diff --git a/collections/_catalog/deployment/02413809-9fbf-4649-ae22-3d0947d264c6.md b/collections/_catalog/deployment/02413809-9fbf-4649-ae22-3d0947d264c6.md deleted file mode 100644 index f96e6b5e9b..0000000000 --- a/collections/_catalog/deployment/02413809-9fbf-4649-ae22-3d0947d264c6.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Example Labels and Annotations -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - kubernetes -patternId: 02413809-9fbf-4649-ae22-3d0947d264c6 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20design%20contains%20example%20of%20how%20label%20and%20annotation%20can%20be%20created%20and%20organised -patternCaveats: | - No%20caveats -permalink: catalog/deployment/example-labels-and-annotations-02413809-9fbf-4649-ae22-3d0947d264c6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/02413809-9fbf-4649-ae22-3d0947d264c6/0.0.1/design.yml' -downloadLink: 02413809-9fbf-4649-ae22-3d0947d264c6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/04cf78e7-6041-45f7-bca5-999d5d7d6a19.md b/collections/_catalog/deployment/04cf78e7-6041-45f7-bca5-999d5d7d6a19.md deleted file mode 100644 index da0ccf47b1..0000000000 --- a/collections/_catalog/deployment/04cf78e7-6041-45f7-bca5-999d5d7d6a19.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Dapr ' -publishedVersion: 0.0.5 -userId: 969bfd5e-28fb-4c20-a020-ee9db65da812 -userName: Aabid Sofi -userAvatarURL: -type: deployment -compatibility: - - dapr -patternId: 04cf78e7-6041-45f7-bca5-999d5d7d6a19 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/04cf78e7-6041-45f7-bca5-999d5d7d6a19-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/04cf78e7-6041-45f7-bca5-999d5d7d6a19-dark.png -patternInfo: | - A%20standard%20Dapr%20control%20plane%20design. -patternCaveats: | - none -permalink: catalog/deployment/dapr-04cf78e7-6041-45f7-bca5-999d5d7d6a19.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/04cf78e7-6041-45f7-bca5-999d5d7d6a19/0.0.5/design.yml' -downloadLink: 04cf78e7-6041-45f7-bca5-999d5d7d6a19/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/06ef6097-8f21-4a76-b025-0c9271168814.md b/collections/_catalog/deployment/06ef6097-8f21-4a76-b025-0c9271168814.md deleted file mode 100644 index b55570e821..0000000000 --- a/collections/_catalog/deployment/06ef6097-8f21-4a76-b025-0c9271168814.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Istio Operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - istio-operator -patternId: 06ef6097-8f21-4a76-b025-0c9271168814 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/06ef6097-8f21-4a76-b025-0c9271168814-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/06ef6097-8f21-4a76-b025-0c9271168814-dark.png -patternInfo: | - This%20YAML%20defines%20a%20Kubernetes%20Deployment%20for%20the%20Istio%20Operator%20within%20the%20istio-operator%20namespace.%20The%20deployment%20ensures%20a%20single%20replica%20of%20the%20Istio%20Operator%20pod%20is%20always%20running%2C%20which%20is%20managed%20by%20a%20service%20account%20named%20istio-operator.%20The%20deployment's%20metadata%20includes%20the%20namespace%20and%20the%20deployment%20name.%20The%20pod%20selector%20matches%20pods%20with%20the%20label%20name%3A%20istio-operator%2C%20ensuring%20the%20correct%20pods%20are%20managed.%20The%20pod%20template%20specifies%20metadata%20and%20details%20for%20the%20containers%2C%20including%20the%20container%20name%20istio-operator%20and%20the%20image%20gcr.io%2Fistio-testing%2Foperator%3A1.5-dev%2C%20which%20runs%20the%20istio-operator%20command%20with%20the%20server%20argument. -patternCaveats: | - 1.%20Namespace%20Configuration%3A%20Ensure%20that%20the%20istio-operator%20namespace%20exists%20before%20applying%20this%20deployment.%20If%20the%20namespace%20is%20not%20present%2C%20the%20deployment%20will%20fail.%0A%0A2.%20Image%20Version%3A%20The%20image%20specified%20(gcr.io%2Fistio-testing%2Foperator%3A1.5-dev)%20is%20a%20development%20version.%20It%20is%20crucial%20to%20verify%20the%20stability%20and%20compatibility%20of%20this%20version%20for%20production%20environments.%20Using%20a%20stable%20release%20version%20is%20generally%20recommended.%0A%0A3.%20Resource%20Allocation%3A%20The%20resource%20limits%20and%20requests%20are%20set%20to%20specific%20values%20(200m%20CPU%2C%20256Mi%20memory%20for%20limits%3B%2050m%20CPU%2C%20128Mi%20memory%20for%20requests).%20These%20values%20should%20be%20reviewed%20and%20adjusted%20based%20on%20the%20actual%20resource%20availability%20and%20requirements%20of%20your%20Kubernetes%20cluster%20to%20prevent%20resource%20contention%20or%20overallocation.%0A%0A4.%20Leader%20Election%3A%20The%20environment%20variables%20include%20LEADER_ELECTION_NAMESPACE%20which%20is%20derived%20from%20the%20pod's%20namespace.%20Ensure%20that%20the%20leader%20election%20mechanism%20is%20properly%20configured%20and%20that%20only%20one%20instance%20of%20the%20operator%20becomes%20the%20leader%20to%20avoid%20conflicts.%0A%0A5.%20Security%20Context%3A%20The%20deployment%20does%20not%20specify%20a%20security%20context%20for%20the%20container.%20It%20is%20advisable%20to%20review%20and%20define%20appropriate%20security%20contexts%20to%20enhance%20the%20security%20posture%20of%20the%20deployment%2C%20such%20as%20running%20the%20container%20as%20a%20non-root%20user. -permalink: catalog/deployment/istio-operator-06ef6097-8f21-4a76-b025-0c9271168814.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/06ef6097-8f21-4a76-b025-0c9271168814/0.0.1/design.yml' -downloadLink: 06ef6097-8f21-4a76-b025-0c9271168814/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/08379ae3-cd9e-4b55-a190-91a47a1ff638.md b/collections/_catalog/deployment/08379ae3-cd9e-4b55-a190-91a47a1ff638.md deleted file mode 100644 index 5045afcfdb..0000000000 --- a/collections/_catalog/deployment/08379ae3-cd9e-4b55-a190-91a47a1ff638.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Fault-tolerant batch workloads on GKE -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 08379ae3-cd9e-4b55-a190-91a47a1ff638 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/08379ae3-cd9e-4b55-a190-91a47a1ff638-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/08379ae3-cd9e-4b55-a190-91a47a1ff638-dark.png -patternInfo: | - A%20batch%20workload%20is%20a%20process%20typically%20designed%20to%20have%20a%20start%20and%20a%20completion%20point.%20You%20should%20consider%20batch%20workloads%20on%20GKE%20if%20your%20architecture%20involves%20ingesting%2C%20processing%2C%20and%20outputting%20data%20instead%20of%20using%20raw%20data.%20Areas%20like%20machine%20learning%2C%20artificial%20intelligence%2C%20and%20high%20performance%20computing%20(HPC)%20feature%20different%20kinds%20of%20batch%20workloads%2C%20such%20as%20offline%20model%20training%2C%20batched%20prediction%2C%20data%20analytics%2C%20simulation%20of%20physical%20systems%2C%20and%20video%20processing.%0A%0ABy%20designing%20containerized%20batch%20workloads%2C%20you%20can%20leverage%20the%20following%20GKE%20benefits%3A%0A%0AAn%20open%20standard%2C%20broad%20community%2C%20and%20managed%20service.%0ACost%20efficiency%20from%20effective%20workload%20and%20infrastructure%20orchestration%20and%20specialized%20compute%20resources.%0AIsolation%20and%20portability%20of%20containerization%2C%20allowing%20the%20use%20of%20cloud%20as%20overflow%20capacity%20while%20maintaining%20data%20security.%0AAvailability%20of%20burst%20capacity%2C%20followed%20by%20rapid%20scale%20down%20of%20GKE%20clusters. -patternCaveats: | - Ensure%20proper%20networking%20of%20components%20for%20efficient%20functioning -permalink: catalog/deployment/fault-tolerant-batch-workloads-on-gke-08379ae3-cd9e-4b55-a190-91a47a1ff638.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/08379ae3-cd9e-4b55-a190-91a47a1ff638/0.0.1/design.yml' -downloadLink: 08379ae3-cd9e-4b55-a190-91a47a1ff638/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/0a2d8c39-df40-490b-94b7-75d0fb7fc207.md b/collections/_catalog/deployment/0a2d8c39-df40-490b-94b7-75d0fb7fc207.md deleted file mode 100644 index b988572012..0000000000 --- a/collections/_catalog/deployment/0a2d8c39-df40-490b-94b7-75d0fb7fc207.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: default-ns -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 0a2d8c39-df40-490b-94b7-75d0fb7fc207 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This is a sample default namespace that can be used for testing. -patternCaveats: | - No caveats. Feel free to reuse. -permalink: catalog/deployment/default-ns-0a2d8c39-df40-490b-94b7-75d0fb7fc207.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0a2d8c39-df40-490b-94b7-75d0fb7fc207/0.0.1/design.yml' -downloadLink: 0a2d8c39-df40-490b-94b7-75d0fb7fc207/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/0aa86dd0-415c-4bf8-ae76-832560470b74.md b/collections/_catalog/deployment/0aa86dd0-415c-4bf8-ae76-832560470b74.md deleted file mode 100644 index 192c80d955..0000000000 --- a/collections/_catalog/deployment/0aa86dd0-415c-4bf8-ae76-832560470b74.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Run DaemonSet on GKE Autopilot -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 0aa86dd0-415c-4bf8-ae76-832560470b74 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0aa86dd0-415c-4bf8-ae76-832560470b74-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0aa86dd0-415c-4bf8-ae76-832560470b74-dark.png -patternInfo: | - GKE%20uses%20the%20total%20size%20of%20your%20deployed%20workloads%20to%20determine%20the%20size%20of%20the%20nodes%20that%20Autopilot%20provisions%20for%20the%20cluster.%20If%20you%20add%20or%20resize%20a%20DaemonSet%20after%20Autopilot%20provisions%20a%20node%2C%20GKE%20won't%20resize%20existing%20nodes%20to%20accommodate%20the%20new%20total%20workload%20size.%20DaemonSets%20with%20resource%20requests%20larger%20than%20the%20allocatable%20capacity%20of%20existing%20nodes%2C%20after%20accounting%20for%20system%20pods%2C%20also%20won't%20get%20scheduled%20on%20those%20nodes.%0A%0AStarting%20in%20GKE%20version%201.27.6-gke.1248000%2C%20clusters%20in%20Autopilot%20mode%20detect%20nodes%20that%20can't%20fit%20all%20DaemonSets%20and%2C%20over%20time%2C%20migrate%20workloads%20to%20larger%20nodes%20that%20can%20fit%20all%20DaemonSets.%20This%20process%20takes%20some%20time%2C%20especially%20if%20the%20nodes%20run%20system%20Pods%2C%20which%20need%20extra%20time%20to%20gracefully%20terminate%20so%20that%20there's%20no%20disruption%20to%20core%20cluster%20capabilities.%0A%0AIn%20GKE%20version%201.27.5-gke.200%20or%20earlier%2C%20we%20recommend%20cordoning%20and%20draining%20nodes%20that%20can't%20accommodate%20DaemonSet%20Pods. -patternCaveats: | - For%20all%20GKE%20versions%2C%20we%20recommend%20the%20following%20best%20practices%20when%20deploying%20DaemonSets%20on%20Autopilot%3A%0A%0ADeploy%20DaemonSets%20before%20any%20other%20workloads.%0ASet%20a%20higher%20PriorityClass%20on%20DaemonSets%20than%20regular%20Pods.%20The%20higher%20PriorityClass%20lets%20GKE%20evict%20lower-priority%20Pods%20to%20accommodate%20DaemonSet%20pods%20if%20the%20node%20can%20accommodate%20those%20pods.%20This%20helps%20to%20ensure%20that%20the%20DaemonSet%20is%20present%20on%20each%20node%20without%20triggering%20node%20recreation.%0A -permalink: catalog/deployment/run-daemonset-on-gke-autopilot-0aa86dd0-415c-4bf8-ae76-832560470b74.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0aa86dd0-415c-4bf8-ae76-832560470b74/0.0.1/design.yml' -downloadLink: 0aa86dd0-415c-4bf8-ae76-832560470b74/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/0e426f91-14df-4f70-b6cc-ed3624d53ccd.md b/collections/_catalog/deployment/0e426f91-14df-4f70-b6cc-ed3624d53ccd.md deleted file mode 100644 index 8d02aaad8c..0000000000 --- a/collections/_catalog/deployment/0e426f91-14df-4f70-b6cc-ed3624d53ccd.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Key cloak operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - keycloak-operator -patternId: 0e426f91-14df-4f70-b6cc-ed3624d53ccd -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0e426f91-14df-4f70-b6cc-ed3624d53ccd-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0e426f91-14df-4f70-b6cc-ed3624d53ccd-dark.png -patternInfo: | - This%20YAML%20snippet%20describes%20a%20Kubernetes%20Deployment%20for%20a%20Keycloak%20operator%2C%20ensuring%20a%20single%20replica.