2", "kw":"Cluster Overload Control,Managing a Cluster,User Guide", @@ -412,7 +1122,7 @@ { "uri":"cce_10_0175.html", "product_code":"cce", - "code":"42", + "code":"113", "des":"This section describes how to obtain the cluster certificate from the console and use it to access Kubernetes clusters.The downloaded certificate contains three files: cl", "doc_type":"usermanual2", "kw":"Obtaining a Cluster Certificate,Clusters,User Guide", @@ -422,7 +1132,7 @@ { "uri":"cce_10_0403.html", "product_code":"cce", - "code":"43", + "code":"114", "des":"CCE allows you to change the number of nodes managed in a cluster.This function is supported for clusters of v1.15 and later versions.Starting from v1.15.11, the number o", "doc_type":"usermanual2", "kw":"Changing Cluster Scale,Clusters,User Guide", @@ -432,7 +1142,7 @@ { "uri":"cce_10_0183.html", "product_code":"cce", - "code":"44", + "code":"115", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"node labels", @@ -442,7 +1152,7 @@ { "uri":"cce_10_0180.html", "product_code":"cce", - "code":"45", + "code":"116", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Node Overview", @@ -452,7 +1162,7 @@ { "uri":"cce_10_0461.html", "product_code":"cce", - "code":"46", + "code":"117", "des":"A container cluster consists of a set of worker machines, called nodes, that run containerized applications. A node can be a virtual machine (VM) or a physical machine (P", "doc_type":"usermanual2", "kw":"Precautions for Using a Node,Node Overview,User Guide", @@ -462,7 +1172,7 @@ { "uri":"cce_10_0462.html", "product_code":"cce", - "code":"47", + "code":"118", "des":"Container engines, one of the most important components of Kubernetes, manage the lifecycle of images and containers. The kubelet interacts with a container runtime throu", "doc_type":"usermanual2", "kw":"Container Engine,Node Overview,User Guide", @@ -472,7 +1182,7 @@ { "uri":"cce_10_0463.html", "product_code":"cce", - "code":"48", + "code":"119", "des":"The most significant difference is that each Kata container (pod) runs on an independent micro-VM, has an independent OS kernel, and is securely isolated at the virtualiz", "doc_type":"usermanual2", "kw":"Kata Containers and Common Containers,Node Overview,User Guide", @@ -482,7 +1192,7 @@ { "uri":"cce_10_0348.html", "product_code":"cce", - "code":"49", + "code":"120", "des":"The maximum number of pods that can be created on a node is determined by the following parameters:Number of container IP addresses that can be allocated on a node (alpha", "doc_type":"usermanual2", "kw":"Maximum Number of Pods That Can Be Created on a Node,Node Overview,User Guide", @@ -492,7 +1202,7 @@ { "uri":"cce_10_0178.html", "product_code":"cce", - "code":"50", + "code":"121", "des":"Some of the resources on the node need to run some necessary Kubernetes system components and resources to make the node as part of your cluster. Therefore, the total num", "doc_type":"usermanual2", "kw":"node,Kubernetes,Formula for Calculating the Reserved Resources of a Node,Node Overview,User Guide", @@ -502,7 +1212,7 @@ { "uri":"cce_10_0341.html", "product_code":"cce", - "code":"51", + "code":"122", "des":"This section describes how to allocate data disk space.When creating a node, you need to configure a data disk whose capacity is greater than or equal to 100GB for the no", "doc_type":"usermanual2", "kw":"Data Disk Space Allocation,Node Overview,User Guide", @@ -512,7 +1222,7 @@ { "uri":"cce_10_0363.html", "product_code":"cce", - "code":"52", + "code":"123", "des":"At least one cluster has been created.A key pair has been created for identity authentication upon remote node login.The node has 2-core or higher CPU, 4 GB or larger mem", "doc_type":"usermanual2", "kw":"Creating a Node,Nodes,User Guide", @@ -522,7 +1232,7 @@ { "uri":"cce_10_0198.html", "product_code":"cce", - "code":"53", + "code":"124", "des":"In CCE, you can Creating a Node or add existing nodes (ECSs) into your cluster.While an ECS is being accepted into a cluster, the operating system of the ECS will be rese", "doc_type":"usermanual2", "kw":"Adding Nodes for Management,Nodes,User Guide", @@ -532,7 +1242,7 @@ { "uri":"cce_10_0338.html", "product_code":"cce", - "code":"54", + "code":"125", "des":"Removing a node from a cluster will re-install the node OS and clear CCE components on the node.Removing a node will not delete the server corresponding to the node. You ", "doc_type":"usermanual2", "kw":"Removing a Node,Nodes,User Guide", @@ -542,7 +1252,7 @@ { "uri":"cce_10_0003.html", "product_code":"cce", - "code":"55", + "code":"126", "des":"You can reset a node to modify the node configuration, such as the node OS and login mode.Resetting a node will reinstall the node OS and the Kubernetes software on the n", "doc_type":"usermanual2", "kw":"Resetting a Node,Nodes,User Guide", @@ -552,7 +1262,7 @@ { "uri":"cce_10_0185.html", "product_code":"cce", - "code":"56", + "code":"127", "des":"If you use SSH to log in to a node (an ECS), ensure that the ECS already has an EIP (a public IP address).Only login to a running ECS is allowed.Only the user linux can l", "doc_type":"usermanual2", "kw":"Logging In to a Node,Nodes,User Guide", @@ -562,7 +1272,7 @@ { "uri":"cce_10_0004.html", "product_code":"cce", - "code":"57", + "code":"128", "des":"You can add different labels to nodes and define different attributes for labels. By using these node labels, you can quickly understand the characteristics of each node.", "doc_type":"usermanual2", "kw":"node labels,Inherent Label of a Node,Managing Node Labels,Nodes,User Guide", @@ -572,7 +1282,7 @@ { "uri":"cce_10_0352.html", "product_code":"cce", - "code":"58", + "code":"129", "des":"Taints enable a node to repel specific pods to prevent these pods from being scheduled to the node.A taint is a key-value pair associated with an effect. The following ef", "doc_type":"usermanual2", "kw":"Managing Node Taints,Nodes,User Guide", @@ -582,7 +1292,7 @@ { "uri":"cce_10_0184.html", "product_code":"cce", - "code":"59", + "code":"130", "des":"Each node in a cluster is a cloud server or physical machine. After a cluster node is created, you can change the cloud server name or specifications as required.Some inf", "doc_type":"usermanual2", "kw":"Synchronizing Data with Cloud Servers,Nodes,User Guide", @@ -592,8 +1302,8 @@ { "uri":"cce_10_0186.html", "product_code":"cce", - "code":"60", - "des":"When a node in a CCE cluster is deleted, services running on the node will also be deleted. Exercise caution when performing this operation.After a CCE cluster is deleted", + "code":"131", + "des":"When a node in a CCE cluster is deleted, services running on the node will also be deleted. Exercise caution when performing this operation.VM nodes that are being used b", "doc_type":"usermanual2", "kw":"Deleting a Node,Nodes,User Guide", "title":"Deleting a Node", @@ -602,7 +1312,7 @@ { "uri":"cce_10_0036.html", "product_code":"cce", - "code":"61", + "code":"132", "des":"After a node in the cluster is stopped, services on the node are also stopped. Before stopping a node, ensure that discontinuity of the services on the node will not resu", "doc_type":"usermanual2", "kw":"Stopping a Node,Nodes,User Guide", @@ -612,7 +1322,7 @@ { "uri":"cce_10_0276.html", "product_code":"cce", - "code":"62", + "code":"133", "des":"In a rolling upgrade, a new node is created, existing workloads are migrated to the new node, and then the old node is deleted. Figure 1 shows the migration process.The o", "doc_type":"usermanual2", "kw":"Performing Rolling Upgrade for Nodes,Nodes,User Guide", @@ -622,7 +1332,7 @@ { "uri":"cce_10_0035.html", "product_code":"cce", - "code":"63", + "code":"134", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Node Pools", @@ -632,7 +1342,7 @@ { "uri":"cce_10_0081.html", "product_code":"cce", - "code":"64", + "code":"135", "des":"CCE introduces node pools to help you better manage nodes in Kubernetes clusters. A node pool contains one node or a group of nodes with identical configuration in a clus", "doc_type":"usermanual2", "kw":"Deploying a Workload in a Specified Node Pool,Node Pool Overview,Node Pools,User Guide", @@ -642,7 +1352,7 @@ { "uri":"cce_10_0012.html", "product_code":"cce", - "code":"65", + "code":"136", "des":"This section describes how to create a node pool and perform operations on the node pool. For details about how a node pool works, see Node Pool Overview.The autoscaler a", "doc_type":"usermanual2", "kw":"Creating a Node Pool,Node Pools,User Guide", @@ -652,17 +1362,87 @@ { "uri":"cce_10_0222.html", "product_code":"cce", - "code":"66", + "code":"137", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Managing a Node Pool", + "title":"Managing a Node Pool", + "githuburl":"" + }, + { + "uri":"cce_10_0652.html", + "product_code":"cce", + "code":"138", "des":"The default node pool DefaultPool does not support the following management operations.CCE allows you to highly customize Kubernetes parameter settings on core components", "doc_type":"usermanual2", - "kw":"Managing a Node Pool,Node Pools,User Guide", - "title":"Managing a Node Pool", + "kw":"Configuring a Node Pool,Managing a Node Pool,User Guide", + "title":"Configuring a Node Pool", + "githuburl":"" + }, + { + "uri":"cce_10_0653.html", + "product_code":"cce", + "code":"139", + "des":"When editing the resource tags of the node pool. The modified configuration takes effect only for new nodes. To synchronize the configuration to the existing nodes, you n", + "doc_type":"usermanual2", + "kw":"Updating a Node Pool,Managing a Node Pool,User Guide", + "title":"Updating a Node Pool", + "githuburl":"" + }, + { + "uri":"cce_10_0654.html", + "product_code":"cce", + "code":"140", + "des":"After the configuration of a node pool is updated, some configurations cannot be automatically synchronized for existing nodes. You can manually synchronize configuration", + "doc_type":"usermanual2", + "kw":"Synchronizing Node Pools,Managing a Node Pool,User Guide", + "title":"Synchronizing Node Pools", + "githuburl":"" + }, + { + "uri":"cce_10_0660.html", + "product_code":"cce", + "code":"141", + "des":"When CCE releases a new OS image, existing nodes cannot be automatically upgraded. You can manually upgrade them in batches.This operation will upgrade the OS by resettin", + "doc_type":"usermanual2", + "kw":"Upgrading the OS,Managing a Node Pool,User Guide", + "title":"Upgrading the OS", + "githuburl":"" + }, + { + "uri":"cce_10_0655.html", + "product_code":"cce", + "code":"142", + "des":"You can copy the configuration of an existing node pool to create a new node pool on the CCE console.", + "doc_type":"usermanual2", + "kw":"Copying a Node Pool,Managing a Node Pool,User Guide", + "title":"Copying a Node Pool", + "githuburl":"" + }, + { + "uri":"cce_10_0656.html", + "product_code":"cce", + "code":"143", + "des":"Nodes in a node pool can be migrated. Currently, nodes in a node pool can be migrated only to the default node pool (defaultpool) in the same cluster.The migration has no", + "doc_type":"usermanual2", + "kw":"Migrating a Node,Managing a Node Pool,User Guide", + "title":"Migrating a Node", + "githuburl":"" + }, + { + "uri":"cce_10_0657.html", + "product_code":"cce", + "code":"144", + "des":"Deleting a node pool will delete nodes in the pool. Pods on these nodes will be automatically migrated to available nodes in other node pools.Deleting a node pool will de", + "doc_type":"usermanual2", + "kw":"Deleting a Node Pool,Managing a Node Pool,User Guide", + "title":"Deleting a Node Pool", "githuburl":"" }, { "uri":"cce_10_0046.html", "product_code":"cce", - "code":"67", + "code":"145", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Workloads", @@ -672,7 +1452,7 @@ { "uri":"cce_10_0006.html", "product_code":"cce", - "code":"68", + "code":"146", "des":"A workload is an application running on Kubernetes. No matter how many components are there in your workload, you can run it in a group of Kubernetes pods. A workload is ", "doc_type":"usermanual2", "kw":"Overview,Workloads,User Guide", @@ -682,7 +1462,7 @@ { "uri":"cce_10_0047.html", "product_code":"cce", - "code":"69", + "code":"147", "des":"Deployments are workloads (for example, Nginx) that do not store any data or status. You can create Deployments on the CCE console or by running kubectl commands.Before c", "doc_type":"usermanual2", "kw":"create a workload using kubectl,Creating a Deployment,Workloads,User Guide", @@ -692,7 +1472,7 @@ { "uri":"cce_10_0048.html", "product_code":"cce", - "code":"70", + "code":"148", "des":"StatefulSets are a type of workloads whose data or status is stored while they are running. For example, MySQL is a StatefulSet because it needs to store new data.A conta", "doc_type":"usermanual2", "kw":"Using kubectl,Creating a StatefulSet,Workloads,User Guide", @@ -702,7 +1482,7 @@ { "uri":"cce_10_0216.html", "product_code":"cce", - "code":"71", + "code":"149", "des":"CCE provides deployment and management capabilities for multiple types of containers and supports features of container workloads, including creation, configuration, moni", "doc_type":"usermanual2", "kw":"create a workload using kubectl,Creating a DaemonSet,Workloads,User Guide", @@ -712,7 +1492,7 @@ { "uri":"cce_10_0150.html", "product_code":"cce", - "code":"72", + "code":"150", "des":"Jobs are short-lived and run for a certain time to completion. They can be executed immediately after being deployed. It is completed after it exits normally (exit 0).A j", "doc_type":"usermanual2", "kw":"Creating a Job,Workloads,User Guide", @@ -722,7 +1502,7 @@ { "uri":"cce_10_0151.html", "product_code":"cce", - "code":"73", + "code":"151", "des":"A cron job runs on a repeating schedule. You can perform time synchronization for all active nodes at a fixed time point.A cron job runs periodically at the specified tim", "doc_type":"usermanual2", "kw":"time synchronization,Creating a Cron Job,Workloads,User Guide", @@ -732,7 +1512,7 @@ { "uri":"cce_10_0007.html", "product_code":"cce", - "code":"74", + "code":"152", "des":"After a workload is created, you can upgrade, monitor, roll back, or delete the workload, as well as edit its YAML file.Workload/Job managementOperationDescriptionMonitor", "doc_type":"usermanual2", "kw":"Managing Workloads and Jobs,Workloads,User Guide", @@ -742,7 +1522,7 @@ { "uri":"cce_10_0130.html", "product_code":"cce", - "code":"75", + "code":"153", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Configuring a Container", @@ -752,7 +1532,7 @@ { "uri":"cce_10_0396.html", "product_code":"cce", - "code":"76", + "code":"154", "des":"A workload is an abstract model of a group of pods. One pod can encapsulate one or more containers. You can click Add Container in the upper right corner to add multiple ", "doc_type":"usermanual2", "kw":"Setting Basic Container Information,Configuring a Container,User Guide", @@ -762,7 +1542,7 @@ { "uri":"cce_10_0009.html", "product_code":"cce", - "code":"77", + "code":"155", "des":"CCE allows you to create workloads using images pulled from third-party image repositories.Generally, a third-party image repository can be accessed only after authentica", "doc_type":"usermanual2", "kw":"Using a Third-Party Image,Configuring a Container,User Guide", @@ -772,7 +1552,7 @@ { "uri":"cce_10_0163.html", "product_code":"cce", - "code":"78", + "code":"156", "des":"CCE allows you to set resource limits for added containers during workload creation. You can apply for and limit the CPU and memory quotas used by each pod in a workload.", "doc_type":"usermanual2", "kw":"Setting Container Specifications,Configuring a Container,User Guide", @@ -782,7 +1562,7 @@ { "uri":"cce_10_0105.html", "product_code":"cce", - "code":"79", + "code":"157", "des":"CCE provides callback functions for the lifecycle management of containerized applications. For example, if you want a container to perform a certain operation before sto", "doc_type":"usermanual2", "kw":"Startup Command,Post-Start,Pre-Stop,Setting Container Lifecycle Parameters,Configuring a Container,U", @@ -792,7 +1572,7 @@ { "uri":"cce_10_0112.html", "product_code":"cce", - "code":"80", + "code":"158", "des":"Health check regularly checks the health status of containers during container running. If the health check function is not configured, a pod cannot detect application ex", "doc_type":"usermanual2", "kw":"Health check,HTTP request,TCP port,CLI,Setting Health Check for a Container,Configuring a Container,", @@ -802,7 +1582,7 @@ { "uri":"cce_10_0113.html", "product_code":"cce", - "code":"81", + "code":"159", "des":"An environment variable is a variable whose value can affect the way a running container will behave. You can modify environment variables even after workloads are deploy", "doc_type":"usermanual2", "kw":"Setting an Environment Variable,Configuring a Container,User Guide", @@ -812,7 +1592,7 @@ { "uri":"cce_10_0353.html", "product_code":"cce", - "code":"82", + "code":"160", "des":"When a workload is created, the container image is pulled from the image repository to the node. The image is also pulled when the workload is restarted or upgraded.By de", "doc_type":"usermanual2", "kw":"Configuring an Image Pull Policy,Configuring a Container,User Guide", @@ -822,7 +1602,7 @@ { "uri":"cce_10_0354.html", "product_code":"cce", - "code":"83", + "code":"161", "des":"When creating a workload, you can configure containers to use the same time zone as the node. You can enable time zone synchronization when creating a workload.The time z", "doc_type":"usermanual2", "kw":"Configuring Time Zone Synchronization,Configuring a Container,User Guide", @@ -832,7 +1612,7 @@ { "uri":"cce_10_0397.html", "product_code":"cce", - "code":"84", + "code":"162", "des":"In actual applications, upgrade is a common operation. A Deployment, StatefulSet, or DaemonSet can easily support application upgrade.You can set different upgrade polici", "doc_type":"usermanual2", "kw":"Configuring the Workload Upgrade Policy,Configuring a Container,User Guide", @@ -842,7 +1622,7 @@ { "uri":"cce_10_0232.html", "product_code":"cce", - "code":"85", + "code":"163", "des":"A nodeSelector provides a very simple way to constrain pods to nodes with particular labels, as mentioned in Creating a DaemonSet. The affinity and anti-affinity feature ", "doc_type":"usermanual2", "kw":"Scheduling Policy (Affinity/Anti-affinity),Configuring a Container,User Guide", @@ -852,7 +1632,7 @@ { "uri":"cce_10_0345.html", "product_code":"cce", - "code":"86", + "code":"164", "des":"You can use GPUs in CCE containers.A GPU node has been created. For details, see Creating a Node.The gpu-beta add-on has been installed. During the installation, select t", "doc_type":"usermanual2", "kw":"GPU Scheduling,Workloads,User Guide", @@ -862,7 +1642,7 @@ { "uri":"cce_10_0551.html", "product_code":"cce", - "code":"87", + "code":"165", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"CPU Core Binding", @@ -872,17 +1652,27 @@ { "uri":"cce_10_0351.html", "product_code":"cce", - "code":"88", + "code":"166", "des":"By default, kubelet uses CFS quotas to enforce pod CPU limits. When the node runs many CPU-bound pods, the workload can move to different CPU cores depending on whether t", "doc_type":"usermanual2", "kw":"Binding CPU Cores,CPU Core Binding,User Guide", "title":"Binding CPU Cores", "githuburl":"" }, + { + "uri":"cce_10_00356.html", + "product_code":"cce", + "code":"167", + "des":"If you encounter unexpected problems when using a container, you can log in to the container for debugging.The example output is as follows:NAME ", + "doc_type":"usermanual2", + "kw":"Accessing a Container,Workloads,User Guide", + "title":"Accessing a Container", + "githuburl":"" + }, { "uri":"cce_10_0386.html", "product_code":"cce", - "code":"89", + "code":"168", "des":"CCE allows you to add annotations to a YAML file to realize some advanced pod functions. The following table describes the annotations you can add.When you create a workl", "doc_type":"usermanual2", "kw":"Pod Labels and Annotations,Workloads,User Guide", @@ -892,7 +1682,7 @@ { "uri":"cce_10_0423.html", "product_code":"cce", - "code":"90", + "code":"169", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Volcano Scheduling", @@ -902,7 +1692,7 @@ { "uri":"cce_10_0384.html", "product_code":"cce", - "code":"91", + "code":"170", "des":"Jobs can be classified into online jobs and offline jobs based on whether services are always online.Online job: Such jobs run for a long time, with regular traffic surge", "doc_type":"usermanual2", "kw":"Hybrid Deployment of Online and Offline Jobs,Volcano Scheduling,User Guide", @@ -912,7 +1702,7 @@ { "uri":"cce_10_0288.html", "product_code":"cce", - "code":"92", + "code":"171", "des":"When the Cloud Native Network 2.0 model is used, pods use VPC ENIs or sub-ENIs for networking. You can directly bind security groups and EIPs to pods. CCE provides a cust", "doc_type":"usermanual2", "kw":"Security Group Policies,Workloads,User Guide", @@ -922,7 +1712,7 @@ { "uri":"cce_10_0020.html", "product_code":"cce", - "code":"93", + "code":"172", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Networking", @@ -932,7 +1722,7 @@ { "uri":"cce_10_0010.html", "product_code":"cce", - "code":"94", + "code":"173", "des":"You can learn about a cluster network from the following two aspects:What is a cluster network like? A cluster consists of multiple nodes, and pods (or containers) are ru", "doc_type":"usermanual2", "kw":"Overview,Networking,User Guide", @@ -942,7 +1732,7 @@ { "uri":"cce_10_0280.html", "product_code":"cce", - "code":"95", + "code":"174", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Container Network Models", @@ -952,8 +1742,8 @@ { "uri":"cce_10_0281.html", "product_code":"cce", - "code":"96", - "des":"The container network assigns IP addresses to pods in a cluster and provides networking services. In CCE, you can select the following network models for your cluster:Tun", + "code":"175", + "des":"The container network assigns IP addresses to pods in a cluster and provides networking services. In CCE, you can select the following network models for your cluster:Con", "doc_type":"usermanual2", "kw":"Overview,Container Network Models,User Guide", "title":"Overview", @@ -962,7 +1752,7 @@ { "uri":"cce_10_0282.html", "product_code":"cce", - "code":"97", + "code":"176", "des":"The container tunnel network is constructed on but independent of the node network through tunnel encapsulation. This network model uses VXLAN to encapsulate Ethernet pac", "doc_type":"usermanual2", "kw":"Container Tunnel Network,Container Network Models,User Guide", @@ -972,7 +1762,7 @@ { "uri":"cce_10_0283.html", "product_code":"cce", - "code":"98", + "code":"177", "des":"The VPC network uses VPC routing to integrate with the underlying network. This network model is suitable for performance-intensive scenarios. The maximum number of nodes", "doc_type":"usermanual2", "kw":"VPC Network,Container Network Models,User Guide", @@ -982,7 +1772,7 @@ { "uri":"cce_10_0284.html", "product_code":"cce", - "code":"99", + "code":"178", "des":"Developed by CCE, Cloud Native Network 2.0 deeply integrates Elastic Network Interfaces (ENIs) and sub-ENIs of Virtual Private Cloud (VPC). Container IP addresses are all", "doc_type":"usermanual2", "kw":"Cloud Native Network 2.0,Container Network Models,User Guide", @@ -992,7 +1782,7 @@ { "uri":"cce_10_0247.html", "product_code":"cce", - "code":"100", + "code":"179", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Services", @@ -1002,7 +1792,7 @@ { "uri":"cce_10_0249.html", "product_code":"cce", - "code":"101", + "code":"180", "des":"After a pod is created, the following problems may occur if you directly access the pod:The pod can be deleted and recreated at any time by a controller such as a Deploym", "doc_type":"usermanual2", "kw":"Service Overview,Services,User Guide", @@ -1012,7 +1802,7 @@ { "uri":"cce_10_0011.html", "product_code":"cce", - "code":"102", + "code":"181", "des":"ClusterIP Services allow workloads in the same cluster to use their cluster-internal domain names to access each other.The cluster-internal domain name format is Deployments or StatefulSets in the navigation pane ", "doc_type":"usermanual2", "kw":"Fault Locating and Troubleshooting for Abnormal Workloads,Workload Abnormalities,User Guide", @@ -2222,7 +3022,7 @@ { "uri":"cce_faq_00098.html", "product_code":"cce", - "code":"223", + "code":"303", "des":"Viewing K8s Event InformationCheck Item 1: Checking Whether a Node Is Available in the ClusterCheck Item 2: Checking Whether Node Resources (CPU and Memory) Are Sufficien", "doc_type":"usermanual2", "kw":"workload,InstanceSchedulingFailed,Failed to Schedule an Instance,Workload Abnormalities,User Guide", @@ -2232,7 +3032,7 @@ { "uri":"cce_faq_00015.html", "product_code":"cce", - "code":"224", + "code":"304", "des":"If the workload details page displays an event indicating that image pulling fails, perform the following operations to locate the fault:Check Item 1: Checking Whether im", "doc_type":"usermanual2", "kw":"workload,Failed to Pull an Image,Workload Abnormalities,User Guide", @@ -2242,7 +3042,7 @@ { "uri":"cce_faq_00018.html", "product_code":"cce", - "code":"225", + "code":"305", "des":"On the details page of a workload, if an event is displayed indicating that the container fails to be restarted, perform the following operations to locate the fault:Rect", "doc_type":"usermanual2", "kw":"Failed to Restart a Container,Workload Abnormalities,User Guide", @@ -2252,7 +3052,7 @@ { "uri":"cce_faq_00209.html", "product_code":"cce", - "code":"226", + "code":"306", "des":"Pod actions are classified into the following two types:kube-controller-manager periodically checks the status of all nodes. If a node is in the NotReady state for a peri", "doc_type":"usermanual2", "kw":"What Should I Do If An Evicted Pod Exists?,Workload Abnormalities,User Guide", @@ -2262,7 +3062,7 @@ { "uri":"cce_faq_00140.html", "product_code":"cce", - "code":"227", + "code":"307", "des":"When a node is faulty, pods on the node are evicted to ensure workload availability. If the pods are not evicted when the node is faulty, perform the following steps:Use ", "doc_type":"usermanual2", "kw":"Instance Eviction Exception,Workload Abnormalities,User Guide", @@ -2272,7 +3072,7 @@ { "uri":"cce_faq_00210.html", "product_code":"cce", - "code":"228", + "code":"308", "des":"When a node is in the Unavailable state, CCE migrates container pods on the node and sets the pods running on the node to the Terminating state.After the node is restored", "doc_type":"usermanual2", "kw":"What Should I Do If Pods in the Terminating State Cannot Be Deleted?,Workload Abnormalities,User Gui", @@ -2282,7 +3082,7 @@ { "uri":"cce_faq_00012.html", "product_code":"cce", - "code":"229", + "code":"309", "des":"The metadata.enable field in the YAML file of the workload is false. As a result, the pod of the workload is deleted and the workload is in the stopped status.The workloa", "doc_type":"usermanual2", "kw":"What Should I Do If a Workload Is Stopped Caused by Pod Deletion?,Workload Abnormalities,User Guide", @@ -2292,7 +3092,7 @@ { "uri":"cce_faq_00005.html", "product_code":"cce", - "code":"230", + "code":"310", "des":"The pod remains in the creating state for a long time, and the sandbox-related errors are reported.Select a troubleshooting method for your cluster:Clusters of V1.13 or l", "doc_type":"usermanual2", "kw":"What Should I Do If Sandbox-Related Errors Are Reported When the Pod Remains in the Creating State?,", @@ -2302,7 +3102,7 @@ { "uri":"cce_faq_00199.html", "product_code":"cce", - "code":"231", + "code":"311", "des":"Workload pods in the cluster fail and are being redeployed constantly.After the following command is run, the command output shows that many pods are in the evicted state", "doc_type":"usermanual2", "kw":"What Should I Do If a Pod Is in the Evicted State?,Workload Abnormalities,User Guide", @@ -2312,7 +3112,7 @@ { "uri":"cce_faq_00002.html", "product_code":"cce", - "code":"232", + "code":"312", "des":"If a node has sufficient memory resources, a container on this node can use more memory resources than requested, but no more than limited. If the memory allocated to a c", "doc_type":"usermanual2", "kw":"What Should I Do If the OOM Killer Is Triggered When a Container Uses Memory Resources More Than Lim", @@ -2322,7 +3122,7 @@ { "uri":"cce_faq_00202.html", "product_code":"cce", - "code":"233", + "code":"313", "des":"A workload can be accessed from public networks through a load balancer. LoadBalancer provides higher reliability than EIP-based NodePort because an EIP is no longer boun", "doc_type":"usermanual2", "kw":"What Should I Do If a Service Released in a Workload Cannot Be Accessed from Public Networks?,Refere", @@ -2332,7 +3132,7 @@ { "uri":"cce_faq_00266.html", "product_code":"cce", - "code":"234", + "code":"314", "des":"A VPC is similar to a private local area network (LAN) managed by a home gateway whose IP address is 192.168.0.0/16. A VPC is a private network built on the cloud and pro", "doc_type":"usermanual2", "kw":"VPC,cluster,nodes,What Is the Relationship Between Clusters, VPCs, and Subnets?,Reference,User Guide", @@ -2342,7 +3142,7 @@ { "uri":"cce_faq_00265.html", "product_code":"cce", - "code":"235", + "code":"315", "des":"CCE is a universal container platform. Its default security group rules apply to common scenarios. Based on security requirements, you can harden the security group rules", "doc_type":"usermanual2", "kw":"How Do I Harden the VPC Security Group Rules for CCE Cluster Nodes?,Reference,User Guide", @@ -2352,7 +3152,7 @@ { "uri":"cce_bestpractice.html", "product_code":"cce", - "code":"236", + "code":"316", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Best Practice", @@ -2362,17 +3162,137 @@ { "uri":"cce_bestpractice_00006.html", "product_code":"cce", - "code":"237", + "code":"317", "des":"Security, efficiency, stability, and availability are common requirements on all cloud services. To meet these requirements, the system availability, data reliability, an", "doc_type":"usermanual2", "kw":"Checklist for Deploying Containerized Applications in the Cloud,Best Practice,User Guide", "title":"Checklist for Deploying Containerized Applications in the Cloud", "githuburl":"" }, + { + "uri":"cce_bestpractice_0321.html", + "product_code":"cce", + "code":"318", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Containerization", + "title":"Containerization", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0001.html", + "product_code":"cce", + "code":"319", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Containerizing an Enterprise Application (ERP)", + "title":"Containerizing an Enterprise Application (ERP)", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0002.html", + "product_code":"cce", + "code":"320", + "des":"This chapter provides CCE best practices to walk you through the application containerization.A container is a lightweight high-performance resource isolation mechanism i", + "doc_type":"usermanual2", + "kw":"enterprise resource planning (ERP),Solution Overview,Containerizing an Enterprise Application (ERP),", + "title":"Solution Overview", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0340.html", + "product_code":"cce", + "code":"321", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Procedure", + "title":"Procedure", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0003.html", + "product_code":"cce", + "code":"322", + "des":"This tutorial describes how to containerize an ERP system by migrating it from a VM to CCE.No recoding or re-architecting is required. You only need to pack the entire ap", + "doc_type":"usermanual2", + "kw":"Containerizing an Entire Application,Procedure,User Guide", + "title":"Containerizing an Entire Application", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0004.html", + "product_code":"cce", + "code":"323", + "des":"The following figure illustrates the process of containerizing an application.", + "doc_type":"usermanual2", + "kw":"Containerization Process,Procedure,User Guide", + "title":"Containerization Process", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0005.html", + "product_code":"cce", + "code":"324", + "des":"Before containerizing an application, you need to analyze the running environment and dependencies of the application, and get familiar with the application deployment mo", + "doc_type":"usermanual2", + "kw":"containerizing an application,Analyzing the Application,Procedure,User Guide", + "title":"Analyzing the Application", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0006.html", + "product_code":"cce", + "code":"325", + "des":"After application analysis, you have gained the understanding of the OS and runtime required for running the application. You need to make the following preparations:Inst", + "doc_type":"usermanual2", + "kw":"Preparing the Application Runtime,Procedure,User Guide", + "title":"Preparing the Application Runtime", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0007.html", + "product_code":"cce", + "code":"326", + "des":"During application containerization, you need to prepare a startup script. The method of compiling this script is the same as that of compiling a shell script. The startu", + "doc_type":"usermanual2", + "kw":"Compiling a Startup Script,Procedure,User Guide", + "title":"Compiling a Startup Script", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0008.html", + "product_code":"cce", + "code":"327", + "des":"An image is the basis of a container. A container runs based on the content defined in the image. An image has multiple layers. Each layer includes the modifications made", + "doc_type":"usermanual2", + "kw":"Compiling the Dockerfile,Procedure,User Guide", + "title":"Compiling the Dockerfile", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0009.html", + "product_code":"cce", + "code":"328", + "des":"This section describes how to build an entire application into a Docker image. After building an image, you can use the image to deploy and upgrade the application. This ", + "doc_type":"usermanual2", + "kw":"Building and Uploading an Image,Procedure,User Guide", + "title":"Building and Uploading an Image", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_0010.html", + "product_code":"cce", + "code":"329", + "des":"This section describes how to deploy a workload on CCE. When using CCE for the first time, create an initial cluster and add a node into the cluster.Containerized workloa", + "doc_type":"usermanual2", + "kw":"Creating a Container Workload,Procedure,User Guide", + "title":"Creating a Container Workload", + "githuburl":"" + }, { "uri":"cce_bestpractice_00237.html", "product_code":"cce", - "code":"238", + "code":"330", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Migration", @@ -2382,7 +3302,7 @@ { "uri":"cce_bestpractice_0306.html", "product_code":"cce", - "code":"239", + "code":"331", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Migrating On-premises Kubernetes Clusters to CCE", @@ -2392,7 +3312,7 @@ { "uri":"cce_bestpractice_0307.html", "product_code":"cce", - "code":"240", + "code":"332", "des":"Containers are growing in popularity and Kubernetes simplifies containerized deployment. Many companies choose to build their own Kubernetes clusters. However, the O&M wo", "doc_type":"usermanual2", "kw":"Solution Overview,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2402,7 +3322,7 @@ { "uri":"cce_bestpractice_0308.html", "product_code":"cce", - "code":"241", + "code":"333", "des":"CCE allows you to customize cluster resources to meet various service requirements. Table 1 lists the key performance parameters of a cluster and provides the planned val", "doc_type":"usermanual2", "kw":"Planning Resources for the Target Cluster,Migrating On-premises Kubernetes Clusters to CCE,User Guid", @@ -2412,7 +3332,7 @@ { "uri":"cce_bestpractice_0309.html", "product_code":"cce", - "code":"242", + "code":"334", "des":"If your migration does not involve resources outside a cluster listed in Table 1 or you do not need to use other services to update resources after the migration, skip th", "doc_type":"usermanual2", "kw":"Migrating Resources Outside a Cluster,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2422,7 +3342,7 @@ { "uri":"cce_bestpractice_0310.html", "product_code":"cce", - "code":"243", + "code":"335", "des":"Velero is an open-source backup and migration tool for Kubernetes clusters. It integrates the persistent volume (PV) data backup capability of the Restic tool and can be ", "doc_type":"usermanual2", "kw":"Installing the Migration Tool,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2432,7 +3352,7 @@ { "uri":"cce_bestpractice_0311.html", "product_code":"cce", - "code":"244", + "code":"336", "des":"WordPress is used as an example to describe how to migrate an application from an on-premises Kubernetes cluster to a CCE cluster. The WordPress application consists of t", "doc_type":"usermanual2", "kw":"Migrating Resources in a Cluster,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2442,7 +3362,7 @@ { "uri":"cce_bestpractice_0312.html", "product_code":"cce", - "code":"245", + "code":"337", "des":"The WordPress and MySQL images used in this example can be pulled from SWR. Therefore, the image pull failure (ErrImagePull) will not occur. If the application to be migr", "doc_type":"usermanual2", "kw":"Updating Resources Accordingly,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2452,7 +3372,7 @@ { "uri":"cce_bestpractice_0313.html", "product_code":"cce", - "code":"246", + "code":"338", "des":"Cluster migration involves full migration of application data, which may cause intra-application adaptation problems. In this example, after the cluster is migrated, the ", "doc_type":"usermanual2", "kw":"Performing Additional Tasks,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2462,7 +3382,7 @@ { "uri":"cce_bestpractice_0314.html", "product_code":"cce", - "code":"247", + "code":"339", "des":"Both HostPath and Local volumes are local storage volumes. However, the Restic tool integrated in Velero cannot back up the PVs of the HostPath type and supports only the", "doc_type":"usermanual2", "kw":"Troubleshooting,Migrating On-premises Kubernetes Clusters to CCE,User Guide", @@ -2472,7 +3392,7 @@ { "uri":"cce_bestpractice_0322.html", "product_code":"cce", - "code":"248", + "code":"340", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"DevOps", @@ -2482,7 +3402,7 @@ { "uri":"cce_bestpractice_0324.html", "product_code":"cce", - "code":"249", + "code":"341", "des":"GitLab is an open-source version management system developed with Ruby on Rails for Git project repository management. It supports web-based access to public and private ", "doc_type":"usermanual2", "kw":"Interconnecting GitLab with SWR and CCE for CI/CD,DevOps,User Guide", @@ -2492,7 +3412,7 @@ { "uri":"cce_bestpractice_0323.html", "product_code":"cce", - "code":"250", + "code":"342", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Disaster Recovery", @@ -2502,7 +3422,7 @@ { "uri":"cce_bestpractice_00220.html", "product_code":"cce", - "code":"251", + "code":"343", "des":"To achieve high availability for your CCE containers, you can do as follows:Deploy three master nodes for the cluster.When nodes are deployed across AZs, set custom sched", "doc_type":"usermanual2", "kw":"Implementing High Availability for Containers in CCE,Disaster Recovery,User Guide", @@ -2512,7 +3432,7 @@ { "uri":"cce_bestpractice_0315.html", "product_code":"cce", - "code":"252", + "code":"344", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Security", @@ -2522,7 +3442,7 @@ { "uri":"cce_bestpractice_0317.html", "product_code":"cce", - "code":"253", + "code":"345", "des":"For security purposes, you are advised to configure a cluster as follows.Kubernetes releases a major version in about four months. CCE follows the same frequency as Kuber", "doc_type":"usermanual2", "kw":"Cluster Security,Security,User Guide", @@ -2532,7 +3452,7 @@ { "uri":"cce_bestpractice_0318.html", "product_code":"cce", - "code":"254", + "code":"346", "des":"Do not bind an EIP to a node unless necessary to reduce the attack surface.If an EIP must be used, properly configure the firewall or security group rules to restrict acc", "doc_type":"usermanual2", "kw":"Node Security,Security,User Guide", @@ -2542,7 +3462,7 @@ { "uri":"cce_bestpractice_0319.html", "product_code":"cce", - "code":"255", + "code":"347", "des":"The nodeSelector or nodeAffinity is used to limit the range of nodes to which applications can be scheduled, preventing the entire cluster from being threatened due to th", "doc_type":"usermanual2", "kw":"Container Security,Security,User Guide", @@ -2552,7 +3472,7 @@ { "uri":"cce_bestpractice_0320.html", "product_code":"cce", - "code":"256", + "code":"348", "des":"Currently, CCE has configured static encryption for secret resources. The secrets created by users will be encrypted and stored in etcd of the CCE cluster. Secrets can be", "doc_type":"usermanual2", "kw":"Secret Security,Security,User Guide", @@ -2562,7 +3482,7 @@ { "uri":"cce_bestpractice_0090.html", "product_code":"cce", - "code":"257", + "code":"349", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Auto Scaling", @@ -2572,17 +3492,37 @@ { "uri":"cce_bestpractice_00282.html", "product_code":"cce", - "code":"258", + "code":"350", "des":"The best way to handle surging traffic is to automatically adjust the number of machines based on the traffic volume or resource usage, which is called scaling.In CCE, th", "doc_type":"usermanual2", "kw":"Using HPA and CA for Auto Scaling of Workloads and Nodes,Auto Scaling,User Guide", "title":"Using HPA and CA for Auto Scaling of Workloads and Nodes", "githuburl":"" }, + { + "uri":"cce_bestpractice_10008.html", + "product_code":"cce", + "code":"351", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Monitoring", + "title":"Monitoring", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_10009.html", + "product_code":"cce", + "code":"352", + "des":"Generally, a user has different clusters for different purposes, such as production, testing, and development. To monitor, collect, and view metrics of these clusters, yo", + "doc_type":"usermanual2", + "kw":"Using Prometheus for Multi-cluster Monitoring,Monitoring,User Guide", + "title":"Using Prometheus for Multi-cluster Monitoring", + "githuburl":"" + }, { "uri":"cce_bestpractice_0050.html", "product_code":"cce", - "code":"259", + "code":"353", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Cluster", @@ -2592,7 +3532,7 @@ { "uri":"cce_bestpractice_00254.html", "product_code":"cce", - "code":"260", + "code":"354", "des":"When you have multiple CCE clusters, you may find it difficult to efficiently connect to all of them.This section describes how to configure access to multiple clusters b", "doc_type":"usermanual2", "kw":"Connecting to Multiple Clusters Using kubectl,Cluster,User Guide", @@ -2602,17 +3542,27 @@ { "uri":"cce_bestpractice_00190.html", "product_code":"cce", - "code":"261", + "code":"355", "des":"You can use the pre-installation script feature to configure CCE cluster nodes (ECSs).When creating a node in a cluster of v1.13.10 or later, if a data disk is not manage", "doc_type":"usermanual2", "kw":"Adding a Second Data Disk to a Node in a CCE Cluster,Cluster,User Guide", "title":"Adding a Second Data Disk to a Node in a CCE Cluster", "githuburl":"" }, + { + "uri":"cce_bestpractice_10012.html", + "product_code":"cce", + "code":"356", + "des":"When a node is created, a data disk is created by default for container runtime and kubelet components to use. The data disk used by the container runtime and kubelet co", + "doc_type":"usermanual2", + "kw":"Selecting a Data Disk for the Node,Cluster,User Guide", + "title":"Selecting a Data Disk for the Node", + "githuburl":"" + }, { "uri":"cce_bestpractice_0052.html", "product_code":"cce", - "code":"262", + "code":"357", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Networking", @@ -2622,7 +3572,7 @@ { "uri":"cce_bestpractice_00004.html", "product_code":"cce", - "code":"263", + "code":"358", "des":"Before creating a cluster on CCE, determine the number of VPCs, number of subnets, container CIDR blocks, and Services for access based on service requirements.This topic", "doc_type":"usermanual2", "kw":"Planning CIDR Blocks for a Cluster,Networking,User Guide", @@ -2632,8 +3582,8 @@ { "uri":"cce_bestpractice_00162.html", "product_code":"cce", - "code":"264", - "des":"CCE uses self-proprietary, high-performance container networking add-ons to support the tunnel network, Cloud Native Network 2.0, and VPC network models.After a cluster i", + "code":"359", + "des":"CCE uses proprietary, high-performance container networking add-ons to support the tunnel network, Cloud Native Network 2.0, and VPC network models.After a cluster is cre", "doc_type":"usermanual2", "kw":"Selecting a Network Model,Networking,User Guide", "title":"Selecting a Network Model", @@ -2642,7 +3592,7 @@ { "uri":"cce_bestpractice_00231.html", "product_code":"cce", - "code":"265", + "code":"360", "des":"Session persistence is one of the most common while complex problems in load balancing.Session persistence is also called sticky sessions. After the sticky session functi", "doc_type":"usermanual2", "kw":"Implementing Sticky Session Through Load Balancing,Networking,User Guide", @@ -2652,7 +3602,7 @@ { "uri":"cce_bestpractice_00035.html", "product_code":"cce", - "code":"266", + "code":"361", "des":"There may be different types of proxy servers between a client and a container server. How can a container obtain the real source IP address of the client? This section d", "doc_type":"usermanual2", "kw":"Obtaining the Client Source IP Address for a Container,Networking,User Guide", @@ -2662,7 +3612,7 @@ { "uri":"cce_bestpractice_0053.html", "product_code":"cce", - "code":"267", + "code":"362", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Storage", @@ -2672,8 +3622,8 @@ { "uri":"cce_bestpractice_00198.html", "product_code":"cce", - "code":"268", - "des":"A data disk is divided depending on the container storage Rootfs:Overlayfs: No independent thin pool is allocated. Image data is stored in the dockersys disk.