Kubernetes Taints and Tolerations (Examples)

  Рет қаралды 6,941

Anton Putra

Anton Putra

Күн бұрын

Пікірлер: 13
@AntonPutra
@AntonPutra Жыл бұрын
🔴 - To support my channel, I’d like to offer Mentorship/On-the-Job Support/Consulting - me@antonputra.com
@mugensekai
@mugensekai 2 жыл бұрын
Cool to know that you have either option of using _operator: Equal_ and specifying the value *or* using a general _operator: Exists_ without the a value.
@AntonPutra
@AntonPutra 2 жыл бұрын
yeap
@AntonPutra
@AntonPutra Жыл бұрын
👉 How to Manage Secrets in Terraform - kzbin.info/www/bejne/aX-TpXqBrNt1mqM 👉 Terraform Tips & Tricks - kzbin.info/www/bejne/bYScZaKLid5lsJY 👉 ArgoCD Tutorial - kzbin.info/www/bejne/sHjRlZqafMZkisU
@AntonPutra
@AntonPutra 3 жыл бұрын
🔴Kubernetes Explained Playlist - kzbin.info/aero/PLiMWaCMwGJXkKGx03qyCAqSit6vY5G_JK
@gonzariosm
@gonzariosm Жыл бұрын
Hey Anton, qq: at 1:14 I can see that the cpacity_type is "ON_DEMAND" and not "SPOT" this was a mistake, right?
@AntonPutra
@AntonPutra Жыл бұрын
Not sure what you mean by 'a mistake,' but when you use a specialized type such as spot, typically you don't want to run all applications on them; that's why you additionally add taints. The example in the video is exactly to demonstrate the point that when using SPOT, you want to add taints to that node group.
@gonzariosm
@gonzariosm Жыл бұрын
Thank you very much for your response. Perhaps I have expressed myself badly. What I mean is that I see that Terraform code has the value "ON_DEMAND" in the capacity_type. I mean that this node will be "ON_DEMAND" and not "SPOT" or am I wrong? On the other hand, thank you very much for your videos 🚀
@gdevelek
@gdevelek 2 жыл бұрын
You were in a lot of hurry in this video and didn't explain much. It seems to me that a toleration is a way to override the taint. In other words, a way to allow a pod to be scheduled on a node, despite the fact that the node has a taint for NOT allowing pods to be scheduled on it.
@AntonPutra
@AntonPutra 2 жыл бұрын
Thanks for the feedback!
@mugensekai
@mugensekai 2 жыл бұрын
Agreed. Good nuggets in here, but I had to replay a few times to fully digest everything. The way I look at it is that tainting nodes is a good way to _exclude_ pods you *don't* want scheduled on the node, adding a toleration to the Pod spec is the exception.
@diegonayalazo
@diegonayalazo Жыл бұрын
Thanks
@AntonPutra
@AntonPutra Жыл бұрын
welcome
Kubernetes Pod Disruption Budget (Examples)
4:00
Anton Putra
Рет қаралды 11 М.
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
Kubernetes RBAC Explained
23:17
Anton Putra
Рет қаралды 15 М.
Do NOT Learn Kubernetes Without Knowing These Concepts...
13:01
Travis Media
Рет қаралды 335 М.
Kubernetes Services networking
7:13
Project Calico
Рет қаралды 93 М.
Advanced Scheduling in Kubernetes
24:57
Pavan Elthepu
Рет қаралды 21 М.
Simplified Kubernetes Taints and Tolerations Demo
4:45
Java Home Cloud
Рет қаралды 4,2 М.
Most Common Kubernetes Deployment Strategies (Examples & Code)
20:06
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН