Core Kubernetes by Jay Vyas & Chris Love
Author:Jay Vyas & Chris Love [Vyas, Jay & Love, Chris]
Language: eng
Format: epub
Publisher: Manning Publications Co.
Published: 2022-05-30T22:00:00+00:00
7.4.2 CSI as a specification that works inside of Kubernetes
Figure 7.4 demonstrates the workflow for provisioning a PVC with a CSI driver. Itâs much more transparent and decoupled than what we see with GlusterFS, where different components accomplish different tasks in a discrete manner.
Figure 7.4 Provisioning a PVC with a CSI driver
The CSI specification abstractly defines a generic set of functionality that allows a storage service to be defined without specifying any implementation. In this section, weâll go through some aspects of this interface in the context of Kubernetes itself. The operations it defines are in three general categories: identity services, controller services, and node services. At its heart is the notion of, as you might have guessed, a controller that negotiates the need for storage with a backend provider (your expensive NAS solution) and the Kubernetes control plane by fulfilling a dynamic storage request. Letâs take a quick peek at these three categories:
Identity servicesâAllow a plugin service to self-identify (provide metadata about itself). This allows the Kubernetes control plane to confirm that a particular type of storage plugin is running and available for a volume type.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6649)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6641)
Running Windows Containers on AWS by Marcio Morales(6164)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4961)
Combating Crime on the Dark Web by Nearchos Nearchou(4548)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4425)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4424)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4213)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3785)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3452)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