# lsblk\nNAME", + "code":"363", + "des":"EulerOS 2.9 is used as the sample OS. Originally, system disk /dev/vda has 50 GB and one partition (/dev/vda1), and then 50 GB is added to the disk. In this example, the ", "doc_type":"usermanual2", "kw":"Expanding Node Disk Capacity,Storage,User Guide", "title":"Expanding Node Disk Capacity", @@ -2682,7 +3632,7 @@ { "uri":"cce_bestpractice_00199.html", "product_code":"cce", - "code":"269", + "code":"364", "des":"This section describes how to mount OBS buckets and OBS parallel file systems (preferred) of third-party tenants.The CCE cluster of a SaaS service provider needs to be mo", "doc_type":"usermanual2", "kw":"Mounting an Object Storage Bucket of a Third-Party Tenant,Storage,User Guide", @@ -2690,9 +3640,9 @@ "githuburl":"" }, { - "uri":"cce_bestpractice_00253_0.html", + "uri":"cce_bestpractice_00253.html", "product_code":"cce", - "code":"270", + "code":"365", "des":"The minimum capacity of an SFS Turbo file system is 500 GB, and the SFS Turbo file system cannot be billed by usage. By default, the root directory of an SFS Turbo file s", "doc_type":"usermanual2", "kw":"Dynamically Creating and Mounting Subdirectories of an SFS Turbo File System,Storage,User Guide", @@ -2702,7 +3652,7 @@ { "uri":"cce_bestpractice_0107.html", "product_code":"cce", - "code":"271", + "code":"366", "des":"In clusters later than v1.15.11-r1, CSI (the everest add-on) has taken over all functions of fuxi FlexVolume (the storage-driver add-on) for managing container storage. Y", "doc_type":"usermanual2", "kw":"How Do I Change the Storage Class Used by a Cluster of v1.15 from FlexVolume to CSI Everest?,Storage", @@ -2710,9 +3660,9 @@ "githuburl":"" }, { - "uri":"cce_bestpractice_00281_0.html", + "uri":"cce_bestpractice_00281.html", "product_code":"cce", - "code":"272", + "code":"367", "des":"When using storage resources in CCE, the most common method is to specify storageClassName to define the type of storage resources to be created when creating a PVC. The ", "doc_type":"usermanual2", "kw":"Custom Storage Classes,Storage,User Guide", @@ -2722,7 +3672,7 @@ { "uri":"cce_bestpractice_00284.html", "product_code":"cce", - "code":"273", + "code":"368", "des":"EVS disks cannot be attached across AZs. For example, EVS disks in AZ 1 cannot be attached to nodes in AZ 2.If the storage class csi-disk is used for StatefulSets, when a", "doc_type":"usermanual2", "kw":"Realizing Automatic Topology for EVS Disks When Nodes Are Deployed Across AZs (csi-disk-topology),St", @@ -2732,7 +3682,7 @@ { "uri":"cce_bestpractice_0051.html", "product_code":"cce", - "code":"274", + "code":"369", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Container", @@ -2742,7 +3692,7 @@ { "uri":"cce_bestpractice_00002.html", "product_code":"cce", - "code":"275", + "code":"370", "des":"If a node has sufficient memory resources, a container on this node can use more memory resources than requested, but no more than limited. If the memory allocated to a c", "doc_type":"usermanual2", "kw":"Properly Allocating Container Computing Resources,Container,User Guide", @@ -2752,7 +3702,7 @@ { "uri":"cce_bestpractice_00227.html", "product_code":"cce", - "code":"276", + "code":"371", "des":"To access a Kubernetes cluster from a client, you can use the Kubernetes command line tool kubectl.Create a DaemonSet file.vi daemonSet.yamlAn example YAML file is provid", "doc_type":"usermanual2", "kw":"Modifying Kernel Parameters Using a Privileged Container,Container,User Guide", @@ -2762,7 +3712,7 @@ { "uri":"cce_bestpractice_00228.html", "product_code":"cce", - "code":"277", + "code":"372", "des":"Before containers running applications are started, one or some init containers are started first. If there are multiple init containers, they will be started in the defi", "doc_type":"usermanual2", "kw":"Initializing a Container,Container,User Guide", @@ -2772,7 +3722,7 @@ { "uri":"cce_bestpractice_00226.html", "product_code":"cce", - "code":"278", + "code":"373", "des":"If DNS or other related settings are inappropriate, you can use hostAliases to overwrite the resolution of the host name at the pod level when adding entries to the /etc/", "doc_type":"usermanual2", "kw":"Using hostAliases to Configure /etc/hosts in a Pod,Container,User Guide", @@ -2782,17 +3732,67 @@ { "uri":"cce_bestpractice_0325.html", "product_code":"cce", - "code":"279", + "code":"374", "des":"Linux allows you to create a core dump file if an application crashes, which contains the data the application had in memory at the time of the crash. You can analyze the", "doc_type":"usermanual2", "kw":"Configuring Core Dumps,Container,User Guide", "title":"Configuring Core Dumps", "githuburl":"" }, + { + "uri":"cce_bestpractice_0055.html", + "product_code":"cce", + "code":"375", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Permission", + "title":"Permission", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_00221.html", + "product_code":"cce", + "code":"376", + "des":"By default, the kubeconfig file provided by CCE for users has permissions bound to the cluster-admin role, which are equivalent to the permissions of user root. It is dif", + "doc_type":"usermanual2", + "kw":"Configuring kubeconfig for Fine-Grained Management on Cluster Resources,Permission,User Guide", + "title":"Configuring kubeconfig for Fine-Grained Management on Cluster Resources", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_10000.html", + "product_code":"cce", + "code":"377", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual2", + "kw":"Release", + "title":"Release", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_10001.html", + "product_code":"cce", + "code":"378", + "des":"When switching between old and new services, you may be challenged in ensuring the system service continuity. If a new service version is directly released to all users a", + "doc_type":"usermanual2", + "kw":"Overview,Release,User Guide", + "title":"Overview", + "githuburl":"" + }, + { + "uri":"cce_bestpractice_10002.html", + "product_code":"cce", + "code":"379", + "des":"To implement grayscale release for a CCE cluster, you need to deploy other open-source tools, such as Nginx Ingress, to the cluster or deploy services to a service mesh. ", + "doc_type":"usermanual2", + "kw":"Using Services to Implement Simple Grayscale Release and Blue-Green Deployment,Release,User Guide", + "title":"Using Services to Implement Simple Grayscale Release and Blue-Green Deployment", + "githuburl":"" + }, { "uri":"cce_01_9999.html", "product_code":"cce", - "code":"280", + "code":"380", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Migrating Data from CCE 1.0 to CCE 2.0", @@ -2802,7 +3802,7 @@ { "uri":"cce_01_9998.html", "product_code":"cce", - "code":"281", + "code":"381", "des":"CCE 2.0 inherits and modifies the features of CCE 1.0, and release new features.Modified features:Clusters in CCE 1.0 are equivalent to Hybrid clusters in CCE 2.0.CCE 2.0", "doc_type":"usermanual2", "kw":"Differences Between CCE 1.0 and CCE 2.0,Migrating Data from CCE 1.0 to CCE 2.0,User Guide", @@ -2812,7 +3812,7 @@ { "uri":"cce_01_9997.html", "product_code":"cce", - "code":"282", + "code":"382", "des":"Migrate the images stored in the image repository of CCE 1.0 to CCE 2.0.A VM is available. The VM is bound to a public IP address and can access the Internet. Docker (ear", "doc_type":"usermanual2", "kw":"Migrating Images,Migrating Data from CCE 1.0 to CCE 2.0,User Guide", @@ -2822,7 +3822,7 @@ { "uri":"cce_01_9996.html", "product_code":"cce", - "code":"283", + "code":"383", "des":"Create Hybrid clusters on the CCE 2.0 console. These new Hybrid clusters should have the same specifications with those created on CCE 1.0.To create clusters using APIs, ", "doc_type":"usermanual2", "kw":"Migrating Clusters,Migrating Data from CCE 1.0 to CCE 2.0,User Guide", @@ -2832,7 +3832,7 @@ { "uri":"cce_01_9995.html", "product_code":"cce", - "code":"284", + "code":"384", "des":"This section describes how to create a Deployment with the same specifications as that in CCE 1.0 on the CCE 2.0 console.It is advised to delete the applications on CCE 1", "doc_type":"usermanual2", "kw":"Migrating Applications,Migrating Data from CCE 1.0 to CCE 2.0,User Guide", @@ -2842,7 +3842,7 @@ { "uri":"cce_01_0300.html", "product_code":"cce", - "code":"285", + "code":"385", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual2", "kw":"Change History,User Guide", diff --git a/docs/cce/umn/CLASS.TXT.json b/docs/cce/umn/CLASS.TXT.json index afd0e381..a7781fa9 100644 --- a/docs/cce/umn/CLASS.TXT.json +++ b/docs/cce/umn/CLASS.TXT.json @@ -1,22 +1,139 @@ [ { - "desc":"Cloud Container Engine (CCE) provides highly scalable, high-performance, enterprise-class Kubernetes clusters and supports Docker containers. With CCE, you can easily dep", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cce", - "title":"What Is Cloud Container Engine?", - "uri":"cce_01_0091.html", + "title":"Service Overview", + "uri":"en-us_topic_0000001550437509.html", "doc_type":"usermanual2", "p_code":"", "code":"1" }, { - "desc":"This document provides instructions for getting started with the Cloud Container Engine (CCE).Complete the following tasks to get started with CCE.The accounts have the p", + "desc":"Cloud Container Engine (CCE) is a scalable, enterprise-class hosted Kubernetes service. With CCE, you can easily deploy, manage, and scale containerized applications in t", "product_code":"cce", - "title":"Instruction", - "uri":"cce_qs_0001.html", + "title":"What Is Cloud Container Engine?", + "uri":"cce_01_0091.html", "doc_type":"usermanual2", - "p_code":"", + "p_code":"1", "code":"2" }, + { + "desc":"CCE is a container service built on Docker and Kubernetes. A wealth of features enable you to run container clusters at scale. CCE eases containerization thanks to its re", + "product_code":"cce", + "title":"Product Advantages", + "uri":"cce_productdesc_0003.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"3" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Application Scenarios", + "uri":"cce_productdesc_0007.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"4" + }, + { + "desc":"In CCE, you can run clusters with x86 and Arm nodes. Create and manage Kubernetes clusters. Deploy containerized applications in them. All done in CCE.Containerization re", + "product_code":"cce", + "title":"Infrastructure and Containerized Application Management", + "uri":"cce_productdesc_0020.html", + "doc_type":"usermanual2", + "p_code":"4", + "code":"5" + }, + { + "desc":"Shopping apps and websites, especially during promotions and flash salesLive streaming, where service loads often fluctuateGames, where many players may go online in cert", + "product_code":"cce", + "title":"Auto Scaling in Seconds", + "uri":"cce_productdesc_0015.html", + "doc_type":"usermanual2", + "p_code":"4", + "code":"6" + }, + { + "desc":"You may receive a lot feedback and requirements for your apps or services. You may want to boost user experience with new features. Continuous integration (CI) and delive", + "product_code":"cce", + "title":"DevOps and CI/CD", + "uri":"cce_productdesc_0017.html", + "doc_type":"usermanual2", + "p_code":"4", + "code":"7" + }, + { + "desc":"Multi-cloud deployment and disaster recoveryRunning apps in containers on different clouds can ensure high availability. When a cloud is down, other clouds respond and se", + "product_code":"cce", + "title":"Hybrid Cloud Architecture", + "uri":"cce_productdesc_0018.html", + "doc_type":"usermanual2", + "p_code":"4", + "code":"8" + }, + { + "desc":"This section describes the notes and constraints on using CCE.After a cluster is created, the following items cannot be changed:Number of master nodes. For example, you c", + "product_code":"cce", + "title":"Notes and Constraints", + "uri":"cce_productdesc_0005.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"9" + }, + { + "desc":"CCE allows you to assign permissions to IAM users and user groups under your tenant accounts. CCE combines the advantages of Identity and Access Management (IAM) and Kube", + "product_code":"cce", + "title":"Permissions", + "uri":"cce_productdesc_0002.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"10" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Basic Concepts", + "uri":"cce_productdesc_0004.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"11" + }, + { + "desc":"CCE provides highly scalable, high-performance, enterprise-class Kubernetes clusters and supports Docker containers. With CCE, you can easily deploy, manage, and scale co", + "product_code":"cce", + "title":"Basic Concepts", + "uri":"cce_productdesc_0011.html", + "doc_type":"usermanual2", + "p_code":"11", + "code":"12" + }, + { + "desc":"Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of container clusters. It is a container orchestration tool and a leading sol", + "product_code":"cce", + "title":"Mappings Between CCE and Kubernetes Terms", + "uri":"cce_productdesc_0010.html", + "doc_type":"usermanual2", + "p_code":"11", + "code":"13" + }, + { + "desc":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.Regions are divided based on geographical", + "product_code":"cce", + "title":"Regions and AZs", + "uri":"cce_productdesc_0012.html", + "doc_type":"usermanual2", + "p_code":"11", + "code":"14" + }, + { + "desc":"CCE works with the following cloud services and requires permissions to access them.", + "product_code":"cce", + "title":"Related Services", + "uri":"cce_productdesc_0008.html", + "doc_type":"usermanual2", + "p_code":"1", + "code":"15" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cce", @@ -24,16 +141,7 @@ "uri":"cce_bulletin_0000.html", "doc_type":"usermanual2", "p_code":"", - "code":"3" - }, - { - "desc":"When performing operations such as creating, deleting, and scaling clusters, do not change user permission in the Identity and Access Management (IAM) console. Otherwise,", - "product_code":"cce", - "title":"Risky Operations on Cluster Nodes", - "uri":"cce_bulletin_0054.html", - "doc_type":"usermanual2", - "p_code":"3", - "code":"4" + "code":"16" }, { "desc":"This section explains versioning in CCE, and the policies for Kubernetes version support.Version number: The format is x.y.z, where x.y is the major version and z is the ", @@ -41,8 +149,8 @@ "title":"Kubernetes Version Support Mechanism", "uri":"cce_bulletin_0003.html", "doc_type":"usermanual2", - "p_code":"3", - "code":"5" + "p_code":"16", + "code":"17" }, { "desc":"To ensure that stable and reliable Kubernetes versions are available during your use of CCE, CCE provides the Kubernetes version support mechanism. A new supported versio", @@ -50,17 +158,17 @@ "title":"CCE Cluster Version Release Notes", "uri":"cce_bulletin_0068.html", "doc_type":"usermanual2", - "p_code":"3", - "code":"6" + "p_code":"16", + "code":"18" }, { - "desc":"CCE nodes in Hybrid clusters can run on EulerOS 2.5, EulerOS 2.9 and CentOS 7.7. The following table lists the supported patches for these OSs.The OS patches and verifica", + "desc":"CCE nodes in Hybrid clusters can run on EulerOS 2.5, EulerOS 2.9, CentOS 7.7 and Ubuntu 22.04. The following table lists the supported patches for these OSs.The OS patche", "product_code":"cce", "title":"OS Patch Notes for Cluster Nodes", "uri":"cce_bulletin_0301.html", "doc_type":"usermanual2", - "p_code":"3", - "code":"7" + "p_code":"16", + "code":"19" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -68,8 +176,8 @@ "title":"Security Vulnerability Responses", "uri":"cce_bulletin_0169.html", "doc_type":"usermanual2", - "p_code":"3", - "code":"8" + "p_code":"16", + "code":"20" }, { "desc":"High-risk vulnerabilities:CCE fixes vulnerabilities as soon as possible after the Kubernetes community detects them and releases fixing solutions. The fixing policies are", @@ -77,8 +185,8 @@ "title":"Vulnerability Fixing Policies", "uri":"cce_bulletin_0011.html", "doc_type":"usermanual2", - "p_code":"8", - "code":"9" + "p_code":"20", + "code":"21" }, { "desc":"Recently, a security research team disclosed a privilege escalation vulnerability (CVE-2021-4034, also dubbed PwnKit) in PolKit's pkexec. Unprivileged users can gain full", @@ -86,8 +194,8 @@ "title":"Linux Polkit Privilege Escalation Vulnerability (CVE-2021-4034)", "uri":"CVE-2021-4034.html", "doc_type":"usermanual2", - "p_code":"8", - "code":"10" + "p_code":"20", + "code":"22" }, { "desc":"The Linux Kernel SACK vulnerabilities have been fixed. This section describes the solution to these vulnerabilities.On June 18, 2019, Red Hat released a security notice, ", @@ -95,26 +203,98 @@ "title":"Notice on Fixing Linux Kernel SACK Vulnerabilities", "uri":"cce_bulletin_0206.html", "doc_type":"usermanual2", - "p_code":"8", - "code":"11" + "p_code":"20", + "code":"23" }, { - "desc":"In clusters earlier than v1.21, a token is obtained by mounting the secret of the service account to a pod. Tokens obtained this way are permanent. This approach is no lo", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cce", - "title":"Service Account Token Security Improvement", - "uri":"cce_10_0477.html", - "doc_type":"usermanual2", - "p_code":"3", - "code":"12" - }, - { - "desc":"CCE works closely with multiple cloud services to support computing, storage, networking, and monitoring functions. When you log in to the CCE console for the first time,", - "product_code":"cce", - "title":"Obtaining Resource Permissions", - "uri":"cce_01_9994.html", + "title":"Getting Started", + "uri":"cce_qs_0000.html", "doc_type":"usermanual2", "p_code":"", - "code":"13" + "code":"24" + }, + { + "desc":"This section describes how to use Cloud Container Engine (CCE) and provides frequently asked questions (FAQs) to help you quickly get started with CCE.Complete the follow", + "product_code":"cce", + "title":"Introduction", + "uri":"cce_qs_0001.html", + "doc_type":"usermanual2", + "p_code":"24", + "code":"25" + }, + { + "desc":"Before using CCE, you need to make the following preparations:Creating an IAM userObtaining Resource Permissions(Optional) Creating a VPC(Optional) Creating a Key PairIf ", + "product_code":"cce", + "title":"Preparations", + "uri":"cce_qs_0006.html", + "doc_type":"usermanual2", + "p_code":"24", + "code":"26" + }, + { + "desc":"This section describes how to quickly create a CCE cluster. In this example, the default or simple configurations are in use.If you have not created a cluster, a wizard p", + "product_code":"cce", + "title":"Creating a Kubernetes Cluster", + "uri":"cce_qs_0008.html", + "doc_type":"usermanual2", + "p_code":"24", + "code":"27" + }, + { + "desc":"You can use images to quickly create a single-pod workload that can be accessed from public networks. This section describes how to use CCE to quickly deploy an Nginx app", + "product_code":"cce", + "title":"Creating a Deployment (Nginx) from an Image", + "uri":"cce_qs_0003.html", + "doc_type":"usermanual2", + "p_code":"24", + "code":"28" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Deploying WordPress and MySQL That Depend on Each Other", + "uri":"cce_qs_0007.html", + "doc_type":"usermanual2", + "p_code":"24", + "code":"29" + }, + { + "desc":"WordPress was originally a blog platform based on PHP and MySQL. It is gradually evolved into a content management system. You can set up your own blog website on any ser", + "product_code":"cce", + "title":"Overview", + "uri":"cce_qs_0009.html", + "doc_type":"usermanual2", + "p_code":"29", + "code":"30" + }, + { + "desc":"WordPress must be used together with MySQL. WordPress runs the content management program while MySQL serves as a database to store data.The WordPress and MySQL images ha", + "product_code":"cce", + "title":"Step 1: Create a MySQL Workload", + "uri":"cce_qs_0004.html", + "doc_type":"usermanual2", + "p_code":"29", + "code":"31" + }, + { + "desc":"WordPress was originally a blog platform based on PHP and MySQL. It is gradually evolved into a content management system. You can set up your own blog website on any ser", + "product_code":"cce", + "title":"Step 2: Create a WordPress Workload", + "uri":"cce_qs_0005.html", + "doc_type":"usermanual2", + "p_code":"29", + "code":"32" + }, + { + "desc":"During service deployment or running, you may trigger high-risk operations at different levels, causing service faults or interruption. To help you better estimate and av", + "product_code":"cce", + "title":"High-Risk Operations and Solutions", + "uri":"cce_10_0054.html", + "doc_type":"usermanual2", + "p_code":"", + "code":"33" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -123,7 +303,7 @@ "uri":"cce_10_0091.html", "doc_type":"usermanual2", "p_code":"", - "code":"14" + "code":"34" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -131,17 +311,17 @@ "title":"Cluster Overview", "uri":"cce_10_0002.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"15" + "p_code":"34", + "code":"35" }, { - "desc":"Kubernetes allows you to easily deploy and manage containerized application and facilitates container scheduling and orchestration.For developers, Kubernetes is a cluster", + "desc":"Kubernetes is an open source container orchestration engine for automating deployment, scaling, and management of containerized applications.For developers, Kubernetes is", "product_code":"cce", "title":"Basic Cluster Information", "uri":"cce_10_0430.html", "doc_type":"usermanual2", - "p_code":"15", - "code":"16" + "p_code":"35", + "code":"36" }, { "desc":"The following table lists the differences between CCE Turbo clusters and CCE clusters:The QingTian architecture consists of data plane (software-hardware synergy) and man", @@ -149,8 +329,8 @@ "title":"CCE Turbo Clusters and CCE Clusters", "uri":"cce_10_0342.html", "doc_type":"usermanual2", - "p_code":"15", - "code":"17" + "p_code":"35", + "code":"37" }, { "desc":"kube-proxy is a key component of a Kubernetes cluster. It is responsible for load balancing and forwarding between a Service and its backend pod.CCE supports two forwardi", @@ -158,8 +338,8 @@ "title":"Comparing iptables and IPVS", "uri":"cce_10_0349.html", "doc_type":"usermanual2", - "p_code":"15", - "code":"18" + "p_code":"35", + "code":"38" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -167,8 +347,8 @@ "title":"Release Notes", "uri":"cce_10_0068.html", "doc_type":"usermanual2", - "p_code":"15", - "code":"19" + "p_code":"35", + "code":"39" }, { "desc":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.25.Kubernetes 1", @@ -176,8 +356,8 @@ "title":"CCE Kubernetes 1.25 Release Notes", "uri":"cce_10_0467.html", "doc_type":"usermanual2", - "p_code":"19", - "code":"20" + "p_code":"39", + "code":"40" }, { "desc":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.23.Changes in C", @@ -185,8 +365,8 @@ "title":"CCE Kubernetes 1.23 Release Notes", "uri":"cce_10_0468.html", "doc_type":"usermanual2", - "p_code":"19", - "code":"21" + "p_code":"39", + "code":"41" }, { "desc":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.21.Kubernetes 1", @@ -194,8 +374,8 @@ "title":"CCE Kubernetes 1.21 Release Notes", "uri":"cce_10_0469.html", "doc_type":"usermanual2", - "p_code":"19", - "code":"22" + "p_code":"39", + "code":"42" }, { "desc":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.19.Kubernetes 1", @@ -203,8 +383,8 @@ "title":"CCE Kubernetes 1.19 Release Notes", "uri":"cce_10_0470.html", "doc_type":"usermanual2", - "p_code":"19", - "code":"23" + "p_code":"39", + "code":"43" }, { "desc":"CCE has passed the Certified Kubernetes Conformance Program and is a certified Kubernetes offering. This section describes the updates in CCE Kubernetes 1.17.All resource", @@ -212,8 +392,8 @@ "title":"CCE Kubernetes 1.17 Release Notes", "uri":"cce_10_0471.html", "doc_type":"usermanual2", - "p_code":"19", - "code":"24" + "p_code":"39", + "code":"44" }, { "desc":"CCE Turbo clusters run on a cloud native infrastructure that features software-hardware synergy to support passthrough networking, high security and reliability, and inte", @@ -221,8 +401,8 @@ "title":"Creating a CCE Turbo Cluster", "uri":"cce_10_0298.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"25" + "p_code":"34", + "code":"45" }, { "desc":"On the CCE console, you can easily create Kubernetes clusters. Kubernetes can manage container clusters at scale. A cluster manages a group of node resources.In CCE, you ", @@ -230,8 +410,8 @@ "title":"Creating a CCE Cluster", "uri":"cce_10_0028.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"26" + "p_code":"34", + "code":"46" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -239,8 +419,8 @@ "title":"Using kubectl to Run a Cluster", "uri":"cce_10_0140.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"27" + "p_code":"34", + "code":"47" }, { "desc":"This section uses a CCE cluster as an example to describe how to connect to a CCE cluster using kubectl.When you access a cluster using kubectl, CCE uses thekubeconfig.js", @@ -248,8 +428,8 @@ "title":"Connecting to a Cluster Using kubectl", "uri":"cce_10_0107.html", "doc_type":"usermanual2", - "p_code":"27", - "code":"28" + "p_code":"47", + "code":"48" }, { "desc":"A Subject Alternative Name (SAN) can be signed in to a cluster server certificate. A SAN is usually used by the client to verify the server validity in TLS handshakes. Sp", @@ -257,8 +437,8 @@ "title":"Customizing a Cluster Certificate SAN", "uri":"cce_10_0367.html", "doc_type":"usermanual2", - "p_code":"27", - "code":"29" + "p_code":"47", + "code":"49" }, { "desc":"getThe get command displays one or many resources of a cluster.This command prints a table of the most important information about all resources, including cluster nodes,", @@ -266,8 +446,8 @@ "title":"Common kubectl Commands", "uri":"cce_10_0139.html", "doc_type":"usermanual2", - "p_code":"27", - "code":"30" + "p_code":"47", + "code":"50" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -275,8 +455,8 @@ "title":"Upgrading a Cluster", "uri":"cce_10_0215.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"31" + "p_code":"34", + "code":"51" }, { "desc":"To enable interoperability from one Kubernetes installation to the next, you must upgrade your Kubernetes clusters before the maintenance period ends.After the latest Kub", @@ -284,8 +464,8 @@ "title":"Upgrade Overview", "uri":"cce_10_0197.html", "doc_type":"usermanual2", - "p_code":"31", - "code":"32" + "p_code":"51", + "code":"52" }, { "desc":"Before the upgrade, you can check whether your cluster can be upgraded and which versions are available on the CCE console. For details, see Upgrade Overview.Upgraded clu", @@ -293,8 +473,80 @@ "title":"Before You Start", "uri":"cce_10_0302.html", "doc_type":"usermanual2", - "p_code":"31", - "code":"33" + "p_code":"51", + "code":"53" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Post-Upgrade Verification", + "uri":"cce_10_0560.html", + "doc_type":"usermanual2", + "p_code":"51", + "code":"54" + }, + { + "desc":"After the cluster is upgraded, check whether the services are running normal.Different services have different verification mode. Select a suitable one and verify the ser", + "product_code":"cce", + "title":"Service Verification", + "uri":"cce_10_0561.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"55" + }, + { + "desc":"Check whether unexpected pods exist in the cluster.Check whether there are pods restart unexpectedly in the cluster.Go to the CCE console and access the cluster console. ", + "product_code":"cce", + "title":"Pod Check", + "uri":"cce_10_0562.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"56" + }, + { + "desc":"Check whether the nodes are running properly.Check whether the node network is normal.Check whether the container network is normal.The node status reflects whether the n", + "product_code":"cce", + "title":"Node and Container Network Check", + "uri":"cce_10_0563.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"57" + }, + { + "desc":"Check whether the label is lost.Check whether there are unexpected taints.Go to the CCE console, access the cluster console, and choose Nodes in the navigation pane. On t", + "product_code":"cce", + "title":"Node Label and Taint Check", + "uri":"cce_10_0564.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"58" + }, + { + "desc":"Check whether nodes can be created in the cluster.Go to the CCE console and access the cluster console. Choose Nodes in the navigation pane, and click Create Node.If node", + "product_code":"cce", + "title":"New Node Check", + "uri":"cce_10_0565.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"59" + }, + { + "desc":"Check whether pods can be created on the existing nodes after the cluster is upgraded.Check whether pods can be created on new nodes after the cluster is upgraded.After c", + "product_code":"cce", + "title":"New Pod Check", + "uri":"cce_10_0566.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"60" + }, + { + "desc":"After the cluster is upgraded, you need to reset the nodes that fail to be upgraded.Go back to the previous step or view the upgrade details on the upgrade history page t", + "product_code":"cce", + "title":"Node Skipping Check for Reset", + "uri":"cce_10_0567.html", + "doc_type":"usermanual2", + "p_code":"54", + "code":"61" }, { "desc":"You can upgrade your clusters to a newer Kubernetes version on the CCE console.Before the upgrade, learn about the target version to which each CCE cluster can be upgrade", @@ -302,8 +554,8 @@ "title":"Performing Replace/Rolling Upgrade", "uri":"cce_10_0120.html", "doc_type":"usermanual2", - "p_code":"31", - "code":"34" + "p_code":"51", + "code":"62" }, { "desc":"You can upgrade your clusters to a newer version on the CCE console.Before the upgrade, learn about the target version to which each CCE cluster can be upgraded in what w", @@ -311,8 +563,8 @@ "title":"Performing In-place Upgrade", "uri":"cce_10_0301.html", "doc_type":"usermanual2", - "p_code":"31", - "code":"35" + "p_code":"51", + "code":"63" }, { "desc":"This section describes how to migrate services from a cluster of an earlier version to a cluster of a later version in CCE.This operation is applicable when a cross-versi", @@ -320,8 +572,395 @@ "title":"Migrating Services Across Clusters of Different Versions", "uri":"cce_10_0210.html", "doc_type":"usermanual2", - "p_code":"31", - "code":"36" + "p_code":"51", + "code":"64" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Troubleshooting for Pre-upgrade Check Exceptions", + "uri":"cce_10_0550.html", + "doc_type":"usermanual2", + "p_code":"51", + "code":"65" + }, + { + "desc":"The system performs a comprehensive pre-upgrade check before the cluster upgrade. If the cluster does not meet the pre-upgrade check conditions, the upgrade cannot contin", + "product_code":"cce", + "title":"Performing Pre-upgrade Check", + "uri":"cce_10_0549.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"66" + }, + { + "desc":"Check the following aspects:Check whether the node is available.Check whether the node OS supports the upgrade.Check whether there are unexpected node pool tags in the no", + "product_code":"cce", + "title":"Checking the Node", + "uri":"cce_10_0431.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"67" + }, + { + "desc":"Check whether the current user is in the upgrade blocklist.CCE temporarily disables the cluster upgrade function due to the following reasons:The cluster is identified as", + "product_code":"cce", + "title":"Checking the Blocklist", + "uri":"cce_10_0432.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"68" + }, + { + "desc":"Check the following aspects:Check whether the add-on status is normal.Check whether the add-on supports the target version.Scenario 1: The add-on status is abnormal.Log i", + "product_code":"cce", + "title":"Checking the Add-on", + "uri":"cce_10_0433.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"69" + }, + { + "desc":"Check whether the current HelmRelease record contains discarded Kubernetes APIs that are not supported by the target cluster version. If yes, the Helm chart may be unavai", + "product_code":"cce", + "title":"Checking the Helm Chart", + "uri":"cce_10_0434.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"70" + }, + { + "desc":"Check whether CCE can connect to your master nodes.Contact technical support.", + "product_code":"cce", + "title":"Checking the Master Node SSH Connectivity", + "uri":"cce_10_0435.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"71" + }, + { + "desc":"Check the following aspects:Check the node status.Check whether the auto scaling function of the node pool is disabled.Scenario 1: The node pool status is abnormal.Log in", + "product_code":"cce", + "title":"Checking the Node Pool", + "uri":"cce_10_0436.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"72" + }, + { + "desc":"Check whether the security group allows the master node to access nodes using ICMP.Log in to the VPC console, choose Access Control > Security Groups, and enter the targe", + "product_code":"cce", + "title":"Checking the Security Group", + "uri":"cce_10_0437.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"73" + }, + { + "desc":"Check whether the node needs to be migrated.For the 1.15 cluster that is upgraded from 1.13 in rolling mode, you need to migrate (reset or create and replace) all nodes b", + "product_code":"cce", + "title":"To-Be-Migrated Node", + "uri":"cce_10_0439.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"74" + }, + { + "desc":"Check whether there are discarded resources in the clusters.Scenario 1: The PodSecurityPolicy resource object has been discarded since clusters of v1.25.Run the kubectl g", + "product_code":"cce", + "title":"Discarded Kubernetes Resource", + "uri":"cce_10_0440.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"75" + }, + { + "desc":"Read the version compatibility differences and ensure that they are not affected.The patch upgrade does not involve version compatibility differences.", + "product_code":"cce", + "title":"Compatibility Risk", + "uri":"cce_10_0441.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"76" + }, + { + "desc":"Check whether cce-agent on the current node is of the latest version.If cce-agent is not of the latest version, the automatic update fails. This problem is usually caused", + "product_code":"cce", + "title":"Node CCEAgent Version", + "uri":"cce_10_0442.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"77" + }, + { + "desc":"Check whether the CPU usage of the node exceeds 90%.Upgrade the cluster during off-peak hours.Check whether too many pods are deployed on the node. If yes, reschedule pod", + "product_code":"cce", + "title":"Node CPU Usage", + "uri":"cce_10_0443.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"78" + }, + { + "desc":"Check the following aspects:Check whether the key CRD packageversions.version.cce.io of the cluster is deleted.Check whether the cluster key CRD network-attachment-defini", + "product_code":"cce", + "title":"CRD Check", + "uri":"cce_10_0444.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"79" + }, + { + "desc":"Check the following aspects:Check whether the key data disks on the node meet the upgrade requirements.Check whether the /tmp directory has 500 MB available space.During ", + "product_code":"cce", + "title":"Node Disk", + "uri":"cce_10_0445.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"80" + }, + { + "desc":"Check the following aspects:Check whether the DNS configuration of the current node can resolve the OBS address.Check whether the current node can access the OBS address ", + "product_code":"cce", + "title":"Node DNS", + "uri":"cce_10_0446.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"81" + }, + { + "desc":"Check whether the key directory /var/paas on the nodes contain files with abnormal owners or owner groups.CCE uses the /var/paas directory to manage nodes and store file ", + "product_code":"cce", + "title":"Node Key Directory File Permissions", + "uri":"cce_10_0447.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"82" + }, + { + "desc":"Check whether the kubelet on the node is running properly.Scenario 1: The kubelet status is abnormal.If the kubelet is abnormal, the node is unavailable. Restore the node", + "product_code":"cce", + "title":"Kubelet", + "uri":"cce_10_0448.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"83" + }, + { + "desc":"Check whether the memory usage of the node exceeds 90%.Upgrade the cluster during off-peak hours.Check whether too many pods are deployed on the node. If yes, reschedule ", + "product_code":"cce", + "title":"Node Memory", + "uri":"cce_10_0449.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"84" + }, + { + "desc":"Check whether the clock synchronization server ntpd or chronyd of the node is running properly.Scenario 1: ntpd is running abnormally.Log in to the node and run the syste", + "product_code":"cce", + "title":"Node Clock Synchronization Server", + "uri":"cce_10_0450.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"85" + }, + { + "desc":"Check whether the OS kernel version of the node is supported by CCE.Running nodes depend on the initial standard kernel version when they are created. CCE has performed c", + "product_code":"cce", + "title":"Node OS", + "uri":"cce_10_0451.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"86" + }, + { + "desc":"Check whether the number of CPUs on the master node is greater than 2.If the number of CPUs on the master node is 2, contact technical support to expand the number to 4 o", + "product_code":"cce", + "title":"Node CPU Count", + "uri":"cce_10_0452.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"87" + }, + { + "desc":"Check whether the Python commands are available on a node.If the command output is not 0, the check fails.Install Python before the upgrade.", + "product_code":"cce", + "title":"Node Python Command", + "uri":"cce_10_0453.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"88" + }, + { + "desc":"Check whether the nodes in the cluster are ready.Scenario 1: The nodes are in the unavailable status.Log in to the CCE console and access the cluster console. Choose Node", + "product_code":"cce", + "title":"Node Readiness", + "uri":"cce_10_0455.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"89" + }, + { + "desc":"Check whether journald of a node is normal.Log in to the node and run the systemctl is-active systemd-journald command to query the running status of journald. If the com", + "product_code":"cce", + "title":"Node journald", + "uri":"cce_10_0456.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"90" + }, + { + "desc":"Check whether the containerd.sock file exists on the node. This file affects the startup of container runtime in the Euler OS.Scenario: The Docker used by the node is the", + "product_code":"cce", + "title":"containerd.sock Check", + "uri":"cce_10_0457.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"91" + }, + { + "desc":"Before the upgrade, check whether an internal error occurs.If this check fails, contact technical support.", + "product_code":"cce", + "title":"Internal Error", + "uri":"cce_10_0458.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"92" + }, + { + "desc":"Check whether inaccessible mount points exist on the node.Scenario: There are inaccessible mount points on the node.If network NFS (such as OBS, SFS, and SFS) is used by ", + "product_code":"cce", + "title":"Node Mount Point", + "uri":"cce_10_0459.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"93" + }, + { + "desc":"Check whether the taint, as shown in Table 1, exists on the node.Taint checklistNameImpactnode.kubernetes.io/upgradeNoScheduleScenario 1: The node is skipped during the c", + "product_code":"cce", + "title":"Kubernetes Node Taint", + "uri":"cce_10_0460.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"94" + }, + { + "desc":"Check whether the current everest add-on has compatibility restrictions. See Table 1.The current everest add-on has compatibility restrictions and cannot be upgraded with", + "product_code":"cce", + "title":"everest Restriction Check", + "uri":"cce_10_0478.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"95" + }, + { + "desc":"Check whether the current cce-controller-hpa add-on has compatibility restrictions.The current cce-controller-hpa add-on has compatibility restrictions. An add-on that ca", + "product_code":"cce", + "title":"cce-hpa-controller Restriction Check", + "uri":"cce_10_0479.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"96" + }, + { + "desc":"Check whether the current cluster version and the target version support enhanced CPU policy.Scenario: The current cluster version uses the enhanced CPU management policy", + "product_code":"cce", + "title":"Enhanced CPU Management Policy", + "uri":"cce_10_0480.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"97" + }, + { + "desc":"Check whether the container runtime and network components on the user node are healthy.If a component is abnormal, log in to the node to check the status of the abnormal", + "product_code":"cce", + "title":"User Node Components Health", + "uri":"cce_10_0484.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"98" + }, + { + "desc":"Check whether the Kubernetes, container runtime, and network components of the controller node are healthy.If a component on the controller node is abnormal, contact tech", + "product_code":"cce", + "title":"Controller Node Components Health", + "uri":"cce_10_0485.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"99" + }, + { + "desc":"Check whether the resources of Kubernetes components, such as etcd and kube-controller-manager, exceed the upper limit.Solution 1: Reducing Kubernetes resourcesSolution 2", + "product_code":"cce", + "title":"Memory Resource Limit of Kubernetes Components", + "uri":"cce_10_0486.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"100" + }, + { + "desc":"The system scans the audit logs of the past day to check whether the user calls the deprecated APIs of the target Kubernetes version.Due to the limited time range of audi", + "product_code":"cce", + "title":"Checking Deprecated Kubernetes APIs", + "uri":"cce_10_0487.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"101" + }, + { + "desc":"If IPv6 is enabled for a CCE Turbo cluster, check whether the target cluster version supports IPv6.CCE Turbo clusters support IPv6 since v1.23. This feature is available ", + "product_code":"cce", + "title":"IPv6 Capability of a CCE Turbo Cluster", + "uri":"cce_10_0488.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"102" + }, + { + "desc":"Check whether NetworkManager of a node is normal.Log in to the node and run the systemctl is-active NetworkManager command to query the running status of NetworkManager. ", + "product_code":"cce", + "title":"Node NetworkManager", + "uri":"cce_10_0489.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"103" + }, + { + "desc":"Check the ID file format.", + "product_code":"cce", + "title":"Node ID File", + "uri":"cce_10_0490.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"104" + }, + { + "desc":"When you upgrade a CCE cluster to v1.19 or later, the system checks whether the following configuration files have been modified in the background:/opt/cloud/cce/kubernet", + "product_code":"cce", + "title":"Node Configuration Consistency", + "uri":"cce_10_0491.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"105" + }, + { + "desc":"Check whether the configuration files of key components exist on the node.The following table lists the files to be checked.Contact technical support to restore the confi", + "product_code":"cce", + "title":"Node Configuration File", + "uri":"cce_10_0492.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"106" + }, + { + "desc":"Check whether the current CoreDNS key configuration Corefile is different from the Helm Release record. The difference may be overwritten during the add-on upgrade, affec", + "product_code":"cce", + "title":"Checking CoreDNS Configuration Consistency", + "uri":"cce_10_0493.html", + "doc_type":"usermanual2", + "p_code":"65", + "code":"107" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -329,17 +968,17 @@ "title":"Managing a Cluster", "uri":"cce_10_0031.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"37" + "p_code":"34", + "code":"108" }, { "desc":"CCE allows you to manage cluster parameters, through which you can let core components work under your very requirements.This function is supported only in clusters of v1", "product_code":"cce", - "title":"Managing Cluster Components", + "title":"Cluster Configuration Management", "uri":"cce_10_0213.html", "doc_type":"usermanual2", - "p_code":"37", - "code":"38" + "p_code":"108", + "code":"109" }, { "desc":"This section describes how to delete a cluster.Deleting a cluster will delete the nodes in the cluster (excluding accepted nodes), data disks attached to the nodes, workl", @@ -347,8 +986,8 @@ "title":"Deleting a Cluster", "uri":"cce_10_0212.html", "doc_type":"usermanual2", - "p_code":"37", - "code":"39" + "p_code":"108", + "code":"110" }, { "desc":"If you do not need to use a cluster temporarily, you are advised to hibernate the cluster.After a cluster is hibernated, resources such as workloads cannot be created or ", @@ -356,8 +995,8 @@ "title":"Hibernating and Waking Up a Cluster", "uri":"cce_10_0214.html", "doc_type":"usermanual2", - "p_code":"37", - "code":"40" + "p_code":"108", + "code":"111" }, { "desc":"If overload control is enabled, concurrent requests are dynamically controlled based on the resource pressure of master nodes to keep them and the cluster available.The c", @@ -365,8 +1004,8 @@ "title":"Cluster Overload Control", "uri":"cce_10_0602.html", "doc_type":"usermanual2", - "p_code":"37", - "code":"41" + "p_code":"108", + "code":"112" }, { "desc":"This section describes how to obtain the cluster certificate from the console and use it to access Kubernetes clusters.The downloaded certificate contains three files: cl", @@ -374,8 +1013,8 @@ "title":"Obtaining a Cluster Certificate", "uri":"cce_10_0175.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"42" + "p_code":"34", + "code":"113" }, { "desc":"CCE allows you to change the number of nodes managed in a cluster.This function is supported for clusters of v1.15 and later versions.Starting from v1.15.11, the number o", @@ -383,8 +1022,8 @@ "title":"Changing Cluster Scale", "uri":"cce_10_0403.html", "doc_type":"usermanual2", - "p_code":"14", - "code":"43" + "p_code":"34", + "code":"114" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -393,7 +1032,7 @@ "uri":"cce_10_0183.html", "doc_type":"usermanual2", "p_code":"", - "code":"44" + "code":"115" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -401,8 +1040,8 @@ "title":"Node Overview", "uri":"cce_10_0180.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"45" + "p_code":"115", + "code":"116" }, { "desc":"A container cluster consists of a set of worker machines, called nodes, that run containerized applications. A node can be a virtual machine (VM) or a physical machine (P", @@ -410,8 +1049,8 @@ "title":"Precautions for Using a Node", "uri":"cce_10_0461.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"46" + "p_code":"116", + "code":"117" }, { "desc":"Container engines, one of the most important components of Kubernetes, manage the lifecycle of images and containers. The kubelet interacts with a container runtime throu", @@ -419,8 +1058,8 @@ "title":"Container Engine", "uri":"cce_10_0462.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"47" + "p_code":"116", + "code":"118" }, { "desc":"The most significant difference is that each Kata container (pod) runs on an independent micro-VM, has an independent OS kernel, and is securely isolated at the virtualiz", @@ -428,8 +1067,8 @@ "title":"Kata Containers and Common Containers", "uri":"cce_10_0463.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"48" + "p_code":"116", + "code":"119" }, { "desc":"The maximum number of pods that can be created on a node is determined by the following parameters:Number of container IP addresses that can be allocated on a node (alpha", @@ -437,8 +1076,8 @@ "title":"Maximum Number of Pods That Can Be Created on a Node", "uri":"cce_10_0348.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"49" + "p_code":"116", + "code":"120" }, { "desc":"Some of the resources on the node need to run some necessary Kubernetes system components and resources to make the node as part of your cluster. Therefore, the total num", @@ -446,8 +1085,8 @@ "title":"Formula for Calculating the Reserved Resources of a Node", "uri":"cce_10_0178.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"50" + "p_code":"116", + "code":"121" }, { "desc":"This section describes how to allocate data disk space.When creating a node, you need to configure a data disk whose capacity is greater than or equal to 100GB for the no", @@ -455,8 +1094,8 @@ "title":"Data Disk Space Allocation", "uri":"cce_10_0341.html", "doc_type":"usermanual2", - "p_code":"45", - "code":"51" + "p_code":"116", + "code":"122" }, { "desc":"At least one cluster has been created.A key pair has been created for identity authentication upon remote node login.The node has 2-core or higher CPU, 4 GB or larger mem", @@ -464,8 +1103,8 @@ "title":"Creating a Node", "uri":"cce_10_0363.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"52" + "p_code":"115", + "code":"123" }, { "desc":"In CCE, you can Creating a Node or add existing nodes (ECSs) into your cluster.While an ECS is being accepted into a cluster, the operating system of the ECS will be rese", @@ -473,8 +1112,8 @@ "title":"Adding Nodes for Management", "uri":"cce_10_0198.