%20It%20specifies%20labels%20and%20annotations%20for%20metadata%2C%20including%20a%20service%20account.%20The%20pod%20template%20defines%20a%20container%20running%20the%20Keycloak%20operator%20image%2C%20with%20environment%20variables%20set%20for%20namespace%20and%20pod%20name%20retrieval.%20Security%20context%20settings%20prevent%20privilege%20escalation.%20Probes%20are%20configured%20for%20liveness%20and%20readiness%20checks%20on%20port%208081%2C%20with%20resource%20requests%20and%20limits%20ensuring%20proper%20resource%20allocation%20for%20the%20container. -patternCaveats: | - 1.%20Single%20Replica%3A%20The%20configuration%20specifies%20only%20one%20replica%2C%20which%20means%20there's%20no%20built-in%20redundancy%20or%20high%20availability.%20Consider%20adjusting%20the%20replica%20count%20based%20on%20your%20availability%20requirements.%0A%0A2.%20Resource%20Allocation%3A%20Resource%20requests%20and%20limits%20are%20set%20for%20CPU%20and%20memory.%20Ensure%20these%20values%20are%20appropriate%20for%20your%20workload%20and%20cluster%20capacity%20to%20avoid%20performance%20issues%20or%20resource%20contention.%0A%0A3.%20Security%20Context%3A%20The%20security%20context%20is%20configured%20to%20run%20the%20container%20as%20a%20non-root%20user%20and%20disallow%20privilege%20escalation.%20Ensure%20these%20settings%20align%20with%20your%20security%20policies%20and%20container%20requirements.%0A%0A4.%20Probes%20Configuration%3A%20Liveness%20and%20readiness%20probes%20are%20set%20up%20to%20check%20the%20health%20of%20the%20container%20on%20port%208081.%20Ensure%20that%20the%20specified%20endpoints%20(%2Fhealthz%20and%20%2Freadyz)%20are%20correctly%20implemented%20in%20the%20application%20code.%0A%0A5.%20Namespace%20Configuration%3A%20The%20WATCH_NAMESPACE%20environment%20variable%20is%20set%20to%20an%20empty%20string%2C%20potentially%20causing%20the%20operator%20to%20watch%20all%20namespaces.%20Ensure%20this%20behavior%20aligns%20with%20your%20intended%20scope%20of%20operation%20and%20namespace%20isolation%20requirements. -permalink: catalog/deployment/key-cloak-operator-0e426f91-14df-4f70-b6cc-ed3624d53ccd.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0e426f91-14df-4f70-b6cc-ed3624d53ccd/0.0.1/design.yml' -downloadLink: 0e426f91-14df-4f70-b6cc-ed3624d53ccd/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/104be089-dae0-4d09-be70-c1d121673119.md b/collections/_catalog/deployment/104be089-dae0-4d09-be70-c1d121673119.md deleted file mode 100644 index 16a579c7b2..0000000000 --- a/collections/_catalog/deployment/104be089-dae0-4d09-be70-c1d121673119.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: mTLS-handshake-acceleration-for-Istio -publishedVersion: 0.0.1 -userId: 969bfd5e-28fb-4c20-a020-ee9db65da812 -userName: Aabid Sofi -userAvatarURL: -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: 104be089-dae0-4d09-be70-c1d121673119 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/104be089-dae0-4d09-be70-c1d121673119-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/104be089-dae0-4d09-be70-c1d121673119-dark.png -patternInfo: | - Cryptographic operations are among the most compute-intensive and critical operations when it comes to secured connections. Istio uses Envoy as the “gateways/sidecar” to handle secure connections and intercept the traffic. Depending upon use cases, when an ingress gateway must handle a large number of incoming TLS and secured service-to-service connections through sidecar proxies, the load on Envoy increases. The potential performance depends on many factors, such as size of the cpuset on which Envoy is running, incoming traffic patterns, and key size. These factors can impact Envoy serving many new incoming TLS requests. To achieve performance improvements and accelerated handshakes, a new feature was introduced in Envoy 1.20 and Istio 1.14. It can be achieved with 3rd Gen Intel® Xeon® Scalable processors, the Intel® Integrated Performance Primitives (Intel® IPP) crypto library, CryptoMB Private Key Provider Method support in Envoy, and Private Key Provider configuration in Istio using ProxyConfig. -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource for custom Intel configuration -permalink: catalog/deployment/mtls-handshake-acceleration-for-istio-104be089-dae0-4d09-be70-c1d121673119.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/104be089-dae0-4d09-be70-c1d121673119/0.0.1/design.yml' -downloadLink: 104be089-dae0-4d09-be70-c1d121673119/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/114c94c9-052b-46a2-86fe-4cdd2e88c746.md b/collections/_catalog/deployment/114c94c9-052b-46a2-86fe-4cdd2e88c746.md deleted file mode 100644 index 88d5bd9098..0000000000 --- a/collections/_catalog/deployment/114c94c9-052b-46a2-86fe-4cdd2e88c746.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: my first app design -publishedVersion: 0.0.1 -userId: 4d90d649-c4b8-42b8-adc6-51702129cb05 -userName: sonal singh -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 114c94c9-052b-46a2-86fe-4cdd2e88c746 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/114c94c9-052b-46a2-86fe-4cdd2e88c746-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/114c94c9-052b-46a2-86fe-4cdd2e88c746-dark.png -patternInfo: | - This infrastructure design defines two services within a system: 1. **Customer Service**: - Type: Customer - Version: 0.0.50 - Model: Jira Service Desk Operator - Attributes: This service is configured with specific settings, including an email address, legacy customer mode, and a name. It is categorized as a tool within the system.2. **Notebook Service**: - Type: Notebook - Version: 1.6.1 - Model: Kubeflow - Attributes: This service is categorized as a machine learning tool. It has metadata related to its source URI and appearance. These services are components within a larger system or design, each serving a distinct purpose. The Customer Service is associated with customer-related operations, while the Notebook Service is related to machine learning tasks. -patternCaveats: | - Make sure to use correct credentials for Jira service operator -permalink: catalog/deployment/my-first-app-design-114c94c9-052b-46a2-86fe-4cdd2e88c746.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/114c94c9-052b-46a2-86fe-4cdd2e88c746/0.0.1/design.yml' -downloadLink: 114c94c9-052b-46a2-86fe-4cdd2e88c746/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/129c524b-ead9-4170-b236-a1c9dd274ece.md b/collections/_catalog/deployment/129c524b-ead9-4170-b236-a1c9dd274ece.md deleted file mode 100644 index f447f7722e..0000000000 --- a/collections/_catalog/deployment/129c524b-ead9-4170-b236-a1c9dd274ece.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: gitlab runner deployment -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - gitlab-runner-operator -patternId: 129c524b-ead9-4170-b236-a1c9dd274ece -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/129c524b-ead9-4170-b236-a1c9dd274ece-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/129c524b-ead9-4170-b236-a1c9dd274ece-dark.png -patternInfo: | - This%20configuration%20ensures%20that%20a%20single%20instance%20of%20the%20GitLab%20Runner%20is%20deployed%20within%20the%20gitlab-runner%20namespace.%20The%20GitLab%20Runner%20is%20configured%20with%20a%20specific%20ServiceAccount%2C%20CPU%20resource%20requests%20and%20limits%2C%20and%20is%20provided%20with%20a%20ConfigMap%20containing%20the%20configuration%20file%20config.toml.%20The%20deployment%20is%20designed%20to%20continuously%20restart%20the%20pod%20(restartPolicy%3A%20Always)%20to%20ensure%20the%20GitLab%20Runner%20remains%20available%20for%20executing%20jobs.%0A -patternCaveats: | - 1.%20Resource%20Allocation%3A%20Ensure%20that%20the%20CPU%20resource%20requests%20and%20limits%20specified%20in%20the%20configuration%20are%20appropriate%20for%20the%20workload%20of%20the%20GitLab%20Runner.%20Monitor%20resource%20usage%20and%20adjust%20these%20values%20as%20necessary%20to%20prevent%20resource%20contention%20and%20ensure%20optimal%20performance.%0A%0A2.%20Image%20Pull%20Policy%3A%20The%20configuration%20specifies%20imagePullPolicy%3A%20Always%2C%20which%20causes%20Kubernetes%20to%20pull%20the%20Docker%20image%20(gitlab%2Fgitlab-runner%3Alatest)%20every%20time%20the%20pod%20is%20started.%20While%20this%20ensures%20that%20the%20latest%20image%20is%20always%20used%2C%20it%20may%20increase%20deployment%20time%20and%20consume%20additional%20network%20bandwidth.%20Consider%20whether%20this%20policy%20aligns%20with%20your%20deployment%20requirements%20and%20constraints.%0A%0A3.%20Security%3A%20Review%20the%20permissions%20granted%20to%20the%20gitlab-admin%20ServiceAccount%20to%20ensure%20that%20it%20has%20appropriate%20access%20rights%20within%20the%20Kubernetes%20cluster.%20Limit%20the%20permissions%20to%20the%20minimum%20required%20for%20the%20GitLab%20Runner%20to%20perform%20its%20tasks%20to%20reduce%20the%20risk%20of%20unauthorized%20access%20or%20privilege%20escalation.%0A%0A4.%20ConfigMap%20Management%3A%20Ensure%20that%20the%20gitlab-runner-config%20ConfigMap%20referenced%20in%20the%20configuration%20contains%20the%20correct%20configuration%20settings%20for%20the%20GitLab%20Runner.%20Monitor%20and%20manage%20changes%20to%20the%20ConfigMap%20to%20ensure%20that%20the%20GitLab%20Runner's%20configuration%20remains%20up-to-date%20and%20consistent%20across%20deployments. -permalink: catalog/deployment/gitlab-runner-deployment-129c524b-ead9-4170-b236-a1c9dd274ece.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/129c524b-ead9-4170-b236-a1c9dd274ece/0.0.1/design.yml' -downloadLink: 129c524b-ead9-4170-b236-a1c9dd274ece/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/189a3e71-8be9-4e64-9fed-150a9b1060de.md b/collections/_catalog/deployment/189a3e71-8be9-4e64-9fed-150a9b1060de.md deleted file mode 100644 index b27c5b3758..0000000000 --- a/collections/_catalog/deployment/189a3e71-8be9-4e64-9fed-150a9b1060de.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Resilient Web App -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - kubernetes -patternId: 189a3e71-8be9-4e64-9fed-150a9b1060de -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/189a3e71-8be9-4e64-9fed-150a9b1060de-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/189a3e71-8be9-4e64-9fed-150a9b1060de-dark.png -patternInfo: | - This is a simple app that uses nginx as a web proxy for improving the resiliency of web app -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/resilient-web-app-189a3e71-8be9-4e64-9fed-150a9b1060de.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/189a3e71-8be9-4e64-9fed-150a9b1060de/0.0.1/design.yml' -downloadLink: 189a3e71-8be9-4e64-9fed-150a9b1060de/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1abccf09-dcb8-46e4-8cac-f9e33c27516d.md b/collections/_catalog/deployment/1abccf09-dcb8-46e4-8cac-f9e33c27516d.md deleted file mode 100644 index c30cd868c5..0000000000 --- a/collections/_catalog/deployment/1abccf09-dcb8-46e4-8cac-f9e33c27516d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: AWS rds controller -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - aws-rds-controller -patternId: 1abccf09-dcb8-46e4-8cac-f9e33c27516d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1abccf09-dcb8-46e4-8cac-f9e33c27516d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1abccf09-dcb8-46e4-8cac-f9e33c27516d-dark.png -patternInfo: | - This%20YAML%20manifest%20defines%20a%20Kubernetes%20Deployment%20for%20the%20ACK%20RDS%20Controller%20application.%20It%20orchestrates%20the%20deployment%20of%20the%20application%20within%20a%20Kubernetes%20cluster%2C%20ensuring%20its%20availability%20and%20scalability.%20The%20manifest%20specifies%20various%20parameters%20such%20as%20the%20number%20of%20replicas%2C%20pod%20template%20configurations%20including%20container%20settings%2C%20environment%20variables%2C%20resource%20limits%2C%20and%20security%20context.%20Additionally%2C%20it%20includes%20probes%20for%20health%20checks%2C%20node%20selection%20preferences%2C%20tolerations%2C%20and%20affinity%20rules%20for%20optimal%20scheduling.