Skip to content

Commit

Permalink
fix some blogs' url of images
Browse files Browse the repository at this point in the history
Signed-off-by: faweizhao26 <[email protected]>
  • Loading branch information
faweizhao26 committed Apr 15, 2024
1 parent c1b2b19 commit 174c009
Show file tree
Hide file tree
Showing 7 changed files with 12 additions and 14 deletions.
2 changes: 1 addition & 1 deletion content/en/blogs/faas-openfunction.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ keywords: Serverless, FaaS, OpenFunction
description: This article describes function computing concepts, reference architectures, and the latest trends in the cloud-native Serverless field, and further explains how OpenFunction builds a modern cloud-native serverless computing platform.
createTime: '2021-12-03'
author: 'Huo Bingjie, Felix'
snapshot: 'https://pek3b.qingstor.com/kubesphere-community/images/serverless-faas-openfunction.png'
snapshot: 'https://pek3b.qingstor.com/kubesphere-community/images/serverless-20211203-cover.png'
---

**Serverless computing**, commonly known as Serverless, has become a buzzword in the cloud-native field. It will fuel the next wave of development in cloud computing after IaaS and PaaS. Serverless emphasizes an architecture philosophy and service model that allows developers to focus on implementing business logics in applications rather than on managing infrastructures (e.g., servers). In its paper *Cloud Programming Simplified: A Berkeley View on Serverless Computing*, the University of California at Berkeley presents two key viewpoints on Serverless:
Expand Down
6 changes: 3 additions & 3 deletions content/zh/blogs/calico-wireguard-support-with-azure-cni.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ WireGuard 是一种 VPN 技术,从 linux 5.6 内核开始默认包含在内核

WireGuard 是一种 VPN 技术,通常被认为是 C/S 架构。它同样能在端对端的网格网络架构中配置使用,这就是 Tigera 设计的 WireGuard 可以在 Kubernetes 中启用的解决方案。使用 Calico,所有启用 WireGuard 的节点将端对端形成一个加密的网格。Calico 甚至支持在同一集群内同时包含启用 WireGuard 的节点与未启用 WireGuard 的节点,并且可以相互通信。

![](/jsDelivr/1.1.png)
![](https://pek3b.qingstor.com/kubesphere-community/images/06581ad7-image1-10-e1628656758212.png)

我们选择 WireGuard 并不是一个折中的方案。我们希望提供最简单、最安全、最快速的方式来加密传输 Kubernetes 集群中的数据,而无需使用 mTLS、IPsec 或其他复杂的配置。事实上,您可以把 WireGuard 看成是另一个具有加密功能的 Overlay。

Expand All @@ -35,13 +35,13 @@ WireGuard 是一种 VPN 技术,通常被认为是 C/S 架构。它同样能在
- 为每个节点编写端对端节点
- 使用防火墙标记(fwmark)编写 IP route、IP tables 和 Routing tables,以此正确处理各自节点上的路由

您仅需指明意图,其他的事情都由集群完成
您仅需指明意图,其他的事情都由集群完成

## 使用 WireGuard 时的数据包流向

下图显示了启用 WireGuard 后集群中的各种数据包流量情况。

![](/jsDelivr/2.1.png)
![](https://pek3b.qingstor.com/kubesphere-community/images/eb522dd1-image2-8.png)

同一主机上的 Pod:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -643,7 +643,7 @@ Please check the result using the command:
- Etcd 监控
![](https://opsman-1258881081.cos.ap-beijing.myqcloud.com//ksp-monitor-cluster-Etcd-v340-v126-arm.png)
![](https://pek3b.qingstor.com/kubesphere-community/images/ksp-monitor-cluster-etcd-v340-v126-arm.png)
- 应用商店
Expand Down
2 changes: 1 addition & 1 deletion content/zh/blogs/kubesphere-devops-pipeline-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ yygh-site

对于 Sentinel,我们直接使用雷丰阳已经制作好的镜像 `leifengyang/sentinel:1.8.2`,然后暴露一个 NodePort 类型的 Service,端口号为 `32636`。 访问 `http://192.168.23.160:32636`,以默认用户 `sentinel` 和默认密码 `sentinel` 登录,可以进入 Sentinel 控制台。 如果一切顺利,应该可以看到类似的页面:

![](htts://pek3b.qingstor.com/kubesphere-community/images/70909f56-0452-4dbc-b716-c47431a53404.png)
![](https://pek3b.qingstor.com/kubesphere-community/images/1776090-20221101110638437-1889863892.png)

对于 MongoDB,我们直接通过应用模版部署它(不勾选登录认证):

Expand Down
10 changes: 5 additions & 5 deletions content/zh/blogs/kubesphere-log-collection.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,13 +16,13 @@ snapshot: 'https://pek3b.qingstor.com/kubesphere-community/images/20221128172157