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"53" + "p_code":"115", + "code":"124" }, { "desc":"Removing a node from a cluster will re-install the node OS and clear CCE components on the node.Removing a node will not delete the server corresponding to the node. You ", @@ -482,8 +1121,8 @@ "title":"Removing a Node", "uri":"cce_10_0338.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"54" + "p_code":"115", + "code":"125" }, { "desc":"You can reset a node to modify the node configuration, such as the node OS and login mode.Resetting a node will reinstall the node OS and the Kubernetes software on the n", @@ -491,8 +1130,8 @@ "title":"Resetting a Node", "uri":"cce_10_0003.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"55" + "p_code":"115", + "code":"126" }, { "desc":"If you use SSH to log in to a node (an ECS), ensure that the ECS already has an EIP (a public IP address).Only login to a running ECS is allowed.Only the user linux can l", @@ -500,8 +1139,8 @@ "title":"Logging In to a Node", "uri":"cce_10_0185.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"56" + "p_code":"115", + "code":"127" }, { "desc":"You can add different labels to nodes and define different attributes for labels. By using these node labels, you can quickly understand the characteristics of each node.", @@ -509,8 +1148,8 @@ "title":"Managing Node Labels", "uri":"cce_10_0004.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"57" + "p_code":"115", + "code":"128" }, { "desc":"Taints enable a node to repel specific pods to prevent these pods from being scheduled to the node.A taint is a key-value pair associated with an effect. The following ef", @@ -518,8 +1157,8 @@ "title":"Managing Node Taints", "uri":"cce_10_0352.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"58" + "p_code":"115", + "code":"129" }, { "desc":"Each node in a cluster is a cloud server or physical machine. After a cluster node is created, you can change the cloud server name or specifications as required.Some inf", @@ -527,17 +1166,17 @@ "title":"Synchronizing Data with Cloud Servers", "uri":"cce_10_0184.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"59" + "p_code":"115", + "code":"130" }, { - "desc":"When a node in a CCE cluster is deleted, services running on the node will also be deleted. Exercise caution when performing this operation.After a CCE cluster is deleted", + "desc":"When a node in a CCE cluster is deleted, services running on the node will also be deleted. Exercise caution when performing this operation.VM nodes that are being used b", "product_code":"cce", "title":"Deleting a Node", "uri":"cce_10_0186.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"60" + "p_code":"115", + "code":"131" }, { "desc":"After a node in the cluster is stopped, services on the node are also stopped. Before stopping a node, ensure that discontinuity of the services on the node will not resu", @@ -545,8 +1184,8 @@ "title":"Stopping a Node", "uri":"cce_10_0036.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"61" + "p_code":"115", + "code":"132" }, { "desc":"In a rolling upgrade, a new node is created, existing workloads are migrated to the new node, and then the old node is deleted. Figure 1 shows the migration process.The o", @@ -554,8 +1193,8 @@ "title":"Performing Rolling Upgrade for Nodes", "uri":"cce_10_0276.html", "doc_type":"usermanual2", - "p_code":"44", - "code":"62" + "p_code":"115", + "code":"133" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -564,7 +1203,7 @@ "uri":"cce_10_0035.html", "doc_type":"usermanual2", "p_code":"", - "code":"63" + "code":"134" }, { "desc":"CCE introduces node pools to help you better manage nodes in Kubernetes clusters. A node pool contains one node or a group of nodes with identical configuration in a clus", @@ -572,8 +1211,8 @@ "title":"Node Pool Overview", "uri":"cce_10_0081.html", "doc_type":"usermanual2", - "p_code":"63", - "code":"64" + "p_code":"134", + "code":"135" }, { "desc":"This section describes how to create a node pool and perform operations on the node pool. For details about how a node pool works, see Node Pool Overview.The autoscaler a", @@ -581,17 +1220,80 @@ "title":"Creating a Node Pool", "uri":"cce_10_0012.html", "doc_type":"usermanual2", - "p_code":"63", - "code":"65" + "p_code":"134", + "code":"136" }, { - "desc":"The default node pool DefaultPool does not support the following management operations.CCE allows you to highly customize Kubernetes parameter settings on core components", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cce", "title":"Managing a Node Pool", "uri":"cce_10_0222.html", "doc_type":"usermanual2", - "p_code":"63", - "code":"66" + "p_code":"134", + "code":"137" + }, + { + "desc":"The default node pool DefaultPool does not support the following management operations.CCE allows you to highly customize Kubernetes parameter settings on core components", + "product_code":"cce", + "title":"Configuring a Node Pool", + "uri":"cce_10_0652.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"138" + }, + { + "desc":"When editing the resource tags of the node pool. The modified configuration takes effect only for new nodes. To synchronize the configuration to the existing nodes, you n", + "product_code":"cce", + "title":"Updating a Node Pool", + "uri":"cce_10_0653.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"139" + }, + { + "desc":"After the configuration of a node pool is updated, some configurations cannot be automatically synchronized for existing nodes. You can manually synchronize configuration", + "product_code":"cce", + "title":"Synchronizing Node Pools", + "uri":"cce_10_0654.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"140" + }, + { + "desc":"When CCE releases a new OS image, existing nodes cannot be automatically upgraded. You can manually upgrade them in batches.This operation will upgrade the OS by resettin", + "product_code":"cce", + "title":"Upgrading the OS", + "uri":"cce_10_0660.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"141" + }, + { + "desc":"You can copy the configuration of an existing node pool to create a new node pool on the CCE console.", + "product_code":"cce", + "title":"Copying a Node Pool", + "uri":"cce_10_0655.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"142" + }, + { + "desc":"Nodes in a node pool can be migrated. Currently, nodes in a node pool can be migrated only to the default node pool (defaultpool) in the same cluster.The migration has no", + "product_code":"cce", + "title":"Migrating a Node", + "uri":"cce_10_0656.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"143" + }, + { + "desc":"Deleting a node pool will delete nodes in the pool. Pods on these nodes will be automatically migrated to available nodes in other node pools.Deleting a node pool will de", + "product_code":"cce", + "title":"Deleting a Node Pool", + "uri":"cce_10_0657.html", + "doc_type":"usermanual2", + "p_code":"137", + "code":"144" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -600,7 +1302,7 @@ "uri":"cce_10_0046.html", "doc_type":"usermanual2", "p_code":"", - "code":"67" + "code":"145" }, { "desc":"A workload is an application running on Kubernetes. No matter how many components are there in your workload, you can run it in a group of Kubernetes pods. A workload is ", @@ -608,8 +1310,8 @@ "title":"Overview", "uri":"cce_10_0006.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"68" + "p_code":"145", + "code":"146" }, { "desc":"Deployments are workloads (for example, Nginx) that do not store any data or status. You can create Deployments on the CCE console or by running kubectl commands.Before c", @@ -617,8 +1319,8 @@ "title":"Creating a Deployment", "uri":"cce_10_0047.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"69" + "p_code":"145", + "code":"147" }, { "desc":"StatefulSets are a type of workloads whose data or status is stored while they are running. For example, MySQL is a StatefulSet because it needs to store new data.A conta", @@ -626,8 +1328,8 @@ "title":"Creating a StatefulSet", "uri":"cce_10_0048.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"70" + "p_code":"145", + "code":"148" }, { "desc":"CCE provides deployment and management capabilities for multiple types of containers and supports features of container workloads, including creation, configuration, moni", @@ -635,8 +1337,8 @@ "title":"Creating a DaemonSet", "uri":"cce_10_0216.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"71" + "p_code":"145", + "code":"149" }, { "desc":"Jobs are short-lived and run for a certain time to completion. They can be executed immediately after being deployed. It is completed after it exits normally (exit 0).A j", @@ -644,8 +1346,8 @@ "title":"Creating a Job", "uri":"cce_10_0150.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"72" + "p_code":"145", + "code":"150" }, { "desc":"A cron job runs on a repeating schedule. You can perform time synchronization for all active nodes at a fixed time point.A cron job runs periodically at the specified tim", @@ -653,8 +1355,8 @@ "title":"Creating a Cron Job", "uri":"cce_10_0151.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"73" + "p_code":"145", + "code":"151" }, { "desc":"After a workload is created, you can upgrade, monitor, roll back, or delete the workload, as well as edit its YAML file.Workload/Job managementOperationDescriptionMonitor", @@ -662,8 +1364,8 @@ "title":"Managing Workloads and Jobs", "uri":"cce_10_0007.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"74" + "p_code":"145", + "code":"152" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -671,8 +1373,8 @@ "title":"Configuring a Container", "uri":"cce_10_0130.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"75" + "p_code":"145", + "code":"153" }, { "desc":"A workload is an abstract model of a group of pods. One pod can encapsulate one or more containers. You can click Add Container in the upper right corner to add multiple ", @@ -680,8 +1382,8 @@ "title":"Setting Basic Container Information", "uri":"cce_10_0396.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"76" + "p_code":"153", + "code":"154" }, { "desc":"CCE allows you to create workloads using images pulled from third-party image repositories.Generally, a third-party image repository can be accessed only after authentica", @@ -689,8 +1391,8 @@ "title":"Using a Third-Party Image", "uri":"cce_10_0009.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"77" + "p_code":"153", + "code":"155" }, { "desc":"CCE allows you to set resource limits for added containers during workload creation. You can apply for and limit the CPU and memory quotas used by each pod in a workload.", @@ -698,8 +1400,8 @@ "title":"Setting Container Specifications", "uri":"cce_10_0163.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"78" + "p_code":"153", + "code":"156" }, { "desc":"CCE provides callback functions for the lifecycle management of containerized applications. For example, if you want a container to perform a certain operation before sto", @@ -707,8 +1409,8 @@ "title":"Setting Container Lifecycle Parameters", "uri":"cce_10_0105.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"79" + "p_code":"153", + "code":"157" }, { "desc":"Health check regularly checks the health status of containers during container running. If the health check function is not configured, a pod cannot detect application ex", @@ -716,8 +1418,8 @@ "title":"Setting Health Check for a Container", "uri":"cce_10_0112.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"80" + "p_code":"153", + "code":"158" }, { "desc":"An environment variable is a variable whose value can affect the way a running container will behave. You can modify environment variables even after workloads are deploy", @@ -725,8 +1427,8 @@ "title":"Setting an Environment Variable", "uri":"cce_10_0113.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"81" + "p_code":"153", + "code":"159" }, { "desc":"When a workload is created, the container image is pulled from the image repository to the node. The image is also pulled when the workload is restarted or upgraded.By de", @@ -734,8 +1436,8 @@ "title":"Configuring an Image Pull Policy", "uri":"cce_10_0353.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"82" + "p_code":"153", + "code":"160" }, { "desc":"When creating a workload, you can configure containers to use the same time zone as the node. You can enable time zone synchronization when creating a workload.The time z", @@ -743,8 +1445,8 @@ "title":"Configuring Time Zone Synchronization", "uri":"cce_10_0354.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"83" + "p_code":"153", + "code":"161" }, { "desc":"In actual applications, upgrade is a common operation. A Deployment, StatefulSet, or DaemonSet can easily support application upgrade.You can set different upgrade polici", @@ -752,8 +1454,8 @@ "title":"Configuring the Workload Upgrade Policy", "uri":"cce_10_0397.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"84" + "p_code":"153", + "code":"162" }, { "desc":"A nodeSelector provides a very simple way to constrain pods to nodes with particular labels, as mentioned in Creating a DaemonSet. The affinity and anti-affinity feature ", @@ -761,8 +1463,8 @@ "title":"Scheduling Policy (Affinity/Anti-affinity)", "uri":"cce_10_0232.html", "doc_type":"usermanual2", - "p_code":"75", - "code":"85" + "p_code":"153", + "code":"163" }, { "desc":"You can use GPUs in CCE containers.A GPU node has been created. For details, see Creating a Node.The gpu-beta add-on has been installed. During the installation, select t", @@ -770,8 +1472,8 @@ "title":"GPU Scheduling", "uri":"cce_10_0345.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"86" + "p_code":"145", + "code":"164" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -779,8 +1481,8 @@ "title":"CPU Core Binding", "uri":"cce_10_0551.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"87" + "p_code":"145", + "code":"165" }, { "desc":"By default, kubelet uses CFS quotas to enforce pod CPU limits. When the node runs many CPU-bound pods, the workload can move to different CPU cores depending on whether t", @@ -788,8 +1490,17 @@ "title":"Binding CPU Cores", "uri":"cce_10_0351.html", "doc_type":"usermanual2", - "p_code":"87", - "code":"88" + "p_code":"165", + "code":"166" + }, + { + "desc":"If you encounter unexpected problems when using a container, you can log in to the container for debugging.The example output is as follows:NAME ", + "product_code":"cce", + "title":"Accessing a Container", + "uri":"cce_10_00356.html", + "doc_type":"usermanual2", + "p_code":"145", + "code":"167" }, { "desc":"CCE allows you to add annotations to a YAML file to realize some advanced pod functions. The following table describes the annotations you can add.When you create a workl", @@ -797,8 +1508,8 @@ "title":"Pod Labels and Annotations", "uri":"cce_10_0386.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"89" + "p_code":"145", + "code":"168" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -806,8 +1517,8 @@ "title":"Volcano Scheduling", "uri":"cce_10_0423.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"90" + "p_code":"145", + "code":"169" }, { "desc":"Jobs can be classified into online jobs and offline jobs based on whether services are always online.Online job: Such jobs run for a long time, with regular traffic surge", @@ -815,8 +1526,8 @@ "title":"Hybrid Deployment of Online and Offline Jobs", "uri":"cce_10_0384.html", "doc_type":"usermanual2", - "p_code":"90", - "code":"91" + "p_code":"169", + "code":"170" }, { "desc":"When the Cloud Native Network 2.0 model is used, pods use VPC ENIs or sub-ENIs for networking. You can directly bind security groups and EIPs to pods. CCE provides a cust", @@ -824,8 +1535,8 @@ "title":"Security Group Policies", "uri":"cce_10_0288.html", "doc_type":"usermanual2", - "p_code":"67", - "code":"92" + "p_code":"145", + "code":"171" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -834,7 +1545,7 @@ "uri":"cce_10_0020.html", "doc_type":"usermanual2", "p_code":"", - "code":"93" + "code":"172" }, { "desc":"You can learn about a cluster network from the following two aspects:What is a cluster network like? A cluster consists of multiple nodes, and pods (or containers) are ru", @@ -842,8 +1553,8 @@ "title":"Overview", "uri":"cce_10_0010.html", "doc_type":"usermanual2", - "p_code":"93", - "code":"94" + "p_code":"172", + "code":"173" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -851,17 +1562,17 @@ "title":"Container Network Models", "uri":"cce_10_0280.html", "doc_type":"usermanual2", - "p_code":"93", - "code":"95" + "p_code":"172", + "code":"174" }, { - "desc":"The container network assigns IP addresses to pods in a cluster and provides networking services. In CCE, you can select the following network models for your cluster:Tun", + "desc":"The container network assigns IP addresses to pods in a cluster and provides networking services. In CCE, you can select the following network models for your cluster:Con", "product_code":"cce", "title":"Overview", "uri":"cce_10_0281.html", "doc_type":"usermanual2", - "p_code":"95", - "code":"96" + "p_code":"174", + "code":"175" }, { "desc":"The container tunnel network is constructed on but independent of the node network through tunnel encapsulation. This network model uses VXLAN to encapsulate Ethernet pac", @@ -869,8 +1580,8 @@ "title":"Container Tunnel Network", "uri":"cce_10_0282.html", "doc_type":"usermanual2", - "p_code":"95", - "code":"97" + "p_code":"174", + "code":"176" }, { "desc":"The VPC network uses VPC routing to integrate with the underlying network. This network model is suitable for performance-intensive scenarios. The maximum number of nodes", @@ -878,8 +1589,8 @@ "title":"VPC Network", "uri":"cce_10_0283.html", "doc_type":"usermanual2", - "p_code":"95", - "code":"98" + "p_code":"174", + "code":"177" }, { "desc":"Developed by CCE, Cloud Native Network 2.0 deeply integrates Elastic Network Interfaces (ENIs) and sub-ENIs of Virtual Private Cloud (VPC). Container IP addresses are all", @@ -887,8 +1598,8 @@ "title":"Cloud Native Network 2.0", "uri":"cce_10_0284.html", "doc_type":"usermanual2", - "p_code":"95", - "code":"99" + "p_code":"174", + "code":"178" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -896,8 +1607,8 @@ "title":"Services", "uri":"cce_10_0247.html", "doc_type":"usermanual2", - "p_code":"93", - "code":"100" + "p_code":"172", + "code":"179" }, { "desc":"After a pod is created, the following problems may occur if you directly access the pod:The pod can be deleted and recreated at any time by a controller such as a Deploym", @@ -905,8 +1616,8 @@ "title":"Service Overview", "uri":"cce_10_0249.html", "doc_type":"usermanual2", - "p_code":"100", - "code":"101" + "p_code":"179", + "code":"180" }, { "desc":"ClusterIP Services allow workloads in the same cluster to use their cluster-internal domain names to access each other.The cluster-internal domain name format is Deployments or StatefulSets in the navigation pane ", @@ -1994,8 +2714,8 @@ "title":"Fault Locating and Troubleshooting for Abnormal Workloads", "uri":"cce_faq_00134.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"222" + "p_code":"301", + "code":"302" }, { "desc":"Viewing K8s Event InformationCheck Item 1: Checking Whether a Node Is Available in the ClusterCheck Item 2: Checking Whether Node Resources (CPU and Memory) Are Sufficien", @@ -2003,8 +2723,8 @@ "title":"Failed to Schedule an Instance", "uri":"cce_faq_00098.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"223" + "p_code":"301", + "code":"303" }, { "desc":"If the workload details page displays an event indicating that image pulling fails, perform the following operations to locate the fault:Check Item 1: Checking Whether im", @@ -2012,8 +2732,8 @@ "title":"Failed to Pull an Image", "uri":"cce_faq_00015.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"224" + "p_code":"301", + "code":"304" }, { "desc":"On the details page of a workload, if an event is displayed indicating that the container fails to be restarted, perform the following operations to locate the fault:Rect", @@ -2021,8 +2741,8 @@ "title":"Failed to Restart a Container", "uri":"cce_faq_00018.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"225" + "p_code":"301", + "code":"305" }, { "desc":"Pod actions are classified into the following two types:kube-controller-manager periodically checks the status of all nodes. If a node is in the NotReady state for a peri", @@ -2030,8 +2750,8 @@ "title":"What Should I Do If An Evicted Pod Exists?", "uri":"cce_faq_00209.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"226" + "p_code":"301", + "code":"306" }, { "desc":"When a node is faulty, pods on the node are evicted to ensure workload availability. If the pods are not evicted when the node is faulty, perform the following steps:Use ", @@ -2039,8 +2759,8 @@ "title":"Instance Eviction Exception", "uri":"cce_faq_00140.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"227" + "p_code":"301", + "code":"307" }, { "desc":"When a node is in the Unavailable state, CCE migrates container pods on the node and sets the pods running on the node to the Terminating state.After the node is restored", @@ -2048,8 +2768,8 @@ "title":"What Should I Do If Pods in the Terminating State Cannot Be Deleted?", "uri":"cce_faq_00210.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"228" + "p_code":"301", + "code":"308" }, { "desc":"The metadata.enable field in the YAML file of the workload is false. As a result, the pod of the workload is deleted and the workload is in the stopped status.The workloa", @@ -2057,8 +2777,8 @@ "title":"What Should I Do If a Workload Is Stopped Caused by Pod Deletion?", "uri":"cce_faq_00012.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"229" + "p_code":"301", + "code":"309" }, { "desc":"The pod remains in the creating state for a long time, and the sandbox-related errors are reported.Select a troubleshooting method for your cluster:Clusters of V1.13 or l", @@ -2066,8 +2786,8 @@ "title":"What Should I Do If Sandbox-Related Errors Are Reported When the Pod Remains in the Creating State?", "uri":"cce_faq_00005.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"230" + "p_code":"301", + "code":"310" }, { "desc":"Workload pods in the cluster fail and are being redeployed constantly.After the following command is run, the command output shows that many pods are in the evicted state", @@ -2075,8 +2795,8 @@ "title":"What Should I Do If a Pod Is in the Evicted State?", "uri":"cce_faq_00199.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"231" + "p_code":"301", + "code":"311" }, { "desc":"If a node has sufficient memory resources, a container on this node can use more memory resources than requested, but no more than limited. If the memory allocated to a c", @@ -2084,8 +2804,8 @@ "title":"What Should I Do If the OOM Killer Is Triggered When a Container Uses Memory Resources More Than Limited?", "uri":"cce_faq_00002.html", "doc_type":"usermanual2", - "p_code":"221", - "code":"232" + "p_code":"301", + "code":"312" }, { "desc":"A workload can be accessed from public networks through a load balancer. LoadBalancer provides higher reliability than EIP-based NodePort because an EIP is no longer boun", @@ -2093,8 +2813,8 @@ "title":"What Should I Do If a Service Released in a Workload Cannot Be Accessed from Public Networks?", "uri":"cce_faq_00202.html", "doc_type":"usermanual2", - "p_code":"212", - "code":"233" + "p_code":"292", + "code":"313" }, { "desc":"A VPC is similar to a private local area network (LAN) managed by a home gateway whose IP address is 192.168.0.0/16. A VPC is a private network built on the cloud and pro", @@ -2102,8 +2822,8 @@ "title":"What Is the Relationship Between Clusters, VPCs, and Subnets?", "uri":"cce_faq_00266.html", "doc_type":"usermanual2", - "p_code":"212", - "code":"234" + "p_code":"292", + "code":"314" }, { "desc":"CCE is a universal container platform. Its default security group rules apply to common scenarios. Based on security requirements, you can harden the security group rules", @@ -2111,8 +2831,8 @@ "title":"How Do I Harden the VPC Security Group Rules for CCE Cluster Nodes?", "uri":"cce_faq_00265.html", "doc_type":"usermanual2", - "p_code":"212", - "code":"235" + "p_code":"292", + "code":"315" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2121,7 +2841,7 @@ "uri":"cce_bestpractice.html", "doc_type":"usermanual2", "p_code":"", - "code":"236" + "code":"316" }, { "desc":"Security, efficiency, stability, and availability are common requirements on all cloud services. To meet these requirements, the system availability, data reliability, an", @@ -2129,8 +2849,116 @@ "title":"Checklist for Deploying Containerized Applications in the Cloud", "uri":"cce_bestpractice_00006.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"237" + "p_code":"316", + "code":"317" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Containerization", + "uri":"cce_bestpractice_0321.html", + "doc_type":"usermanual2", + "p_code":"316", + "code":"318" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Containerizing an Enterprise Application (ERP)", + "uri":"cce_bestpractice_0001.html", + "doc_type":"usermanual2", + "p_code":"318", + "code":"319" + }, + { + "desc":"This chapter provides CCE best practices to walk you through the application containerization.A container is a lightweight high-performance resource isolation mechanism i", + "product_code":"cce", + "title":"Solution Overview", + "uri":"cce_bestpractice_0002.html", + "doc_type":"usermanual2", + "p_code":"319", + "code":"320" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Procedure", + "uri":"cce_bestpractice_0340.html", + "doc_type":"usermanual2", + "p_code":"319", + "code":"321" + }, + { + "desc":"This tutorial describes how to containerize an ERP system by migrating it from a VM to CCE.No recoding or re-architecting is required. You only need to pack the entire ap", + "product_code":"cce", + "title":"Containerizing an Entire Application", + "uri":"cce_bestpractice_0003.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"322" + }, + { + "desc":"The following figure illustrates the process of containerizing an application.", + "product_code":"cce", + "title":"Containerization Process", + "uri":"cce_bestpractice_0004.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"323" + }, + { + "desc":"Before containerizing an application, you need to analyze the running environment and dependencies of the application, and get familiar with the application deployment mo", + "product_code":"cce", + "title":"Analyzing the Application", + "uri":"cce_bestpractice_0005.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"324" + }, + { + "desc":"After application analysis, you have gained the understanding of the OS and runtime required for running the application. You need to make the following preparations:Inst", + "product_code":"cce", + "title":"Preparing the Application Runtime", + "uri":"cce_bestpractice_0006.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"325" + }, + { + "desc":"During application containerization, you need to prepare a startup script. The method of compiling this script is the same as that of compiling a shell script. The startu", + "product_code":"cce", + "title":"Compiling a Startup Script", + "uri":"cce_bestpractice_0007.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"326" + }, + { + "desc":"An image is the basis of a container. A container runs based on the content defined in the image. An image has multiple layers. Each layer includes the modifications made", + "product_code":"cce", + "title":"Compiling the Dockerfile", + "uri":"cce_bestpractice_0008.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"327" + }, + { + "desc":"This section describes how to build an entire application into a Docker image. After building an image, you can use the image to deploy and upgrade the application. This ", + "product_code":"cce", + "title":"Building and Uploading an Image", + "uri":"cce_bestpractice_0009.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"328" + }, + { + "desc":"This section describes how to deploy a workload on CCE. When using CCE for the first time, create an initial cluster and add a node into the cluster.Containerized workloa", + "product_code":"cce", + "title":"Creating a Container Workload", + "uri":"cce_bestpractice_0010.html", + "doc_type":"usermanual2", + "p_code":"321", + "code":"329" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2138,8 +2966,8 @@ "title":"Migration", "uri":"cce_bestpractice_00237.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"238" + "p_code":"316", + "code":"330" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2147,8 +2975,8 @@ "title":"Migrating On-premises Kubernetes Clusters to CCE", "uri":"cce_bestpractice_0306.html", "doc_type":"usermanual2", - "p_code":"238", - "code":"239" + "p_code":"330", + "code":"331" }, { "desc":"Containers are growing in popularity and Kubernetes simplifies containerized deployment. Many companies choose to build their own Kubernetes clusters. However, the O&M wo", @@ -2156,8 +2984,8 @@ "title":"Solution Overview", "uri":"cce_bestpractice_0307.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"240" + "p_code":"331", + "code":"332" }, { "desc":"CCE allows you to customize cluster resources to meet various service requirements. Table 1 lists the key performance parameters of a cluster and provides the planned val", @@ -2165,8 +2993,8 @@ "title":"Planning Resources for the Target Cluster", "uri":"cce_bestpractice_0308.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"241" + "p_code":"331", + "code":"333" }, { "desc":"If your migration does not involve resources outside a cluster listed in Table 1 or you do not need to use other services to update resources after the migration, skip th", @@ -2174,8 +3002,8 @@ "title":"Migrating Resources Outside a Cluster", "uri":"cce_bestpractice_0309.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"242" + "p_code":"331", + "code":"334" }, { "desc":"Velero is an open-source backup and migration tool for Kubernetes clusters. It integrates the persistent volume (PV) data backup capability of the Restic tool and can be ", @@ -2183,8 +3011,8 @@ "title":"Installing the Migration Tool", "uri":"cce_bestpractice_0310.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"243" + "p_code":"331", + "code":"335" }, { "desc":"WordPress is used as an example to describe how to migrate an application from an on-premises Kubernetes cluster to a CCE cluster. The WordPress application consists of t", @@ -2192,8 +3020,8 @@ "title":"Migrating Resources in a Cluster", "uri":"cce_bestpractice_0311.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"244" + "p_code":"331", + "code":"336" }, { "desc":"The WordPress and MySQL images used in this example can be pulled from SWR. Therefore, the image pull failure (ErrImagePull) will not occur. If the application to be migr", @@ -2201,8 +3029,8 @@ "title":"Updating Resources Accordingly", "uri":"cce_bestpractice_0312.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"245" + "p_code":"331", + "code":"337" }, { "desc":"Cluster migration involves full migration of application data, which may cause intra-application adaptation problems. In this example, after the cluster is migrated, the ", @@ -2210,8 +3038,8 @@ "title":"Performing Additional Tasks", "uri":"cce_bestpractice_0313.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"246" + "p_code":"331", + "code":"338" }, { "desc":"Both HostPath and Local volumes are local storage volumes. However, the Restic tool integrated in Velero cannot back up the PVs of the HostPath type and supports only the", @@ -2219,8 +3047,8 @@ "title":"Troubleshooting", "uri":"cce_bestpractice_0314.html", "doc_type":"usermanual2", - "p_code":"239", - "code":"247" + "p_code":"331", + "code":"339" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2228,8 +3056,8 @@ "title":"DevOps", "uri":"cce_bestpractice_0322.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"248" + "p_code":"316", + "code":"340" }, { "desc":"GitLab is an open-source version management system developed with Ruby on Rails for Git project repository management. It supports web-based access to public and private ", @@ -2237,8 +3065,8 @@ "title":"Interconnecting GitLab with SWR and CCE for CI/CD", "uri":"cce_bestpractice_0324.html", "doc_type":"usermanual2", - "p_code":"248", - "code":"249" + "p_code":"340", + "code":"341" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2246,8 +3074,8 @@ "title":"Disaster Recovery", "uri":"cce_bestpractice_0323.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"250" + "p_code":"316", + "code":"342" }, { "desc":"To achieve high availability for your CCE containers, you can do as follows:Deploy three master nodes for the cluster.When nodes are deployed across AZs, set custom sched", @@ -2255,8 +3083,8 @@ "title":"Implementing High Availability for Containers in CCE", "uri":"cce_bestpractice_00220.html", "doc_type":"usermanual2", - "p_code":"250", - "code":"251" + "p_code":"342", + "code":"343" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2264,8 +3092,8 @@ "title":"Security", "uri":"cce_bestpractice_0315.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"252" + "p_code":"316", + "code":"344" }, { "desc":"For security purposes, you are advised to configure a cluster as follows.Kubernetes releases a major version in about four months. CCE follows the same frequency as Kuber", @@ -2273,8 +3101,8 @@ "title":"Cluster Security", "uri":"cce_bestpractice_0317.html", "doc_type":"usermanual2", - "p_code":"252", - "code":"253" + "p_code":"344", + "code":"345" }, { "desc":"Do not bind an EIP to a node unless necessary to reduce the attack surface.If an EIP must be used, properly configure the firewall or security group rules to restrict acc", @@ -2282,8 +3110,8 @@ "title":"Node Security", "uri":"cce_bestpractice_0318.html", "doc_type":"usermanual2", - "p_code":"252", - "code":"254" + "p_code":"344", + "code":"346" }, { "desc":"The nodeSelector or nodeAffinity is used to limit the range of nodes to which applications can be scheduled, preventing the entire cluster from being threatened due to th", @@ -2291,8 +3119,8 @@ "title":"Container Security", "uri":"cce_bestpractice_0319.html", "doc_type":"usermanual2", - "p_code":"252", - "code":"255" + "p_code":"344", + "code":"347" }, { "desc":"Currently, CCE has configured static encryption for secret resources. The secrets created by users will be encrypted and stored in etcd of the CCE cluster. Secrets can be", @@ -2300,8 +3128,8 @@ "title":"Secret Security", "uri":"cce_bestpractice_0320.html", "doc_type":"usermanual2", - "p_code":"252", - "code":"256" + "p_code":"344", + "code":"348" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2309,8 +3137,8 @@ "title":"Auto Scaling", "uri":"cce_bestpractice_0090.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"257" + "p_code":"316", + "code":"349" }, { "desc":"The best way to handle surging traffic is to automatically adjust the number of machines based on the traffic volume or resource usage, which is called scaling.In CCE, th", @@ -2318,8 +3146,26 @@ "title":"Using HPA and CA for Auto Scaling of Workloads and Nodes", "uri":"cce_bestpractice_00282.html", "doc_type":"usermanual2", - "p_code":"257", - "code":"258" + "p_code":"349", + "code":"350" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Monitoring", + "uri":"cce_bestpractice_10008.html", + "doc_type":"usermanual2", + "p_code":"316", + "code":"351" + }, + { + "desc":"Generally, a user has different clusters for different purposes, such as production, testing, and development. To monitor, collect, and view metrics of these clusters, yo", + "product_code":"cce", + "title":"Using Prometheus for Multi-cluster Monitoring", + "uri":"cce_bestpractice_10009.html", + "doc_type":"usermanual2", + "p_code":"351", + "code":"352" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2327,8 +3173,8 @@ "title":"Cluster", "uri":"cce_bestpractice_0050.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"259" + "p_code":"316", + "code":"353" }, { "desc":"When you have multiple CCE clusters, you may find it difficult to efficiently connect to all of them.This section describes how to configure access to multiple clusters b", @@ -2336,8 +3182,8 @@ "title":"Connecting to Multiple Clusters Using kubectl", "uri":"cce_bestpractice_00254.html", "doc_type":"usermanual2", - "p_code":"259", - "code":"260" + "p_code":"353", + "code":"354" }, { "desc":"You can use the pre-installation script feature to configure CCE cluster nodes (ECSs).When creating a node in a cluster of v1.13.10 or later, if a data disk is not manage", @@ -2345,8 +3191,17 @@ "title":"Adding a Second Data Disk to a Node in a CCE Cluster", "uri":"cce_bestpractice_00190.html", "doc_type":"usermanual2", - "p_code":"259", - "code":"261" + "p_code":"353", + "code":"355" + }, + { + "desc":"When a node is created, a data disk is created by default for container runtime and kubelet components to use. The data disk used by the container runtime and kubelet co", + "product_code":"cce", + "title":"Selecting a Data Disk for the Node", + "uri":"cce_bestpractice_10012.html", + "doc_type":"usermanual2", + "p_code":"353", + "code":"356" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2354,8 +3209,8 @@ "title":"Networking", "uri":"cce_bestpractice_0052.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"262" + "p_code":"316", + "code":"357" }, { "desc":"Before creating a cluster on CCE, determine the number of VPCs, number of subnets, container CIDR blocks, and Services for access based on service requirements.This topic", @@ -2363,17 +3218,17 @@ "title":"Planning CIDR Blocks for a Cluster", "uri":"cce_bestpractice_00004.html", "doc_type":"usermanual2", - "p_code":"262", - "code":"263" + "p_code":"357", + "code":"358" }, { - "desc":"CCE uses self-proprietary, high-performance container networking add-ons to support the tunnel network, Cloud Native Network 2.0, and VPC network models.After a cluster i", + "desc":"CCE uses proprietary, high-performance container networking add-ons to support the tunnel network, Cloud Native Network 2.0, and VPC network models.After a cluster is cre", "product_code":"cce", "title":"Selecting a Network Model", "uri":"cce_bestpractice_00162.html", "doc_type":"usermanual2", - "p_code":"262", - "code":"264" + "p_code":"357", + "code":"359" }, { "desc":"Session persistence is one of the most common while complex problems in load balancing.Session persistence is also called sticky sessions. After the sticky session functi", @@ -2381,8 +3236,8 @@ "title":"Implementing Sticky Session Through Load Balancing", "uri":"cce_bestpractice_00231.html", "doc_type":"usermanual2", - "p_code":"262", - "code":"265" + "p_code":"357", + "code":"360" }, { "desc":"There may be different types of proxy servers between a client and a container server. How can a container obtain the real source IP address of the client? This section d", @@ -2390,8 +3245,8 @@ "title":"Obtaining the Client Source IP Address for a Container", "uri":"cce_bestpractice_00035.html", "doc_type":"usermanual2", - "p_code":"262", - "code":"266" + "p_code":"357", + "code":"361" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2399,17 +3254,17 @@ "title":"Storage", "uri":"cce_bestpractice_0053.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"267" + "p_code":"316", + "code":"362" }, { - "desc":"A data disk is divided depending on the container storage Rootfs:Overlayfs: No independent thin pool is allocated. Image data is stored in the dockersys disk.# lsblk\nNAME", + "desc":"EulerOS 2.9 is used as the sample OS. Originally, system disk /dev/vda has 50 GB and one partition (/dev/vda1), and then 50 GB is added to the disk. In this example, the ", "product_code":"cce", "title":"Expanding Node Disk Capacity", "uri":"cce_bestpractice_00198.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"268" + "p_code":"362", + "code":"363" }, { "desc":"This section describes how to mount OBS buckets and OBS parallel file systems (preferred) of third-party tenants.The CCE cluster of a SaaS service provider needs to be mo", @@ -2417,17 +3272,17 @@ "title":"Mounting an Object Storage Bucket of a Third-Party Tenant", "uri":"cce_bestpractice_00199.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"269" + "p_code":"362", + "code":"364" }, { "desc":"The minimum capacity of an SFS Turbo file system is 500 GB, and the SFS Turbo file system cannot be billed by usage. By default, the root directory of an SFS Turbo file s", "product_code":"cce", "title":"Dynamically Creating and Mounting Subdirectories of an SFS Turbo File System", - "uri":"cce_bestpractice_00253_0.html", + "uri":"cce_bestpractice_00253.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"270" + "p_code":"362", + "code":"365" }, { "desc":"In clusters later than v1.15.11-r1, CSI (the everest add-on) has taken over all functions of fuxi FlexVolume (the storage-driver add-on) for managing container storage. Y", @@ -2435,17 +3290,17 @@ "title":"How Do I Change the Storage Class Used by a Cluster of v1.15 from FlexVolume to CSI Everest?", "uri":"cce_bestpractice_0107.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"271" + "p_code":"362", + "code":"366" }, { "desc":"When using storage resources in CCE, the most common method is to specify storageClassName to define the type of storage resources to be created when creating a PVC. The ", "product_code":"cce", "title":"Custom Storage Classes", - "uri":"cce_bestpractice_00281_0.html", + "uri":"cce_bestpractice_00281.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"272" + "p_code":"362", + "code":"367" }, { "desc":"EVS disks cannot be attached across AZs. For example, EVS disks in AZ 1 cannot be attached to nodes in AZ 2.If the storage class csi-disk is used for StatefulSets, when a", @@ -2453,8 +3308,8 @@ "title":"Realizing Automatic Topology for EVS Disks When Nodes Are Deployed Across AZs (csi-disk-topology)", "uri":"cce_bestpractice_00284.html", "doc_type":"usermanual2", - "p_code":"267", - "code":"273" + "p_code":"362", + "code":"368" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2462,8 +3317,8 @@ "title":"Container", "uri":"cce_bestpractice_0051.html", "doc_type":"usermanual2", - "p_code":"236", - "code":"274" + "p_code":"316", + "code":"369" }, { "desc":"If a node has sufficient memory resources, a container on this node can use more memory resources than requested, but no more than limited. If the memory allocated to a c", @@ -2471,8 +3326,8 @@ "title":"Properly Allocating Container Computing Resources", "uri":"cce_bestpractice_00002.html", "doc_type":"usermanual2", - "p_code":"274", - "code":"275" + "p_code":"369", + "code":"370" }, { "desc":"To access a Kubernetes cluster from a client, you can use the Kubernetes command line tool kubectl.Create a DaemonSet file.vi daemonSet.yamlAn example YAML file is provid", @@ -2480,8 +3335,8 @@ "title":"Modifying Kernel Parameters Using a Privileged Container", "uri":"cce_bestpractice_00227.html", "doc_type":"usermanual2", - "p_code":"274", - "code":"276" + "p_code":"369", + "code":"371" }, { "desc":"Before containers running applications are started, one or some init containers are started first. If there are multiple init containers, they will be started in the defi", @@ -2489,8 +3344,8 @@ "title":"Initializing a Container", "uri":"cce_bestpractice_00228.html", "doc_type":"usermanual2", - "p_code":"274", - "code":"277" + "p_code":"369", + "code":"372" }, { "desc":"If DNS or other related settings are inappropriate, you can use hostAliases to overwrite the resolution of the host name at the pod level when adding entries to the /etc/", @@ -2498,8 +3353,8 @@ "title":"Using hostAliases to Configure /etc/hosts in a Pod", "uri":"cce_bestpractice_00226.html", "doc_type":"usermanual2", - "p_code":"274", - "code":"278" + "p_code":"369", + "code":"373" }, { "desc":"Linux allows you to create a core dump file if an application crashes, which contains the data the application had in memory at the time of the crash. You can analyze the", @@ -2507,8 +3362,53 @@ "title":"Configuring Core Dumps", "uri":"cce_bestpractice_0325.html", "doc_type":"usermanual2", - "p_code":"274", - "code":"279" + "p_code":"369", + "code":"374" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Permission", + "uri":"cce_bestpractice_0055.html", + "doc_type":"usermanual2", + "p_code":"316", + "code":"375" + }, + { + "desc":"By default, the kubeconfig file provided by CCE for users has permissions bound to the cluster-admin role, which are equivalent to the permissions of user root. It is dif", + "product_code":"cce", + "title":"Configuring kubeconfig for Fine-Grained Management on Cluster Resources", + "uri":"cce_bestpractice_00221.html", + "doc_type":"usermanual2", + "p_code":"375", + "code":"376" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cce", + "title":"Release", + "uri":"cce_bestpractice_10000.html", + "doc_type":"usermanual2", + "p_code":"316", + "code":"377" + }, + { + "desc":"When switching between old and new services, you may be challenged in ensuring the system service continuity. If a new service version is directly released to all users a", + "product_code":"cce", + "title":"Overview", + "uri":"cce_bestpractice_10001.html", + "doc_type":"usermanual2", + "p_code":"377", + "code":"378" + }, + { + "desc":"To implement grayscale release for a CCE cluster, you need to deploy other open-source tools, such as Nginx Ingress, to the cluster or deploy services to a service mesh. ", + "product_code":"cce", + "title":"Using Services to Implement Simple Grayscale Release and Blue-Green Deployment", + "uri":"cce_bestpractice_10002.html", + "doc_type":"usermanual2", + "p_code":"377", + "code":"379" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2517,7 +3417,7 @@ "uri":"cce_01_9999.html", "doc_type":"usermanual2", "p_code":"", - "code":"280" + "code":"380" }, { "desc":"CCE 2.0 inherits and modifies the features of CCE 1.0, and release new features.Modified features:Clusters in CCE 1.0 are equivalent to Hybrid clusters in CCE 2.0.CCE 2.0", @@ -2525,8 +3425,8 @@ "title":"Differences Between CCE 1.0 and CCE 2.0", "uri":"cce_01_9998.html", "doc_type":"usermanual2", - "p_code":"280", - "code":"281" + "p_code":"380", + "code":"381" }, { "desc":"Migrate the images stored in the image repository of CCE 1.0 to CCE 2.0.A VM is available. The VM is bound to a public IP address and can access the Internet. Docker (ear", @@ -2534,8 +3434,8 @@ "title":"Migrating Images", "uri":"cce_01_9997.html", "doc_type":"usermanual2", - "p_code":"280", - "code":"282" + "p_code":"380", + "code":"382" }, { "desc":"Create Hybrid clusters on the CCE 2.0 console. These new Hybrid clusters should have the same specifications with those created on CCE 1.0.To create clusters using APIs, ", @@ -2543,8 +3443,8 @@ "title":"Migrating Clusters", "uri":"cce_01_9996.html", "doc_type":"usermanual2", - "p_code":"280", - "code":"283" + "p_code":"380", + "code":"383" }, { "desc":"This section describes how to create a Deployment with the same specifications as that in CCE 1.0 on the CCE 2.0 console.It is advised to delete the applications on CCE 1", @@ -2552,8 +3452,8 @@ "title":"Migrating Applications", "uri":"cce_01_9995.html", "doc_type":"usermanual2", - "p_code":"280", - "code":"284" + "p_code":"380", + "code":"384" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2562,6 +3462,6 @@ "uri":"cce_01_0300.html", "doc_type":"usermanual2", "p_code":"", - "code":"285" + "code":"385" } ] \ No newline at end of file diff --git a/docs/cce/umn/cce_01_0091.html b/docs/cce/umn/cce_01_0091.html index 8432c28a..df22ad91 100644 --- a/docs/cce/umn/cce_01_0091.html +++ b/docs/cce/umn/cce_01_0091.html @@ -1,9 +1,16 @@