%20The%20manifest%20encapsulates%20the%20deployment%20requirements%20necessary%20for%20the%20ACK%20RDS%20Controller%20application%20to%20run%20effectively%20in%20a%20Kubernetes%20environment. -patternCaveats: | - 1.%20Resource%20Allocation%3A%20Ensure%20that%20resource%20requests%20and%20limits%20are%20appropriately%20configured%20based%20on%20the%20expected%20workload%20of%20the%20application%20to%20avoid%20resource%20contention%20and%20potential%20performance%20issues.%0A%0A2.%20Security%20Configuration%3A%20Review%20the%20security%20context%20settings%2C%20including%20privilege%20escalation%2C%20runAsNonRoot%2C%20and%20capabilities%2C%20to%20enforce%20security%20best%20practices%20and%20minimize%20the%20risk%20of%20unauthorized%20access%20or%20privilege%20escalation%20within%20the%20container.%0A%0A3.%20Probe%20Configuration%3A%20Validate%20the%20configuration%20of%20liveness%20and%20readiness%20probes%20to%20ensure%20they%20accurately%20reflect%20the%20health%20and%20readiness%20of%20the%20application.%20Incorrect%20probe%20settings%20can%20lead%20to%20unnecessary%20pod%20restarts%20or%20deployment%20issues.%0A%0A4.%20Environment%20Variables%3A%20Double-check%20the%20environment%20variables%20provided%20to%20the%20container%2C%20ensuring%20they%20are%20correctly%20set%20and%20necessary%20for%20the%20application's%20functionality.%20Incorrect%20or%20missing%20environment%20variables%20can%20cause%20runtime%20errors%20or%20unexpected%20behavior.%0A%0A5.%20Volume%20Mounts%3A%20Verify%20the%20volume%20mounts%20defined%20in%20the%20deployment%2C%20especially%20if%20the%20application%20requires%20access%20to%20specific%20data%20or%20configuration%20files.%20Incorrect%20volume%20configurations%20can%20result%20in%20data%20loss%20or%20application%20malfunction. -permalink: catalog/deployment/aws-rds-controller-1abccf09-dcb8-46e4-8cac-f9e33c27516d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1abccf09-dcb8-46e4-8cac-f9e33c27516d/0.0.1/design.yml' -downloadLink: 1abccf09-dcb8-46e4-8cac-f9e33c27516d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1d2ca262-3d69-4bfd-86ff-61b3c9162881.md b/collections/_catalog/deployment/1d2ca262-3d69-4bfd-86ff-61b3c9162881.md deleted file mode 100644 index d0ab7c9203..0000000000 --- a/collections/_catalog/deployment/1d2ca262-3d69-4bfd-86ff-61b3c9162881.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Istio HTTP Header Filter (Clone) -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: deployment -compatibility: - - istio-operator - - istio-base - - kubernetes -patternId: 1d2ca262-3d69-4bfd-86ff-61b3c9162881 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1d2ca262-3d69-4bfd-86ff-61b3c9162881-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1d2ca262-3d69-4bfd-86ff-61b3c9162881-dark.png -patternInfo: | - This is a test design -patternCaveats: | - NA -permalink: catalog/deployment/istio-http-header-filter-clone-1d2ca262-3d69-4bfd-86ff-61b3c9162881.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1d2ca262-3d69-4bfd-86ff-61b3c9162881/0.0.1/design.yml' -downloadLink: 1d2ca262-3d69-4bfd-86ff-61b3c9162881/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1d3b05ee-7c11-4c01-be93-81c3bb1b6524.md b/collections/_catalog/deployment/1d3b05ee-7c11-4c01-be93-81c3bb1b6524.md deleted file mode 100644 index e69ddbe8f1..0000000000 --- a/collections/_catalog/deployment/1d3b05ee-7c11-4c01-be93-81c3bb1b6524.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Emojivoto Application -publishedVersion: 0.0.1 -userId: 173202fe-b94d-4064-8a86-1cf063732884 -userName: Ashish Tiwari -userAvatarURL: https://layer5.io/static/7b1f08e10d271cbfd963c7d435cf84ac/416c3/ashish-tiwari.webp -type: deployment -compatibility: - - kubernetes -patternId: 1d3b05ee-7c11-4c01-be93-81c3bb1b6524 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20design%20deploys%20Linkerd%20sample%20emojivoto%20application. -patternCaveats: | - Ensure%20enough%20resources%20are%20available%20in%20the%20cluster -permalink: catalog/deployment/emojivoto-application-1d3b05ee-7c11-4c01-be93-81c3bb1b6524.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1d3b05ee-7c11-4c01-be93-81c3bb1b6524/0.0.1/design.yml' -downloadLink: 1d3b05ee-7c11-4c01-be93-81c3bb1b6524/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1e2478e0-7611-4d4f-a44f-ea02cebf7b91.md b/collections/_catalog/deployment/1e2478e0-7611-4d4f-a44f-ea02cebf7b91.md deleted file mode 100644 index 5c0f634f95..0000000000 --- a/collections/_catalog/deployment/1e2478e0-7611-4d4f-a44f-ea02cebf7b91.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: postgreSQL cluster -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - postgres-operator -patternId: 1e2478e0-7611-4d4f-a44f-ea02cebf7b91 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1e2478e0-7611-4d4f-a44f-ea02cebf7b91-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1e2478e0-7611-4d4f-a44f-ea02cebf7b91-dark.png -patternInfo: | - This%20YAML%20configuration%20defines%20a%20PostgreSQL%20cluster%20deployment%20tailored%20for%20Google%20Kubernetes%20Engine%20(GKE)%20utilizing%20the%20Cloud%20Native%20PostgreSQL%20(CNPG)%20operator.%20The%20cluster%2C%20named%20%22gke-pg-cluster%2C%22%20is%20designed%20to%20offer%20a%20standard%20PostgreSQL%20environment%2C%20featuring%20three%20instances%20for%20redundancy%20and%20high%20availability.%20Each%20instance%20is%20provisioned%20with%202Gi%20of%20premium%20storage%2C%20ensuring%20robust%20data%20persistence.%20Resource%20allocations%20are%20specified%2C%20with%20each%20instance%20requesting%201Gi%20of%20memory%20and%201000m%20(milliCPU)%20of%20CPU%2C%20and%20limits%20set%20to%20the%20same%20values.%20Additionally%2C%20the%20cluster%20is%20configured%20with%20pod%20anti-affinity%2C%20promoting%20distribution%20across%20nodes%20for%20fault%20tolerance.%20Host-based%20authentication%20is%20enabled%20for%20security%2C%20permitting%20access%20from%20IP%20range%2010.48.0.0%2F20%20using%20the%20%22md5%22%20method.%20Monitoring%20capabilities%20are%20integrated%2C%20facilitated%20by%20enabling%20pod%20monitoring.%20The%20configuration%20also%20includes%20tolerations%20and%20additional%20pod%20affinity%20rules%2C%20enhancing%20scheduling%20flexibility%20and%20optimizing%20resource%20utilization%20within%20the%20Kubernetes%20environment.%20This%20deployment%20exemplifies%20a%20robust%20and%20scalable%20PostgreSQL%20infrastructure%20optimized%20for%20cloud-native%20environments%2C%20aligning%20with%20best%20practices%20for%20reliability%2C%20performance%2C%20and%20security. -patternCaveats: | - 1.%20Resource%20Requirements%3A%20The%20specified%20resource%20requests%20and%20limits%20(memory%20and%20CPU)%20should%20be%20carefully%20evaluated%20to%20ensure%20they%20align%20with%20the%20expected%20workload%20demands.%20Adjustments%20may%20be%20necessary%20based%20on%20actual%20usage%20patterns%20and%20performance%20requirements.%0A%0A2.%20Storage%20Class%3A%20The%20choice%20of%20storage%20class%20(%22premium-rwo%22%20in%20this%20case)%20should%20be%20reviewed%20to%20ensure%20it%20meets%20performance%2C%20availability%2C%20and%20cost%20requirements.%20Depending%20on%20the%20workload%20characteristics%2C%20other%20storage%20classes%20may%20be%20more%20suitable.%0A%0A3.%20Networking%20Configuration%3A%20The%20configured%20host-based%20authentication%20rules%20may%20need%20adjustment%20based%20on%20the%20network%20environment%20and%20security%20policies%20in%20place.%20Ensure%20that%20only%20authorized%20entities%20have%20access%20to%20the%20PostgreSQL%20cluster. -permalink: catalog/deployment/postgresql-cluster-1e2478e0-7611-4d4f-a44f-ea02cebf7b91.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1e2478e0-7611-4d4f-a44f-ea02cebf7b91/0.0.1/design.yml' -downloadLink: 1e2478e0-7611-4d4f-a44f-ea02cebf7b91/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7.md b/collections/_catalog/deployment/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7.md deleted file mode 100644 index 57e6d5ae41..0000000000 --- a/collections/_catalog/deployment/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: doks-nginx-deployment -publishedVersion: 0.0.1 -userId: 878488d5-c394-4b04-91b4-fd2f9e67ffaf -userName: Vivek Vishal -userAvatarURL: https://lh3.googleusercontent.com/a/AEdFTp4cegl_eVvmX8msycqpmZqZjkpHkrR5ZAZLOANmjg=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7-dark.png -patternInfo: | - This is a sample design used for exploring kubernetes deployment and service -patternCaveats: | - No caveats. Free to reuses and distribute -permalink: catalog/deployment/doks-nginx-deployment-1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7/0.0.1/design.yml' -downloadLink: 1f3c7dcd-e49a-4bf7-985a-661d6c64d8d7/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b.md b/collections/_catalog/deployment/1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b.md deleted file mode 100644 index fb6babac91..0000000000 --- a/collections/_catalog/deployment/1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Example Edge-Network Relationship ' -publishedVersion: 0.0.1 -userId: 79089163-7195-4727-9be4-7254a673ed46 -userName: Ritik Saxena -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The%20design%20showcases%20the%20operational%20dynamics%20of%20the%20Edge-Network%20Relationship.%20There%20are%20two%20ways%20you%20can%20use%20this%20design%20in%20your%20architecture%20design.%0A1.%20Cloning%20this%20design%20by%20clicking%20the%20clone%20button.%0A2.%20Start%20from%20scratch%20by%20creating%20an%20edge-network%20relationship%20on%20your%20own.%0A%0A%3Cstrong%3EHow%20to%20create%20an%20Edge-Network%20relationship%20on%20your%20own%3F%3C%2Fstrong%3E%0A%0A1.%20Navigate%20to%20MeshMap.%0A2.%20Click%20on%20the%20Kubernetes%20icon%20inside%20the%20dock%20it%20will%20open%20a%20Kubernetes%20drawer%20from%20where%20you%20can%20select%20any%20component%20that%20Kubernetes%20supports.%0A3.%20Search%20for%20the%20Ingress%20and%20Service%20component%20from%20the%20search%20bar%20provided%20in%20the%20drawer.%0A4.%20Drag-n-drop%20both%20the%20components%20on%20the%20canvas.%0A5.%20Hover%20over%20the%20Ingress%20component%2C%20Some%20handlebars%20will%20show%20up%20on%20four%20sides%20of%20the%20component.%20%0A6.%20Move%20the%20cursor%20close%20to%20either%20of%20the%20handlebars%2C%20an%20arrow%20will%20show%20up%2C%20click%20on%20that%20arrow.%20This%20will%20open%20up%20two%20options%3A%0A%20%20%20%201.%20%3Cstrong%3E%20Question%20mark%3A%20%3C%2Fstrong%3E%20%20Opens%20the%20Help%20Center%0A%20%20%20%202.%20%3Cstrong%3EArrow%20(Edge%20handle)%3A%20%3C%2Fstrong%3E%20This%20edge%20handle%20is%20used%20for%20creating%20the%20edge%20relationship%0A7.%20Click%20on%20the%20Edge%20handle%20and%20move%20your%20cursor%20close%20to%20the%20Service%20component.%20An%20edge%20will%20appear%20going%20from%20the%20Ingress%20to%20Service%20component%20which%20represents%20the%20edge%20relationship%20between%20the%20two%20components.%0A8.%20Congratulations!%20You%20just%20created%20a%20relationship%20between%20Ingress%20and%20Service. -patternCaveats: | - No%20Caveats%20or%20Considerations -permalink: catalog/deployment/example-edge-network-relationship-1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b/0.0.1/design.yml' -downloadLink: 1f79b0c6-2efe-4ee9-b08c-e1bd07a3926b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/210422ee-a1c4-4844-9591-bab374608cba.md b/collections/_catalog/deployment/210422ee-a1c4-4844-9591-bab374608cba.md deleted file mode 100644 index 34f8cf3802..0000000000 --- a/collections/_catalog/deployment/210422ee-a1c4-4844-9591-bab374608cba.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Litmus Chaos Operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - litmus-core -patternId: 210422ee-a1c4-4844-9591-bab374608cba -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/210422ee-a1c4-4844-9591-bab374608cba-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/210422ee-a1c4-4844-9591-bab374608cba-dark.png -patternInfo: | - This%20YAML%20file%20defines%20a%20Kubernetes%20Deployment%20for%20the%20Litmus%20Chaos%20Operator.