In Kubernetes, a Horizontal Pod Autoscaler (HPA) automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling the workload to match demand.
You might have heard or used kubectl proxy and/or kubectl port-forward commands while working with Kubernetes cluster.
However, are you aware of how they work and when we should use the above commands?
An admission controller is a piece of code that intercepts and processes requests to the Kubernetes API server prior to persistence of the object, but after the request is authenticated and authorized.
Priority Classes in Kubernetes are used to prioritize workloads to have a higher priority over the other ones. This property can be used for providing a higher priority to mission critical workloads so that they can continue running as much as possible.
Kubernetes uses “Quality Of Service (QoS) Classes” and assigns it to each Pod to make decisions of pod eviction. The QoS classes can help to prioritise the workloads in a k8s cluster.
A StorageClass provides a way for administrators to describe the “classes” of storage they offer. Each StorageClass contains the fields provisioner, parameters, and reclaimPolicy, which are used when a PersistentVolume belonging to the class needs to be dynamically provisioned. There will always be a default StorageClass in Kubernetes which is used by all PVCs if not specified.
A Pod Disruption Budget (PDB) limits the number of Pods of a replicated application that are down simultaneously from voluntary disruptions. It specifies the number of replicas that an application can tolerate having, relative to how many it is intended to have.
To make the best use of kubernetes, it is very important to know and apply the configuration best practices. This will always ensure to have a standard and efficient development and management in a Kubernetes environment.
AWS Network Load Balancers (NLB) started supporting Security Groups. We can now configure security group rules to help ensure that NLB only accepts traffic from trusted IP addresses which will improve our application’s security posture and simplifies operations.