What Is Cloud Container Engine?

-

Cloud Container Engine (CCE) provides highly scalable, high-performance, enterprise-class Kubernetes clusters and supports Docker containers. With CCE, you can easily deploy, manage, and scale containerized applications on the cloud.

-

CCE is deeply integrated with the public cloud services, including high-performance computing (ECS), network (VPC, EIP, and ELB), and storage (EVS and SFS) services. It supports heterogeneous computing architectures such as GPU, ARM, and FPGA. By using multi-AZ and multi-region disaster recovery, CCE ensures high availability of Kubernetes clusters.

-

You can use CCE through the console, kubectl, and APIs. Before using the CCE service, learn about the concepts related to Kubernetes. For details, see https://kubernetes.io/docs/concepts/.

-
  • Junior users: You are advised to use the console. The console provides an intuitive interface for you to complete operations such as creating clusters or workloads.
  • Advanced users: If you have experience in using kubectl, you are advised to use the kubectl, and APIs to perform operations. For details, see Kubernetes APIs and kubectl CLI.
+

Why CCE?

CCE is a one-stop platform integrating compute, networking, storage, and many other services. Supporting multi-AZ and multi-region disaster recovery, CCE ensures high availability of Kubernetes clusters.

+

For more information, see Product Advantages and Application Scenarios.

+
+

Accessing CCE

You can use CCE via the CCE console, kubectl, or Kubernetes APIs. Figure 1 shows the process.

+
Figure 1 Accessing CCE
+
+
+
+
diff --git a/docs/cce/umn/cce_01_0300.html b/docs/cce/umn/cce_01_0300.html index a1798429..4515f98e 100644 --- a/docs/cce/umn/cce_01_0300.html +++ b/docs/cce/umn/cce_01_0300.html @@ -8,7 +8,12 @@ -

2023-02-10

+

2023-05-30

+ + + + +

2023-02-10

diff --git a/docs/cce/umn/cce_01_9994.html b/docs/cce/umn/cce_01_9994.html deleted file mode 100644 index 9ccffed9..00000000 --- a/docs/cce/umn/cce_01_9994.html +++ /dev/null @@ -1,15 +0,0 @@ - - -

Obtaining Resource Permissions

-
CCE works closely with multiple cloud services to support computing, storage, networking, and monitoring functions. When you log in to the CCE console for the first time, CCE automatically requests permissions to access those cloud services in the region where you run your applications. Specifically:
  • Compute services

    When you create a node in a cluster, an ECS is created accordingly. The prerequisite is that CCE have obtained the permissions to access Elastic Cloud Service (ECS).

    -
  • Storage services

    CCE allows you to mount storage to nodes and containers in a cluster. The prerequisite is that CCE have obtained the permissions to access services such as Elastic Volume Service (EVS), Scalable File Service (SFS), and Object Storage Service (OBS).

    -
  • Networking services

    CCE allows containers in a cluster to be published as services that can be accessed by external systems. The prerequisite is that CCE have obtained the permissions to access services such as Virtual Private Cloud (VPC) and Elastic Load Balance (ELB).

    -
  • Container and monitoring services

    CCE supports functions such as container image pulling, monitoring, and logging. The prerequisite is that CCE have obtained the permissions to access services such as SoftWare Repository for Container (SWR) and Application Operations Management (AOM).

    -
-
-

After you agree to delegate the permissions, an agency named cce_admin_trust will be created for CCE in Identity and Access Management (IAM). The system account op_svc_cce will be delegated the Tenant Administrator role to perform operations on other cloud service resources. Tenant Administrator has the permissions on all cloud services except IAM, which calls the cloud services on which CCE depends. The delegation takes effect only in the current region. For details, see Delegating Resource Access to Another Account.

-

To use CCE in multiple regions, you need to request cloud resource permissions in each region. You can go to the IAM console, choose Agencies, and click cce_admin_trust to view the delegation records of each region.

-

CCE may fail to run as expected if the Tenant Administrator role is not assigned. Therefore, do not delete or modify the cce_admin_trust agency when using CCE.

-
-
- diff --git a/docs/cce/umn/cce_01_9996.html b/docs/cce/umn/cce_01_9996.html index 56efdeee..e8d3b66f 100644 --- a/docs/cce/umn/cce_01_9996.html +++ b/docs/cce/umn/cce_01_9996.html @@ -93,7 +93,7 @@

This parameter does not exist in CCE 1.0. Set this parameter based on your requirements.

-

By default, RBAC is selected. Read Namespace Permissions (Kubernetes RBAC-based) and select I am aware of the above limitations and read the CCE Role Management Instructions.

+

By default, RBAC is selected. Read Namespace Permissions (Kubernetes RBAC-based) and select I am aware of the above limitations and read the CCE Role Management Instructions.

After RBAC is enabled, users access resources in the cluster according to fine-grained permissions policies.

@@ -101,7 +101,7 @@

This parameter does not exist in CCE 1.0. Set this parameter based on your requirements.

-

The authentication mechanism performs permission control on resources in a cluster. For example, you can grant user A to read and write applications in a namespace, while granting user B to only read resources in a cluster. For details about role-based permission control, see Controlling Cluster Permissions.

+

The authentication mechanism performs permission control on resources in a cluster. For example, you can grant user A to read and write applications in a namespace, while granting user B to only read resources in a cluster. For details about role-based permission control, see Namespace Permissions (Kubernetes RBAC-based).

  • By default, X.509 authentication instead of Enhanced authentication is enabled. X.509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols.
  • If permission control on a cluster is required, select Enhanced authentication and then Authenticating Proxy.

    Click Upload next to CA Root Certificate to upload a valid certificate. Select the check box to confirm that the uploaded certificate is valid.

    If the certificate is invalid, the cluster cannot be created. The uploaded certificate file must be smaller than 1 MB and in .crt or .cer format.

@@ -159,7 +159,7 @@

OS

Select an operating system for the node.

-

Reinstalling OSs or modifying OS configurations could make nodes unavailable. Exercise caution when performing these operations. For more information, see Risky Operations on Cluster Nodes.

+

Reinstalling OSs or modifying OS configurations could make nodes unavailable. Exercise caution when performing these operations. For more information, see High-Risk Operations and Solutions.

VPC

@@ -290,7 +290,7 @@

  • Click Next to install add-ons.

    System resource add-ons must be installed. Advanced functional add-ons are optional.

    -

    You can also install optional add-ons after the cluster is created. To do so, choose Add-ons in the navigation pane of the CCE console and select the add-on you will install. For details, see Add-ons.

    +

    You can also install optional add-ons after the cluster is created. To do so, choose Add-ons in the navigation pane of the CCE console and select the add-on you will install. For details, see Add-ons.

  • Click Create Now. Check all the configurations, and click Submit.

    It takes 6 to 10 minutes to create a cluster. Information indicating the progress of the creation process will be displayed.

  • diff --git a/docs/cce/umn/cce_10_0003.html b/docs/cce/umn/cce_10_0003.html index 665f5868..727777ad 100644 --- a/docs/cce/umn/cce_10_0003.html +++ b/docs/cce/umn/cce_10_0003.html @@ -10,34 +10,34 @@

    Procedure

    The new console allows you to reset nodes in batches. You can also use private images to reset nodes in batches.

    1. Log in to the CCE console.
    2. Click the cluster name and access the cluster details page, choose Nodes in the navigation pane, and select one or multiple nodes to be reset in the list on the right. Choose More > Reset.
    3. In the displayed dialog box, click Yes.

      • For nodes in the DefaultPool node pool, the parameter setting page is displayed. Set the parameters by referring to 4.
      • For a node you create in a node pool, resetting the node does not support parameter configuration. You can directly use the configuration image of the node pool to reset the node.
      -

    4. Specify node parameters.

      Compute Settings -
      Table 1 Configuration parameters

      Parameter

      +

    5. Specify node parameters.

      Compute Settings +
      - - - - - - - - - @@ -45,74 +45,74 @@
      Table 1 Configuration parameters

      Parameter

      Description

      +

      Description

      Specification

      +

      Specification

      Node specifications cannot be modified when you reset a node.

      +

      Node specifications cannot be modified when you reset a node.

      Container Engine

      +

      Container Engine

      CCE clusters support Docker.

      -

      For a CCE Turbo cluster, both Docker and containerd are supported. For details, see Mapping between Node OSs and Container Engines.

      +
      CCE clusters support Docker and containerd in some scenarios.
      • VPC network clusters of v1.23 and later versions support containerd. Container tunnel network clusters of v1.23.2-r0 and later versions support containerd.
      • For a CCE Turbo cluster, both Docker and containerd are supported. For details, see Mapping between Node OSs and Container Engines.
      +

      OS

      +

      OS

      Public image: Select an OS for the node.

      -

      Private image: You can use private images.

      +

      Public image: Select an OS for the node.

      +

      Private image: You can use private images.

      Login Mode

      +

      Login Mode

      • Key Pair

        Select the key pair used to log in to the node. You can select a shared key.

        -

        A key pair is used for identity authentication when you remotely log in to a node. If no key pair is available, click Create Key Pair.

        +
      • Key Pair

        Select the key pair used to log in to the node. You can select a shared key.

        +

        A key pair is used for identity authentication when you remotely log in to a node. If no key pair is available, click Create Key Pair.

      -

      Storage Settings

      -
      Configure storage resources on a node for the containers running on it. -
      Table 2 Configuration parameters

      Parameter

      +

      Storage Settings

      +
      Configure storage resources on a node for the containers running on it. +
      - - - - -
      Table 2 Configuration parameters

      Parameter

      Description

      +

      Description

      System Disk

      +

      System Disk

      Directly use the system disk of the cloud server.