%20It%20creates%20a%20single%20replica%20of%20the%20chaos-operator%20pod%20within%20the%20litmus%20namespace.%20The%20deployment%20is%20labeled%20for%20organization%20and%20management%20purposes%2C%20specifying%20details%20like%20the%20version%20and%20component.%20The%20container%20runs%20the%20litmuschaos%2Fchaos-operator%3Aci%20image%20with%20a%20command%20to%20enable%20leader%20election%20and%20sets%20various%20environment%20variables%20for%20operation.%20Additionally%2C%20it%20uses%20the%20litmus%20service%20account%20to%20manage%20permissions%2C%20ensuring%20the%20operator%20runs%20with%20the%20necessary%20access%20rights%20within%20the%20Kubernetes%20cluster. -patternCaveats: | - 1.%20Namespace%20Watch%3A%0AThe%20WATCH_NAMESPACE%20environment%20variable%20is%20set%20to%20an%20empty%20string%2C%20which%20means%20the%20operator%20will%20watch%20all%20namespaces.%20This%20can%20have%20security%20implications%20and%20might%20require%20broader%20permissions.%20Consider%20restricting%20it%20to%20specific%20namespaces%20if%20not%20required.%0A%0A2.%20Image%20Tag%3A%0AThe%20image%20is%20set%20to%20litmuschaos%2Fchaos-operator%3Aci%2C%20which%20uses%20the%20latest%20code%20from%20the%20continuous%20integration%20pipeline.%20This%20might%20include%20unstable%20or%20untested%20features.%20For%20production%20environments%2C%20it's%20recommended%20to%20use%20a%20stable%20and%20tagged%20version%20of%20the%20image.%0A%0A3.%20Leader%20Election%3A%0AThe%20-leader-elect%3Dtrue%20argument%20ensures%20high%20availability%20by%20allowing%20only%20one%20active%20instance%20of%20the%20operator%20at%20a%20time.%20Ensure%20that%20this%20behavior%20aligns%20with%20your%20high-availability%20requirements.%0A%0A4.%20Resource%20Limits%20and%20Requests%3A%0AThere%20are%20no%20resource%20requests%20or%20limits%20defined%20for%20the%20chaos-operator%20container.%20It's%20good%20practice%20to%20specify%20these%20to%20ensure%20the%20container%20has%20the%20necessary%20resources%20and%20to%20prevent%20it%20from%20consuming%20excessive%20resources.%0A -permalink: catalog/deployment/litmus-chaos-operator-210422ee-a1c4-4844-9591-bab374608cba.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/210422ee-a1c4-4844-9591-bab374608cba/0.0.1/design.yml' -downloadLink: 210422ee-a1c4-4844-9591-bab374608cba/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/22e28213-8c94-49d5-b104-3b7feee84b5e.md b/collections/_catalog/deployment/22e28213-8c94-49d5-b104-3b7feee84b5e.md deleted file mode 100644 index a3f556e2ce..0000000000 --- a/collections/_catalog/deployment/22e28213-8c94-49d5-b104-3b7feee84b5e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: voting_app -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 22e28213-8c94-49d5-b104-3b7feee84b5e -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/22e28213-8c94-49d5-b104-3b7feee84b5e-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/22e28213-8c94-49d5-b104-3b7feee84b5e-dark.png -patternInfo: | - A%20deployment%20of%20voting%20app%20in%20a%20Kubernetes%20environment%2C%20the%20%22voting_app%22%20design%20leverages%20container%20orchestration%20to%20ensure%20scalability%2C%20reliability%2C%20and%20ease%20of%20deployment. -patternCaveats: | - No%20caveats -permalink: catalog/deployment/voting-app-22e28213-8c94-49d5-b104-3b7feee84b5e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/22e28213-8c94-49d5-b104-3b7feee84b5e/0.0.1/design.yml' -downloadLink: 22e28213-8c94-49d5-b104-3b7feee84b5e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/23d03e32-4232-40f1-b953-0416e47b9b5d.md b/collections/_catalog/deployment/23d03e32-4232-40f1-b953-0416e47b9b5d.md deleted file mode 100644 index a013688b2d..0000000000 --- a/collections/_catalog/deployment/23d03e32-4232-40f1-b953-0416e47b9b5d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Kubernetes Engine Training Example ' -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - -patternId: 23d03e32-4232-40f1-b953-0416e47b9b5d -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - "" -patternCaveats: | - "" -permalink: catalog/deployment/kubernetes-engine-training-example-23d03e32-4232-40f1-b953-0416e47b9b5d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/23d03e32-4232-40f1-b953-0416e47b9b5d/0.0.1/design.yml' -downloadLink: 23d03e32-4232-40f1-b953-0416e47b9b5d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/2512c0cb-385d-40de-b1f5-bc4a67131538.md b/collections/_catalog/deployment/2512c0cb-385d-40de-b1f5-bc4a67131538.md deleted file mode 100644 index 4c681d9a5e..0000000000 --- a/collections/_catalog/deployment/2512c0cb-385d-40de-b1f5-bc4a67131538.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: my-sql-with-cinder-vol-plugin -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 2512c0cb-385d-40de-b1f5-bc4a67131538 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2512c0cb-385d-40de-b1f5-bc4a67131538-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2512c0cb-385d-40de-b1f5-bc4a67131538-dark.png -patternInfo: | - Cinder is a Block Storage service for OpenStack. This example shows how it can be used as an attachment mounted to a pod in Kubernetes. Start kubelet with cloud provider as openstack with a valid cloud config Sample cloud_config [Global] auth-url=https://os-identity.vip.foo.bar.com:5443/v2.0 username=user password=pass region=region1 tenant-id=0c331a1df18571594d49fe68asa4e Create a cinder volume Ex cinder create --display-name=test-repo 2Use the id of the cinder volume created to create a pod definition Create a new pod with the definition cluster/kubectl.sh create -f examples/mysql-cinder-pd/mysql.yaml This should now 1. Attach the specified volume to the kubelet's host machine\\\\n2. Format the volume if required (only if the volume specified is not already formatted to the fstype specified) 3. Mount it on the kubelet's host machine 4. Spin up a container with this volume mounted to the path specified in the pod definition -patternCaveats: | - Currently the cinder volume plugin is designed to work only on linux hosts and offers ext4 and ext3 as supported fs types Make sure that kubelet host machine has the following executables.\\\\nEnsure cinder is installed and configured properly in the region in which kubelet is spun up -permalink: catalog/deployment/my-sql-with-cinder-vol-plugin-2512c0cb-385d-40de-b1f5-bc4a67131538.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2512c0cb-385d-40de-b1f5-bc4a67131538/0.0.1/design.yml' -downloadLink: 2512c0cb-385d-40de-b1f5-bc4a67131538/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/2649785a-6cb1-4671-b625-a790ac375043.md b/collections/_catalog/deployment/2649785a-6cb1-4671-b625-a790ac375043.md deleted file mode 100644 index a910a71a8f..0000000000 --- a/collections/_catalog/deployment/2649785a-6cb1-4671-b625-a790ac375043.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Persistence-volume-claim -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: deployment -compatibility: - - kubernetes -patternId: 2649785a-6cb1-4671-b625-a790ac375043 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2649785a-6cb1-4671-b625-a790ac375043-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2649785a-6cb1-4671-b625-a790ac375043-dark.png -patternInfo: | - Defines a Kubernetes PersistentVolumeClaim (PVC) requesting 10Gi storage with 'manual' storage class. Supports both ReadWriteMany and ReadWriteOnce access modes, with optional label-based PV selection. Carefully adjust storage size for specific storage solutions, and consider annotations, security, monitoring, and scalability needs. -patternCaveats: | - Ensure that the chosen storageClassName is properly configured and available in your cluster. Be cautious about the ReadWriteMany and ReadWriteOnce access modes, as they impact compatibility with PersistentVolumes (PVs). The selector should match existing PVs in your cluster if used. Adjust the storage size to align with your storage solution, keeping in mind the AWS EFS special case. Review the need for annotations, confirm the namespace, and implement security measures. Monitor and set up alerts for your PVC, and plan for backup and disaster recovery. Lastly, ensure scalability to meet your application's storage requirements. -permalink: catalog/deployment/persistence-volume-claim-2649785a-6cb1-4671-b625-a790ac375043.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2649785a-6cb1-4671-b625-a790ac375043/0.0.1/design.yml' -downloadLink: 2649785a-6cb1-4671-b625-a790ac375043/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/28715e69-c6c1-4f96-bfa2-05113b00bae0.md b/collections/_catalog/deployment/28715e69-c6c1-4f96-bfa2-05113b00bae0.md deleted file mode 100644 index 7ebaddd49a..0000000000 --- a/collections/_catalog/deployment/28715e69-c6c1-4f96-bfa2-05113b00bae0.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: CryptoMB-TLS-handshake-acceleration-for-Istio -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: 28715e69-c6c1-4f96-bfa2-05113b00bae0 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/28715e69-c6c1-4f96-bfa2-05113b00bae0-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/28715e69-c6c1-4f96-bfa2-05113b00bae0-dark.png -patternInfo: | - Depending upon use cases, when an ingress gateway must handle a large number of incoming TLS and secured service-to-service connections through sidecar proxies, the load on Envoy increases. The potential performance depends on many factors, such as size of the cpuset on which Envoy is running, incoming traffic patterns, and key size. These factors can impact Envoy serving many new incoming TLS requests. To achieve performance improvements and accelerated handshakes, a new feature was introduced in Envoy 1.20 and Istio 1.14. It can be achieved with 3rd Gen Intel® Xeon® Scalable processors, the Intel® Integrated Performance Primitives (Intel® IPP) crypto library, CryptoMB Private Key Provider Method support in Envoy, and Private Key Provider configuration in Istio using ProxyConfig.\\\\\\\\\\\\\\\\n\\\\\\\\\\\\\\\\nEnvoy uses BoringSSL as the default TLS library. BoringSSL supports setting private key methods for offloading asynchronous private key operations, and Envoy implements a private key provider framework to allow creation of Envoy extensions which handle TLS handshakes private key operations (signing and decryption) using the BoringSSL hooks.\\\\\\\\\\\\\\\\n\\\\\\\\\\\\\\\\nCryptoMB private key provider is an Envoy extension which handles BoringSSL TLS RSA operations using Intel AVX-512 multi-buffer acceleration. When a new handshake happens, BoringSSL invokes the private key provider to request the cryptographic operation, and then the control returns to Envoy. The RSA requests are gathered in a buffer. When the buffer is full or the timer expires, the private key provider invokes Intel AVX-512 processing of the buffer. When processing is done, Envoy is notified that the cryptographic operation is done and that it may continue with the handshakes. -patternCaveats: | - None -permalink: catalog/deployment/cryptomb-tls-handshake-acceleration-for-istio-28715e69-c6c1-4f96-bfa2-05113b00bae0.