容器日志分为标准输出日志和落盘日志两种。应用将日志打印在容器标准输出 `STDOUT` 中,由容器运行时(Docker 或 Containerd)把标准输出日志写入容器日志文件中,最终由采集器导出。这种日志打印采集是业界推荐方案。但对于不打印标准输出而直接将日志落盘的情况,业界最常用见的方案是,使用 `Sidecar` 采集落盘日志,把落盘日志打印到容器标准输出中,再利用标准输出日志的采集方式输出。

![](https://p9-juejin.byteimg.com/tos-cn-i-k3u1fbpfcp/bb596565862f45f7852421c50d9e88b1~tplv-k3u1fbpfcp-watermark.image?)
![](https://pek3b.qingstor.com/kubesphere-community/images/bb596565862f45f7852421c50d9e88b1~tplv-k3u1fbpfcp-watermark.png)

对于 KubeSphere 用户,只需要两步即可:第一在项目中开启`收集卷上日志`,第二在工作负载中配置落盘文件路径。具体操作见下图所示。

![](https://p9-juejin.byteimg.com/tos-cn-i-k3u1fbpfcp/e0b20d93902f4545826cacbc4541f054~tplv-k3u1fbpfcp-watermark.image?)
![](https://pek3b.qingstor.com/kubesphere-community/images/e0b20d93902f4545826cacbc4541f054~tplv-k3u1fbpfcp-watermark.png)

![](https://p9-juejin.byteimg.com/tos-cn-i-k3u1fbpfcp/4d93e799977840628dd45d0a19493d9b~tplv-k3u1fbpfcp-watermark.image?)
![](https://pek3b.qingstor.com/kubesphere-community/images/4d93e799977840628dd45d0a19493d9b~tplv-k3u1fbpfcp-watermark.png)

上述两个步骤,会自动在容器中注入 `Filebeat Sidecar` 作为 logging-agent,将落盘日志打印输出在容器标准输出中。Filebeat 配置可通过 ConfigMap 修改。

Expand Down Expand Up @@ -58,7 +58,7 @@ $ kubectl get Output -n kubesphere-logging-system es -o yaml

我们把日志导出到第三方日志服务,那就需要定制 FluentBit 输入输出。使用 `tail` 插件采集 `/var/log/containers/flux-wms-*.log` 文件中的日志,输出到 `Kafka` 中。可参考如下配置:

![](https://p1-juejin.byteimg.com/tos-cn-i-k3u1fbpfcp/942da92ef0af483687b08b2994bc5d66~tplv-k3u1fbpfcp-watermark.image?)
![](https://pek3b.qingstor.com/kubesphere-community/images/942da92ef0af483687b08b2994bc5d66~tplv-k3u1fbpfcp-watermark.png)

```yaml
---
Expand Down Expand Up @@ -241,7 +241,7 @@ logging.level: warning
当看到 Kafka 消费者输出完美多行日志块时,脑后传来多巴胺的快感!再看一眼架构图,咱们来做总结!
![](https://p6-juejin.byteimg.com/tos-cn-i-k3u1fbpfcp/248b663dfc354e6d860ebd671dd5b5e3~tplv-k3u1fbpfcp-watermark.image?)
![](https://pek3b.qingstor.com/kubesphere-community/images/248b663dfc354e6d860ebd671dd5b5e3~tplv-k3u1fbpfcp-watermark.png)
## 总结
Expand Down
2 changes: 0 additions & 2 deletions content/zh/blogs/kubesphere-v3.3.0-offline-installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -596,8 +596,6 @@ https://kubesphere.io 2022-06-30 14:30:19

通过 `http://{IP}:30880` 使用默认帐户和密码 `admin/P@88w0rd` 访问 KubeSphere 的 Web 控制台,进行后续的操作配置。

![](https://kubesphere.com.cn/images/docs/v3.3/zh-cn/upgrade/air-gapped-upgrade-with-ks-installer/kubesphere-login.PNG)

## 总结

感谢您完整的阅读完本文,为此,您应该 Get 到了以下技能:
Expand Down
2 changes: 1 addition & 1 deletion content/zh/blogs/openelb-arp.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ spec:
## Layer2 模式中的黑客技术
![](https://files.mdnice.com/user/2166/ff880d68-be25-4def-8cd6-b09a032ae753.png)
![](https://pek3b.qingstor.com/kubesphere-community/images/ff880d68-be25-4def-8cd6-b09a032ae753.webp)
> ARP 欺骗技术: 应用程序主动回复路由器 ARP 请求,让路由器以为该应用是合法终端,从而劫持网络流量包。
Expand Down

0 comments on commit 174c009

Please sign in to comment.