      +

      Directly use the system disk of the cloud server.

      Data Disk

      +

      Data Disk

      At least one data disk is required for the container runtime and kubelet. The data disk cannot be deleted or uninstalled. Otherwise, the node will be unavailable.

      -

      Click Expand and select Allocate Disk Space to define the disk space occupied by the container runtime to store the working directories, container image data, and image metadata. For details about how to allocate data disk space, see Data Disk Space Allocation.

      -

      For other data disks, a raw disk is created without any processing by default. You can also click Expand and select Mount Disk to mount the data disk to a specified directory.

      +

      At least one data disk is required for the container runtime and kubelet. The data disk cannot be deleted or uninstalled. Otherwise, the node will be unavailable.

      +

      Click Expand and select Allocate Disk Space to define the disk space occupied by the container runtime to store the working directories, container image data, and image metadata. For details about how to allocate data disk space, see Data Disk Space Allocation.

      +

      For other data disks, a raw disk is created without any processing by default. You can also click Expand and select Mount Disk to mount the data disk to a specified directory.

      -
      Advanced Settings -
      Table 3 Advanced configuration parameters

      Parameter

      +
      Advanced Settings +
      - - - - - - - - - - - - - diff --git a/docs/cce/umn/cce_10_0006.html b/docs/cce/umn/cce_10_0006.html index 3e407221..361fba7e 100644 --- a/docs/cce/umn/cce_10_0006.html +++ b/docs/cce/umn/cce_10_0006.html @@ -4,12 +4,12 @@

      CCE provides Kubernetes-native container deployment and management and supports lifecycle management of container workloads, including creation, configuration, monitoring, auto scaling, upgrade, uninstall, service discovery, and load balancing.

      Pod

      A pod is the smallest and simplest unit in the Kubernetes object model that you create or deploy. A pod encapsulates one or more containers, storage volumes, a unique network IP address, and options that govern how the containers should run.

      Pods can be used in either of the following ways:

      -
      • A container is running in a pod. This is the most common usage of pods in Kubernetes. You can view the pod as a single encapsulated container, but Kubernetes directly manages pods instead of containers.
      • Multiple containers that need to be coupled and share resources run in a pod. In this scenario, an application contains a main container and several sidecar containers, as shown in Figure 1. For example, the main container is a web server that provides file services from a fixed directory, and a sidecar container periodically downloads files to the directory.
        Figure 1 Pod
        +
        • A container is running in a pod. This is the most common usage of pods in Kubernetes. You can view the pod as a single encapsulated container, but Kubernetes directly manages pods instead of containers.
        • Multiple containers that need to be coupled and share resources run in a pod. In this scenario, an application contains a main container and several sidecar containers, as shown in Figure 1. For example, the main container is a web server that provides file services from a fixed directory, and a sidecar container periodically downloads files to the directory.
          Figure 1 Pod

        In Kubernetes, pods are rarely created directly. Instead, controllers such as Deployments and jobs, are used to manage pods. Controllers can create and manage multiple pods, and provide replica management, rolling upgrade, and self-healing capabilities. A controller generally uses a pod template to create corresponding pods.

      Deployment

      A pod is the smallest and simplest unit that you create or deploy in Kubernetes. It is designed to be an ephemeral, one-off entity. A pod can be evicted when node resources are insufficient and disappears along with a cluster node failure. Kubernetes provides controllers to manage pods. Controllers can create and manage pods, and provide replica management, rolling upgrade, and self-healing capabilities. The most commonly used controller is Deployment.

      -
      Figure 2 Relationship between a Deployment and pods
      +
      Figure 2 Relationship between a Deployment and pods

      A Deployment can contain one or more pods. These pods have the same role. Therefore, the system automatically distributes requests to multiple pods of a Deployment.

      A Deployment integrates a lot of functions, including online deployment, rolling upgrade, replica creation, and restoration of online jobs. To some extent, Deployments can be used to realize unattended rollout, which greatly reduces difficulties and operation risks in the rollout process.

      @@ -18,12 +18,12 @@

      With detailed analysis, it is found that each part of distributed stateful applications plays a different role. For example, the database nodes are deployed in active/standby mode, and pods are dependent on each other. In this case, you need to meet the following requirements for the pods:

      • A pod can be recognized by other pods. Therefore, a pod must have a fixed identifier.
      • Each pod has an independent storage device. After a pod is deleted and then restored, the data read from the pod must be the same as the previous one. Otherwise, the pod status is inconsistent.

      To address the preceding requirements, Kubernetes provides StatefulSets.

      -
      1. A StatefulSet provides a fixed name for each pod following a fixed number ranging from 0 to N. After a pod is rescheduled, the pod name and the host name remain unchanged.
      2. A StatefulSet provides a fixed access domain name for each pod through the headless Service (described in following sections).
      3. The StatefulSet creates PersistentVolumeClaims (PVCs) with fixed identifiers to ensure that pods can access the same persistent data after being rescheduled.

        +
        1. A StatefulSet provides a fixed name for each pod following a fixed number ranging from 0 to N. After a pod is rescheduled, the pod name and the host name remain unchanged.
        2. A StatefulSet provides a fixed access domain name for each pod through the headless Service (described in following sections).
        3. The StatefulSet creates PersistentVolumeClaims (PVCs) with fixed identifiers to ensure that pods can access the same persistent data after being rescheduled.

      DaemonSet

      A DaemonSet runs a pod on each node in a cluster and ensures that there is only one pod. This works well for certain system-level applications, such as log collection and resource monitoring, since they must run on each node and need only a few pods. A good example is kube-proxy.

      DaemonSets are closely related to nodes. If a node becomes faulty, the DaemonSet will not create the same pods on other nodes.

      -
      Figure 3 DaemonSet
      +
      Figure 3 DaemonSet

      Job and Cron Job

      Jobs and cron jobs allow you to run short lived, one-off tasks in batch. They ensure the task pods run to completion.

      • A job is a resource object used by Kubernetes to control batch tasks. Jobs are different from long-term servo tasks (such as Deployments and StatefulSets). The former is started and terminated at specific times, while the latter runs unceasingly unless being terminated. The pods managed by a job will be automatically removed after successfully completing tasks based on user configurations.
      • A cron job runs a job periodically on a specified schedule. A cron job object is similar to a line of a crontab file in Linux.
      diff --git a/docs/cce/umn/cce_10_0007.html b/docs/cce/umn/cce_10_0007.html index 3cc1f063..fe2cd9e6 100644 --- a/docs/cce/umn/cce_10_0007.html +++ b/docs/cce/umn/cce_10_0007.html @@ -1,10 +1,10 @@

      Managing Workloads and Jobs

      -

      Scenario

      After a workload is created, you can upgrade, monitor, roll back, or delete the workload, as well as edit its YAML file. -
      Table 3 Advanced configuration parameters

      Parameter

      Description

      +

      Description

      Kubernetes Label

      +

      Kubernetes Label

      Click Add Label to set the key-value pair attached to the Kubernetes objects (such as pods). A maximum of 20 labels can be added.

      -

      Labels can be used to distinguish nodes. With workload affinity settings, container pods can be scheduled to a specified node. For more information, see Labels and Selectors.

      +

      Click Add to set the key-value pair attached to the Kubernetes objects (such as pods). A maximum of 20 labels can be added.

      +

      Labels can be used to distinguish nodes. With workload affinity settings, container pods can be scheduled to a specified node. For more information, see Labels and Selectors.

      Resource Tag

      +

      Resource Tag

      You can add resource tags to classify resources.

      -

      You can create predefined tags in Tag Management Service (TMS). Predefined tags are visible to all service resources that support the tagging function. You can use these tags to improve tagging and resource migration efficiency.

      -

      CCE will automatically create the "CCE-Dynamic-Provisioning-Node=node id" tag.

      +

      You can add resource tags to classify resources.

      +

      You can create predefined tags in Tag Management Service (TMS). Predefined tags are visible to all service resources that support the tagging function. You can use these tags to improve tagging and resource migration efficiency.

      +

      CCE will automatically create the "CCE-Dynamic-Provisioning-Node=node id" tag.

      Taint

      +

      Taint

      This field is left blank by default. You can add taints to set anti-affinity for the node. A maximum of 10 taints are allowed for each node. Each taint contains the following parameters:
      • Key: A key must contain 1 to 63 characters, starting with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed. A DNS subdomain name can be used as the prefix of a key.
      • Value: A value must start with a letter or digit and can contain a maximum of 63 characters, including letters, digits, hyphens (-), underscores (_), and periods (.).
      • Effect: Available options are NoSchedule, PreferNoSchedule, and NoExecute.
      -
      NOTICE:
      • If taints are used, you must configure tolerations in the YAML files of pods. Otherwise, scale-up may fail or pods cannot be scheduled onto the added nodes.
      • After a node pool is created, you can click Edit to modify its configuration. The modification will be synchronized to all nodes in the node pool.
      +
      This parameter is left blank by default. You can add taints to set anti-affinity for the node. A maximum of 10 taints are allowed for each node. Each taint contains the following parameters:
      • Key: A key must contain 1 to 63 characters starting with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed. A DNS subdomain name can be used as the prefix of a key.
      • Value: A value must start with a letter or digit and can contain a maximum of 63 characters, including letters, digits, hyphens (-), underscores (_), and periods (.).
      • Effect: Available options are NoSchedule, PreferNoSchedule, and NoExecute.
      +
      NOTICE:
      • If taints are used, you must configure tolerations in the YAML files of pods. Otherwise, scale-up may fail or pods cannot be scheduled onto the added nodes.
      • After a node pool is created, you can click Edit to modify its configuration. The modification will be synchronized to all nodes in the node pool.

      Max. Pods

      +

      Max. Pods

      Maximum number of pods that can run on the node, including the default system pods.

      -

      This limit prevents the node from being overloaded with pods.

      +

      Maximum number of pods that can run on the node, including the default system pods.

      +

      This limit prevents the node from being overloaded with pods.

      Pre-installation Command

      +

      Pre-installation Command

      Enter commands. A maximum of 1,000 characters are allowed.

      -

      The script will be executed before Kubernetes software is installed. Note that if the script is incorrect, Kubernetes software may fail to be installed.

      +

      Enter commands. A maximum of 1,000 characters are allowed.

      +

      The script will be executed before Kubernetes software is installed. Note that if the script is incorrect, Kubernetes software may fail to be installed.

      Post-installation Command

      +

      Post-installation Command

      Enter commands. A maximum of 1,000 characters are allowed.

      -

      The script will be executed after Kubernetes software is installed and will not affect the installation.

      +

      Enter commands. A maximum of 1,000 characters are allowed.

      +

      The script will be executed after Kubernetes software is installed and will not affect the installation.

      Table 1 Workload/Job management

      Operation

      +

      Scenario

      After a workload is created, you can upgrade, monitor, roll back, or delete the workload, as well as edit its YAML file. +
      - @@ -13,49 +13,49 @@ - - - - - - - - - - - - - - - - - - - - - - @@ -98,32 +100,33 @@

      Storage Settings

      Configure storage resources on a node for the containers running on it. Set the disk size according to site requirements. -
      Table 1 Workload/Job management

      Operation

      Description

      +

      Description

      You can view the CPU and memory usage of workloads and pods on the CCE console.

      View Log

      +

      View Log

      You can view the logs of workloads.

      +

      You can view the logs of workloads.

      Upgrade

      +

      Upgrade

      You can replace images or image tags to quickly upgrade Deployments, StatefulSets, and DaemonSets without interrupting services.

      +

      You can replace images or image tags to quickly upgrade Deployments, StatefulSets, and DaemonSets without interrupting services.

      Edit YAML

      +

      Edit YAML

      You can modify and download the YAML files of Deployments, StatefulSets, DaemonSets, and pods on the CCE console. YAML files of jobs and cron jobs can only be viewed, copied, and downloaded.

      +

      You can modify and download the YAML files of Deployments, StatefulSets, DaemonSets, and pods on the CCE console. YAML files of jobs and cron jobs can only be viewed, copied, and downloaded.

      Roll Back

      +

      Roll Back

      Only Deployments can be rolled back.

      +

      Only Deployments can be rolled back.

      Redeploy

      +

      Redeploy

      You can redeploy a workload. After the workload is redeployed, all pods in the workload will be restarted.

      +

      You can redeploy a workload. After the workload is redeployed, all pods in the workload will be restarted.

      Enabling/Disabling the Upgrade

      +

      Enabling/Disabling the Upgrade

      Only Deployments support this operation.

      +

      Only Deployments support this operation.

      Manage Label

      +

      Manage Label

      Labels are key-value pairs and can be attached to workloads for affinity and anti-affinity scheduling. Jobs and Cron Jobs do not support this operation.

      +

      Labels are key-value pairs and can be attached to workloads for affinity and anti-affinity scheduling. Jobs and Cron Jobs do not support this operation.

      Delete

      +

      Delete

      You can delete a workload or job that is no longer needed. Deleted workloads or jobs cannot be recovered.

      +

      You can delete a workload or job that is no longer needed. Deleted workloads or jobs cannot be recovered.

      View Events

      +

      View Events

      You can view event names, event types, number of occurrences, Kubernetes events, first occurrence time, and last occurrence time.

      +

      You can view event names, event types, number of occurrences, Kubernetes events, first occurrence time, and last occurrence time.

      Stop/Start

      @@ -68,55 +68,55 @@ -

      Monitoring a Workload

      You can view the CPU and memory usage of Deployments and pods on the CCE console to determine the resource specifications you may need. This section uses a Deployment as an example to describe how to monitor a workload.

      -
      1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
      2. Click the Deployments tab and click Monitor of the target workload. On the page that is displayed, you can view CPU usage and memory usage of the workload.
      3. Click the workload name. On the Pods tab page, click the Monitor of the target pod to view its CPU and memory usage.
      +

      Monitoring a Workload

      You can view the CPU and memory usage of Deployments and pods on the CCE console to determine the resource specifications you may need. This section uses a Deployment as an example to describe how to monitor a workload.

      +
      1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
      2. Click the Deployments tab and click Monitor of the target workload. On the page that is displayed, you can view CPU usage and memory usage of the workload.
      3. Click the workload name. On the Pods tab page, click the Monitor of the target pod to view its CPU and memory usage.
      -

      Viewing Logs

      You can view logs of Deployments, StatefulSets, DaemonSets, and jobs. This section uses a Deployment as an example to describe how to view logs.

      -
      1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
      2. Click the Deployments tab and click the View Log of the target workload.

        On the displayed View Log window, you can view logs by time.

        +

        Viewing Logs

        You can view logs of Deployments, StatefulSets, DaemonSets, and jobs. This section uses a Deployment as an example to describe how to view logs.

        +
        1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
        2. Click the Deployments tab and click the View Log of the target workload.

          On the displayed View Log window, you can view logs by time.

        -

        Upgrading a Workload

        You quickly upgrade Deployments, StatefulSets, and DaemonSets on the CCE console.

        -

        This section uses a Deployment as an example to describe how to upgrade a workload.

        -

        Before replacing an image or image version, upload the new image to the SWR service.

        -
        1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
        2. Click the Deployments tab and click Upgrade of the target workload.

          • Workloads cannot be upgraded in batches.
          • Before performing an in-place StatefulSet upgrade, you must manually delete old pods. Otherwise, the upgrade status is always displayed as Upgrading.
          +

          Upgrading a Workload

          You quickly upgrade Deployments, StatefulSets, and DaemonSets on the CCE console.

          +

          This section uses a Deployment as an example to describe how to upgrade a workload.

          +

          Before replacing an image or image version, upload the new image to the SWR service.

          +
          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab and click Upgrade of the target workload.

            • Workloads cannot be upgraded in batches.
            • Before performing an in-place StatefulSet upgrade, you must manually delete old pods. Otherwise, the upgrade status is always displayed as Upgrading.
            -

          3. Upgrade the workload based on service requirements. The method for setting parameter is the same as that for creating a workload.
          4. After the update is complete, click Upgrade Workload, manually confirm the YAML file, and submit the upgrade.
          +

        3. Upgrade the workload based on service requirements. The method for setting parameter is the same as that for creating a workload.
        4. After the update is complete, click Upgrade Workload, manually confirm the YAML file, and submit the upgrade.
        -

        Editing a YAML file

        You can modify and download the YAML files of Deployments, StatefulSets, DaemonSets, and pods on the CCE console. YAML files of jobs and cron jobs can only be viewed, copied, and downloaded. This section uses a Deployment as an example to describe how to edit the YAML file.

        -
        1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
        2. Click the Deployments tab and choose More > Edit YAML in the Operation column of the target workload. In the dialog box that is displayed, modify the YAML file.
        3. Click Edit and then OK to save the changes.
        4. (Optional) In the Edit YAML window, click Download to download the YAML file.
        +

        Editing a YAML file

        You can modify and download the YAML files of Deployments, StatefulSets, DaemonSets, and pods on the CCE console. YAML files of jobs and cron jobs can only be viewed, copied, and downloaded. This section uses a Deployment as an example to describe how to edit the YAML file.

        +
        1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
        2. Click the Deployments tab and choose More > Edit YAML in the Operation column of the target workload. In the dialog box that is displayed, modify the YAML file.
        3. Click Edit and then OK to save the changes.
        4. (Optional) In the Edit YAML window, click Download to download the YAML file.
        -

        Rolling Back a Workload (Available Only for Deployments)

        CCE records the release history of all Deployments. You can roll back a Deployment to a specified version.

        -
        1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
        2. Click the Deployments tab, choose More > Roll Back in the Operation column of the target workload.
        3. Switch to the Change History tab page, click Roll Back to This Version of the target version, manually confirm the YAML file, and click OK.

          +

          Rolling Back a Workload (Available Only for Deployments)

          CCE records the release history of all Deployments. You can roll back a Deployment to a specified version.

          +
          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab, choose More > Roll Back in the Operation column of the target workload.
          3. Switch to the Change History tab page, click Roll Back to This Version of the target version, manually confirm the YAML file, and click OK.

          Redeploying a Workload

          After you redeploy a workload, all pods in the workload will be restarted. This section uses Deployments as an example to illustrate how to redeploy a workload.

          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab and choose More > Redeploy in the Operation column of the target workload.
          3. In the dialog box that is displayed, click Yes to redeploy the workload.
          -

          Disabling/Enabling Upgrade (Available Only for Deployments)

          Only Deployments support this operation.

          +

          Disabling/Enabling Upgrade (Available Only for Deployments)

          Only Deployments support this operation.

          • After the upgrade is disabled, the upgrade command can be delivered but will not be applied to the pods.

            If you are performing a rolling upgrade, the rolling upgrade stops after the disabling upgrade command is delivered. In this case, the new and old pods co-exist.

          • If a Deployment is being upgraded, it can be upgraded or rolled back. Its pods will inherit the latest updates of the Deployment. If they are inconsistent, the pods are upgraded automatically according to the latest information of the Deployment.
          -

          Deployments in the disable upgrade state cannot be rolled back.

          +

          Deployments in the disable upgrade state cannot be rolled back.

          -
          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab and choose More > Disable/Enable Upgrade in the Operation column of the workload.
          3. In the dialog box that is displayed, click Yes.
          +
          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab and choose More > Disable/Enable Upgrade in the Operation column of the workload.
          3. In the dialog box that is displayed, click Yes.
          -

          Managing Labels

          Labels are key-value pairs and can be attached to workloads. Workload labels are often used for affinity and anti-affinity scheduling. You can add labels to multiple workloads or a specified workload.

          -

          You can manage the labels of Deployments, StatefulSets, and DaemonSets based on service requirements. This section uses Deployments as an example to describe how to manage labels.

          -

          In the following figure, three labels (release, env, and role) are defined for workload APP 1, APP 2, and APP 3. The values of these labels vary with workload.

          -
          • Label of APP 1: [release:alpha;env:development;role:frontend]
          • Label of APP 2: [release:beta;env:testing;role:frontend]
          • Label of APP 3: [release:alpha;env:production;role:backend]
          -

          If you set key to role and value to frontend when using workload scheduling or another function, APP 1 and APP 2 will be selected.

          -
          Figure 1 Label example
          -
          1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
          2. Click the Deployments tab and choose More > Manage Label in the Operation column of the target workload.
          3. Click Add, enter a key and a value, and click OK.

            A key-value pair must contain 1 to 63 characters starting and ending with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed.

            +

            Managing Labels

            Labels are key-value pairs and can be attached to workloads. Workload labels are often used for affinity and anti-affinity scheduling. You can add labels to multiple workloads or a specified workload.

            +

            You can manage the labels of Deployments, StatefulSets, and DaemonSets based on service requirements. This section uses Deployments as an example to describe how to manage labels.

            +

            In the following figure, three labels (release, env, and role) are defined for workload APP 1, APP 2, and APP 3. The values of these labels vary with workload.

            +
            • Label of APP 1: [release:alpha;env:development;role:frontend]
            • Label of APP 2: [release:beta;env:testing;role:frontend]
            • Label of APP 3: [release:alpha;env:production;role:backend]
            +

            If you set key to role and value to frontend when using workload scheduling or another function, APP 1 and APP 2 will be selected.

            +
            Figure 1 Label example
            +
            1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
            2. Click the Deployments tab and choose More > Manage Label in the Operation column of the target workload.
            3. Click Add, enter a key and a value, and click OK.

              A key-value pair must contain 1 to 63 characters starting and ending with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed.

            -

            Deleting a Workload/Job

            You can delete a workload or job that is no longer needed. Deleted workloads or jobs cannot be recovered. Exercise caution when you perform this operation. This section uses a Deployment as an example to describe how to delete a workload.

            -
            1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
            2. In the same row as the workload you will delete, choose Operation > More > Delete.

              Read the system prompts carefully. A workload cannot be recovered after it is deleted. Exercise caution when performing this operation.

              -

            3. Click Yes.

              • If the node where the pod is located is unavailable or shut down and the workload cannot be deleted, you can forcibly delete the pod from the pod list on the workload details page.
              • Ensure that the storage volumes to be deleted are not used by other workloads. If these volumes are imported or have snapshots, you can only unbind them.
              +

              Deleting a Workload/Job

              You can delete a workload or job that is no longer needed. Deleted workloads or jobs cannot be recovered. Exercise caution when you perform this operation. This section uses a Deployment as an example to describe how to delete a workload.

              +
              1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
              2. In the same row as the workload you will delete, choose Operation > More > Delete.

                Read the system prompts carefully. A workload cannot be recovered after it is deleted. Exercise caution when performing this operation.

                +

              3. Click Yes.

                • If the node where the pod is located is unavailable or shut down and the workload cannot be deleted, you can forcibly delete the pod from the pod list on the workload details page.
                • Ensure that the storage volumes to be deleted are not used by other workloads. If these volumes are imported or have snapshots, you can only unbind them.

              -

              Viewing Events

              This section uses Deployments as an example to illustrate how to view events of a workload. To view the event of a job or cron jon, click View Event in the Operation column of the target workload.

              -
              1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
              2. On the Deployments tab page, click the target workload. In the Pods tab page, click the View Events to view the event name, event type, number of occurrences, Kubernetes event, first occurrence time, and last occurrence time.

                Event data will be retained for one hour and then automatically deleted.

                +

                Viewing Events

                This section uses Deployments as an example to illustrate how to view events of a workload. To view the event of a job or cron jon, click View Event in the Operation column of the target workload.

                +
                1. Log in to the CCE console, go to an existing cluster, and choose Workloads in the navigation pane.
                2. On the Deployments tab page, click the target workload. In the Pods tab page, click the View Events to view the event name, event type, number of occurrences, Kubernetes event, first occurrence time, and last occurrence time.

                  Event data will be retained for one hour and then automatically deleted.

                diff --git a/docs/cce/umn/cce_10_0010.html b/docs/cce/umn/cce_10_0010.html index 6a672493..4ce43b33 100644 --- a/docs/cce/umn/cce_10_0010.html +++ b/docs/cce/umn/cce_10_0010.html @@ -4,7 +4,7 @@

                You can learn about a cluster network from the following two aspects:

                • What is a cluster network like? A cluster consists of multiple nodes, and pods (or containers) are running on the nodes. Nodes and containers need to communicate with each other. For details about the cluster network types and their functions, see Cluster Network Structure.
                • How is pod access implemented in a cluster? Accessing a pod or container is a process of accessing services of a user. Kubernetes provides Service and Ingress to address pod access issues. This section summarizes common network access scenarios. You can select the proper scenario based on site requirements. For details about the network access scenarios, see Access Scenarios.

                Cluster Network Structure

                All nodes in the cluster are located in a VPC and use the VPC network. The container network is managed by dedicated network add-ons.

                -

                +

                • Node Network

                  A node network assigns IP addresses to hosts (nodes in the figure above) in a cluster. You need to select a VPC subnet as the node network of the CCE cluster. The number of available IP addresses in a subnet determines the maximum number of nodes (including master nodes and worker nodes) that can be created in a cluster. This quantity is also affected by the container network. For details, see the container network model.

                • Container Network

                  A container network assigns IP addresses to containers in a cluster. CCE inherits the IP-Per-Pod-Per-Network network model of Kubernetes. That is, each pod has an independent IP address on a network plane and all containers in a pod share the same network namespace. All pods in a cluster exist in a directly connected flat network. They can access each other through their IP addresses without using NAT. Kubernetes only provides a network mechanism for pods, but does not directly configure pod networks. The configuration of pod networks is implemented by specific container network add-ons. The container network add-ons are responsible for configuring networks for pods and managing container IP addresses.

                  Currently, CCE supports the following container network models:

                  @@ -14,20 +14,20 @@

                Service

                A Service is used for pod access. With a fixed IP address, a Service forwards access traffic to pods and performs load balancing for these pods.

                -
                Figure 1 Accessing pods through a Service
                +
                Figure 1 Accessing pods through a Service

                You can configure the following types of Services:

                • ClusterIP: used to make the Service only reachable from within a cluster.
                • NodePort: used for access from outside a cluster. A NodePort Service is accessed through the port on the node.
                • LoadBalancer: used for access from outside a cluster. It is an extension of NodePort, to which a load balancer routes, and external systems only need to access the load balancer.

                For details about the Service, see Service Overview.

                Ingress

                Services forward requests using layer-4 TCP and UDP protocols. Ingresses forward requests using layer-7 HTTP and HTTPS protocols. Domain names and paths can be used to achieve finer granularities.

                -
                Figure 2 Ingress and Service
                +
                Figure 2 Ingress-Service

                For details about the ingress, see Ingress Overview.

                Access Scenarios

                Workload access scenarios can be categorized as follows:

                -
                • Intra-cluster access: A ClusterIP Service is used for workloads in the same cluster to access each other.
                • Access from outside a cluster: A Service (NodePort or LoadBalancer type) or an ingress is recommended for a workload outside a cluster to access workloads in the cluster.
                  • Access through the internet requires an EIP to be bound the node or load balancer.
                  • Access through an intranet uses only the intranet IP address of the node or load balancer. If workloads are located in different VPCs, a peering connection is required to enable communication between different VPCs.
                  -
                • External access initiated by a workload:
                  • Accessing an intranet: The workload accesses the intranet address, but the implementation method varies depending on container network models. Ensure that the peer security group allows the access requests from the container CIDR block.
                  • Accessing a public network: You need to assign an EIP to the node where the workload runs (when the VPC network or tunnel network model is used), bind an EIP to the pod IP address (when the Cloud Native Network 2.0 model is used), or configure SNAT rules through the NAT gateway. For details, see Accessing Public Networks from a Container.
                  +
                  • Intra-cluster access: A ClusterIP Service is used for workloads in the same cluster to access each other.
                  • Access from outside a cluster: A Service (NodePort or LoadBalancer type) or an ingress is recommended for a workload outside a cluster to access workloads in the cluster.
                    • Access through the internet requires an EIP to be bound the node or load balancer.
                    • Access through the intranet requires an internal IP address to be bound the node or load balancer. If workloads are located in different VPCs, a peering connection is required to enable communication between different VPCs.
                    +
                  • The workload accesses the external network.
                    • Accessing an intranet: The workload accesses the intranet address, but the implementation method varies depending on container network models. Ensure that the peer security group allows the access requests from the container CIDR block.
                    • Accessing a public network: You need to assign an EIP to the node where the workload runs (when the VPC network or tunnel network model is used), bind an EIP to the pod IP address (when the Cloud Native Network 2.0 model is used), or configure SNAT rules through the NAT gateway. For details, see Accessing Public Networks from a Container.
                  -
                  Figure 3 Network access diagram
                  +
                  Figure 3 Network access diagram
                diff --git a/docs/cce/umn/cce_10_0011.html b/docs/cce/umn/cce_10_0011.html index 1a08ed51..e0d5cdb4 100644 --- a/docs/cce/umn/cce_10_0011.html +++ b/docs/cce/umn/cce_10_0011.html @@ -4,7 +4,7 @@

                Scenario

                ClusterIP Services allow workloads in the same cluster to use their cluster-internal domain names to access each other.

                The cluster-internal domain name format is <Service name>.<Namespace of the workload>.svc.cluster.local:<Port>, for example, nginx.default.svc.cluster.local:80.

                Figure 1 shows the mapping relationships between access channels, container ports, and access ports.

                -
                Figure 1 Intra-cluster access (ClusterIP)
                +
                Figure 1 Intra-cluster access (ClusterIP)

                Creating a ClusterIP Service

                1. Log in to the CCE console and access the cluster console.
                2. Choose Networking in the navigation pane and click Create Service in the upper right corner.
                3. Set intra-cluster access parameters.

                  • Service Name: Service name, which can be the same as the workload name.
                  • Service Type: Select ClusterIP.
                  • Namespace: Namespace to which the workload belongs.
                  • Selector: Add a label and click Add. A Service selects a pod based on the added label. You can also click Reference Workload Label to reference the label of an existing workload. In the dialog box that is displayed, select a workload and click OK.
                  • Port Settings
                    • Protocol: protocol used by the Service.
                    • Service Port: port used by the Service. The port number ranges from 1 to 65535.
                    • Container Port: port on which the workload listens. For example, Nginx uses port 80 by default.
                  diff --git a/docs/cce/umn/cce_10_0012.html b/docs/cce/umn/cce_10_0012.html index 222dec7e..ace9ae5f 100644 --- a/docs/cce/umn/cce_10_0012.html +++ b/docs/cce/umn/cce_10_0012.html @@ -27,7 +27,7 @@

      By default, auto scaling is disabled.

      Install the autoscaler add-on to enable auto scaling.

      -

      After you enable auto scaling by switching on , nodes in the node pool will be automatically created or deleted based on cluster loads.

      +

      After you enable auto scaling by switching on , nodes in the node pool will be automatically created or deleted based on cluster loads.

      • Maximum Nodes and Minimum Nodes: You can set the maximum and minimum number of nodes to ensure that the number of nodes to be scaled is within a proper range.
      • Priority: Set this parameter based on service requirements. A larger value indicates a higher priority. For example, if this parameter is set to 1 and 4 respectively for node pools A and B, B has a higher priority than A. If the priorities of multiple node pools are set to the same value, for example, 2, the node pools are not prioritized and the system performs scaling based on the minimum resource waste principle.
        NOTE:

        CCE selects a node pool for auto scaling based on the following policies:

        1. CCE uses algorithms to determine whether a node pool meets the conditions to allow scheduling of a pod in pending state, including whether the node resources are greater than requested by the pod, and whether the nodeSelect, nodeAffinity, and taints meet the conditions. In addition, the node pools that fail to be scaled (due to insufficient resources or other reasons) and are still in the 15-minute cool-down interval are filtered.
        2. If multiple node pools meet the scaling requirements, the system checks the priority of each node pool and selects the node pool with the highest priority for scaling. The value ranges from 0 to 100 and the default priority is 0. The value 100 indicates the highest priority, and the value 0 indicates the lowest priority.
        3. If multiple node pools have the same priority or no priority is configured for them, the system selects the node pool that will consume the least resources based on the configured VM specification.
        4. If the VM specifications of multiple node pools are the same but the node pools are deployed in different AZs, the system randomly selects a node pool to trigger scaling.
        @@ -63,19 +63,21 @@

      Node Type

      For a CCE cluster, ECS and BMS are supported.

      -

      CCE Turbo clusters support ECSs of the VM and physical types.

      +
      CCE cluster:
      • ECS (VM): Containers run on ECSs.
      +
      +
      CCE Turbo cluster:
      • ECS (VM): Containers run on ECSs. Only Trunkport ECSs (models that can be bound with multiple elastic network interfaces (ENIs)) are supported.
      +

      Container Engine

      CCE clusters support Docker. Starting from CCE 1.23, containerd is supported.

      -

      For a CCE Turbo cluster, both Docker and containerd are supported. For details, see Mapping between Node OSs and Container Engines.

      +
      CCE clusters support Docker and containerd in some scenarios.
      • VPC network clusters of v1.23 and later versions support containerd. Container tunnel network clusters of v1.23.2-r0 and later versions support containerd.
      • For a CCE Turbo cluster, both Docker and containerd are supported. For details, see Mapping between Node OSs and Container Engines.
      +

      Specifications

      Select node specifications that best fit your business needs.

      +

      Select a node specification based on service requirements. The available node specifications vary depending on regions or AZs. For details, see the CCE console.

      OS

      @@ -87,8 +89,8 @@

      Login Mode

      • Key Pair

        Select the key pair used to log in to the node. You can select a shared key.

        -

        A key pair is used for identity authentication when you remotely log in to a node. If no key pair is available, click Create Key Pair.

        +
      • Key Pair

        Select the key pair used to log in to the node. You can select a shared key.

        +

        A key pair is used for identity authentication when you remotely log in to a node. If no key pair is available, click Create Key Pair..

      Table 3 Configuration parameters

      Parameter

      +
      - - - - - @@ -161,64 +164,64 @@

      Advanced Settings

      Configure advanced node capabilities such as labels, taints, and startup command. -
      Table 3 Parameters for storage settings

      Parameter

      Description

      +

      Description

      System Disk

      +

      System Disk

      System disk used by the node OS. The value ranges from 40 GB to 1,024 GB. The default value is 50 GB.

      -
      Encryption: Data disk encryption safeguards your data. Snapshots generated from encrypted disks and disks created using these snapshots automatically inherit the encryption function. This function is available only in certain regions.
      • Encryption is not selected by default.
      • After you select Encryption, you can select an existing key in the displayed dialog box. If no key is available, click View Key List to create a key. After the key is created, click the refresh icon.
      +

      System disk used by the node OS. The value ranges from 40 GB to 1,024 GB. The default value is 50 GB.

      +
      Encryption: Data disk encryption safeguards your data. Snapshots generated from encrypted disks and disks created using these snapshots automatically inherit the encryption function. This function is available only in certain regions.
      • Encryption is not selected by default.
      • After you select Encryption, you can select an existing key in the displayed dialog box. If no key is available, click View Key List to create a key. After the key is created, click the refresh icon.

      Data Disk

      +

      Data Disk

      Data disk used by the container runtime and kubelet on the node.

      -

      At least one data disk is required for the container runtime and kubelet. The data disk cannot be deleted or uninstalled. Otherwise, the node will be unavailable.

      -

      Click Expand to set the following parameters:

      -
      • Allocate Disk Space: Select this option to define the disk space occupied by the container runtime to store the working directories, container image data, and image metadata. For details about how to allocate data disk space, see Data Disk Space Allocation.
      • Encryption: Data disk encryption safeguards your data. Snapshots generated from encrypted disks and disks created using these snapshots automatically inherit the encryption function. This function is available only in certain regions.
        • Encryption is not selected by default.
        • After you select Encryption, you can select an existing key in the displayed dialog box. If no key is available, click View Key List to create a key. After the key is created, click the refresh icon.
        +

      At least one data disk is required for the container runtime and kubelet. The data disk cannot be deleted or uninstalled. Otherwise, the node will be unavailable.