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/28715e69-c6c1-4f96-bfa2-05113b00bae0/0.0.1/design.yml' -downloadLink: 28715e69-c6c1-4f96-bfa2-05113b00bae0/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/29b94780-865c-460b-b852-cc5c31730561.md b/collections/_catalog/deployment/29b94780-865c-460b-b852-cc5c31730561.md deleted file mode 100644 index a96ab75117..0000000000 --- a/collections/_catalog/deployment/29b94780-865c-460b-b852-cc5c31730561.md +++ /dev/null @@ -1,47 +0,0 @@ ---- -layout: item -name: nginx k8s deployment -publishedVersion: 0.0.5 -userId: 551da661-8632-415f-b69f-ecb298b88575 -userName: Ijeoma Eti -userAvatarURL: -type: deployment -compatibility: - - kubernetes - - nginx-service-mesh -patternId: 29b94780-865c-460b-b852-cc5c31730561 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The design represented by the nginx-deployment.yaml file sets up a basic web server infrastructure using Kubernetes resources. - -Key Components: -Namespace (nginx-namespace): - -A separate namespace called nginx-namespace is created to isolate and organize the Nginx application and its resources from other applications running in the cluster. -Deployment (nginx-deployment): - -Deploys a web server using the Nginx image (nginx:latest). -Two replicas (instances) of the Nginx server are created, ensuring high availability and load distribution across multiple pods. -Each pod in the deployment runs the Nginx container and listens on port 80. -Service (nginx-service): - -Exposes the Nginx application to the external network via a LoadBalancer service type. -The service forwards traffic from external clients to the Nginx pods on port 80, making the web server accessible outside the cluster. -The service ensures that traffic is balanced between the two Nginx pods. -Purpose of the Design: -This design demonstrates how to deploy a simple, scalable web server using Kubernetes. By visualizing this in Meshery, you can: - -Understand the relationship between different Kubernetes resources (Namespace, Deployment, and Service). -Observe how traffic flows from external clients through the LoadBalancer to the Nginx pods. -Learn the basics of deploying and managing stateless applications in Kubernetes. -Use this as a foundation to explore more advanced Kubernetes concepts like autoscaling, rolling updates, and integration with service meshes. -In summary, this design sets up a highly available Nginx web server with external access and load balancing, making it a fundamental example of how to deploy and expose applications using Kubernetes. -patternCaveats: | - 1. LoadBalancer Requirement: Needs a cloud provider or environment that supports LoadBalancer services; otherwise, external access might not work. -2. Namespace Conflicts: Ensure the nginx-namespace is properly managed to avoid conflicts with existing resources. -3. Resource Availability: The cluster must have enough resources to run the two Nginx replicas. -Default Nginx Config: Uses basic Nginx settings; not suitable for production without customization. -permalink: catalog/deployment/nginx-k8s-deployment-29b94780-865c-460b-b852-cc5c31730561.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/29b94780-865c-460b-b852-cc5c31730561/0.0.5/design.yml' -downloadLink: 29b94780-865c-460b-b852-cc5c31730561/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49.md b/collections/_catalog/deployment/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49.md deleted file mode 100644 index 64a9f727e8..0000000000 --- a/collections/_catalog/deployment/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Autogenerated -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - thanos-operator -patternId: 2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49-dark.png -patternInfo: | - This%20YAML%20manifest%20defines%20a%20Kubernetes%20Deployment%20for%20the%20Thanos%20Operator%2C%20named%20%22thanos-operator%2C%22%20with%20one%20replica.%20The%20deployment's%20pod%20template%20is%20labeled%20%22app%3A%20thanos-operator%22%20and%20includes%20security%20settings%20to%20run%20as%20a%20non-root%20user%20with%20specific%20user%20(1000)%20and%20group%20(2000)%20IDs.%20The%20main%20container%2C%20also%20named%20%22thanos-operator%2C%22%20uses%20the%20%22thanos-io%2Fthanos%3Alatest%22%20image%2C%20runs%20with%20minimal%20privileges%2C%20and%20starts%20with%20the%20argument%20%22--log.level%3Dinfo.%22%20It%20listens%20on%20port%208080%20for%20HTTP%20traffic%20and%20has%20liveness%20and%20readiness%20probes%20set%20to%20check%20the%20%22%2Fmetrics%22%20endpoint.%20Resource%20requests%20and%20limits%20are%20defined%20for%20CPU%20and%20memory.%20Additionally%2C%20the%20pod%20is%20scheduled%20on%20Linux%20nodes%20with%20specific%20node%20affinity%20rules%20and%20tolerations%20for%20certain%20node%20taints%2C%20ensuring%20appropriate%20node%20placement%20and%20scheduling. -patternCaveats: | - 1.%20Security%20Context%3A%0A%0A1.1%20The%20runAsUser%3A%201000%20and%20fsGroup%3A%202000%20settings%20are%20essential%20for%20running%20the%20container%20with%20non-root%20privileges.%20Ensure%20that%20these%20user%20IDs%20are%20correctly%20configured%20and%20have%20the%20necessary%20permissions%20within%20your%20environment.%0A%0A1.2%20Dropping%20all%20capabilities%20(drop%3A%20-%20ALL)%20enhances%20security%20but%20may%20limit%20certain%20functionalities.%20Verify%20that%20the%20Thanos%20container%20does%20not%20require%20any%20additional%20capabilities.%0A%0A2.%20Image%20Tag%3A%0A%0AThe%20image%20tag%20is%20set%20to%20%22latest%2C%22%20which%20can%20introduce%20instability%20since%20it%20pulls%20the%20most%20recent%20image%20version%20that%20might%20not%20be%20thoroughly%20tested.%20Consider%20specifying%20a%20specific%2C%20stable%20version%20tag%20for%20better%20control%20over%20updates%20and%20rollbacks.%0A%0A3.%20Resource%20Requests%20and%20Limits%3A%0A%0AThe%20defined%20resource%20requests%20and%20limits%20(memory%3A%20%2264Mi%22%2F%22128Mi%22%2C%20cpu%3A%20%22250m%22%2F%22500m%22)%20might%20need%20adjustment%20based%20on%20the%20actual%20workload%20and%20performance%20characteristics%20of%20the%20Thanos%20Operator%20in%20your%20environment.%20Monitor%20resource%20usage%20and%20tweak%20these%20settings%20accordingly%20to%20prevent%20resource%20starvation%20or%20over-provisioning. -permalink: catalog/deployment/autogenerated-2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49/0.0.1/design.yml' -downloadLink: 2b8ca8e9-b964-4102-8ee7-dbb2f1fbed49/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25.md b/collections/_catalog/deployment/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25.md deleted file mode 100644 index 0e5d7c54a4..0000000000 --- a/collections/_catalog/deployment/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25.md +++ /dev/null @@ -1,27 +0,0 @@ ---- -layout: item -name: WordPress and MySQL with Persistent Volume on Kubernetes -publishedVersion: 0.0.1 -userId: b7b7de05-4f68-4663-8249-15301cc0eb80 -userName: Nathan Johnson -userAvatarURL: https://img.freepik.com/premium-vector/young-man-avatar-character-vector-illustration-design_24877-18517.jpg -type: deployment -compatibility: - - istio-base - - istio-operator - - linkerd - - appmesh-controller - - nginx-ingress - - nginx - - consul - - nginx-service-mesh -patternId: 2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25-dark.png -patternInfo: | - This design includes a WordPress site and a MySQL database using Minikube. Both applications use PersistentVolumes and PersistentVolumeClaims to store data. -patternCaveats: | - Warning: This deployment is not suitable for production use cases, as it uses single instance WordPress and MySQL Pods. Consider using WordPress Helm Chart to deploy WordPress in production. -permalink: catalog/deployment/wordpress-and-mysql-with-persistent-volume-on-kubernetes-2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25/0.0.1/design.yml' -downloadLink: 2df29b2b-7e5e-4d8b-a5b3-3dea569f4d25/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3255f170-e2b1-48e8-bbed-40d4e0198a90.md b/collections/_catalog/deployment/3255f170-e2b1-48e8-bbed-40d4e0198a90.md deleted file mode 100644 index 2103b95555..0000000000 --- a/collections/_catalog/deployment/3255f170-e2b1-48e8-bbed-40d4e0198a90.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Hierarchical-Parent-Inventory-Relationship -publishedVersion: 0.0.4 -userId: 7cc3290b-9c57-4f93-8fb0-dbc5664c95a1 -userName: Awani Alero -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIsyS9IR90Bo2I56iqRPlYulzglXOKhqczvYvf31sttxczvwuTX=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 3255f170-e2b1-48e8-bbed-40d4e0198a90 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20represents%20a%20parent-child%20relationship%20between%20components%2C%20where%20one%20component%20is%20a%20dependency%20of%20another.%20Parent-child%20relationships%20show%20clear%20lineage%2C%20similar%20to%20a%20family%20tree.%0A%0AIn%20this%20design%2C%20the%20namespace%20serves%20as%20a%20parent%20to%20the%20config%20map%20and%20role. -patternCaveats: | - Dependency%20Awareness%3A%20Users%20should%20understand%20that%20the%20child%20components%20(e.g.%2C%20config%20maps%2C%20roles)%20depend%20on%20the%20parent%20(e.g.%2C%20namespace).%20If%20the%20parent%20component%20is%20deleted%20or%20modified%2C%20it%20will%20affect%20the%20child%20components.%0A%0A -permalink: catalog/deployment/hierarchical-parent-inventory-relationship-3255f170-e2b1-48e8-bbed-40d4e0198a90.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3255f170-e2b1-48e8-bbed-40d4e0198a90/0.0.4/design.yml' -downloadLink: 3255f170-e2b1-48e8-bbed-40d4e0198a90/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/32f10b2a-82eb-4ab9-b1f7-4f8c7f888011.md b/collections/_catalog/deployment/32f10b2a-82eb-4ab9-b1f7-4f8c7f888011.md deleted file mode 100644 index 424783ca9e..0000000000 --- a/collections/_catalog/deployment/32f10b2a-82eb-4ab9-b1f7-4f8c7f888011.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Jaeger operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - jaeger-operator -patternId: 32f10b2a-82eb-4ab9-b1f7-4f8c7f888011 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20for%20the%20Jaeger%20Operator.%20This%20Deployment%2C%20named%20%22jaeger-operator%2C%22%20specifies%20that%20a%20container%20will%20be%20created%20using%20the%20jaegertracing%2Fjaeger-operator%3Amaster%20image.%20The%20container%20runs%20with%20the%20argument%20%22start%2C%22%20which%20initiates%20the%20operator's%20main%20process.%20Additionally%2C%20the%20container%20is%20configured%20with%20an%20environment%20variable%2C%20LOG-LEVEL%2C%20set%20to%20%22debug%2C%22%20enabling%20detailed%20logging%20for%20troubleshooting%20and%20monitoring%20purposes.%20This%20setup%20allows%20the%20Jaeger%20Operator%20to%20manage%20Jaeger%20tracing%20instances%20within%20the%20Kubernetes%20cluster%2C%20ensuring%20efficient%20deployment%2C%20scaling%2C%20and%20maintenance%20of%20distributed%20tracing%20components. -patternCaveats: | - 1.%20Image%20Tag%3A%20The%20image%20tag%20master%20indicates%20that%20the%20latest%2C%20potentially%20unstable%20version%20of%20the%20Jaeger%20Operator%20is%20being%20used.%20For%20production%20environments%2C%20it's%20safer%20to%20use%20a%20specific%2C%20stable%20version%20to%20avoid%20unexpected%20issues.%0A%0A2.%20Resource%20Limits%20and%20Requests%3A%20The%20deployment%20does%20not%20specify%20resource%20requests%20and%20limits%20for%20the%20container.%20It's%20crucial%20to%20define%20these%20to%20ensure%20that%20the%20Jaeger%20Operator%20has%20enough%20CPU%20and%20memory%20to%20function%20correctly%2C%20while%20also%20preventing%20it%20from%20consuming%20excessive%20resources%20on%20the%20cluster.%0A%0A3.%20Replica%20Count%3A%20The%20spec%20section%20does%20not%20specify%20the%20number%20of%20replicas%20for%20the%20deployment.%20By%20default%2C%20Kubernetes%20will%20create%20one%20replica%2C%20which%20might%20not%20provide%20high%20availability.%20Consider%20increasing%20the%20replica%20count%20for%20redundancy.%0A%0A4.%20Namespace%3A%20The%20deployment%20does%20not%20specify%20a%20namespace.%20Ensure%20that%20the%20deployment%20is%20applied%20to%20the%20appropriate%20namespace%2C%20particularly%20if%20you%20have%20a%20multi-tenant%20cluster.%0A%0A5.%20Security%20Context%3A%20There%20is%20no%20security%20context%20defined.%20Adding%20a%20security%20context%20can%20enhance%20the%20security%20posture%20of%20the%20container%20by%20restricting%20permissions%20and%20enforcing%20best%20practices%20like%20running%20as%20a%20non-root%20user. -permalink: catalog/deployment/jaeger-operator-32f10b2a-82eb-4ab9-b1f7-4f8c7f888011.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/32f10b2a-82eb-4ab9-b1f7-4f8c7f888011/0.0.1/design.yml' -downloadLink: 32f10b2a-82eb-4ab9-b1f7-4f8c7f888011/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3546d0d4-ba6e-4c7e-9661-853ade11847f.md b/collections/_catalog/deployment/3546d0d4-ba6e-4c7e-9661-853ade11847f.md deleted file mode 100644 index 2a4548a19f..0000000000 --- a/collections/_catalog/deployment/3546d0d4-ba6e-4c7e-9661-853ade11847f.