First introduction to Google Kubernetes Engine (GKE)
But so far, there are very few cloud service providers that can provide k8s fully managed services. Even AWS, which is currently the dominant cloud provider, does not fully provide k8s managed services and only provides limited customized services. In this regard, It's not mature yet.
However, Google’s k8s hosting service, namely GKE, has taken k8s hosting service to the extreme (at least for now). It not only provides a full set of k8s hosting services, but what is even more striking is that Google has integrated Autoscaler and k8s to achieve With the automatic scaling mechanism of k8s nodes, nodes can be automatically added or deleted according to the needs of pods. When existing nodes cannot carry new services, nodes will be added automatically to meet demand. When existing nodes are idle enough, the adjustment mechanism will be enabled to automatically shrink. Node, in a sense, this almost achieves the concept of serverless.
However, this may be just the tip of the iceberg, and more powerful functions need to be further explored. This article is just an introductory guide, which mainly provides guidance to quickly get started with GKE services (k8s hosting services) based on Google Cloud Platform.
Next, we will provide step-by-step instructions on how to use GKE to deploy services. The premise is that you have some understanding of k8s and can simply use the kubectl command.
Google Cloud SDK is a set of command line tools for accessing various resources on the GCP (Google Cloud Platform) platform, similar to the aws command line tool of aws.
Not much to say about installation and configuration. Click the link below to select the tar package of the corresponding operating system version to download, then unzip it and add google-cloud-sdk/bin to the PATH environment variable
Initializing the Google Cloud SDK is to bind the gcloud command to the Google account and set some other default values, such as region, proxy, account, project (new project in the Google account), etc.
Before executing gcloud init initialization, you must first configure the HTTP proxy (you know GFW) for gcloud. Please see my previous article for the specific configuration. Then execute gcloud init to complete the initialization and just follow the wizard.

gcloud components install kubectl
After creating the cluster, you need to obtain authentication credentials to interact with the cluster. To authenticate to the cluster, run the following command:
gcloud container clusters get-credentials
kubectl run hello-server --image gcr.io/google-samples/hello-app:1.0 --port 8080
https://cloud.google.com/kubernetes-engine/docs/quickstart https://cloud.google.com/sdk/docs/quickstart-macos?hl=zh-cn
gcloud auth login --no-launch-browser # gcloud 登录认证 gcloud config set compute/zone [COMPUTE_ZONE] # 设置默认区域 gcloud components list # 列出可安装组件 gcloud components install [组件名称] # 安装组件 gcloud components update # 更新所有已安装组件 gcloud components remove [组件名称] # 卸载已安装组件
gcloud config set proxy/type http gcloud config set proxy/address 127.0.0.1 gcloud config set proxy/port 1087
kubectl create secret docker-registry regcred --docker-server= --docker-username= --docker-password= --docker-email=
注意:设置 docker 私服后,要在 GKE 部署 k8s 服务,必须得在 k8s 资源文件(yaml 格式)中的 container
同一级指定 imagePullSecrets 键,要不然仍然无法拉取配置的私服的镜像,示例资源文件如下:
apiVersion: v1 kind: Pod metadata: name: private-reg spec: containers: - name: private-reg-container image: imagePullSecrets: - name: regcred
kubectl get secret regcred --output=yaml #base64 格式 显示 kubectl get secret regcred --output="jsonpath={.data.\.dockerconfigjson}" | base64 -d # base64
The above is the detailed content of First introduction to Google Kubernetes Engine (GKE). For more information, please follow other related articles on the PHP Chinese website!

The methods for basic Linux learning from scratch include: 1. Understand the file system and command line interface, 2. Master basic commands such as ls, cd, mkdir, 3. Learn file operations, such as creating and editing files, 4. Explore advanced usage such as pipelines and grep commands, 5. Master debugging skills and performance optimization, 6. Continuously improve skills through practice and exploration.

Linux is widely used in servers, embedded systems and desktop environments. 1) In the server field, Linux has become an ideal choice for hosting websites, databases and applications due to its stability and security. 2) In embedded systems, Linux is popular for its high customization and efficiency. 3) In the desktop environment, Linux provides a variety of desktop environments to meet the needs of different users.

The disadvantages of Linux include user experience, software compatibility, hardware support, and learning curve. 1. The user experience is not as friendly as Windows or macOS, and it relies on the command line interface. 2. The software compatibility is not as good as other systems and lacks native versions of many commercial software. 3. Hardware support is not as comprehensive as Windows, and drivers may be compiled manually. 4. The learning curve is steep, and mastering command line operations requires time and patience.

Linuxisnothardtolearn,butthedifficultydependsonyourbackgroundandgoals.ForthosewithOSexperience,especiallycommand-linefamiliarity,Linuxisaneasytransition.Beginnersmayfaceasteeperlearningcurvebutcanmanagewithproperresources.Linux'sopen-sourcenature,bas

The five basic components of Linux are: 1. The kernel, managing hardware resources; 2. The system library, providing functions and services; 3. Shell, the interface for users to interact with the system; 4. The file system, storing and organizing data; 5. Applications, using system resources to implement functions.

Opening a new chapter in smart home: Open source home automation system based on Ubuntu Smart home technology has revolutionized the way we interact with our living spaces, bringing convenience, safety and energy efficiency to our daily lives. From remote control of lights and appliances, to monitoring security cameras and automated climate control, smart home technology is becoming increasingly popular. However, many business smart home systems have limitations: high costs, privacy issues, and limited compatibility. Fortunately, open source software solutions combine the power of Ubuntu to provide an alternative – allowing users to create a customizable, cost-effective and secure smart home ecosystem. This guide will explore how to set up a home automation system using Ubuntu and open source tools.

Linux vs. Windows: A 2025 Comparison Thinking about switching from macOS or Windows? Linux might be the answer. While macOS users will find a relatively smooth transition (due to macOS's UNIX core), Windows users will need to adapt. This guide hig

Linux devices are hardware devices running Linux operating systems, including servers, personal computers, smartphones and embedded systems. They take advantage of the power of Linux to perform various tasks such as website hosting and big data analytics.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SublimeText3 Chinese version
Chinese version, very easy to use

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.