      +
      • First data disk: used for container runtime and kubelet components. The value ranges from 20 GB to 32,768 GB. The default value is 100 GB.
      • Other data disks: You can set the data disk size to a value ranging from 10 GB to 32,768 GB. The default value is 100 GB.
      +

      Advanced Settings

      +

      Click Expand to set the following parameters:

      +
      • Allocate Disk Space: Select this option to define the disk space occupied by the container runtime to store the working directories, container image data, and image metadata. For details about how to allocate data disk space, see Data Disk Space Allocation.
      • Encryption: Data disk encryption safeguards your data. Snapshots generated from encrypted disks and disks created using these snapshots automatically inherit the encryption function. This function is available only in certain regions.
        • Encryption is not selected by default.
        • After you select Encryption, you can select an existing key in the displayed dialog box. If no key is available, click View Key List to create a key. After the key is created, click the refresh icon.
      -

      Adding Multiple Data Disks

      -

      A maximum of four data disks can be added. By default, raw disks are created without any processing. You can also click Expand and select any of the following options:

      -
      • Default: By default, a raw disk is created without any processing.
      • Mount Disk: The data disk is attached to a specified directory.
      -

      Local Disk Description

      -

      If the node flavor is disk-intensive or ultra-high I/O, one data disk can be a local disk.

      -

      Local disks may break down and do not ensure data reliability. It is recommended that you store service data in EVS disks, which are more reliable than local disks.

      +

      Adding Multiple Data Disks

      +

      A maximum of four data disks can be added. By default, raw disks are created without any processing. You can also click Expand and select any of the following options:

      +
      • Default: By default, a raw disk is created without any processing.
      • Mount Disk: The data disk is attached to a specified directory.
      +

      Local Disk Description

      +

      If the node flavor is disk-intensive or ultra-high I/O, one data disk can be a local disk.

      +

      Local disks may break down and do not ensure data reliability. It is recommended that you store service data in EVS disks, which are more reliable than local disks.

      Table 5 Advanced configuration parameters

      Parameter

      +
      - - - - - - - - - - - - - - - - - diff --git a/docs/cce/umn/cce_10_0014.html b/docs/cce/umn/cce_10_0014.html index 779f5bb1..3f83ff87 100644 --- a/docs/cce/umn/cce_10_0014.html +++ b/docs/cce/umn/cce_10_0014.html @@ -4,20 +4,20 @@

      Scenario

      A workload can be accessed from public networks through a load balancer, which is more secure and reliable than EIP.

      The LoadBalancer access address is in the format of <IP address of public network load balancer>:<access port>, for example, 10.117.117.117:80.

      In this access mode, requests are transmitted through an ELB load balancer to a node and then forwarded to the destination pod through the Service.

      -
      Figure 1 LoadBalancer
      +
      Figure 1 LoadBalancer

      When CCE Turbo clusters and dedicated load balancers are used, passthrough networking is supported to reduce service latency and ensure zero performance loss.

      External access requests are directly forwarded from a load balancer to pods. Internal access requests can be forwarded to a pod through a Service.

      -
      Figure 2 Passthrough networking
      +
      Figure 2 Passthrough networking

      Notes and Constraints

      • LoadBalancer Services allow workloads to be accessed from public networks through ELB. This access mode has the following restrictions:
        • It is recommended that automatically created load balancers not be used by other resources. Otherwise, these load balancers cannot be completely deleted, causing residual resources.
        • Do not change the listener name for the load balancer in clusters of v1.15 and earlier. Otherwise, the load balancer cannot be accessed.
      • After a Service is created, if the affinity setting is switched from the cluster level to the node level, the connection tracing table will not be cleared. You are advised not to modify the Service affinity setting after the Service is created. If you need to modify it, create a Service again.
      • If the service affinity is set to the node level (that is, externalTrafficPolicy is set to Local), the cluster may fail to access the Service by using the ELB address. For details, see Why a Cluster Fails to Access Services by Using the ELB Address.
      • CCE Turbo clusters support only cluster-level service affinity.
      • Dedicated ELB load balancers can be used only in clusters of v1.17 and later.
      • Dedicated load balancers must be the network type (TCP/UDP) supporting private networks (with a private IP). If the Service needs to support HTTP, the specifications of dedicated load balancers must use HTTP/HTTPS (application load balancing) in addition to TCP/UDP (network load balancing).
      • If you create a LoadBalancer Service on the CCE console, a random node port is automatically generated. If you use kubectl to create a LoadBalancer Service, a random node port is generated unless you specify one.
      • In a CCE cluster, if the cluster-level affinity is configured for a LoadBalancer Service, requests are distributed to the node ports of each node using SNAT when entering the cluster. The number of node ports cannot exceed the number of available node ports on the node. If the Service affinity is at the node level (local), there is no such constraint. In a CCE Turbo cluster, this constraint applies to shared ELB load balancers, but not dedicated ones. You are advised to use dedicated ELB load balancers in CCE Turbo clusters.
      • When the cluster service forwarding (proxy) mode is IPVS, the node IP cannot be configured as the external IP of the Service. Otherwise, the node is unavailable.
      • In a cluster using the IPVS proxy mode, if the ingress and Service use the same ELB load balancer, the ingress cannot be accessed from the nodes and containers in the cluster because kube-proxy mounts the LoadBalancer Service address to the ipvs-0 bridge. This bridge intercepts the traffic of the load balancer connected to the ingress. You are advised to use different ELB load balancers for the ingress and Service.

      Creating a LoadBalancer Service

      1. Log in to the CCE console and click the cluster name to access the cluster.
      2. Choose Networking in the navigation pane and click Create Service in the upper right corner.
      3. Set parameters.

        • Service Name: Specify a Service name, which can be the same as the workload name.
        • Access Type: Select LoadBalancer.
        • Namespace: Namespace to which the workload belongs.
        • Service Affinity: For details, see externalTrafficPolicy (Service Affinity).
          • Cluster level: The IP addresses and access ports of all nodes in a cluster can be used to access the workload associated with the Service. Service access will cause performance loss due to route redirection, and the source IP address of the client cannot be obtained.
          • Node level: Only the IP address and access port of the node where the workload is located can access the workload associated with the Service. Service access will not cause performance loss due to route redirection, and the source IP address of the client can be obtained.
        • Selector: Add a label and click Add. A Service selects a pod based on the added label. You can also click Reference Workload Label to reference the label of an existing workload. In the dialog box that is displayed, select a workload and click OK.
        • Load Balancer

          Select the load balancer to interconnect. Only load balancers in the same VPC as the cluster are supported. If no load balancer is available, click Create Load Balancer to create one on the ELB console.

          -

          You can click Edit and configure load balancer parameters in the Load Balancer dialog box.

          +

          You can click the edit icon in the row of Set ELB to configure load balancer parameters.

          • Distribution Policy: Three algorithms are available: weighted round robin, weighted least connections algorithm, or source IP hash.
            • Weighted round robin: Requests are forwarded to different servers based on their weights, which indicate server processing performance. Backend servers with higher weights receive proportionately more requests, whereas equal-weighted servers receive the same number of requests. This algorithm is often used for short connections, such as HTTP services.
            • Weighted least connections: In addition to the weight assigned to each server, the number of connections processed by each backend server is also considered. Requests are forwarded to the server with the lowest connections-to-weight ratio. Building on least connections, the weighted least connections algorithm assigns a weight to each server based on their processing capability. This algorithm is often used for persistent connections, such as database connections.
            • Source IP hash: The source IP address of each request is calculated using the hash algorithm to obtain a unique hash key, and all backend servers are numbered. The generated key allocates the client to a particular server. This enables requests from different clients to be distributed in load balancing mode and ensures that requests from the same client are forwarded to the same server. This algorithm applies to TCP connections without cookies.
            -
          • Type: This function is disabled by default. You can select Source IP address. Listeners ensure session stickiness based on IP addresses. Requests from the same IP address will be forwarded to the same backend server.
          • Health Check: This function is disabled by default. The health check is for the load balancer. When TCP is selected during the port settings, you can choose either TCP or HTTP. When UDP is selected during the port settings, only UDP is supported.. By default, the service port (Node Port and container port of the Service) is used for health check. You can also specify another port for health check. After the port is specified, a service port named cce-healthz will be added for the Service.
          +
        • Type: This function is disabled by default. You can select Source IP address. Listeners ensure session stickiness based on IP addresses. Requests from the same IP address will be forwarded to the same backend server.
        • Health Check: configured for the load balancer. When TCP is selected during the port settings, you can choose either TCP or HTTP. When UDP is selected during the port settings, only UDP is supported.. By default, the service port (Node Port and container port of the Service) is used for health check. You can also specify another port for health check. After the port is specified, a service port named cce-healthz will be added for the Service.
      4. Port Settings
        • Protocol: protocol used by the Service.
        • Service Port: port used by the Service. The port number ranges from 1 to 65535.
        • Container Port: port on which the workload listens. For example, Nginx uses port 80 by default.
      5. Annotation: The LoadBalancer Service has some advanced CCE functions, which are implemented by annotations. For details, see Service Annotations. When you use kubectl to create a container, annotations will be used. For details, see Using kubectl to Create a Service (Using an Existing Load Balancer) and Using kubectl to Create a Service (Automatically Creating a Load Balancer).
      6. Click OK.
      @@ -272,11 +272,11 @@ spec: kubernetes ClusterIP 10.247.0.1 <none> 443/TCP 3d nginx LoadBalancer 10.247.130.196 10.78.42.242 80:31540/TCP 51s

    6. Enter the URL in the address box of the browser, for example, 10.78.42.242:80. 10.78.42.242 indicates the IP address of the load balancer, and 80 indicates the access port displayed on the CCE console.

      The Nginx is accessible.

      -
      Figure 3 Accessing Nginx through the LoadBalancer Service
      +
      Figure 3 Accessing Nginx through the LoadBalancer Service

    7. Using kubectl to Create a Service (Automatically Creating a Load Balancer)

      You can add a Service when creating a workload using kubectl. This section uses an Nginx workload as an example to describe how to add a LoadBalancer Service using kubectl.

      -
      1. Use kubectl to connect to the cluster. For details, see Connecting to a Cluster Using kubectl.
      2. Create and edit the nginx-deployment.yaml and nginx-elb-svc.yaml files.

        The file names are user-defined. nginx-deployment.yaml and nginx-elb-svc.yaml are merely example file names.

        +
        1. Use kubectl to connect to the cluster. For details, see Connecting to a Cluster Using kubectl.
        2. Create and edit the nginx-deployment.yaml and nginx-elb-svc.yaml files.

          The file names are user-defined. nginx-deployment.yaml and nginx-elb-svc.yaml are merely example file names.

          vi nginx-deployment.yaml

          apiVersion: apps/v1
           kind: Deployment
          @@ -381,7 +381,7 @@ spec:
           
           
      - @@ -455,7 +455,7 @@ spec: - - diff --git a/docs/cce/umn/cce_10_0015.html b/docs/cce/umn/cce_10_0015.html index 416062e7..3b7a8919 100644 --- a/docs/cce/umn/cce_10_0015.html +++ b/docs/cce/umn/cce_10_0015.html @@ -10,104 +10,216 @@ metadata: data: SPECIAL_LEVEL: Hello SPECIAL_TYPE: CCE -

      When a ConfigMap is used in a pod, the pod and ConfigMap must be in the same cluster and namespace.

      +
      • When a ConfigMap is used in a workload, the workload and ConfigMap must be in the same cluster and namespace.
      • When a ConfigMap is mounted as a data volume and is updated, Kubernetes updates the data in the data volume at the same time.

        When a ConfigMap data volume mounted in subPath mode is updated, Kubernetes cannot automatically update the data in the data volume.

        +
      • When a ConfigMap is used as an environment variable, data can not be automatically updated when the ConfigMap is updated. To update the data, you need to restart the pod.
      -

      Setting Workload Environment Variables

      When creating a workload, you can use a ConfigMap to set environment variables. The valueFrom parameter indicates the key-value pair to be referenced.

      -
      apiVersion: v1
      -kind: Pod
      +

      Setting Workload Environment Variables

      Using the console

      +
      1. Log in to the CCE console and access the cluster console.
      2. In the navigation pane, choose Workloads. Then, click Create Workload.

        When creating a workload, click Environment Variables in the Container Settings area, and click .

        +
        • Added from ConfigMap: Select a ConfigMap to import all of its keys as environment variables.

          +
        • Added from ConfigMap key: Import a key in a ConfigMap as the value of an environment variable.
          • Variable Name: name of an environment variable in the workload. The name can be customized and is set to the key name selected in the ConfigMap by default.
          • Variable Value/Reference: Select a ConfigMap and the key to be imported. The corresponding value is imported as a workload environment variable.
          +

          For example, after you import the value Hello of SPECIAL_LEVEL in ConfigMap cce-configmap as the value of workload environment variable SPECIAL_LEVEL, an environment variable named SPECIAL_LEVEL with its value Hello exists in the container.

          +

          +
        +

      3. Configure other workload parameters and click Create Workload.

        After the workload runs properly, access the container and run the following command to check whether the ConfigMap has been set as an environment variable of the workload:

        +
        printenv SPECIAL_LEVEL
        +

        The example output is as follows:

        +
        Hello
        +

      +

      Using kubectl

      +
      1. According to Connecting to a Cluster Using kubectl, configure the kubectl command to connect an ECS to the cluster.
      2. Create a file named nginx-configmap.yaml and edit it.

        vi nginx-configmap.yaml

        +

        Content of the YAML file:

        +
        • Added from ConfigMap: To add all data in a ConfigMap to environment variables, use the envFrom parameter. The keys in the ConfigMap will become names of environment variables in a pod.
          apiVersion: apps/v1
          +kind: Deployment
           metadata:
          -  name: configmap-pod-1
          +  name: nginx-configmap
           spec:
          -  containers:
          -    - name: test-container
          -      image: busybox
          -      command: [ "/bin/sh", "-c", "env" ]
          -      env:
          -        - name: SPECIAL_LEVEL_KEY
          -          valueFrom:                             ## Use valueFrom to specify the value of the env that refers to the ConfigMap.
          -            configMapKeyRef:
          -              name: cce-configmap                ## Name of the referenced configuration file.
          -              key: SPECIAL_LEVEL                 ## Key of the referenced ConfigMap.
          -  restartPolicy: Never
          -
          If you need to define the values of multiple ConfigMaps as the environment variables of the pods, add multiple environment variable parameters to the pods.
          env:
          -- name: SPECIAL_LEVEL_KEY
          -  valueFrom:
          -    configMapKeyRef:
          -          name: cce-configmap
          -          key: SPECIAL_LEVEL
          -- name: SPECIAL_TYPE_KEY
          -  valueFrom:
          -    configMapKeyRef:
          -          name: cce-configmap
          -          key: SPECIAL_TYPE
          -
          -

          To add all data in a ConfigMap to environment variables, use the envFrom parameter. The keys in the ConfigMap will become names of environment variables in a pod.

          -
          apiVersion: v1
          -kind: Pod
          +  replicas: 1
          +  selector:
          +    matchLabels:
          +      app: nginx-configmap
          +  template:
          +    metadata:
          +      labels:
          +        app: nginx-configmap
          +    spec:
          +      containers:
          +      - name: container-1
          +        image: nginx:latest
          +        envFrom:                      # Use envFrom to specify a ConfigMap to be referenced by environment variables.
          +        - configMapRef:
          +            name: cce-configmap       # Name of the referenced ConfigMap.
          +      imagePullSecrets:
          +      - name: default-secret
          +
        • Added from a ConfigMap key: When creating a workload, you can use a ConfigMap to set environment variables and use the valueFrom parameter to reference the key-value pair in the ConfigMap separately.
          apiVersion: apps/v1
          +kind: Deployment
           metadata:
          -  name: configmap-pod-2
          +  name: nginx-configmap
           spec:
          -  containers:
          -    - name: test-container
          -      image: busybox
          -      command: [ "/bin/sh", "-c", "env" ]
          -      envFrom:
          -      - configMapRef:
          -          name: cce-configmap
          -  restartPolicy: Never
          -
      -

      Setting Command Line Parameters

      You can use a ConfigMap to set commands or parameter values for a container by using the environment variable substitution syntax $(VAR_NAME). The following shows an example.

      -
      apiVersion: v1
      -kind: Pod
      -metadata:
      -  name: configmap-pod-3
      -spec:
      -  containers:
      -    - name: test-container
      -      image: busybox
      -      command: [ "/bin/sh", "-c", "echo $(SPECIAL_LEVEL_KEY) $(SPECIAL_TYPE_KEY)" ]
      -      env:
      -        - name: SPECIAL_LEVEL_KEY
      +  replicas: 1
      +  selector:
      +    matchLabels:
      +      app: nginx-configmap
      +  template:
      +    metadata:
      +      labels:
      +        app: nginx-configmap
      +    spec:
      +      containers:
      +      - name: container-1
      +        image: nginx:latest
      +        env:                             # Set environment variables in the workload.
      +        - name: SPECIAL_LEVEL           # Name of the environment variable in the workload.
      +          valueFrom:                    # Use valueFrom to specify an environment variable to reference a ConfigMap.
      +            configMapKeyRef:
      +              name: cce-configmap       # Name of the referenced ConfigMap.
      +              key: SPECIAL_LEVEL        # Key in the referenced ConfigMap.
      +        - name: SPECIAL_TYPE            # Add multiple environment variables. Multiple environment variables can be imported at the same time.
                 valueFrom:
                   configMapKeyRef:
      -              name: cce-configmap
      -              key: SPECIAL_LEVEL
      -        - name: SPECIAL_TYPE_KEY
      -          valueFrom:
      -            configMapKeyRef:
      -              name: cce-configmap
      -              key: SPECIAL_TYPE
      -  restartPolicy: Never
      -

      After the pod runs, the following information is displayed:

      + name: cce-configmap + key: SPECIAL_TYPE + imagePullSecrets: + - name: default-secret
      + +

    8. Create a workload.

      kubectl apply -f nginx-configmap.yaml

      +

    9. View the environment variables in the pod.

      1. Run the following command to view the created pod:
        kubectl get pod | grep nginx-configmap
        +
        Expected output:
        nginx-configmap-***   1/1     Running   0              2m18s
        +
        +
      2. Run the following command to view the environment variables in the pod:
        kubectl exec nginx-configmap-*** -- printenv SPECIAL_LEVEL SPECIAL_TYPE
        +

        Expected output:

        +
        Hello
        +CCE
        +

        The ConfigMap has been set as an environment variable of the workload.

        +
      +

    10. +
      +

      Setting Command Line Parameters

      You can use a ConfigMap as an environment variable to set commands or parameter values for a container by using the environment variable substitution syntax $VAR_NAME.

      +

      Using the console

      +
      1. Log in to the CCE console and access the cluster console.
      2. In the navigation pane, choose Workloads. Then, click Create Workload.

        When creating a workload, click Environment Variables in the Container Settings area, and click . In this example, select Added from ConfigMap.

        +
        • Added from ConfigMap: Select a ConfigMap to import all of its keys as environment variables.

          +
        +

      3. Click Lifecycle in the Container Settings area, click the Post-Start tab on the right, and set the following parameters:

        • Processing Method: CLI
        • Command: Enter the following three command lines. SPECIAL_LEVEL and SPECIAL_TYPE are the environment variable names in the workload, that is, the key names in the cce-configmap ConfigMap.
          /bin/bash
          +-c
          +echo $SPECIAL_LEVEL $SPECIAL_TYPE > /usr/share/nginx/html/index.html
          +
        +

        +

      4. Configure other workload parameters and click Create Workload.

        After the workload runs properly, access the container and run the following command to check whether the ConfigMap has been set as an environment variable of the workload:

        +
        cat /usr/share/nginx/html/index.html
        +

        The example output is as follows:

        +
        Hello CCE
        +

      +

      Using kubectl

      +
      1. According to Connecting to a Cluster Using kubectl, configure the kubectl command to connect an ECS to the cluster.
      2. Create a file named nginx-configmap.yaml and edit it.

        vi nginx-configmap.yaml

        +
        As shown in the following example, the cce-configmap ConfigMap is imported to the workload. SPECIAL_LEVEL and SPECIAL_TYPE are environment variable names, that is, key names in the cce-configmap ConfigMap.
        apiVersion: apps/v1
        +kind: Deployment
        +metadata:
        +  name: nginx-configmap
        +spec:
        +  replicas: 1
        +  selector:
        +    matchLabels:
        +      app: nginx-configmap
        +  template:
        +    metadata:
        +      labels:
        +        app: nginx-configmap
        +    spec:
        +      containers:
        +      - name: container-1
        +        image: nginx:latest
        +        lifecycle:
        +          postStart:
        +            exec:
        +              command: [ "/bin/sh", "-c", "echo $SPECIAL_LEVEL $SPECIAL_TYPE > /usr/share/nginx/html/index.html" ]
        +        envFrom:                      # Use envFrom to specify a ConfigMap to be referenced by environment variables.
        +        - configMapRef:
        +            name: cce-configmap       # Name of the referenced ConfigMap.
        +      imagePullSecrets:
        +        - name: default-secret
        +
        +

      3. Create a workload.

        kubectl apply -f nginx-configmap.yaml

        +

      4. After the workload runs properly, the following content is entered into the /usr/share/nginx/html/index.html file in the container:

        1. Run the following command to view the created pod:
          kubectl get pod | grep nginx-configmap
          +
          Expected output:
          nginx-configmap-***   1/1     Running   0              2m18s
          +
          +
        2. Run the following command to view the environment variables in the pod:
          kubectl exec nginx-configmap-*** -- cat /usr/share/nginx/html/index.html
          +

          Expected output:

          Hello CCE
          +
        +

      -

      Attaching a ConfigMap to the Workload Data Volume

      A ConfigMap can also be used in the data volume. You only need to attach the ConfigMap to the workload when creating the workload. After the mounting is complete, a configuration file with key as the file name and value as the file content is generated.

      -
      apiVersion: v1
      -kind: Pod
      +

      Attaching a ConfigMap to the Workload Data Volume

      The data stored in a ConfigMap can be referenced in a volume of type ConfigMap. You can mount such a volume to a specified container path. The platform supports the separation of workload codes and configuration files. ConfigMap volumes are used to store workload configuration parameters. Before that, you need to create ConfigMaps in advance. For details, see Creating a ConfigMap.

      +

      Using the console

      +
      1. Log in to the CCE console and access the cluster console.
      2. In the navigation pane, choose Workloads. Then, click Create Workload.

        When creating a workload, click Data Storage in the Container Settings area. Click Add Volume and select ConfigMap from the drop-down list.

        +

      3. Set the local volume type to ConfigMap and set parameters for adding a local volume, as shown in Table 1.

        +

      Table 5 Advanced configuration parameters

      Parameter

      Description

      +

      Description

      Kubernetes Label

      +

      Kubernetes Label

      Click Add Label to set the key-value pair attached to the Kubernetes objects (such as pods). A maximum of 20 labels can be added.

      -

      Labels can be used to distinguish nodes. With workload affinity settings, container pods can be scheduled to a specified node. For more information, see Labels and Selectors.

      +

      Click Add to set the key-value pair attached to the Kubernetes objects (such as pods). A maximum of 20 labels can be added.

      +

      Labels can be used to distinguish nodes. With workload affinity settings, container pods can be scheduled to a specified node. For more information, see Labels and Selectors.

      Resource Tag

      +

      Resource Tag

      You can add resource tags to classify resources.

      -

      You can create predefined tags in Tag Management Service (TMS). Predefined tags are visible to all service resources that support the tagging function. You can use these tags to improve tagging and resource migration efficiency.

      -

      CCE will automatically create the "CCE-Dynamic-Provisioning-Node=node id" tag.

      +

      You can add resource tags to classify resources.

      +

      You can create predefined tags in Tag Management Service (TMS). Predefined tags are visible to all service resources that support the tagging function. You can use these tags to improve tagging and resource migration efficiency.

      +

      CCE will automatically create the "CCE-Dynamic-Provisioning-Node=node id" tag.

      Taint

      +

      Taint

      This parameter is left blank by default. You can add taints to set anti-affinity for the node. A maximum of 10 taints are allowed for each node. Each taint contains the following parameters:
      • Key: A key must contain 1 to 63 characters, starting with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed. A DNS subdomain name can be used as the prefix of a key.
      • Value: A value must start with a letter or digit and can contain a maximum of 63 characters, including letters, digits, hyphens (-), underscores (_), and periods (.).
      • Effect: Available options are NoSchedule, PreferNoSchedule, and NoExecute.
      +
      This parameter is left blank by default. You can add taints to set anti-affinity for the node. A maximum of 10 taints are allowed for each node. Each taint contains the following parameters:
      • Key: A key must contain 1 to 63 characters starting with a letter or digit. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed. A DNS subdomain name can be used as the prefix of a key.
      • Value: A value must start with a letter or digit and can contain a maximum of 63 characters, including letters, digits, hyphens (-), underscores (_), and periods (.).
      • Effect: Available options are NoSchedule, PreferNoSchedule, and NoExecute.
      -

      For details, see Managing Node Taints.

      -
      NOTE:

      For a cluster of v1.19 or earlier, the workload may have been scheduled to a node before the taint is added. To avoid such a situation, select a cluster of v1.19 or later.

      +

      For details, see Managing Node Taints.

      +
      NOTE:

      For a cluster of v1.19 or earlier, the workload may have been scheduled to a node before the taint is added. To avoid such a situation, select a cluster of v1.19 or later.

      Max. Pods

      +

      Max. Pods

      Maximum number of pods that can run on the node, including the default system pods.

      -

      This limit prevents the node from being overloaded with pods.

      -

      This number is also decided by other factors. For details, see Maximum Number of Pods That Can Be Created on a Node.

      +

      Maximum number of pods that can run on the node, including the default system pods.

      +

      This limit prevents the node from being overloaded with pods.

      +

      This number is also decided by other factors. For details, see Maximum Number of Pods That Can Be Created on a Node.

      ECS Group

      +

      ECS Group

      An ECS group logically groups ECSs. The ECSs in the same ECS group comply with the same policy associated with the ECS group.

      -

      Anti-affinity: ECSs in an ECS group are deployed on different physical hosts to improve service reliability.

      -

      Select an existing ECS group, or click Add ECS Group to create one. After the ECS group is created, click the refresh button.

      +

      An ECS group logically groups ECSs. The ECSs in the same ECS group comply with the same policy associated with the ECS group.

      +

      Anti-affinity: ECSs in an ECS group are deployed on different physical hosts to improve service reliability.

      +

      Select an existing ECS group, or click Add ECS Group to create one. After the ECS group is created, click the refresh button.

      Pre-installation Command

      +

      Pre-installation Command

      Enter commands. A maximum of 1,000 characters are allowed.

      -

      The script will be executed before Kubernetes software is installed. Note that if the script is incorrect, Kubernetes software may fail to be installed.

      +

      Enter commands. A maximum of 1,000 characters are allowed.

      +

      The script will be executed before Kubernetes software is installed. Note that if the script is incorrect, Kubernetes software may fail to be installed.

      Post-installation Command

      +

      Post-installation Command

      Enter commands. A maximum of 1,000 characters are allowed.

      -

      The script will be executed after Kubernetes software is installed and will not affect the installation.

      +

      Enter commands. A maximum of 1,000 characters are allowed.

      +

      The script will be executed after Kubernetes software is installed and will not affect the installation.

      Agency

      +

      Agency

      An agency is created by the account administrator on the IAM console. By creating an agency, you can share your cloud server resources with another account, or entrust a more professional person or team to manage your resources.

      -

      If no agency is available, click Create Agency on the right to create one.

      +

      An agency is created by the account administrator on the IAM console. By creating an agency, you can share your cloud server resources with another account, or entrust a more professional person or team to manage your resources.

      +

      If no agency is available, click Create Agency on the right to create one.

      Select a proper load balancer type as required.

      The value can be:

      -
      • union: shared load balancer
      • performance: dedicated load balancer, which can be used only in clusters of v1.17 and later.
      +
      • union: shared load balancer
      • performance: dedicated load balancer, which can be used only in clusters of v1.17 and later.

      kubernetes.io/elb.subnet-id

      @@ -422,10 +422,10 @@ spec:

      String

      This parameter indicates the load balancing algorithm of the backend server group. The default value is ROUND_ROBIN.

      +

      This parameter indicates the load balancing algorithm of the backend server group. The default value is ROUND_ROBIN.

      Options:

      -
      • ROUND_ROBIN: weighted round robin algorithm
      • LEAST_CONNECTIONS: weighted least connections algorithm
      • SOURCE_IP: source IP hash algorithm
      -

      When the value is SOURCE_IP, the weights of backend servers in the server group are invalid.

      +
      • ROUND_ROBIN: weighted round robin algorithm
      • LEAST_CONNECTIONS: weighted least connections algorithm
      • SOURCE_IP: source IP hash algorithm
      +

      When the value is SOURCE_IP, the weights of backend servers in the server group are invalid.

      kubernetes.io/elb.health-check-flag

      @@ -435,7 +435,7 @@ spec:

      String

      Whether to enable the ELB health check.

      -
      • Enabling health check: Leave blank this parameter or set it to on.
      • Disabling health check: Set this parameter to off.
      +
      • Enabling health check: Leave blank this parameter or set it to on.
      • Disabling health check: Set this parameter to off.

      If this parameter is enabled, the kubernetes.io/elb.health-check-option field must also be specified at the same time.

      String

      Listeners ensure session stickiness based on IP addresses. Requests from the same IP address will be forwarded to the same backend server.

      -
      • Disabling sticky session: Do not set this parameter.
      • Enabling sticky session: Set this parameter to SOURCE_IP, indicating that the sticky session is based on the source IP address.
      +
      • Disabling sticky session: Do not set this parameter.
      • Enabling sticky session: Set this parameter to SOURCE_IP, indicating that the sticky session is based on the source IP address.

      kubernetes.io/elb.session-affinity-option

      @@ -633,8 +633,8 @@ spec:
      NAME         TYPE           CLUSTER-IP       EXTERNAL-IP   PORT(S)        AGE
       kubernetes   ClusterIP      10.247.0.1       <none>        443/TCP        3d
       nginx        LoadBalancer   10.247.130.196   10.78.42.242   80:31540/TCP   51s
      -

    11. Enter the URL in the address box of the browser, for example, 10.78.42.242:80. 10.78.42.242 indicates the IP address of the load balancer, and 80 indicates the access port displayed on the CCE console.

      The Nginx is accessible.

      -
      Figure 4 Accessing Nginx through the LoadBalancer Service
      +

    12. Enter the URL in the address box of the browser, for example, 10.78.42.242:80. 10.78.42.242 indicates the IP address of the load balancer, and 80 indicates the access port displayed on the CCE console.

      The Nginx is accessible.

      +
      Figure 4 Accessing Nginx through the LoadBalancer Service

    13. ELB Forwarding

      After a Service of the LoadBalancer type is created, you can view the listener forwarding rules of the load balancer on the ELB console.

      @@ -651,11 +651,11 @@ kubernetes ClusterIP 10.247.0.1 <none> 443/TCP

      Client

      Tunnel Network Cluster (IPVS)

      +

      Container Tunnel Network Cluster (IPVS)

      VPC Network Cluster (IPVS)

      Tunnel Network Cluster (iptables)

      +

      Container Tunnel Network Cluster (iptables)

      VPC Network Cluster (iptables)

      + + + + + + + + + + +
      Table 1 Mounting a ConfigMap volume

      Parameter

      +

      Description

      +

      Option

      +

      Select the desired ConfigMap name.

      +

      A ConfigMap must be created in advance. For details, see Creating a ConfigMap.

      +

      Add Container Path

      +
      Configure the following parameters:
      1. Container Path: Enter the path of the container, for example, /tmp.
        This parameter indicates the container path to which a data volume will be mounted. Do not mount the volume to a system directory such as / or /var/run; this action may cause container errors. You are advised to mount the container to an empty directory. If the directory is not empty, ensure that there are no files affecting container startup in the directory. Otherwise, such files will be replaced, resulting in failures to start the container and create the workload.
        NOTICE:

        When the container is mounted to a high-risk directory, you are advised to use an account with minimum permissions to start the container; otherwise, high-risk files on the host machine may be damaged.

        +
        +
        +
      2. subPath: Enter a subpath, for example, tmp.
        • A subpath is used to mount a local volume so that the same data volume is used in a single pod.
        • The subpath can be the key and value of a ConfigMap or secret. If the subpath is a key-value pair that does not exist, the data import does not take effect.
        • The data imported by specifying a subpath will not be updated along with the ConfigMap/secret updates.
        +
      3. Set the permission to Read-only. Data volumes in the path are read-only.
      +
      +

      You can click to add multiple paths and subpaths.

      +
      +
      +

      +

      Using kubectl

      +
      1. According to Connecting to a Cluster Using kubectl, configure the kubectl command to connect an ECS to the cluster.
      2. Create a file named nginx-configmap.yaml and edit it.

        vi nginx-configmap.yaml

        +

        As shown in the following example, after the ConfigMap volume is mounted, a configuration file with the key as the file name and value as the file content is generated in the /etc/config directory of the container.

        +
        apiVersion: apps/v1
        +kind: Deployment
         metadata:
        -  name: configmap-pod-4
        +  name: nginx-configmap
         spec:
        -  containers:
        -    - name: test-container
        -      image: busybox
        -      command: [ "/bin/sh", "-c", "ls /etc/config/" ]   ## Lists the file names in the directory.
        -      volumeMounts:
        -      - name: config-volume
        -        mountPath: /etc/config                          ## Attaches to the /etc/config directory.
        -  volumes:
        +  replicas: 1
        +  selector:
        +    matchLabels:
        +      app: nginx-configmap
        +  template:
        +    metadata:
        +      labels:
        +        app: nginx-configmap
        +    spec:
        +      containers:
        +      - name: container-1
        +        image: nginx:latest
        +        volumeMounts:
        +        - name: config-volume
        +          mountPath: /etc/config            # Mount to the /etc/config directory.
        +          readOnly: true
        +    volumes:
             - name: config-volume
               configMap:
        -        name: cce-configmap
        -  restartPolicy: Never
        -

        After the pod is run, the SPECIAL_LEVEL and SPECIAL_TYPE files are generated in the /etc/config directory. The contents of the files are Hello and CCE, respectively. Also, the following file names will be displayed.

        -
        SPECIAL_TYPE
        -SPECIAL_LEVEL
        -

        To mount a ConfigMap to a data volume, you can also perform operations on the CCE console. When creating a workload, set advanced settings for the container, choose Data Storage > Local Volume, click Add Local Volume, and select ConfigMap. For details, see ConfigMap.

        + name: cce-configmap # Name of the referenced ConfigMap. +

      3. Create a workload.

        kubectl apply -f nginx-configmap.yaml

        +

      4. After the workload runs properly, the SPECIAL_LEVEL and SPECIAL_TYPE files are generated in the /etc/config directory. The contents of the files are Hello and CCE, respectively.

        1. Run the following command to view the created pod:
          kubectl get pod | grep nginx-configmap
          +
          Expected output:
          nginx-configmap-***   1/1     Running   0              2m18s
          +
          +
        2. Run the following command to view the SPECIAL_LEVEL or SPECIAL_TYPE file in the pod:
          kubectl exec nginx-configmap-*** -- /etc/config/SPECIAL_LEVEL
          +

          Expected output:

          +
          Hello
          +
        +

      diff --git a/docs/cce/umn/cce_10_0016.html b/docs/cce/umn/cce_10_0016.html index 7c5c5744..64cbe038 100644 --- a/docs/cce/umn/cce_10_0016.html +++ b/docs/cce/umn/cce_10_0016.html @@ -1,10 +1,10 @@

      Using a Secret

      -

      The following secrets are used by the CCE system. Do not perform any operations on them.

      +

      Do not perform any operation on the following secrets. For details, see Cluster Secrets.