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Wordpress and MySql on Kubernetes -publishedVersion: 0.0.1 -userId: 6126611f-41d6-4206-8504-822a5262d110 -userName: David Hunter Hunter -userAvatarURL: -type: deployment -compatibility: - - kubernetes - - mysql-operator - - wordpress-operator -patternId: 3546d0d4-ba6e-4c7e-9661-853ade11847f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3546d0d4-ba6e-4c7e-9661-853ade11847f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3546d0d4-ba6e-4c7e-9661-853ade11847f-dark.png -patternInfo: | - This%20MeshMap%20design%20deploys%20a%20scalable%20and%20robust%20WordPress%20application%2C%20backed%20by%20a%20MySQL%20database%2C%20on%20a%20Kubernetes%20cluster.%20The%20design%20leverages%20Kubernetes%20resources%20to%20ensure%20high%20availability%2C%20efficient%20scaling%2C%20and%20ease%20of%20management%20for%20the%20WordPress%20site. -patternCaveats: | - 1.%20Ensure%20that%20your%20Kubernetes%20cluster%20has%20sufficient%20resources%20(CPU%2C%20memory%2C%20and%20storage)%20to%20handle%20the%20demands%20of%20both%20the%20WordPress%20and%20MySQL%20pods.%0A%0A2.%20Properly%20set%20resource%20requests%20and%20limits%20to%20avoid%20resource%20contention%2C%20which%20could%20affect%20performance. -permalink: catalog/deployment/wordpress-and-mysql-on-kubernetes-3546d0d4-ba6e-4c7e-9661-853ade11847f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3546d0d4-ba6e-4c7e-9661-853ade11847f/0.0.1/design.yml' -downloadLink: 3546d0d4-ba6e-4c7e-9661-853ade11847f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9.md b/collections/_catalog/deployment/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9.md deleted file mode 100644 index 500c622e2f..0000000000 --- a/collections/_catalog/deployment/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Prometheus-monitoring-ns -publishedVersion: 0.0.1 -userId: a551897f-da39-4d4d-812e-6b299e82c457 -userName: Freedisch Batale -userAvatarURL: https://drive.google.com/file/d/1z3rUqsmrAIWuVn5v1fxcfepXL7JkQT_0/view?usp=drive_link -type: deployment -compatibility: - - kubernetes -patternId: 36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9-dark.png -patternInfo: | - This is a simple prometheus montioring design -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/prometheus-monitoring-ns-36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9/0.0.1/design.yml' -downloadLink: 36f6c6df-7a99-420f-8d4d-fe0b2dffa5f9/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/37792455-294f-481b-a7a8-13e79ca835ca.md b/collections/_catalog/deployment/37792455-294f-481b-a7a8-13e79ca835ca.md deleted file mode 100644 index cdd7932750..0000000000 --- a/collections/_catalog/deployment/37792455-294f-481b-a7a8-13e79ca835ca.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: AWS cloudfront controller -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - aws-cloudfront-controller -patternId: 37792455-294f-481b-a7a8-13e79ca835ca -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20file%20defines%20a%20Kubernetes%20Deployment%20for%20the%20ack-cloudfront-controller%2C%20a%20component%20responsible%20for%20managing%20AWS%20CloudFront%20resources%20in%20a%20Kubernetes%20environment.%20The%20Deployment%20specifies%20that%20one%20replica%20of%20the%20pod%20should%20be%20maintained%20(replicas%3A%201).%20Metadata%20labels%20are%20provided%20for%20identification%20and%20management%20purposes%2C%20such%20as%20app.kubernetes.io%2Fname%2C%20app.kubernetes.io%2Finstance%2C%20and%20others%2C%20to%20ensure%20proper%20categorization%20and%20management%20by%20Helm.%20The%20pod%20template%20section%20within%20the%20Deployment%20spec%20outlines%20the%20desired%20state%20of%20the%20pods%2C%20including%20the%20container's%20configuration.%0A%0AThe%20container%2C%20named%20controller%2C%20uses%20the%20ack-cloudfront-controller%3Alatest%20image%20and%20will%20run%20a%20binary%20(.%2Fbin%2Fcontroller)%20with%20specific%20arguments%20to%20configure%20its%20operation%2C%20such%20as%20AWS%20region%2C%20endpoint%20URL%2C%20logging%20level%2C%20and%20resource%20tags.%20Environment%20variables%20are%20defined%20to%20provide%20necessary%20configuration%20values%20to%20the%20container.%20The%20container%20exposes%20an%20HTTP%20port%20(8080)%20and%20includes%20liveness%20and%20readiness%20probes%20to%20monitor%20and%20manage%20its%20health%2C%20ensuring%20the%20application%20is%20running%20properly%20and%20is%20ready%20to%20serve%20traffic. -patternCaveats: | - 1.%20Environment%20Variables%3A%0AVerify%20that%20the%20environment%20variables%20such%20as%20AWS_REGION%2C%20AWS_ENDPOINT_URL%2C%20and%20ACK_LOG_LEVEL%20are%20correctly%20set%20according%20to%20your%20AWS%20environment%20and%20logging%20preferences.%20Incorrect%20values%20could%20lead%20to%20improper%20functioning%20or%20failure%20of%20the%20controller.%0A%0A2.%20Secrets%20Management%3A%0AIf%20AWS%20credentials%20are%20required%2C%20make%20sure%20the%20AWS_SHARED_CREDENTIALS_FILE%20and%20AWS_PROFILE%20environment%20variables%20are%20correctly%20configured%20and%20the%20referenced%20Kubernetes%20secret%20exists.%20Missing%20or%20misconfigured%20secrets%20can%20prevent%20the%20controller%20from%20authenticating%20with%20AWS.%0A%0A3.%20Resource%20Requests%20and%20Limits%3A%0AReview%20and%20adjust%20the%20resource%20requests%20and%20limits%20to%20match%20the%20expected%20workload%20and%20available%20cluster%20resources.%20Insufficient%20resources%20can%20lead%20to%20performance%20issues%2C%20while%20overly%20generous%20requests%20can%20waste%20cluster%20resources.%0A%0A4.%20Probes%20Configuration%3A%0AThe%20liveness%20and%20readiness%20probes%20are%20configured%20with%20specific%20paths%20and%20ports.%20Ensure%20that%20these%20endpoints%20are%20correctly%20implemented%20in%20the%20application.%20Misconfigured%20probes%20can%20result%20in%20the%20pod%20being%20killed%20or%20marked%20as%20unready. -permalink: catalog/deployment/aws-cloudfront-controller-37792455-294f-481b-a7a8-13e79ca835ca.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/37792455-294f-481b-a7a8-13e79ca835ca/0.0.1/design.yml' -downloadLink: 37792455-294f-481b-a7a8-13e79ca835ca/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3a38cc90-e998-4f2a-9747-17f2d7ddf313.md b/collections/_catalog/deployment/3a38cc90-e998-4f2a-9747-17f2d7ddf313.md deleted file mode 100644 index 449a23b04c..0000000000 --- a/collections/_catalog/deployment/3a38cc90-e998-4f2a-9747-17f2d7ddf313.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: grafana deployment -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - grafana-ui-server -patternId: 3a38cc90-e998-4f2a-9747-17f2d7ddf313 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3a38cc90-e998-4f2a-9747-17f2d7ddf313-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3a38cc90-e998-4f2a-9747-17f2d7ddf313-dark.png -patternInfo: | - The%20provided%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20named%20%22grafana%22%20within%20the%20%22monitoring%22%20namespace.%20This%20Deployment%20ensures%20the%20availability%20of%20one%20instance%20of%20Grafana%2C%20a%20monitoring%20and%20visualization%20tool.%20It%20specifies%20resource%20requirements%2C%20including%20memory%20and%20CPU%20limits%2C%20and%20mounts%20volumes%20for%20persistent%20storage%20and%20configuration.%20The%20container%20runs%20the%20latest%20version%20of%20the%20Grafana%20image%2C%20exposing%20port%203000%20for%20access.%20The%20configuration%20also%20includes%20a%20Pod%20template%20with%20labels%20for%20Pod%20identification%20and%20a%20selector%20to%20match%20labels%20for%20managing%20Pods. -patternCaveats: | - 1.%20Container%20Image%20Version%3A%20While%20the%20configuration%20uses%20grafana%2Fgrafana%3Alatest%20for%20the%20container%20image%2C%20it's%20important%20to%20note%20that%20relying%20on%20the%20latest%20tag%20can%20introduce%20instability%20if%20Grafana%20publishes%20a%20new%20version%20that%20includes%20breaking%20changes%20or%20bugs.%20Consider%20specifying%20a%20specific%20version%20tag%20for%20more%20predictable%20behavior.%0A%0A2.%20Resource%20Limits%3A%20Resource%20limits%20(memory%20and%20cpu)%20are%20specified%20for%20the%20container.%20Ensure%20that%20these%20limits%20are%20appropriate%20for%20your%20deployment%20environment%20and%20the%20expected%20workload%20of%20Grafana.%20Adjust%20these%20limits%20based%20on%20performance%20testing%20and%20monitoring.%0A%0A3.%20Storage%3A%20The%20configuration%20uses%20an%20emptyDir%20volume%20for%20Grafana's%20storage.%20This%20volume%20is%20ephemeral%20and%20will%20be%20deleted%20if%20the%20Pod%20restarts%20or%20is%20rescheduled%20to%20a%20different%20node.%20Consider%20using%20a%20persistent%20volume%20(e.g.%2C%20PersistentVolumeClaim)%20for%20storing%20Grafana%20data%20to%20ensure%20data%20persistence%20across%20Pod%20restarts.%0A%0A4.%20Configurations%3A%20Configuration%20for%20Grafana's%20data%20sources%20is%20mounted%20using%20a%20ConfigMap.%20Ensure%20that%20the%20ConfigMap%20(grafana-datasources)%20is%20properly%20configured%20with%20the%20required%20data%20source%20configurations.%20Verify%20that%20changes%20to%20the%20ConfigMap%20are%20propagated%20to%20the%20Grafana%20Pod%20without%20downtime. -permalink: catalog/deployment/grafana-deployment-3a38cc90-e998-4f2a-9747-17f2d7ddf313.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3a38cc90-e998-4f2a-9747-17f2d7ddf313/0.0.1/design.yml' -downloadLink: 3a38cc90-e998-4f2a-9747-17f2d7ddf313/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3b2a210d-77b4-4267-bc8e-bc32758edf76.md b/collections/_catalog/deployment/3b2a210d-77b4-4267-bc8e-bc32758edf76.md deleted file mode 100644 index 0e5812ff22..0000000000 --- a/collections/_catalog/deployment/3b2a210d-77b4-4267-bc8e-bc32758edf76.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: meshery-cilium-deployment -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - cilium - - kubernetes -patternId: 3b2a210d-77b4-4267-bc8e-bc32758edf76 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3b2a210d-77b4-4267-bc8e-bc32758edf76-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3b2a210d-77b4-4267-bc8e-bc32758edf76-dark.png -patternInfo: | - This is sample app for testing k8s deployment and cilium -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource for custom Intel configuration -permalink: catalog/deployment/meshery-cilium-deployment-3b2a210d-77b4-4267-bc8e-bc32758edf76.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3b2a210d-77b4-4267-bc8e-bc32758edf76/0.0.1/design.yml' -downloadLink: 3b2a210d-77b4-4267-bc8e-bc32758edf76/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d.md b/collections/_catalog/deployment/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d.md deleted file mode 100644 index 3ba3a232be..0000000000 --- a/collections/_catalog/deployment/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: CryptoMB-TLS-handshake-acceleration-for-Istio -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: 3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d-dark.png -patternInfo: | - Envoy uses BoringSSL as the default TLS library. BoringSSL supports setting private key methods for offloading asynchronous private key operations, and Envoy implements a private key provider framework to allow creation of Envoy extensions which handle TLS handshakes private key operations (signing and decryption) using the BoringSSL hooks.\\\\n\\\\nCryptoMB private key provider is an Envoy extension which handles BoringSSL TLS RSA operations using Intel AVX-512 multi-buffer acceleration. When a new handshake happens, BoringSSL invokes the private key provider to request the cryptographic operation, and then the control returns to Envoy. The RSA requests are gathered in a buffer. When the buffer is full or the timer expires, the private key provider invokes Intel AVX-512 processing of the buffer. When processing is done, Envoy is notified that the cryptographic operation is done and that it may continue with the handshakes.\\\\nEnvoy uses BoringSSL as the default TLS library. BoringSSL supports setting private key methods for offloading asynchronous private key operations, and Envoy implements a private key provider framework to allow creation of Envoy extensions which handle TLS handshakes private key operations (signing and decryption) using the BoringSSL hooks.