Issue #1 : Unlocking Jenkins on Kubernetes & More
โ Bibin Wilson
This weekโs DevOps spotlight:
1. Jenkins on Kubernetes - Free Course Available Now!
We've launched a brand-new free course on deploying Jenkins on Kubernetes. We keep adding one lesson every day - Access it here
2. IPAM in Networking::
IP Address Management (IPAM) : This overview will help you understand how to manage IP addresses effectively within your network. Learn More
3. Wcurl Utility: A Handy Tool for Web Requests
Discover the utility of Wcurl, a versatile tool for making web requests. Perfect for DevOps engineers needing to interact with web services and APIs. Explore
๐ Special Offers & Learning Resources
1. Save 25% on Kubernetes Certification Bundles:
Use code COMBUNDLE25 at CKA + CKS Bundle ($355 Savings) and KCNA + CKA ( $288 Savings)
2. Free Course on Gemini API by Google:
Expand your cloud knowledge with this free course on Google's Gemini API. A great resource for those interested in API management and cloud services. Access Here
3. Kubernetes Patterns - Free eBook:
Download the "Kubernetes Patterns" eBook for free and gain valuable insights into Kubernetes design patterns and best practices. Download Now
๐ Research & Insights
1. Kube-Proxy ๐๐๐ฎ๐๐ถ๐๐๐ถ๐ฐ ๐บ๐ผ๐ฑ๐ฒ ๐ฟ๐ฎ๐ป๐ฑ๐ผ๐บ ๐ฝ๐ฟ๐ผ๐ฏ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐.
Ever wondered how Kubernetes services handle load balancing?
By default, the kube-proxy component in Kubernetes uses iptables for routing requests. (Supports IPVS as well)
I got curious about how it manages load balancing behind the scenes, and I discovered something interesting: a feature in iptables called ๐๐๐ฎ๐๐ถ๐๐๐ถ๐ฐ ๐บ๐ผ๐ฑ๐ฒ ๐ฟ๐ฎ๐ป๐ฑ๐ผ๐บ ๐ฝ๐ฟ๐ผ๐ฏ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐.
This feature is part of iptables and is used for packet filtering and network address translation. It allows you to create rules that match a specific percentage of packets at random.
For example, I tested a service endpoint pointing to a three pod deployemnt. It showed statistic mode random probability as 0.33 , essentially balancing the load across the three pods.
It is more of a probabilistic traffic distribution and not actual load balancing.-
- It doesn't consider the actual load on the servers.
- It doesn't guarantee an even distribution of traffic over time.
- It doesn't maintain session persistence
2. Searches for DevSecOps are skyrocketingโup 200% every year!
3. Istio utilizes 10 percent of hardware resources
Alibaba Cloud reported,A Kubernetes cluster comprising 500 nodes and 15,000 pods, and found it consumed 1,500 cores and 5,000 gigabytes of memory.
It also claimed that the sidecar's CPU and memory requirements grow even higher than that of the app.Google addressed some of these resource challenges with Ambient Mesh.
But as per Alibaba, Ambient Mesh improved performance but still required some proxies to reside within the user cluster.
Alibaba Cloud overcame these issues by building their own service mesh called Canal Mesh.It claims, Canal Mesh delivers throughput ๐ญ๐ฎ.๐ฏ๐ ๐ฎ๐ป๐ฑ ๐ฎ.๐ฏ๐ ๐ต๐ถ๐ด๐ต๐ฒ๐ฟ than Istio and Ambient Mesh, respectively, while reducing CPU consumption compared to Istio.
This was achieved by moving proxies out of the user cluster, leaving only a minimal on-node proxy to manage security and observability. Additionally, it leverages eBPF-based kernel bypass and remote mTLS acceleration to optimize performance further.
1. ๐ฅ๐ฒ๐บ๐ผ๐๐ฒ ๐บ๐ง๐๐ฆ ๐ฎ๐ฐ๐ฐ๐ฒ๐น๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป:It is a technique used to optimize the processing of mTLS connections by offloading the computationally intensive cryptographic operations to specialized hardware.A similar implementation can be done in k8s ingress controllers for TLS using device plugins & RuntimeClass.
๐ฎ. ๐ฒ๐๐ฃ๐-๐ฏ๐ฎ๐๐ฒ๐ฑ ๐ธ๐ฒ๐ฟ๐ป๐ฒ๐น ๐ฏ๐๐ฝ๐ฎ๐๐A technique used to enhance the performance of network operations by bypassing the traditional kernel network stack in LinuxRead about XDP (eXpress Data Path) to understand more on this.
๐๐ฒ๐๐ฎ๐ถ๐น๐ฒ๐ฑ ๐๐ฎ๐ป๐ฎ๐น ๐ ๐ฒ๐๐ต ๐ฃ๐ฎ๐ฝ๐ฒ๐ฟ: https://dl.acm.org/doi/pdf/10.1145/3651890.3672221
Stay tuned for more updates and resources in next week's digest!