      • Do not operate secrets under kube-system.
      • Do not operate default-secret and paas.elb in any of the namespaces. The default-secret is used to pull the private image of SWR, and the paas.elb is used to connect the service in the namespace to the ELB service.
      - +

      The following example shows how to use a secret.

      apiVersion: v1
       kind: Secret
      @@ -12,75 +12,190 @@ metadata:
         name: mysecret
       type: Opaque
       data:
      -  username: ****** #The value must be Base64-encoded.
      +  username: ******  #The value must be Base64-encoded.
         password: ******  #The value must be encoded using Base64.
      -

      When a secret is used in a pod, the pod and secret must be in the same cluster and namespace.

      +
      • When a secret is used in a pod, the pod and secret must be in the same cluster and namespace.
      • When a secret is updated, Kubernetes updates the data in the data volume at the same time.

        However, when a secret data volume mounted in subPath mode is updated, Kubernetes cannot automatically update the data in the data volume.

        +
      -

      Configuring the Data Volume of a Pod

      A secret can be used as a file in a pod. As shown in the following example, the username and password of the mysecret secret are saved in the /etc/foo directory as files.
      apiVersion: v1
      -kind: Pod
      +

      Setting Environment Variables of a Workload

      Using the console

      +
      1. Log in to the CCE console and access the cluster console.
      2. In the navigation pane, choose Workloads. Then, click Create Workload.

        When creating a workload, click Environment Variables in the Container Settings area, and click .

        +
        • Added from secret: Select a secret and import all keys in the secret as environment variables.

          +
        • Added from secret key: Import the value of a key in a secret as the value of an environment variable.
          • Variable Name: name of an environment variable in the workload. The name can be customized and is set to the key name selected in the secret by default.
          • Variable Value/Reference: Select a secret and the key to be imported. The corresponding value is imported as a workload environment variable.
          +

          For example, after you import the value of username in secret mysecret as the value of workload environment variable username, an environment variable named username exists in the container.

          +

          +
        +

      3. Configure other workload parameters and click Create Workload.

        After the workload runs properly, access the container and run the following command to check whether the secret has been set as an environment variable of the workload:

        +
        printenv username
        +

        If the output is the same as that in the secret, the secret has been set as an environment variable of the workload.

        +

      +

      Using kubectl

      +
      1. According to Connecting to a Cluster Using kubectl, configure the kubectl command to connect an ECS to the cluster.
      2. Create a file named nginx-secret.yaml and edit it.

        vi nginx-secret.yaml

        +

        Content of the YAML file:

        +
        • Added from a secret: To add all data in a secret to environment variables, use the envFrom parameter. The keys in the ConfigMap will become names of environment variables in a workload.
          apiVersion: apps/v1
          +kind: Deployment
           metadata:
          -  name: mypod
          +  name: nginx-secret
           spec:
          -  containers:
          -  - name: mypod
          -    image: redis
          -    volumeMounts:
          +  replicas: 1
          +  selector:
          +    matchLabels:
          +      app: nginx-secret
          +  template:
          +    metadata:
          +      labels:
          +        app: nginx-secret
          +    spec:
          +      containers:
          +      - name: container-1
          +        image: nginx:latest
          +        envFrom:                 # Use envFrom to specify a secret to be referenced by environment variables.
          +        - secretRef:
          +            name: mysecret       # Name of the referenced secret.
          +      imagePullSecrets:
          +      - name: default-secret
          +
        • Added from a secret key: When creating a workload, you can set a secret to set environment variables and use the valueFrom parameter to reference the key-value pair in the secret separately.
          apiVersion: apps/v1
          +kind: Deployment
          +metadata:
          +  name: nginx-secret
          +spec:
          +  replicas: 1
          +  selector:
          +    matchLabels:
          +      app: nginx-secret
          +  template:
          +    metadata:
          +      labels:
          +        app: nginx-secret
          +    spec:
          +      containers:
          +      - name: container-1
          +        image: nginx:latest
          +        env:                             # Set environment variables in the workload.
          +        - name: SECRET_USERNAME           # Name of the environment variable in the workload.
          +          valueFrom:                    # Use envFrom to specify a secret to be referenced by environment variables.
          +            secretKeyRef:
          +              name: mysecret       # Name of the referenced secret.
          +              key: username        # Name of the referenced key.
          +        - name: SECRET_PASSWORD            # Add multiple environment variables. Multiple environment variables can be imported at the same time.
          +          valueFrom:
          +            secretKeyRef:
          +              name: mysecret
          +              key: password
          +      imagePullSecrets:
          +      - name: default-secret
          +
        +

      3. Create a workload.

        kubectl apply -f nginx-secret.yaml

        +

      4. View the environment variables in the pod.

        1. Run the following command to view the created pod:
          kubectl get pod | grep nginx-secret
          +
          Expected output:
          nginx-secret-***   1/1     Running   0              2m18s
          +
          +
        2. Run the following command to view the environment variables in the pod:
          kubectl exec nginx-secret-*** -- printenv SPECIAL_USERNAME SPECIAL_PASSWORD
          +

          If the output is the same as that in the secret, the secret has been set as an environment variable of the workload.

          +
        +

      +
      +

      Configuring the Data Volume of a Workload

      You can mount a secret as a volume to the specified container path. Contents in a secret are user-defined. Before that, you need to create a secret. For details, see Creating a Secret.

      +

      Using the console

      +
      1. Log in to the CCE console and access the cluster console.
      2. In the navigation pane on the left, click Workloads. In the right pane, click the Deployments tab. Click Create Workload in the upper right corner.

        When creating a workload, click Data Storage in the Container Settings area. Click Add Volume and select Secret from the drop-down list.

        +

      3. Set the local volume type to Secret and set parameters for adding a local volume, as shown in Table 1.

        +

        + + + + + + + + + + +
        Table 1 Secret

        Parameter

        +

        Description

        +

        Secret

        +

        Select the desired secret name.

        +

        A secret must be created in advance. For details, see Creating a Secret.

        +

        Add Container Path

        +

        Configure the following parameters:

        +
        1. Container Path: Enter the path of the container, for example, /tmp.
          This parameter indicates the container path to which a data volume will be mounted. Do not mount the volume to a system directory such as / or /var/run; this action may cause container errors. You are advised to mount the container to an empty directory. If the directory is not empty, ensure that there are no files affecting container startup in the directory. Otherwise, such files will be replaced, resulting in failures to start the container and create the workload.
          NOTICE:

          When the container is mounted to a high-risk directory, you are advised to use an account with minimum permissions to start the container; otherwise, high-risk files on the host machine may be damaged.

          +
          +
          +
        2. subPath: Enter a subpath, for example, tmp.
          • A subpath is used to mount a local volume so that the same data volume is used in a single pod.
          • The subpath can be the key and value of a ConfigMap or secret. If the subpath is a key-value pair that does not exist, the data import does not take effect.
          • The data imported by specifying a subpath will not be updated along with the ConfigMap/secret updates.
          +
        3. Set the permission to Read-only. Data volumes in the path are read-only.
        +

        You can click to add multiple paths and subpaths.

        +
        +
        +

      +

      Using kubectl

      +
      1. According to Connecting to a Cluster Using kubectl, configure the kubectl command to connect an ECS to the cluster.
      2. Create a file named nginx-secret.yaml and edit it.

        vi nginx-secret.yaml

        +
        In the following example, the username and password in the mysecret secret are saved in the /etc/foo directory as files.
        apiVersion: apps/v1
        +kind: Deployment
        +metadata:
        +  name: nginx-secret
        +spec:
        +  replicas: 1
        +  selector:
        +    matchLabels:
        +      app: nginx-secret
        +  template:
        +    metadata:
        +      labels:
        +        app: nginx-secret
        +    spec:
        +      containers:
        +      - name: container-1
        +        image: nginx:latest
        +        volumeMounts:
        +       - name: foo
        +         mountPath: /etc/foo          # Mount to the /etc/foo directory.
        +         readOnly: true
        +    volumes:
             - name: foo
        -      mountPath: "/etc/foo"
        -      readOnly: true
        -  volumes:
        -  - name: foo
        -    secret:
        -      secretName: mysecret
        + secret: + secretName: mysecret # Name of the referenced secret.
      -
      In addition, you can specify the directory and permission to access a secret. The username is stored in the /etc/foo/my-group/my-username directory of the container.
      apiVersion: v1
      -kind: Pod
      +
      You can also use the items field to control the mapping path of the secret key. For example, store the username is stored in the /etc/foo/my-group/my-username directory of the container.
      • After the items field is used to specify the mapping path of the secret key, the keys that are not specified will not be created as files. For example, if the password key in the following example is not specified, the file will not be created.
      • If you want to use all keys in a secret, you must list all keys in the items field.
      • All keys listed in the items field must exist in the corresponding secret. Otherwise, the volume is not created.
      +
      +
      apiVersion: apps/v1
      +kind: Deployment
       metadata:
      -  name: mypod
      +  name: nginx-secret
       spec:
      -  containers:
      -  - name: mypod
      -    image: redis
      -    volumeMounts:
      +  replicas: 1
      +  selector:
      +    matchLabels:
      +      app: nginx-secret
      +  template:
      +    metadata:
      +      labels:
      +        app: nginx-secret
      +    spec:
      +      containers:
      +      - name: container-1
      +        image: nginx:latest
      +        volumeMounts:
      +       - name: foo
      +         mountPath: /etc/foo          # Mount to the /etc/foo directory.
      +         readOnly: true
      +    volumes:
           - name: foo
      -      mountPath: "/etc/foo"
      -  volumes:
      -  - name: foo
      -    secret:
      -      secretName: mysecret
      -      items:
      -      - key: username
      -        path: my-group/my-username
      -        mode: 511
      + secret: + secretName: mysecret # Name of the referenced secret. + items: + - key: username # Name of the referenced key. + path: my-group/my-username # Mapping path of the secret key.
      -

      To mount a secret to a data volume, you can also perform operations on the CCE console. When creating a workload, set advanced settings for the container, choose Data Storage > Local Volume, click Add Local Volume, and select Secret. For details, see Secret.

      -
      -

      Setting Environment Variables of a Pod

      A secret can be used as an environment variable of a pod. As shown in the following example, the username and password of the mysecret secret are defined as an environment variable of the pod.
      apiVersion: v1
      -kind: Pod
      -metadata:
      -  name: secret-env-pod
      -spec:
      -  containers:
      -  - name: mycontainer
      -    image: redis
      -    env:
      -      - name: SECRET_USERNAME
      -        valueFrom:
      -          secretKeyRef:
      -            name: mysecret
      -            key: username
      -      - name: SECRET_PASSWORD
      -        valueFrom:
      -          secretKeyRef:
      -            name: mysecret
      -            key: password
      -  restartPolicy: Never
      +

    14. Create a workload.

      kubectl apply -f nginx-secret.yaml

      +

    15. After the workload runs properly, the username and password files are generated in the /etc/foo directory.

      1. Run the following command to view the created pod:
        kubectl get pod | grep nginx-secret
        +
        Expected output:
        nginx-secret-***   1/1     Running   0              2m18s
        +
      2. Run the following command to view the username or password file in the pod:
        kubectl exec nginx-secret-*** -- /etc/foo/username
        +

        The expected output is the same as that in the secret.

        +
      +

    16. diff --git a/docs/cce/umn/cce_10_0018.html b/docs/cce/umn/cce_10_0018.html index 84e7a111..f2c43131 100644 --- a/docs/cce/umn/cce_10_0018.html +++ b/docs/cce/umn/cce_10_0018.html @@ -4,7 +4,7 @@

      CCE works with AOM to collect workload logs. When creating a node, CCE installs the ICAgent for you (the DaemonSet named icagent in the kube-system namespace of the cluster). After the ICAgent collects workload logs and reports them to AOM, you can view workload logs on the CCE or AOM console.

      Notes and Constraints

      The ICAgent only collects *.log, *.trace, and *.out text log files.

      -

      Using ICAgent to Collect Logs

      1. When creating a workload, set logging for the container.
      2. Click to add a log policy.

        The following uses Nginx as an example. Log policies vary depending on workloads.
        Figure 1 Adding a log policy
        +

        Using ICAgent to Collect Logs

        1. When creating a workload, set logging for the container.
        2. Click to add a log policy.

          The following uses Nginx as an example. Log policies vary depending on workloads.
          Figure 1 Adding a log policy

        3. Set Storage Type to Host Path or Container Path.

          Table 1 Configuring log policies

          Parameter

          @@ -135,7 +135,7 @@ spec:
          - @@ -146,8 +146,8 @@ spec: diff --git a/docs/cce/umn/cce_10_0026.html b/docs/cce/umn/cce_10_0026.html index cbb20eaf..152c4176 100644 --- a/docs/cce/umn/cce_10_0026.html +++ b/docs/cce/umn/cce_10_0026.html @@ -3,13 +3,13 @@

          Querying CTS Logs

          Scenario

          After you enable CTS, the system starts recording operations on CCE resources. Operation records of the last 7 days can be viewed on the CTS management console.

          -

          Procedure

          1. Log in to the management console.
          2. Click in the upper left corner and select a region.
          3. Choose Service List from the main menu. Choose Management & Deployment > Cloud Trace Service.
          4. In the navigation pane of the CTS console, choose Cloud Trace Service > Trace List.
          5. On the Trace List page, query operation records based on the search criteria. Currently, the trace list supports trace query based on the combination of the following search criteria:

            • Trace Source, Resource Type, and Search By

              Select the search criteria from the drop-down lists. Select CCE from the Trace Source drop-down list.

              +

              Procedure

              1. Log in to the management console.
              2. Click in the upper left corner and select a region.
              3. Choose Service List from the main menu. Choose Management & Deployment > Cloud Trace Service.
              4. In the navigation pane of the CTS console, choose Cloud Trace Service > Trace List.
              5. On the Trace List page, query operation records based on the search criteria. Currently, the trace list supports trace query based on the combination of the following search criteria:

                • Trace Source, Resource Type, and Search By

                  Select the search criteria from the drop-down lists. Select CCE from the Trace Source drop-down list.

                  If you select Trace name from the Search By drop-down list, specify the trace name.

                  If you select Resource ID from the Search By drop-down list, select or enter a specific resource ID.

                  If you select Resource name from the Search By drop-down list, select or enter a specific resource name.

                • Operator: Select a specific operator (at user level rather than account level).
                • Trace Status: Set this parameter to any of the following values: All trace statuses, normal, warning, and incident.
                • Time range: You can query traces generated during any time range in the last seven days.
                -

              6. Click on the left of a trace to expand its details, as shown below.

                Figure 1 Expanding trace details
                -

              7. Click View Trace in the Operation column. The trace details are displayed.

                Figure 2 Viewing event details
                +

              8. Click on the left of a trace to expand its details, as shown below.

                Figure 1 Expanding trace details
                +

              9. Click View Trace in the Operation column. The trace details are displayed.

                Figure 2 Viewing event details

          diff --git a/docs/cce/umn/cce_10_0028.html b/docs/cce/umn/cce_10_0028.html index 52c3ac5f..059e0b6b 100644 --- a/docs/cce/umn/cce_10_0028.html +++ b/docs/cce/umn/cce_10_0028.html @@ -3,7 +3,7 @@

          Creating a CCE Cluster

          On the CCE console, you can easily create Kubernetes clusters. Kubernetes can manage container clusters at scale. A cluster manages a group of node resources.

          In CCE, you can create a CCE cluster to manage VMs. By using high-performance network models, hybrid clusters provide a multi-scenario, secure, and stable runtime environment for containers.

          -

          Notes and Constraints

          • During the node creation, software packages are downloaded from OBS using the domain name. You need to use a private DNS server to resolve the OBS domain name, and configure the subnet where the node resides with a private DNS server address. When you create a subnet, the private DNS server is used by default. If you change the subnet DNS, ensure that the DNS server in use can resolve the OBS domain name.
          • You can create a maximum of 50 clusters in a single region.
          • After a cluster is created, the following items cannot be changed:
            • Cluster type
            • Number of master nodes in the cluster
            • AZ of a master node
            • Network configuration of the cluster, such as the VPC, subnet, container CIDR block, Service CIDR block, and kube-proxy (forwarding) settings
            • Network model. For example, change Tunnel network to VPC network.
            +

            Notes and Constraints

            • During the node creation, software packages are downloaded from OBS using the domain name. You need to use a private DNS server to resolve the OBS domain name, and configure the DNS server address of the subnet where the node resides with a private DNS server address. When you create a subnet, the private DNS server is used by default. If you change the subnet DNS, ensure that the DNS server in use can resolve the OBS domain name.
            • You can create a maximum of 50 clusters in a single region.
            • After a cluster is created, the following items cannot be changed:
              • Cluster type
              • Number of master nodes in the cluster
              • AZ of a master node
              • Network configuration of the cluster, such as the VPC, subnet, container CIDR block, Service CIDR block, and kube-proxy (forwarding) settings
              • Network model. For example, change Tunnel network to VPC network.

            Procedure

            1. Log in to the CCE console. Choose Clusters. On the displayed page, click Create next to CCE cluster.
            2. Set cluster parameters.

              Basic Settings
              • Cluster Name
              • Cluster Version: Select the Kubernetes version used by the cluster.
              • Cluster Scale: maximum number of nodes that can be managed by the cluster.
              • HA: distribution mode of master nodes. By default, master nodes are randomly distributed in different AZs to improve DR capabilities.
                You can also expand advanced settings and customize the master node distribution mode. The following two modes are supported:
                • Random: Master nodes are created in different AZs for DR.
                • Custom: You can determine the location of each master node.
                  • Host: Master nodes are created on different hosts in the same AZ.
                  • Custom: You can determine the location of each master node.
                  @@ -20,12 +20,14 @@
        4. Description: The value can contain a maximum of 200 English characters.
        5. -

        6. Click Next: Add-on Configuration.

          By default, cordens and everest add-ons are installed.

          -
          Service log
          • ICAgent:

            A log collector provided by Application Operations Management (AOM), reporting logs to AOM and Log Tank Service (LTS) according to the log collection rules you configured.

            -

            You can collect stdout logs as required.

            +

          • Click Next: Add-on Configuration.

            Domain Name Resolution: Uses the coredns add-on, installed by default, to resolve domain names and connect to the cloud DNS server.

            +

            Container Storage: Uses the everest add-on, installed by default, to provide container storage based on CSI and connect to cloud storage services such as EVS.

            +
            Service logs
            • Using ICAgent:

              A log collector provided by Application Operations Management (AOM), reporting logs to AOM and Log Tank Service (LTS) according to the log collection rules you configured.

              +

              You can collect stdout logs as required.

            -

          • After the parameters are specified, click Next: Confirm. The cluster resource list is displayed. Confirm the information and click Submit.

            It takes about 6 to 10 minutes to create a cluster. You can click Back to Cluster List to perform other operations on the cluster or click Go to Cluster Events to view the cluster details.

            +

            Overload Control: If overload control is enabled, concurrent requests are dynamically controlled based on the resource pressure of master nodes to keep them and the cluster available.

            +

          • After setting the parameters, click Next: Confirm. After confirming that the cluster configuration information is correct, select I have read and understand the preceding instructions and click Submit.

            It takes about 6 to 10 minutes to create a cluster. You can click Back to Cluster List to perform other operations on the cluster or click Go to Cluster Events to view the cluster details.

          Related Operations

          diff --git a/docs/cce/umn/cce_10_0031.html b/docs/cce/umn/cce_10_0031.html index a61780a4..4edbb64b 100644 --- a/docs/cce/umn/cce_10_0031.html +++ b/docs/cce/umn/cce_10_0031.html @@ -4,7 +4,7 @@

          Notes and Constraints

          • Deleting a node will lead to pod migration, which may affect services. Therefore, delete nodes during off-peak hours.
          • Unexpected risks may occur during node deletion. Back up related data in advance.
          • While the node is being deleted, the backend will set the node to the unschedulable state.
          • Only worker nodes can be stopped.
          -

          Procedure

          1. Log in to the CCE console and click the cluster name to access the cluster.
          2. In the navigation pane, choose Nodes. In the right pane, click the name of the node to be stopped.
          3. In the upper right corner of the ECS details page, click Stop in the instance status area. In the displayed dialog box, click Yes.

            Figure 1 ECS details page
            +

            Procedure

            1. Log in to the CCE console and click the cluster name to access the cluster.
            2. In the navigation pane, choose Nodes. In the right pane, click the name of the node to be stopped.
            3. In the upper right corner of the ECS details page, click Stop in the instance status area. In the displayed dialog box, click Yes.

              Figure 1 ECS details page

          diff --git a/docs/cce/umn/cce_10_0045.html b/docs/cce/umn/cce_10_0045.html index 6ae35260..f1d3a200 100644 --- a/docs/cce/umn/cce_10_0045.html +++ b/docs/cce/umn/cce_10_0045.html @@ -1,6 +1,6 @@ -

          Configuration Center

          +

          ConfigMaps and Secrets

        7. -

          Using the CCE Console

          1. Log in to the CCE console.
          2. Click the cluster name to access the cluster details page, choose Workloads in the navigation pane, and click the Create Workload in the upper right corner.
          3. Set basic information about the workload.

            Basic Info
            • Workload Type: Select Deployment. For details about workload types, see Overview.
            • Workload Name: Enter the name of the workload.
            • Namespace: Select the namespace of the workload. The default value is default. You can also click Create Namespace to create one. For details, see Creating a Namespace.
            • Pods: Enter the number of pods.
            • Container Runtime: A CCE cluster uses runC by default, whereas a CCE Turbo cluster supports both runC and Kata. For details about the differences between runC and Kata, see Kata Containers and Common Containers.
            • Time Zone Synchronization: Specify whether to enable time zone synchronization. After time zone synchronization is enabled, the container and node use the same time zone. The time zone synchronization function depends on the local disk mounted to the container. Do not modify or delete the time zone. For details, see Configuring Time Zone Synchronization.
            +

            Using the CCE Console

            1. Log in to the CCE console.
            2. Click the cluster name to access the cluster details page, choose Workloads in the navigation pane, and click the Create Workload in the upper right corner.
            3. Set basic information about the workload.

              Basic Info
              • Workload Type: Select Deployment. For details about workload types, see Overview.
              • Workload Name: Enter the name of the workload. Enter 1 to 63 characters starting with a lowercase letter and ending with a letter or digit. Only lowercase letters, digits, and hyphens (-) are allowed.
              • Namespace: Select the namespace of the workload. The default value is default. You can also click Create Namespace to create one. For details, see Creating a Namespace.
              • Pods: Enter the number of pods.
              • Container Runtime: A CCE cluster uses runC by default, whereas a CCE Turbo cluster supports both runC and Kata. For details about the differences between runC and Kata, see Kata Containers and Common Containers.
              • Time Zone Synchronization: Specify whether to enable time zone synchronization. After time zone synchronization is enabled, the container and node use the same time zone. The time zone synchronization function depends on the local disk mounted to the container. Do not modify or delete the time zone. For details, see Configuring Time Zone Synchronization.
              Container Settings
            -

            Using the CCE Console

            1. Log in to the CCE console.
            2. Click the cluster name to access the cluster details page, choose Workloads in the navigation pane, and click the Create Workload in the upper right corner.
            3. Set basic information about the workload.

              Basic Info
              • Workload Type: Select StatefulSet. For details about workload types, see Overview.
              • Workload Name: Enter the name of the workload.
              • Namespace: Select the namespace of the workload. The default value is default. You can also click Create Namespace to create one. For details, see Creating a Namespace.
              • Pods: Enter the number of pods.
              • Container Runtime: A CCE cluster uses runC by default, whereas a CCE Turbo cluster supports both runC and Kata. For details about the differences between runC and Kata, see Kata Containers and Common Containers.
              • Time Zone Synchronization: Specify whether to enable time zone synchronization. After time zone synchronization is enabled, the container and node use the same time zone. The time zone synchronization function depends on the local disk mounted to the container. Do not modify or delete the time zone. For details, see Configuring Time Zone Synchronization.
              +

              Using the CCE Console

              1. Log in to the CCE console.
              2. Click the cluster name to access the cluster details page, choose Workloads in the navigation pane, and click the Create Workload in the upper right corner.
              3. Set basic information about the workload.

                Basic Info
                • Workload Type: Select StatefulSet. For details about workload types, see Overview.
                • Workload Name: Enter the name of the workload. Enter 1 to 52 characters starting with a lowercase letter and ending with a letter or digit. Only lowercase letters, digits, and hyphens (-) are allowed.
                • Namespace: Select the namespace of the workload. The default value is default. You can also click Create Namespace to create one. For details, see Creating a Namespace.
                • Pods: Enter the number of pods.
                • Container Runtime: A CCE cluster uses runC by default, whereas a CCE Turbo cluster supports both runC and Kata. For details about the differences between runC and Kata, see Kata Containers and Common Containers.
                • Time Zone Synchronization: Specify whether to enable time zone synchronization. After time zone synchronization is enabled, the container and node use the same time zone. The time zone synchronization function depends on the local disk mounted to the container. Do not modify or delete the time zone. For details, see Configuring Time Zone Synchronization.
                Container Settings
                • Container Information
                  Multiple containers can be configured in a pod. You can click Add Container on the right to configure multiple containers for the pod.
                  • Basic Info: See Setting Basic Container Information.
                  • Lifecycle: See Setting Container Lifecycle Parameters.
                  • Health Check: See Setting Health Check for a Container.
                  • Environment Variables: See Setting an Environment Variable.
                  • Data Storage: See Overview.
                    • StatefulSets support dynamically provisioned EVS volumes.

                      Dynamic mounting is achieved by using the volumeClaimTemplates field and depends on the dynamic creation capability of StorageClass. A StatefulSet associates each pod with a unique PVC using the volumeClaimTemplates field, and the PVCs are bound to their corresponding PVs. Therefore, after the pod is rescheduled, the original data can still be mounted thanks to the PVC.

                    • After a workload is created, the storage that is dynamically mounted cannot be updated.
                    @@ -26,7 +26,7 @@

                    You can also create a Service after creating a workload. For details about the Service, see Service Overview.

                    Advanced Settings
                    • Upgrade: See Configuring the Workload Upgrade Policy.
                    • Scheduling: See Scheduling Policy (Affinity/Anti-affinity).
                    • Instances Management Policies

                      For some distributed systems, the StatefulSet sequence is unnecessary and/or should not occur. These systems require only uniqueness and identifiers.

                      • OrderedReady: The StatefulSet will deploy, delete, or scale pods in order and one by one. (The StatefulSet continues only after the previous pod is ready or deleted.) This is the default policy.
                      • Parallel: The StatefulSet will create pods in parallel to match the desired scale without waiting, and will delete all pods at once.
                      -
                    • Toleration: Using both taints and tolerations allows (not forcibly) the pod to be scheduled to a node with the matching taints, and controls the pod eviction policies after the node where the pod is located is tainted. For details, see Tolerations.
                    • Labels and Annotations: See Pod Labels and Annotations.
                    • DNS: See DNS Configuration.
                    +
                  • Toleration: Using both taints and tolerations allows (not forcibly) the pod to be scheduled to a node with the matching taints, and controls the pod eviction policies after the node where the pod is located is tainted. For details, see Tolerations.
                  • Labels and Annotations: See Pod Labels and Annotations.
                  • DNS: See DNS Configuration.

                • Click Create Workload in the lower right corner.
              diff --git a/docs/cce/umn/cce_10_0054.html b/docs/cce/umn/cce_10_0054.html new file mode 100644 index 00000000..4bc4d0d1 --- /dev/null +++ b/docs/cce/umn/cce_10_0054.html @@ -0,0 +1,322 @@ + + +

              High-Risk Operations and Solutions

              +

              During service deployment or running, you may trigger high-risk operations at different levels, causing service faults or interruption. To help you better estimate and avoid operation risks, this section introduces the consequences and solutions of high-risk operations from multiple dimensions, such as clusters, nodes, networking, load balancing, logs, and EVS disks.

              +

              Clusters and Nodes

              +
          Table 2 Parameter description

          Parameter

          Explanation

          +

          Description

          Description

          Extended host path

          Extended host paths contain pod IDs or container names to distinguish different containers into which the host path is mounted.

          -

          A level-3 directory is added to the original volume directory/subdirectory. You can easily obtain the files output by a single Pod.

          -
          • None: No extended path is configured.
          • PodUID: ID of a pod.
          • PodName: name of a pod.
          • PodUID/ContainerName: ID of a pod or name of a container.
          • PodName/ContainerName: name of a pod or container.
          +

          A level-3 directory is added to the original volume directory/subdirectory. You can easily obtain the files output by a single Pod.

          +
          • None: No extended path is configured.
          • PodUID: ID of a pod.
          • PodName: name of a pod.
          • PodUID/ContainerName: ID of a pod or name of a container.
          • PodName/ContainerName: name of a pod or container.

          policy.logs.rotate

          @@ -155,7 +155,7 @@ spec:

          Log dump

          Log dump refers to rotating log files on a local host.

          -
          • Enabled: AOM scans log files every minute. When a log file exceeds 50 MB, it is dumped immediately. A new .zip file is generated in the directory where the log file locates. For a log file, AOM stores only the latest 20 .zip files. When the number of .zip files exceeds 20, earlier .zip files will be deleted. After the dump is complete, the log file in AOM will be cleared.
          • Disabled: AOM does not dump log files.
          +
          • Enabled: AOM scans log files every minute. When a log file exceeds 50 MB, it is dumped immediately. A new .zip file is generated in the directory where the log file locates. For a log file, AOM stores only the latest 20 .zip files. When the number of .zip files exceeds 20, earlier .zip files will be deleted. After the dump is complete, the log file in AOM will be cleared.
          • Disabled: AOM does not dump log files.
          NOTE:
          • AOM rotates log files using copytruncate. Before enabling log dumping, ensure that log files are written in the append mode. Otherwise, file holes may occur.
          • Currently, mainstream log components such as Log4j and Logback support log file rotation. If you have set rotation for log files, skip the configuration. Otherwise, conflicts may occur.
          • You are advised to configure log file rotation for your own services to flexibly control the size and number of rolled files.
          + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Table 1 High-risk operations and solutions

          Category

          +

          Operation

          +

          Impact

          +

          Solution

          +

          Master node

          +

          Modifying the security group of a node in a cluster

          +

          The master node may be unavailable.

          +
          NOTE:

          Naming rule of a master node: Cluster name-cce-control-Random number

          +
          +

          Restore the security group by referring to the security group of the new cluster and allow traffic from the security group to pass through.

          +

          Letting the node expire or destroying the node

          +

          The master node will be unavailable.

          +

          This operation cannot be undone.

          +

          Reinstalling the OS

          +

          Components on the master node will be deleted.

          +

          This operation cannot be undone.

          +

          Upgrading components on the master or etcd node

          +

          The cluster may be unavailable.

          +

          Roll back to the original version.

          +

          Deleting or formatting core directory data such as /etc/kubernetes on the node

          +

          The master node will be unavailable.

          +

          This operation cannot be undone.

          +

          Changing the node IP address

          +

          The master node will be unavailable.

          +

          Change the IP address back to the original one.

          +

          Modifying parameters of core components (such as etcd, kube-apiserver, and docker)

          +

          The master node may be unavailable.

          +

          Restore the parameter settings to the recommended values. For details, see Cluster Configuration Management.

          +

          Replacing the master or etcd certificate

          +

          The cluster may become unavailable.

          +

          This operation cannot be undone.

          +

          Worker node

          +

          Modifying the security group of a node in a cluster

          +

          The node may be unavailable.

          +
          NOTE:

          Naming rule of a worker node: Cluster name-cce-node-Random number

          +
          +

          Restore the security group by referring to Creating a CCE Cluster and allow traffic from the security group to pass through.

          +

          Deleting the node

          +

          The node will become unavailable.

          +

          This operation cannot be undone.

          +

          Reinstalling the OS

          +

          Node components are deleted, and the node becomes unavailable.

          +

          Reset the node. For details, see Resetting a Node.

          +

          Upgrading the node kernel

          +

          The node may be unavailable or the network may be abnormal.

          +
          NOTE:

          Node running depends on the system kernel version. Do not use the yum update command to update or reinstall the operating system kernel of a node unless necessary. (Reinstalling the operating system kernel using the original image or other images is a risky operation.)

          +
          +

          For details, see Resetting a Node.

          +

          Changing the node IP address

          +

          The node will become unavailable.

          +

          Change the IP address back to the original one.

          +

          Modifying parameters of core components (such as kubelet and kube-proxy)

          +

          The node may become unavailable, and components may be insecure if security-related configurations are modified.

          +

          Restore the parameter settings to the recommended values. For details, see Configuring a Node Pool.

          +

          Modifying OS configuration

          +

          The node may be unavailable.

          +

          Restore the configuration items or reset the node. For details, see Resetting a Node.

          +

          Deleting or modifying the /opt/cloud/cce and /var/paas directories, and delete the data disk.

          +

          The node will become unready.

          +

          You can reset the node. For details, see Resetting a Node.

          +

          Modifying the node directory permission and the container directory permission

          +

          The permissions will be abnormal.

          +

          You are not advised to modify the permissions. Restore the permissions if they are modified.

          +

          Formatting or partitioning system disks, Docker disks, and kubelet disks on nodes.

          +

          The node may be unavailable.

          +

          You can reset the node. For details, see Resetting a Node.

          +

          Installing other software on nodes

          +

          This may cause exceptions on Kubernetes components installed on the node, and make the node unavailable.

          +

          Uninstall the software that has been installed and restore or reset the node. For details, see Resetting a Node.

          +

          Modifying NetworkManager configurations

          +

          The node will become unavailable.

          +

          Reset the node. For details, see Resetting a Node.

          +

          Delete system images such as cfe-pause from the node.

          +

          Containers cannot be created and system images cannot be pulled.

          +

          Copy the image from another normal node for restoration.

          +
          +
          + +

          Networking and Load Balancing

          +
          + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Table 2 High-risk operations and solutions

          Operation

          +

          Impact

          +

          How to Avoid/Fix

          +

          Changing the value of the kernel parameter net.ipv4.ip_forward to 0

          +

          The network becomes inaccessible.

          +

          Change the value to 1.

          +

          Changing the value of the kernel parameter net.ipv4.tcp_tw_recycle to 1

          +

          The NAT service becomes abnormal.

          +

          Change the value to 0.

          +

          Changing the value of the kernel parameter net.ipv4.tcp_tw_reuse to 1

          +

          The network becomes abnormal.

          +

          Change the value to 0.

          +

          Not configuring the node security group to allow UDP packets to pass through port 53 of the container CIDR block

          +

          The DNS in the cluster cannot work properly.

          +

          Restore the security group by referring to Creating a CCE Cluster and allow traffic from the security group to pass through.

          +

          Creating a custom listener on the ELB console for the load balancer managed by CCE

          +

          The modified items are reset by CCE or the ingress is faulty.

          +

          Use the YAML file of the Service to automatically create a listener.

          +

          Binding a user-defined backend on the ELB console to the load balancer managed by CCE.

          +

          Do not manually bind any backend.

          +

          Changing the ELB certificate on the ELB console for the load balancer managed by CCE.

          +

          Use the YAML file of the ingress to automatically manage certificates.

          +

          Changing the listener name on the ELB console for the ELB listener managed by CCE.

          +

          Do not change the name of the ELB listener managed by CCE.

          +

          Changing the description of load balancers, listeners, and forwarding policies managed by CCE on the ELB console.

          +

          Do not modify the description of load balancers, listeners, or forwarding policies managed by CCE.

          +

          Delete CRD resources of network-attachment-definitions of default-network.

          +

          The container network is disconnected, or the cluster fails to be deleted.

          +

          If the resources are deleted by mistake, use the correct configurations to create the default-network resources.

          +
          +
          +
          +

          Logs

          +
          + + + + + + + + + + + + + +
          Table 3 High-risk operations and solutions

          Operation

          +

          Impact

          +

          Solution

          +

          Deleting the /tmp/ccs-log-collector/pos directory on the host machine

          +

          Logs are collected repeatedly.

          +

          None

          +

          Deleting the /tmp/ccs-log-collector/buffer directory of the host machine

          +

          Logs are lost.