\\\\n\\\\nCryptoMB private key provider is an Envoy extension which handles BoringSSL TLS RSA operations using Intel AVX-512 multi-buffer acceleration. When a new handshake happens, BoringSSL invokes the private key provider to request the cryptographic operation, and then the control returns to Envoy. The RSA requests are gathered in a buffer. When the buffer is full or the timer expires, the private key provider invokes Intel AVX-512 processing of the buffer. When processing is done, Envoy is notified that the cryptographic operation is done and that it may continue with the handshakes.\\\\n\\\\n\\\\n -patternCaveats: | - None -permalink: catalog/deployment/cryptomb-tls-handshake-acceleration-for-istio-3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d/0.0.1/design.yml' -downloadLink: 3d01bc39-8627-42b7-abe1-0cf9eb3a0a9d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3e3c169a-c252-4b71-8667-62dd6ed085be.md b/collections/_catalog/deployment/3e3c169a-c252-4b71-8667-62dd6ed085be.md deleted file mode 100644 index 28732ac4b8..0000000000 --- a/collections/_catalog/deployment/3e3c169a-c252-4b71-8667-62dd6ed085be.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: guest_book -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 3e3c169a-c252-4b71-8667-62dd6ed085be -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3e3c169a-c252-4b71-8667-62dd6ed085be-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3e3c169a-c252-4b71-8667-62dd6ed085be-dark.png -patternInfo: | - A%20simple%20guest%20book%20application%20deployment%20using%20Kubernetes%20components%20like%20deployment%2C%20services%20and%20configmap -patternCaveats: | - Do%20make%20sure%20you%20change%20secrets -permalink: catalog/deployment/guest-book-3e3c169a-c252-4b71-8667-62dd6ed085be.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3e3c169a-c252-4b71-8667-62dd6ed085be/0.0.1/design.yml' -downloadLink: 3e3c169a-c252-4b71-8667-62dd6ed085be/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3ec30961-1aba-4db7-86c5-7556de5d90ca.md b/collections/_catalog/deployment/3ec30961-1aba-4db7-86c5-7556de5d90ca.md deleted file mode 100644 index 7348efbe0b..0000000000 --- a/collections/_catalog/deployment/3ec30961-1aba-4db7-86c5-7556de5d90ca.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Busybox (single) (fresh) -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - Kubernetes -patternId: 3ec30961-1aba-4db7-86c5-7556de5d90ca -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3ec30961-1aba-4db7-86c5-7556de5d90ca-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3ec30961-1aba-4db7-86c5-7556de5d90ca-dark.png -patternInfo: | - This design deploys simple busybox app inside Layer5-test namespace -patternCaveats: | - None -permalink: catalog/deployment/busybox-single-fresh-3ec30961-1aba-4db7-86c5-7556de5d90ca.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3ec30961-1aba-4db7-86c5-7556de5d90ca/0.0.1/design.yml' -downloadLink: 3ec30961-1aba-4db7-86c5-7556de5d90ca/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/3f3e545b-063b-4c0a-9cb5-0928d7bd9462.md b/collections/_catalog/deployment/3f3e545b-063b-4c0a-9cb5-0928d7bd9462.md deleted file mode 100644 index 5a28f39d39..0000000000 --- a/collections/_catalog/deployment/3f3e545b-063b-4c0a-9cb5-0928d7bd9462.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Vault operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - vault-operator -patternId: 3f3e545b-063b-4c0a-9cb5-0928d7bd9462 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3f3e545b-063b-4c0a-9cb5-0928d7bd9462-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3f3e545b-063b-4c0a-9cb5-0928d7bd9462-dark.png -patternInfo: | - This%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20for%20the%20vault-operator%20using%20the%20apps%2Fv1%20API%20version.%20It%20specifies%20that%20a%20single%20replica%20of%20the%20vault-operator%20pod%20should%20be%20maintained%20by%20Kubernetes.%20The%20deployment's%20metadata%20sets%20the%20name%20of%20the%20deployment%20to%20vault-operator.%20The%20pod%20template%20within%20the%20deployment%20includes%20metadata%20labels%20that%20tag%20the%20pod%20with%20name%3A%20vault-operator%2C%20which%20helps%20in%20identifying%20and%20managing%20the%20pod.%20The%20pod%20specification%20details%20a%20single%20container%20named%20vault-operator%20that%20uses%20the%20image%20quay.io%2Fcoreos%2Fvault-operator%3Alatest.%20This%20container%20is%20configured%20with%20two%20environment%20variables%3A%20MY_POD_NAMESPACE%20and%20MY_POD_NAME%2C%20which%20derive%20their%20values%20from%20the%20pod's%20namespace%20and%20name%20respectively%20using%20the%20Kubernetes%20downward%20API.%20This%20setup%20ensures%20that%20the%20vault-operator%20container%20is%20aware%20of%20its%20deployment%20context%20within%20the%20Kubernetes%20cluster. -patternCaveats: | - 1.%20Single%20Replica%3A%0AThe%20deployment%20is%20configured%20with%20a%20single%20replica.%20This%20might%20be%20a%20single%20point%20of%20failure.%20Consider%20increasing%20the%20number%20of%20replicas%20for%20high%20availability%20and%20fault%20tolerance.%0A%0A2.%20Image%20Tagging%3A%0AThe%20container%20image%20is%20specified%20as%20latest%2C%20which%20can%20lead%20to%20unpredictable%20deployments%20because%20latest%20may%20change%20over%20time.%20It's%20recommended%20to%20use%20a%20specific%20version%20tag%20to%20ensure%20consistency%20and%20repeatability%20in%20deployments.%0A%0A3.%20Environment%20Variables%3A%0AThe%20deployment%20uses%20environment%20variables%20(MY_POD_NAMESPACE%20and%20MY_POD_NAME)%20obtained%20from%20the%20downward%20API.%20Ensure%20these%20variables%20are%20correctly%20referenced%20and%20required%20by%20your%20application.%0A%0A4.%20Resource%20Requests%20and%20Limits%3A%0AThe%20deployment%20does%20not%20specify%20resource%20requests%20and%20limits%20for%20CPU%20and%20memory.%20This%20could%20lead%20to%20resource%20contention%20or%20overcommitment%20issues.%20It%E2%80%99s%20good%20practice%20to%20define%20these%20to%20ensure%20predictable%20performance%20and%20resource%20usage. -permalink: catalog/deployment/vault-operator-3f3e545b-063b-4c0a-9cb5-0928d7bd9462.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3f3e545b-063b-4c0a-9cb5-0928d7bd9462/0.0.1/design.yml' -downloadLink: 3f3e545b-063b-4c0a-9cb5-0928d7bd9462/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/4032a5c3-d081-429b-9087-2b9bdaa7396b.md b/collections/_catalog/deployment/4032a5c3-d081-429b-9087-2b9bdaa7396b.md deleted file mode 100644 index 27bba5d126..0000000000 --- a/collections/_catalog/deployment/4032a5c3-d081-429b-9087-2b9bdaa7396b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Mount(Pod -> PersistentVolume) -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 4032a5c3-d081-429b-9087-2b9bdaa7396b -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/4032a5c3-d081-429b-9087-2b9bdaa7396b-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/4032a5c3-d081-429b-9087-2b9bdaa7396b-dark.png -patternInfo: | - A%20relationship%20that%20represents%20volume%20mounts%20between%20components.%20Eg%3A%20The%20Pod%20component%20is%20binded%20to%20the%20PersistentVolume%20component%20via%20the%20PersistentVolumeClaim%20component. -patternCaveats: | - NA -permalink: catalog/deployment/mount-pod-persistentvolume-4032a5c3-d081-429b-9087-2b9bdaa7396b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/4032a5c3-d081-429b-9087-2b9bdaa7396b/0.0.1/design.yml' -downloadLink: 4032a5c3-d081-429b-9087-2b9bdaa7396b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/40ed4661-c68c-4f9d-ba2f-0541ee16ea29.md b/collections/_catalog/deployment/40ed4661-c68c-4f9d-ba2f-0541ee16ea29.md deleted file mode 100644 index 6498bfcf02..0000000000 --- a/collections/_catalog/deployment/40ed4661-c68c-4f9d-ba2f-0541ee16ea29.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Microservices Deployment -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: deployment -compatibility: - - aks-appgw-fe -patternId: 40ed4661-c68c-4f9d-ba2f-0541ee16ea29 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - nothing -patternCaveats: | - This is -microservices -deployment & that is _-> $ archittecture deployment -permalink: catalog/deployment/microservices-deployment-40ed4661-c68c-4f9d-ba2f-0541ee16ea29.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/40ed4661-c68c-4f9d-ba2f-0541ee16ea29/0.0.1/design.yml' -downloadLink: 40ed4661-c68c-4f9d-ba2f-0541ee16ea29/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/454dff6a-d988-4a09-8206-963eaa816c8d.md b/collections/_catalog/deployment/454dff6a-d988-4a09-8206-963eaa816c8d.md deleted file mode 100644 index 9af2122142..0000000000 --- a/collections/_catalog/deployment/454dff6a-d988-4a09-8206-963eaa816c8d.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Istio Control Plane -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - istio-base - - istio-operator -patternId: 454dff6a-d988-4a09-8206-963eaa816c8d -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This design includes an Istio control plane, which will deploy to the istio-system namespace by default. -patternCaveats: | - No namespaces are annotated for sidecar provisioning in this design. -permalink: catalog/deployment/istio-control-plane-454dff6a-d988-4a09-8206-963eaa816c8d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/454dff6a-d988-4a09-8206-963eaa816c8d/0.0.1/design.yml' -downloadLink: 454dff6a-d988-4a09-8206-963eaa816c8d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/4cc2bbfb-6bb9-4981-a21f-e52955d92a9d.md b/collections/_catalog/deployment/4cc2bbfb-6bb9-4981-a21f-e52955d92a9d.md deleted file mode 100644 index 18254d4fa1..0000000000 --- a/collections/_catalog/deployment/4cc2bbfb-6bb9-4981-a21f-e52955d92a9d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: NGINX deployment -publishedVersion: 0.0.1 -userId: 551dcb82-7643-4709-8500-9a60e60030b9 -userName: Yash Sharma -userAvatarURL: https://avatars.githubusercontent.com/u/71271069?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 4cc2bbfb-6bb9-4981-a21f-e52955d92a9d -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This design is for learning purposes and may be freely copied and distributed. -patternCaveats: | - This design contains nginx deployment -permalink: catalog/deployment/nginx-deployment-4cc2bbfb-6bb9-4981-a21f-e52955d92a9d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/4cc2bbfb-6bb9-4981-a21f-e52955d92a9d/0.0.1/design.yml' -downloadLink: 4cc2bbfb-6bb9-4981-a21f-e52955d92a9d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/4efe3cb7-c901-48a9-9324-67d73d546aff.md b/collections/_catalog/deployment/4efe3cb7-c901-48a9-9324-67d73d546aff.md deleted file mode 100644 index 631471c0a5..0000000000 --- a/collections/_catalog/deployment/4efe3cb7-c901-48a9-9324-67d73d546aff.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: ArgoCD application controller -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - argo-cd -patternId: 4efe3cb7-c901-48a9-9324-67d73d546aff -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20configuration%20describes%20a%20Kubernetes%20Deployment%20for%20the%20ArgoCD%20Application%20Controller.%20It%20includes%20metadata%20defining%20labels%20for%20identification%20purposes.%20The%20spec%20section%20outlines%20the%20deployment's%20details%2C%20including%20the%20desired%20number%20of%20replicas%20and%20a%20pod%20template.%20Within%20the%20pod%20template%2C%20there's%20a%20single%20container%20named%20argocd-application-controller%2C%20which%20runs%20the%20ArgoCD%20Application%20Controller%20binary.%20This%20container%20is%20configured%20with%20various%20environment%20variables%20sourced%20from%20ConfigMaps%2C%20defining%20parameters%20such%20as%20reconciliation%20timeouts%2C%20repository%20server%20details%2C%20logging%20settings%2C%20and%20affinity%20rules.%20Port%208082%20is%20specified%20for%20readiness%20probes%2C%20and%20volumes%20are%20mounted%20for%20storing%20TLS%20certificates%20and%20temporary%20data.%20Additionally%2C%20the%20deployment%20specifies%20a%20service%20account%20and%20defines%20pod%20affinity%20rules%20for%20scheduling.