gcp ja night #31 での発表資料です。
http://gcpja.connpass.com/event/23874/
[補足記事]
http://qiita.com/na_ga/items/d89b320ba098a0941043
http://qiita.com/na_ga/items/7c3cc3f52dd4068fd319
Dockerをちゃんと使おうと考えていたらKubernetesに出会いました。ERPのシステム開発でkubernetesを使おうとして苦労した、あるいは現在進行形で苦労していることを、そもそもKubernetesが解決しようとしている課題やそのアーキテクチャそのものにも言及しながらお話します。Dockerをベースにシステム設計を行おうとしている方にノウハウ(主に苦労話)を共有します。
July 24th, 2016 July Tech Festa 2016
Dockerをちゃんと使おうと考えていたらKubernetesに出会いました。ERPのシステム開発でkubernetesを使おうとして苦労した、あるいは現在進行形で苦労していることを、そもそもKubernetesが解決しようとしている課題やそのアーキテクチャそのものにも言及しながらお話します。Dockerをベースにシステム設計を行おうとしている方にノウハウ(主に苦労話)を共有します。
July 24th, 2016 July Tech Festa 2016
This document discusses the app container runtime rkt. It provides an overview of rkt, including what it is, its goals, and how it differs from Docker. Key points include:
- Rkt implements the Application Container (appc) specification and allows running containerized applications.
- Its goals are fast downloads/starts, verifiable/cacheable images, composability, and using common technologies like DNS for discovery.
- It differs from Docker in being more composable without a central daemon, focusing more on security through image verification, and using an open standard for images instead of Docker's format.
- The document demonstrates downloading images, verifying signatures, running containers in pods with options like
This document discusses how Istio can be used to provide routing and service discovery capabilities for Kubernetes and Cloud Foundry environments. It describes how Istio integrates with Kubernetes and Cloud Foundry components like Diego cells, the Diego brain, and the router. Key components of Istio like Envoy, Pilot, and its support for features like mTLS, load balancing and circuit breaking are also summarized. The document positions Istio as a way to provide consistent application networking capabilities across Kubernetes and Cloud Foundry platforms.
This document discusses Kubernetes and related technologies like Kubespray, Kops, and Kube-aws for deploying and managing containerized applications on infrastructure. It also describes Project Kubo for deploying Kubernetes on BOSH and mentions Cloud Foundry as a platform for applications. Key technologies discussed include BOSH, stemcells, releases, and deployments for infrastructure automation.
Cloud Foundry V2 | Intermediate Deep DiveKazuto Kusama
?
Cloud Foundry uses buildpacks to compile applications and produce executable droplets. A buildpack detects the application type, compiles dependencies and runtimes, and produces metadata to run the application. The DEA executes the buildpack stages - detect, compile, and release - to download the application, run the appropriate buildpack, and build a droplet containing the compiled application and dependencies that can run on Cloud Foundry.
- The Cloud Controller is responsible for providing the API interface and controlling application lifecycles. It receives application deployment requests from cf commands and works with the DEA to start and stop applications. It also controls creation of services.
- The Router receives "router.register" messages from components and directs traffic based on URL to the appropriate component instance(s). It acts as a load balancer.
- The DEA (Droplet Execution Agent) is where applications are run. It hosts application droplets/containers and monitors their health. The Health Manager monitors the health of DEAs.
IoT Devices Compliant with JC-STAR Using Linux as a Container OSTomohiro Saneyoshi
?
Security requirements for IoT devices are becoming more defined, as seen with the EU Cyber Resilience Act and Japan’s JC-STAR.
It's common for IoT devices to run Linux as their operating system. However, adopting general-purpose Linux distributions like Ubuntu or Debian, or Yocto-based Linux, presents certain difficulties. This article outlines those difficulties.
It also, it highlights the security benefits of using a Linux-based container OS and explains how to adopt it with JC-STAR, using the "Armadillo Base OS" as an example.
Feb.25.2025@JAWS-UG IoT