          +

          None

          +
          +
          +
          +

          EVS Disks

          +
          + + + + + + + + + + + + + + + + + + + + + +
          Table 4 High-risk operations and solutions

          Operation

          +

          Impact

          +

          Solution

          +

          Remarks

          +

          Manually unmounting an EVS disk on the console

          +

          An I/O error is reported when the pod data is being written into the disk.

          +

          Delete the mount path from the node and schedule the pod again.

          +

          The file in the pod records the location where files are to be collected.

          +

          Unmounting the disk mount path on the node

          +

          Pod data is written into a local disk.

          +

          Remount the corresponding path to the pod.

          +

          The buffer contains log cache files to be consumed.

          +

          Operating EVS disks on the node

          +

          Pod data is written into a local disk.

          +

          None

          +

          None

          +
          +
          +
          + + diff --git a/docs/cce/umn/cce_10_0059.html b/docs/cce/umn/cce_10_0059.html index 0b1f95a4..0152de2d 100644 --- a/docs/cce/umn/cce_10_0059.html +++ b/docs/cce/umn/cce_10_0059.html @@ -1,41 +1,70 @@

          Network Policies

          -

          NetworkPolicy is a Kubernetes object used to restrict pod access. In CCE, by setting network policies, you can define ingress rules specifying the addresses to access pods or egress rules specifying the addresses pods can access. This is equivalent to setting up a firewall at the application layer to further ensure network security.

          -

          Network policies depend on the networking add-on of the cluster to which the policies apply.

          +

          Network policies are designed by Kubernetes to restrict pod access. It is equivalent to a firewall at the application layer to enhance network security. The capabilities supported by network policies depend on the capabilities of the network add-ons of the cluster.

          By default, if a namespace does not have any policy, pods in the namespace accept traffic from any source and send traffic to any destination.

          Network policy rules are classified into the following types:

          • namespaceSelector: selects particular namespaces for which all pods should be allowed as ingress sources or egress destinations.
          • podSelector: selects particular pods in the same namespace as the network policy which should be allowed as ingress sources or egress destinations.
          • ipBlock: selects particular IP blocks to allow as ingress sources or egress destinations. (Only egress rules support IP blocks.)
          -

          Notes and Constraints

          • Only clusters that use the tunnel network model support network policies.
          • Network isolation is not supported for IPv6 addresses.
          • Network policies do not support egress rules except for clusters of v1.23 or later.

            Egress rules are supported only in the following operating systems:

            -
            • EulerOS 2.9: kernel version 4.18.0-147.5.1.6.h541.eulerosv2r9.x86_64
            • CentOS 7.7: kernel version 3.10.0-1062.18.1.el7.x86_64
            • EulerOS 2.5: kernel version 3.10.0-862.14.1.5.h591.eulerosv2r7.x86_64
            -
          • If a cluster is upgraded to v1.23 in in-place mode, you cannot use egress rules because the node OS is not upgraded. In this case, reset the node.
          +

          Notes and Constraints

          • Only clusters that use the tunnel network model support network policies. Network policies are classified into the following types:
            • Ingress: All versions support this type.
            • Egress: Only clusters of v1.23 or later support egress rules.

              Egress rules are supported only in the following OSs:

              + +
              + + + + + + + + + + + + + +

              OS

              +

              Verified Kernel Version

              +

              CentOS

              +

              3.10.0-1062.18.1.el7.x86_64

              +

              3.10.0-1127.19.1.el7.x86_64

              +

              3.10.0-1160.25.1.el7.x86_64

              +

              3.10.0-1160.76.1.el7.x86_64

              +

              EulerOS 2.5

              +

              3.10.0-862.14.1.5.h591.eulerosv2r7.x86_64

              +

              3.10.0-862.14.1.5.h687.eulerosv2r7.x86_64

              +

              EulerOS 2.9

              +

              4.18.0-147.5.1.6.h541.eulerosv2r9.x86_64

              +

              4.18.0-147.5.1.6.h766.eulerosv2r9.x86_64

              +
              -

              Using Ingress Rules

              • Using podSelector to specify the access scope
                apiVersion: networking.k8s.io/v1
                +
              +
            • Network isolation is not supported for IPv6 addresses.
            • If a cluster is upgraded to v1.23 in in-place mode, you cannot use egress rules because the node OS is not upgraded. In this case, reset the node.
            +
          +

          Using Ingress Rules

          • Using podSelector to specify the access scope
            apiVersion: networking.k8s.io/v1
             kind: NetworkPolicy
             metadata:
               name: test-network-policy
               namespace: default
             spec:
            -  podSelector:                  # The rule takes effect for pods with the role=db label.
            +  podSelector:                  # The rule takes effect for pods with the role=db label.
                 matchLabels:
                   role: db
               ingress:                      #This is an ingress rule.
               - from:
            -    - podSelector:              #Only traffic from the pods with the role=frontend label is allowed.
            +    - podSelector:              #Only traffic from the pods with the "role=frontend" label is allowed.
                     matchLabels:
                       role: frontend
                 ports:                      #Only TCP can be used to access port 6379.
                 - protocol: TCP
                   port: 6379
            -

            Diagram:

            -
            Figure 1 podSelector
            +

            See the following figure.

            +
            Figure 1 podSelector
          -
          • Using namespaceSelector to specify the access scope
            apiVersion: networking.k8s.io/v1
            +
            • Using namespaceSelector to specify the access scope
              apiVersion: networking.k8s.io/v1
               kind: NetworkPolicy
               metadata:
                 name: test-network-policy
               spec:
              -  podSelector:                  # The rule takes effect for pods with the role=db label.
              +  podSelector:                  # The rule takes effect for pods with the role=db label.
                   matchLabels:
                     role: db
                 ingress:                      #This is an ingress rule.
              @@ -46,8 +75,8 @@ spec:
                   ports:                      #Only TCP can be used to access port 6379.
                   - protocol: TCP
                     port: 6379
              -

              Figure 2 shows how namespaceSelector selects ingress sources.

              -
              Figure 2 namespaceSelector
              +

              See the following figure.

              +
              Figure 2 namespaceSelector

          Using Egress Rules

          Egress supports not only podSelector and namespaceSelector, but also ipBlock.

          @@ -61,7 +90,7 @@ metadata: spec: policyTypes: # Must be specified for an egress rule. - Egress - podSelector: # The rule takes effect for pods with the role=db label. + podSelector: # The rule takes effect for pods with the role=db label. matchLabels: role: db egress: # Egress rule @@ -69,9 +98,9 @@ spec: - ipBlock: cidr: 172.16.0.16/16 # Allow access to this CIDR block. except: - - 172.16.0.40/32 # This CIDR block cannot be accessed. This value must fall within the range specified by cidr. -

          Diagram:

          -
          Figure 3 ipBlock
          + - 172.16.0.40/32 # This CIDR block cannot be accessed. This value must fall within the range specified by cidr. +

          The following figure shows how to use ingress and egress together.

          +
          Figure 3 ipBlock

          You can define ingress and egress in the same rule.

          apiVersion: networking.k8s.io/v1
           kind: NetworkPolicy
          @@ -82,7 +111,7 @@ spec:
             policyTypes:
             - Ingress
             - Egress
          -  podSelector:                  # The rule takes effect for pods with the role=db label.
          +  podSelector:                  # The rule takes effect for pods with the role=db label.
               matchLabels:
                 role: db
             ingress:                      # Ingress rule
          @@ -95,64 +124,64 @@ spec:
                 port: 6379
             egress:                       # Egress rule
             - to:
          -    - podSelector:              # Only pods with the role=web label can be accessed.
          +    - podSelector:              # Only pods with the role=web label can be accessed.
                   matchLabels:
                     role: web
          -

          Diagram:

          -
          Figure 4 Using both ingress and egress
          +

          The following figure shows how to use ingress and egress together.

          +
          Figure 4 Using both ingress and egress
          -

          Creating a Network Policy on the Console

          1. Log in to the CCE console and access the cluster console.
          2. Choose Networking in the navigation pane, click the Network Policies tab, and click Create Network Policy in the upper right corner.

            • Policy Name: Specify a network policy name.
            • Namespace: Select a namespace in which the network policy is applied.
            • Selector: Enter a label, select the pod to be associated, and click Add. You can also click Reference Workload Label to reference the label of an existing workload.
            • Inbound Rule: Click to add an inbound rule. For details about parameter settings, see Table 1.

              -
              -
              Table 1 Adding an inbound rule

              Parameter

              +

              Creating a Network Policy on the Console

              1. Log in to the CCE console and access the cluster console.
              2. Choose Networking in the navigation pane, click the Network Policies tab, and click Create Network Policy in the upper right corner.

                • Policy Name: Specify a network policy name.
                • Namespace: Select a namespace in which the network policy is applied.
                • Selector: Enter a label, select the pod to be associated, and click Add. You can also click Reference Workload Label to reference the label of an existing workload.
                • Inbound Rule: Click to add an inbound rule. For details about parameter settings, see Table 1.

                  +
                  +
                  - - - - - - -
                  Table 1 Adding an inbound rule

                  Parameter

                  Description

                  +

                  Description

                  Protocol & Port

                  +

                  Protocol & Port

                  Select the protocol type and port. Currently, TCP and UDP are supported.

                  +

                  Select the protocol type and port. Currently, TCP and UDP are supported.

                  Source Namespace

                  +

                  Source Namespace

                  Select a namespace whose objects can be accessed. If this parameter is not specified, the source object belongs to the same namespace as the current policy.

                  +

                  Select a namespace whose objects can be accessed. If this parameter is not specified, the object belongs to the same namespace as the current policy.

                  Source Pod Label

                  +

                  Source Pod Label

                  Allow access to the pods with this label, if not specified, all pods in the namespace can be accessed.

                  +

                  Allow accessing the pods with this label. If this parameter is not specified, all pods in the namespace can be accessed.

                  -
                • Outbound Rule: Click to add an outbound rule. For details about parameter settings, see Table 1.
                  -
                  Table 2 Adding an outbound rule

                  Parameter

                  +
                • Outbound Rule: Click to add an outbound rule. For details about parameter settings, see Table 1.
                  +
                  - - - - - - - - - diff --git a/docs/cce/umn/cce_10_0063.html b/docs/cce/umn/cce_10_0063.html index 606aaad6..cc6e8c60 100644 --- a/docs/cce/umn/cce_10_0063.html +++ b/docs/cce/umn/cce_10_0063.html @@ -4,7 +4,7 @@

                  Scenario

                  After a node scaling policy is created, you can delete, edit, disable, enable, or clone the policy.

                  Viewing a Node Scaling Policy

                  You can view the associated node pool, rules, and scaling history of a node scaling policy and rectify faults according to the error information displayed.

                  -
                  1. Log in to the CCE console and access the cluster console.
                  2. Choose Node Scaling in the navigation pane and click in front of the policy to be viewed.
                  3. In the expanded area, the Associated Node Pools, Rules, and Scaling History tab pages are displayed. If the policy is abnormal, locate and rectify the fault based on the error information.

                    You can also disable or enable auto scaling on the Node Pools page.

                    +
                    1. Log in to the CCE console and access the cluster console.
                    2. Choose Node Scaling in the navigation pane and click in front of the policy to be viewed.
                    3. In the expanded area, the Associated Node Pools, Rules, and Scaling History tab pages are displayed. If the policy is abnormal, locate and rectify the fault based on the error information.

                      You can also disable or enable auto scaling on the Node Pools page.

                      1. Log in to the CCE console and access the cluster console.
                      2. In the navigation pane, choose Nodes and switch to the Node Pools tab page.
                      3. Click Edit of the node pool to be operated. In the Edit Node Pool dialog box that is displayed, set the limits of the number of nodes.

                    diff --git a/docs/cce/umn/cce_10_0066.html b/docs/cce/umn/cce_10_0066.html index 05b49acb..6c31dbac 100644 --- a/docs/cce/umn/cce_10_0066.html +++ b/docs/cce/umn/cce_10_0066.html @@ -14,6 +14,7 @@
                  +

                • Whether to deploy the add-on instance across multiple AZs.

                  • Preferred: Deployment pods of the add-on are preferentially scheduled to nodes in different AZs. If the nodes in the cluster do not meet the requirements of multiple AZs, the pods are scheduled to a single AZ.
                  • Required: Deployment pods of the add-on are forcibly scheduled to nodes in different AZs. If the nodes in the cluster do not meet the requirements of multiple AZs, not all pods can run.

                • Set related parameters.

                  In everest 1.2.26 or later, the performance of attaching a large number of EVS volumes is optimized. The following three parameters are provided:
                  • csi_attacher_worker_threads: number of workers that can concurrently mount EVS volumes. The default value is 60.
                  • csi_attacher_detach_worker_threads: number of workers that can concurrently unmount EVS volumes. The default value is 60.
                  • volume_attaching_flow_ctrl: maximum number of EVS volumes that can be mounted by the everest add-on within one minute. The default value is 0, indicating that the EVS volume mounting performance is determined by the underlying storage resources.

                  The preceding three parameters are associated with each other and are constrained by the underlying storage resources in the region where the cluster is located. If you want to mount a large number of volumes (more than 500 EVS volumes per minute), you can contact the customer service personnel and configure the parameters under their guidance to prevent the everest add-on from running abnormally due to improper parameter settings.

                  diff --git a/docs/cce/umn/cce_10_0083.html b/docs/cce/umn/cce_10_0083.html index ab9defe2..68cd8616 100644 --- a/docs/cce/umn/cce_10_0083.html +++ b/docs/cce/umn/cce_10_0083.html @@ -4,7 +4,7 @@

                  Scenario

                  After an HPA policy is created, you can update, clone, edit, and delete the policy, as well as edit the YAML file.

                  Checking an HPA Policy

                  You can view the rules, status, and events of an HPA policy and handle exceptions based on the error information displayed.

                  -
                  1. Log in to the CCE console and access the cluster console.
                  2. In the navigation pane, choose Workload Scaling. On the HPA Policies tab page, click next to the target HPA policy.
                  3. In the expanded area, you can view the Rules, Status, and Events tab pages. If the policy is abnormal, locate and rectify the fault based on the error information.

                    You can also view the created HPA policy on the workload details page.

                    +
                    1. Log in to the CCE console and access the cluster console.
                    2. In the navigation pane, choose Workload Scaling. On the HPA Policies tab page, click next to the target HPA policy.
                    3. In the expanded area, you can view the Rules, Status, and Events tab pages. If the policy is abnormal, locate and rectify the fault based on the error information.

                      You can also view the created HPA policy on the workload details page.

                      1. Log in to the CCE console and access the cluster console.
                      2. In the navigation pane, choose Workloads. Click the workload name to view its details.
                      3. On the workload details page, swich to the Auto Scaling tab page to view the HPA policies. You can also view the scaling policies you configured in Workload Scaling.
                      diff --git a/docs/cce/umn/cce_10_0094.html b/docs/cce/umn/cce_10_0094.html index eb548c61..4b033a72 100644 --- a/docs/cce/umn/cce_10_0094.html +++ b/docs/cce/umn/cce_10_0094.html @@ -3,14 +3,14 @@

                      Ingress Overview

                      Why We Need Ingresses

                      A Service is generally used to forward access requests based on TCP and UDP and provide layer-4 load balancing for clusters. However, in actual scenarios, if there is a large number of HTTP/HTTPS access requests on the application layer, the Service cannot meet the forwarding requirements. Therefore, the Kubernetes cluster provides an HTTP-based access mode, that is, ingress.

                      An ingress is an independent resource in the Kubernetes cluster and defines rules for forwarding external access traffic. As shown in Figure 1, you can customize forwarding rules based on domain names and URLs to implement fine-grained distribution of access traffic.

                      -
                      Figure 1 Ingress diagram
                      +
                      Figure 1 Ingress diagram

                      The following describes the ingress-related definitions:

                      • Ingress object: a set of access rules that forward requests to specified Services based on domain names or URLs. It can be added, deleted, modified, and queried by calling APIs.
                      • Ingress Controller: an executor for request forwarding. It monitors the changes of resource objects such as ingresses, Services, endpoints, secrets (mainly TLS certificates and keys), nodes, and ConfigMaps in real time, parses rules defined by ingresses, and forwards requests to the corresponding backend Services.

                      Working Principle of ELB Ingress Controller

                      ELB Ingress Controller developed by CCE implements layer-7 network access for the internet and intranet (in the same VPC) based on ELB and distributes access traffic to the corresponding Services using different URLs.

                      ELB Ingress Controller is deployed on the master node and bound to the load balancer in the VPC where the cluster resides. Different domain names, ports, and forwarding policies can be configured for the same load balancer (with the same IP address). Figure 2 shows the working principle of ELB Ingress Controller.

                      1. A user creates an ingress object and configures a traffic access rule in the ingress, including the load balancer, URL, SSL, and backend service port.
                      2. When Ingress Controller detects that the ingress object changes, it reconfigures the listener and backend server route on the ELB side according to the traffic access rule.
                      3. When a user accesses a workload, the traffic is forwarded to the corresponding backend service port based on the forwarding policy configured on ELB, and then forwarded to each associated workload through the Service.
                      -
                      Figure 2 Working principle of ELB Ingress Controller
                      +
                      Figure 2 Working principle of ELB Ingress Controller
                      diff --git a/docs/cce/umn/cce_10_0107.html b/docs/cce/umn/cce_10_0107.html index c4a99c05..b99f471b 100644 --- a/docs/cce/umn/cce_10_0107.html +++ b/docs/cce/umn/cce_10_0107.html @@ -12,15 +12,18 @@

                    Download kubectl and the configuration file. Copy the file to your client, and configure kubectl. After the configuration is complete, you can access your Kubernetes clusters. Procedure:

                    -
                    1. Download kubectl.

                      On the Kubernetes release page, click the corresponding link based on the cluster version, click Client Binaries, and download the corresponding platform software package. Alternatively, you can install kubectl with curl following the guide in Install Tools.
                      Figure 1 Downloading kubectl
                      -
                      +
                      1. Download kubectl.

                        Prepare a computer that can access the public network and install kubectl in CLI mode. You can run the kubectl version command to check whether kubectl has been installed. If kubectl has been installed, skip this step.

                        +

                        This section uses the Linux environment as an example to describe how to install and configure kubectl. For details, see Installing kubectl.

                        +
                        1. Log in to your client and download kubectl.
                          cd /home
                          +curl -LO https://dl.k8s.io/release/{v1.25.0}/bin/linux/amd64/kubectl
                          +

                          {v1.25.0} specifies the version number. Replace it as required.

                          +
                        2. Install kubectl.
                          chmod +x kubectl
                          +mv -f kubectl /usr/local/bin
                          +

                      2. Obtain the kubectl configuration file (kubeconfig).

                        On the Connection Information pane on the cluster details page, click Learn more next to kubectl. On the window displayed, download the configuration file.

                        • The kubectl configuration file kubeconfig.json is used for cluster authentication. If the file is leaked, your clusters may be attacked.
                        • By default, two-way authentication is disabled for domain names in the current cluster. You can run the kubectl config use-context externalTLSVerify command to enable two-way authentication. For details, see Two-Way Authentication for Domain Names. For a cluster that has been bound to an EIP, if the authentication fails (x509: certificate is valid) when two-way authentication is used, you need to bind the EIP again and download kubeconfig.json again.
                        • The Kubernetes permissions assigned by the configuration file downloaded by IAM users are the same as those assigned to the IAM users on the CCE console.
                        • If the KUBECONFIG environment variable is configured in the Linux OS, kubectl preferentially loads the KUBECONFIG environment variable instead of $home/.kube/config.
                        -

                      3. Configure kubectl.

                        Install and configure kubectl (A Linux OS is used as an example).
                        1. Copy the kubectl downloaded in 1 and the configuration file downloaded in 2 to the /home directory on your client.
                        2. Log in to your client and configure kubectl. If you have installed kubectl, skip this step.
                          cd /home
                          -chmod +x kubectl
                          -mv -f kubectl /usr/local/bin
                          -
                        3. Log in to your client and configure the kubeconfig file.
                          cd /home
                          +

                        4. Configure kubectl.

                          Configure kubectl (A Linux OS is used).
                          1. Log in to your client and copy the kubeconfig.json configuration file downloaded in 2 to the /home directory on your client.
                          2. Configure the kubectl authentication file.
                            cd /home
                             mkdir -p $HOME/.kube
                             mv -f kubeconfig.json $HOME/.kube/config
                          3. Switch the kubectl access mode based on service scenarios.
                            • Run this command to enable intra-VPC access:
                              kubectl config use-context internal
                              @@ -33,12 +36,16 @@ mv -f kubeconfig.json $HOME/.kube/config

                          Two-Way Authentication for Domain Names

                          Currently, CCE supports two-way authentication for domain names.

                          -
                          • Two-way authentication is disabled for domain names by default. You can run the kubectl config use-context externalTLSVerify command to switch to the externalTLSVerify context to enable it.
                          • When an EIP is bound to or unbound from a cluster, or a custom domain name is configured or updated, the cluster server certificate will be added the latest cluster access address (including the EIP bound to the cluster and all custom domain names configured for the cluster).
                          • Asynchronous cluster synchronization takes about 5 to 10 minutes. You can view the synchronization result in Synchronize Certificate in Operation Records.
                          • For a cluster that has been bound to an EIP, if the authentication fails (x509: certificate is valid) when two-way authentication is used, you need to bind the EIP again and download kubeconfig.json again.
                          • If the domain name two-way authentication is not supported, kubeconfig.json contains the "insecure-skip-tls-verify": true field, as shown in Figure 2. To use two-way authentication, you can download the kubeconfig.json file again and enable two-way authentication for the domain names.
                            Figure 2 Two-way authentication disabled for domain names
                            +
                            • Two-way authentication is disabled for domain names by default. You can run the kubectl config use-context externalTLSVerify command to switch to the externalTLSVerify context to enable it.
                            • When an EIP is bound to or unbound from a cluster, or a custom domain name is configured or updated, the cluster server certificate will be added the latest cluster access address (including the EIP bound to the cluster and all custom domain names configured for the cluster).
                            • Asynchronous cluster synchronization takes about 5 to 10 minutes. You can view the synchronization result in Synchronize Certificate in Operation Records.
                            • For a cluster that has been bound to an EIP, if the authentication fails (x509: certificate is valid) when two-way authentication is used, you need to bind the EIP again and download kubeconfig.json again.
                            • If the domain name two-way authentication is not supported, kubeconfig.json contains the "insecure-skip-tls-verify": true field, as shown in Figure 1. To use two-way authentication, you can download the kubeconfig.json file again and enable two-way authentication for the domain names.
                              Figure 1 Two-way authentication disabled for domain names
                          -

                          Common Issue (Error from server Forbidden)

                          When you use kubectl to create or query Kubernetes resources, the following output is returned:

                          -

                          # kubectl get deploy Error from server (Forbidden): deployments.apps is forbidden: User "0c97ac3cb280f4d91fa7c0096739e1f8" cannot list resource "deployments" in API group "apps" in the namespace "default"

                          +

                          Common Issues

                          • Error from server Forbidden

                            When you use kubectl to create or query Kubernetes resources, the following output is returned:

                            +
                            # kubectl get deploy Error from server (Forbidden): deployments.apps is forbidden: User "0c97ac3cb280f4d91fa7c0096739e1f8" cannot list resource "deployments" in API group "apps" in the namespace "default"

                            The cause is that the user does not have the permissions to operate the Kubernetes resources. For details about how to assign permissions, see Namespace Permissions (Kubernetes RBAC-based).

                            +
                          • The connection to the server localhost:8080 was refused

                            When you use kubectl to create or query Kubernetes resources, the following output is returned:

                            +
                            The connection to the server localhost:8080 was refused - did you specify the right host or port?
                            +

                            The cause is that cluster authentication is not configured for the kubectl client. For details, see 3.

                            +
                          diff --git a/docs/cce/umn/cce_10_0112.html b/docs/cce/umn/cce_10_0112.html index 3634d501..ebd4ffe8 100644 --- a/docs/cce/umn/cce_10_0112.html +++ b/docs/cce/umn/cce_10_0112.html @@ -3,7 +3,7 @@

                          Setting Health Check for a Container

                          Scenario

                          Health check regularly checks the health status of containers during container running. If the health check function is not configured, a pod cannot detect application exceptions or automatically restart the application to restore it. This will result in a situation where the pod status is normal but the application in the pod is abnormal.

                          Kubernetes provides the following health check probes:

                          -
                          • Liveness probe (livenessProbe): checks whether a container is still alive. It is similar to the ps command that checks whether a process exists. If the liveness check of a container fails, the cluster restarts the container. If the liveness check is successful, no operation is executed.
                          • Readiness probe (readinessProbe): checks whether a container is ready to process user requests. Upon that the container is detected unready, service traffic will not be directed to the container. It may take a long time for some applications to start up before they can provide services. This is because that they need to load disk data or rely on startup of an external module. In this case, the application process is running, but the application cannot provide services. To address this issue, this health check probe is used. If the container readiness check fails, the cluster masks all requests sent to the container. If the container readiness check is successful, the container can be accessed.
                          • Startup probe (startupProbe): checks when a container application has started. If such a probe is configured, it disables liveness and readiness checks until it succeeds, ensuring that those probes do not interfere with the application startup. This can be used to adopt liveness checks on slow starting containers, avoiding them getting killed by the kubelet before they are started.
                          +
                          • Liveness probe (livenessProbe): checks whether a container is still alive. It is similar to the ps command that checks whether a process exists. If the liveness check of a container fails, the cluster restarts the container. If the liveness check is successful, no operation is executed.
                          • Readiness probe (readinessProbe): checks whether a container is ready to process user requests. Upon that the container is detected unready, service traffic will not be directed to the container. It may take a long time for some applications to start up before they can provide services. This is because that they need to load disk data or rely on startup of an external module. In this case, the application process is running, but the application cannot provide services. To address this issue, this health check probe is used. If the container readiness check fails, the cluster masks all requests sent to the container. If the container readiness check is successful, the container can be accessed.
                          • Startup probe (startupProbe): checks when a container application has started. If such a probe is configured, it disables liveness and readiness checks until it succeeds, ensuring that those probes do not interfere with the application startup. This can be used to adopt liveness checks on slow starting containers, avoiding them getting terminated by the kubelet before they are started.

                          Check Method

                          • HTTP request

                            This health check mode is applicable to containers that provide HTTP/HTTPS services. The cluster periodically initiates an HTTP/HTTPS GET request to such containers. If the return code of the HTTP/HTTPS response is within 200–399, the probe is successful. Otherwise, the probe fails. In this health check mode, you must specify a container listening port and an HTTP/HTTPS request path.

                            For example, for a container that provides HTTP services, the HTTP check path is /health-check, the port is 80, and the host address is optional (which defaults to the container IP address). Here, 172.16.0.186 is used as an example, and we can get such a request: GET http://172.16.0.186:80/health-check. The cluster periodically initiates this request to the container. You can also add one or more headers to an HTTP request. For example, set the request header name to Custom-Header and the corresponding value to example.

                            @@ -11,9 +11,9 @@

                            For example, if you have a Nginx container with service port 80, after you specify TCP port 80 for container listening, the cluster will periodically initiate a TCP connection to port 80 of the container. If the connection is successful, the probe is successful. Otherwise, the probe fails.

                          • CLI

                            CLI is an efficient tool for health check. When using the CLI, you must specify an executable command in a container. The cluster periodically runs the command in the container. If the command output is 0, the health check is successful. Otherwise, the health check fails.

                            The CLI mode can be used to replace the HTTP request-based and TCP port-based health check.

                            -
                            • For a TCP port, you can write a program script to connect to a container port. If the connection is successful, the script returns 0. Otherwise, the script returns –1.
                            • For an HTTP request, you can write a program script to run the wget command for a container.

                              wget http://127.0.0.1:80/health-check

                              +
                              • For a TCP port, you can use a program script to connect to a container port. If the connection is successful, the script returns 0. Otherwise, the script returns –1.
                              • For an HTTP request, you can use the script command to run the wget command to detect the container.

                                wget http://127.0.0.1:80/health-check

                                Check the return code of the response. If the return code is within 200–399, the script returns 0. Otherwise, the script returns –1.

                                -
                                • Put the program to be executed in the container image so that the program can be executed.
                                • If the command to be executed is a shell script, do not directly specify the script as the command, but add a script parser. For example, if the script is /data/scripts/health_check.sh, you must specify sh/data/scripts/health_check.sh for command execution. The reason is that the cluster is not in the terminal environment when executing programs in a container.
                                +
                                • Put the program to be executed in the container image so that the program can be executed.
                                • If the command to be executed is a shell script, do not directly specify the script as the command, but add a script parser. For example, if the script is /data/scripts/health_check.sh, you must specify sh/data/scripts/health_check.sh for command execution. The reason is that the cluster is not in the terminal environment when executing programs in a container.
                            • gRPC Check
                              gRPC checks can configure startup, liveness, and readiness probes for your gRPC application without exposing any HTTP endpoint, nor do you need an executable. Kubernetes can connect to your workload via gRPC and query its status.
                              • The gRPC check is supported only in CCE clusters of v1.25 or later.
                              • To use gRPC for check, your application must support the gRPC health checking protocol.
                              • Similar to HTTP and TCP probes, if the port is incorrect or the application does not support the health checking protocol, the check fails.
                              diff --git a/docs/cce/umn/cce_10_0113.html b/docs/cce/umn/cce_10_0113.html index c8a6d5fe..95bcbc99 100644 --- a/docs/cce/umn/cce_10_0113.html +++ b/docs/cce/umn/cce_10_0113.html @@ -9,7 +9,7 @@

                              Environment variables can be set in the following modes:

                              • Custom
                              • Added from ConfigMap: Import all keys in a ConfigMap as environment variables.
                              • Added from ConfigMap key: Import a key in a ConfigMap as the value of an environment variable. For example, if you import configmap_value of configmap_key in a ConfigMap as the value of environment variable key1, an environment variable named key1 with its value is configmap_value exists in the container.
                              • Added from secret: Import all keys in a secret as environment variables.
                              • Added from secret key: Import the value of a key in a secret as the value of an environment variable. For example, if you import secret_value of secret_key in secret secret-example as the value of environment variable key2, an environment variable named key2 with its value secret_value exists in the container.
                              • Variable value/reference: Use the field defined by a pod as the value of the environment variable, for example, the pod name.
                              • Resource Reference: Use the field defined by a container as the value of the environment variable, for example, the CPU limit of the container.
                              -

                              Adding Environment Variables

                              1. Log in to the CCE console. When creating a workload, select Environment Variables under Container Settings.
                              2. Set environment variables.

                                +

                                Adding Environment Variables

                                1. Log in to the CCE console. When creating a workload, select Environment Variables under Container Settings.
                                2. Set environment variables.

                                YAML Example

                                apiVersion: apps/v1
                                diff --git a/docs/cce/umn/cce_10_0129.html b/docs/cce/umn/cce_10_0129.html
                                index 5f1cac2e..f2835375 100644
                                --- a/docs/cce/umn/cce_10_0129.html
                                +++ b/docs/cce/umn/cce_10_0129.html
                                @@ -31,6 +31,11 @@
                                 
                • + + +
                  Table 2 Adding an outbound rule

                  Parameter

                  Description

                  +

                  Description

                  Protocol & Port

                  +

                  Protocol & Port

                  Select the protocol type and port. Currently, TCP and UDP are supported. If this parameter is not specified, the protocol type is not limited.

                  +

                  Select the protocol type and port. Currently, TCP and UDP are supported. If this parameter is not specified, the protocol type is not limited.

                  Destination CIDR Block

                  +

                  Destination CIDR Block

                  Allows requests to be routed to a specified CIDR block (and not to the exception CIDR blocks). Separate the destination and exception CIDR blocks by vertical bars (|), and separate multiple exception CIDR blocks by commas (,). For example, 172.17.0.0/16|172.17.1.0/24,172.17.2.0/24 indicates that 172.17.0.0/16 is accessible, but not for 172.17.1.0/24 or 172.17.2.0/24.

                  +

                  Allows requests to be routed to a specified CIDR block (and not to the exception CIDR blocks). Separate the destination and exception CIDR blocks by vertical bars (|), and separate multiple exception CIDR blocks by commas (,). For example, 172.17.0.0/16|172.17.1.0/24,172.17.2.0/24 indicates that 172.17.0.0/16 is accessible, but not for 172.17.1.0/24 or 172.17.2.0/24.

                  Destination Namespace

                  +

                  Destination Namespace

                  Select a namespace whose objects can be accessed. If this parameter is not specified, the source object belongs to the same namespace as the current policy.

                  +

                  Select a namespace whose objects can be accessed. If this parameter is not specified, the object belongs to the same namespace as the current policy.

                  Destination Pod Label

                  +

                  Destination Pod Label

                  Allow access to the pods with this label, if not specified, all pods in the namespace can be accessed.

                  +

                  Allow accessing the pods with this label. If this parameter is not specified, all pods in the namespace can be accessed.

                  Number of pods that will be created to match the selected add-on specifications.

                  Multi AZ

                  +
                  • Preferred: Deployment pods of the add-on are preferentially scheduled to nodes in different AZs. If the nodes in the cluster do not meet the requirements of multiple AZs, the pods are scheduled to a single AZ.
                  • Required: Deployment pods of the add-on are forcibly scheduled to nodes in different AZs. If the nodes in the cluster do not meet the requirements of multiple AZs, not all pods can run.
                  +

                  Containers

                  CPU and memory quotas of the container allowed for the selected add-on specifications.

                  @@ -39,7 +44,7 @@

                  Parameters

                  • parameterSyncStrategy: indicates whether to configure consistency check when an add-on is upgraded.
                    • ensureConsistent: indicates that the configuration consistency check is enabled. If the configuration recorded in the cluster is inconsistent with the actual configuration, the add-on cannot be upgraded.
                    • force: indicates that the configuration consistency check is ignored during an upgrade. Ensure that the current effective configuration is the same as the original configuration. After the add-on is upgraded, restore the value of parameterSyncStrategy to ensureConsistent and enable the configuration consistency check again.
                    -
                  • stub_domains: A domain name server for a user-defined domain name. The format is a key-value pair. The key is a suffix of DNS domain name, and the value is one or more DNS IP addresses.
                  • upstream_nameservers: IP address of the upstream DNS server.
                  • servers: The servers configuration is available since coredns 1.23.1. You can customize the servers configuration. For details, see dns-custom-nameservers. plugins indicates the configuration of each component in coredns (https://coredns.io/manual/plugins/). You are advised to retain the default configurations in common scenarios to prevent CoreDNS from being unavailable due to configuration errors. Each plugin component contains name, parameters (optional), and configBlock (optional). The format of the generated Corefile is as follows:

                    $name $parameters {

                    +
                  • stub_domains: A domain name server for a user-defined domain name. The format is a key-value pair. The key is a suffix of DNS domain name, and the value is one or more DNS IP addresses.
                  • upstream_nameservers: IP address of the upstream DNS server.
                  • servers: The servers configuration is available since coredns 1.23.1. You can customize the servers configuration. For details, see dns-custom-nameservers. plugins indicates the configuration of each component in coredns (https://coredns.io/manual/plugins/). You are advised to retain the default configurations in common scenarios to prevent CoreDNS from being unavailable due to configuration errors. Each plugin component contains name, parameters (optional), and configBlock (optional). The format of the generated Corefile is as follows:

                    $name $parameters {

                    $configBlock

                    }

                    Table 2 describes common plugins.

                    @@ -178,7 +183,7 @@
                    1. The query is first sent to the DNS caching layer in coredns.
                    2. From the caching layer, the suffix of the request is examined and then the request is forwarded to the corresponding DNS:
                      • Names with the cluster suffix, for example, .cluster.local: The request is sent to coredns.
                      • Names with the stub domain suffix, for example, .acme.local: The request is sent to the configured custom DNS resolver that listens, for example, on 1.2.3.4.
                      • Names that do not match the suffix (for example, widget.com): The request is forwarded to the upstream DNS.
                    -
                    Figure 1 Routing
                    +
                    Figure 1 Routing