%20These%20settings%20collectively%20ensure%20the%20reliable%20operation%20of%20the%20ArgoCD%20Application%20Controller%20within%20Kubernetes%20clusters%2C%20facilitating%20efficient%20management%20of%20applications%20within%20an%20ArgoCD%20instance. -patternCaveats: | - 1.%20Environment%20Configuration%3A%20Ensure%20that%20the%20environment%20variables%20configured%20for%20the%20application%20controller%20align%20with%20your%20deployment%20requirements.%20Review%20and%20adjust%20settings%20such%20as%20reconciliation%20timeouts%2C%20logging%20levels%2C%20and%20repository%20server%20details%20as%20needed.%0A%0A2.%20Resource%20Requirements%3A%20Depending%20on%20your%20deployment%20environment%20and%20workload%2C%20adjust%20resource%20requests%20and%20limits%20for%20the%20container%20to%20ensure%20optimal%20performance%20and%20resource%20utilization.%0A%0A3.%20Security%3A%20Pay%20close%20attention%20to%20security%20considerations%2C%20especially%20when%20handling%20sensitive%20data%20such%20as%20TLS%20certificates.%20Ensure%20that%20proper%20encryption%20and%20access%20controls%20are%20in%20place%20for%20any%20secrets%20used%20in%20the%20deployment.%0A%0A4.%20High%20Availability%3A%20Consider%20strategies%20for%20achieving%20high%20availability%20and%20fault%20tolerance%20for%20the%20ArgoCD%20Application%20Controller.%20This%20may%20involve%20running%20multiple%20replicas%20of%20the%20controller%20across%20different%20nodes%20or%20availability%20zones.%0A%0A5.%20Monitoring%20and%20Alerting%3A%20Implement%20robust%20monitoring%20and%20alerting%20mechanisms%20to%20detect%20and%20respond%20to%20any%20issues%20or%20failures%20within%20the%20ArgoCD%20Application%20Controller%20deployment.%20Utilize%20tools%20such%20as%20Prometheus%20and%20Grafana%20to%20monitor%20key%20metrics%20and%20set%20up%20alerts%20for%20critical%20events. -permalink: catalog/deployment/argocd-application-controller-4efe3cb7-c901-48a9-9324-67d73d546aff.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/4efe3cb7-c901-48a9-9324-67d73d546aff/0.0.1/design.yml' -downloadLink: 4efe3cb7-c901-48a9-9324-67d73d546aff/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/506ee560-e0cb-4a54-a2be-e1681ac956c0.md b/collections/_catalog/deployment/506ee560-e0cb-4a54-a2be-e1681ac956c0.md deleted file mode 100644 index 3c395883fb..0000000000 --- a/collections/_catalog/deployment/506ee560-e0cb-4a54-a2be-e1681ac956c0.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: GuestBook App -publishedVersion: 0.0.1 -userId: 9bbbb782-2dd4-4ec3-86fd-0a769c0b98f9 -userName: Yogesh saini -userAvatarURL: https://lh3.googleusercontent.com/a/AAcHTtdv793k9BnK_G6ryNpm4m2meNvSqFBW16N8tqhGkes=s96-c -type: deployment -compatibility: - - Kubernetes -patternId: 506ee560-e0cb-4a54-a2be-e1681ac956c0 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/506ee560-e0cb-4a54-a2be-e1681ac956c0-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/506ee560-e0cb-4a54-a2be-e1681ac956c0-dark.png -patternInfo: | - The GuestBook App is a cloud-native application designed using Kubernetes as the underlying orchestration and management system. It consists of various services and components deployed within Kubernetes namespaces. The default namespace represents the main environment where the application operates. The frontend-cyrdx service is responsible for handling frontend traffic and is deployed as a Kubernetes service with a selector for the guestbook application and frontend tier. The frontend-fsfct deployment runs multiple replicas of the frontend component, which utilizes the gb-frontend image and exposes port 80. The guestbook namespace serves as a logical grouping for components related to the GuestBook App. The redis-follower-armov service handles follower Redis instances for the backend, while the redis-follower-nwlew deployment manages multiple replicas of the follower Redis container. The redis-leader-fhxla deployment represents the leader Redis container, and the redis-leader-vjtmi service exposes it as a Kubernetes service. These components work together to create a distributed and scalable architecture for the GuestBook App, leveraging Kubernetes for container orchestration and management. -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/guestbook-app-506ee560-e0cb-4a54-a2be-e1681ac956c0.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/506ee560-e0cb-4a54-a2be-e1681ac956c0/0.0.1/design.yml' -downloadLink: 506ee560-e0cb-4a54-a2be-e1681ac956c0/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/5751de17-4f97-41c2-a3de-bfc156d456c5.md b/collections/_catalog/deployment/5751de17-4f97-41c2-a3de-bfc156d456c5.md deleted file mode 100644 index 653ff120ed..0000000000 --- a/collections/_catalog/deployment/5751de17-4f97-41c2-a3de-bfc156d456c5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Mattermost Cluster Install -publishedVersion: 0.0.1 -userId: c4431ab5-eec8-4d21-947f-7fd9321c649b -userName: Yash Sharma -userAvatarURL: https://avatars.githubusercontent.com/u/71271069?v=4 -type: deployment -compatibility: - - Kubernetes -patternId: 5751de17-4f97-41c2-a3de-bfc156d456c5 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The cluster-installation service is based on the Mattermost Operator model and operates at version 0.3.3. It is responsible for managing the installation and configuration of the Mattermost operator in default namespace -patternCaveats: | - Ensure sufficient resources are available in the cluster -permalink: catalog/deployment/mattermost-cluster-install-5751de17-4f97-41c2-a3de-bfc156d456c5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5751de17-4f97-41c2-a3de-bfc156d456c5/0.0.1/design.yml' -downloadLink: 5751de17-4f97-41c2-a3de-bfc156d456c5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/58fda714-eaa4-490f-b228-b8bcfe3a1e47.md b/collections/_catalog/deployment/58fda714-eaa4-490f-b228-b8bcfe3a1e47.md deleted file mode 100644 index 9a355129c5..0000000000 --- a/collections/_catalog/deployment/58fda714-eaa4-490f-b228-b8bcfe3a1e47.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Example Edge-Firewall Relationship -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 58fda714-eaa4-490f-b228-b8bcfe3a1e47 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/58fda714-eaa4-490f-b228-b8bcfe3a1e47-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/58fda714-eaa4-490f-b228-b8bcfe3a1e47-dark.png -patternInfo: | - A%20relationship%20that%20act%20as%20a%20firewall%20for%20ingress%20and%20egress%20traffic%20from%20Pods. -patternCaveats: | - NA -permalink: catalog/deployment/example-edge-firewall-relationship-58fda714-eaa4-490f-b228-b8bcfe3a1e47.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/58fda714-eaa4-490f-b228-b8bcfe3a1e47/0.0.1/design.yml' -downloadLink: 58fda714-eaa4-490f-b228-b8bcfe3a1e47/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/59e0f642-3249-46c3-9436-9e873b8eef56.md b/collections/_catalog/deployment/59e0f642-3249-46c3-9436-9e873b8eef56.md deleted file mode 100644 index 80226e79a5..0000000000 --- a/collections/_catalog/deployment/59e0f642-3249-46c3-9436-9e873b8eef56.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: prometheus.yaml -publishedVersion: 0.0.1 -userId: 54a58e68-8c83-4683-a84e-4cf8d3256649 -userName: Senali Dilumika -userAvatarURL: https://lh3.googleusercontent.com/a/AGNmyxZ7hYDbFyTeUENk9J_gYTz9lE2aDWynV1ubCGWhGA=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 59e0f642-3249-46c3-9436-9e873b8eef56 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/59e0f642-3249-46c3-9436-9e873b8eef56.png -patternInfo: | - prometheus -patternCaveats: | - prometheus -permalink: catalog/deployment/prometheus-yaml-59e0f642-3249-46c3-9436-9e873b8eef56.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/59e0f642-3249-46c3-9436-9e873b8eef56/0.0.1/design.yml' -downloadLink: 59e0f642-3249-46c3-9436-9e873b8eef56/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c.md b/collections/_catalog/deployment/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c.md deleted file mode 100644 index 26ea2b4b29..0000000000 --- a/collections/_catalog/deployment/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Meshery v0.6.73 -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - kubernetes -patternId: 5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c-dark.png -patternInfo: | - A self-service engineering platform, Meshery, is the open source, cloud native manager that enables the design and management of all Kubernetes-based infrastructure and applications. Among other features, As an extensible platform, Meshery offers visual and collaborative GitOps, freeing you from the chains of YAML while managing Kubernetes multi-cluster deployments. -patternCaveats: | - Not for Production deployment. Does not include Meshery Cloud. -permalink: catalog/deployment/meshery-v0-6-73-5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c/0.0.1/design.yml' -downloadLink: 5eeaef1f-9c17-4b52-b0bb-3e488ad15a2c/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9.md b/collections/_catalog/deployment/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9.md deleted file mode 100644 index 699fbf8fbd..0000000000 --- a/collections/_catalog/deployment/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Gerrit operator ' -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - gerrit-operator -patternId: 5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9-dark.png -patternInfo: | - %0AThis%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20named%20%22gerrit-operator-deployment%22%20for%20managing%20a%20containerized%20application%20called%20%22gerrit-operator%22.%20It%20specifies%20that%20one%20replica%20of%20the%20application%20should%20be%20deployed.%20The%20Deployment%20ensures%20that%20the%20application%20is%20always%20running%20by%20managing%20pod%20replicas%20based%20on%20the%20provided%20selector%20labels.%20The%20template%20section%20describes%20the%20pod%20specification%2C%20including%20labels%2C%20service%20account%2C%20security%20context%2C%20and%20container%20configuration.%20The%20container%20named%20%22gerrit-operator-container%22%20is%20configured%20with%20an%20image%20from%20a%20container%20registry%2C%20with%20resource%20limits%20and%20requests%20defined%20for%20CPU%20and%20memory.%20Environment%20variables%20are%20set%20for%20various%20parameters%20like%20the%20namespace%2C%20pod%20name%2C%20and%20platform%20type.%20Additionally%2C%20specific%20intervals%20for%20syncing%20Gerrit%20projects%20and%20group%20members%20are%20defined.%20Further%20configuration%20options%20can%20be%20added%20as%20needed%2C%20such%20as%20volumes%20and%20initContainers. -patternCaveats: | - 1.%20Resource%20Requirements%3A%20Ensure%20that%20the%20resource%20requests%20and%20limits%20specified%20for%20CPU%20and%20memory%20are%20appropriate%20for%20the%20workload%20and%20the%20cluster's%20capacity%20to%20prevent%20performance%20issues%20or%20resource%20contention.%0A%0A2.%20Image%20Pull%20Policy%3A%20The%20imagePullPolicy%20set%20to%20%22Always%22%20ensures%20that%20the%20latest%20image%20version%20is%20always%20pulled%20from%20the%20container%20registry.%20This%20may%20increase%20deployment%20time%20and%20consume%20more%20network%20bandwidth%2C%20so%20consider%20the%20trade-offs%20based%20on%20your%20deployment%20requirements.%0A%0A3.%20Security%20Configuration%3A%20The%20security%20context%20settings%2C%20such%20as%20runAsNonRoot%20and%20allowPrivilegeEscalation%3A%20false%2C%20enhance%20pod%20security%20by%20enforcing%20non-root%20user%20execution%20and%20preventing%20privilege%20escalation.%20Verify%20that%20these%20settings%20align%20with%20your%20organization's%20security%20policies.%0A%0A4.%20Environment%20Variables%3A%20Review%20the%20environment%20variables%20set%20for%20WATCH_NAMESPACE%2C%20POD_NAME%2C%20PLATFORM_TYPE%2C%20GERRIT_PROJECT_SYNC_INTERVAL%2C%20and%20GERRIT_GROUP_MEMBER_SYNC_INTERVAL%20to%20ensure%20they%20are%20correctly%20configured%20for%20your%20deployment%20environment%20and%20application%20requirements. -permalink: catalog/deployment/gerrit-operator-5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9/0.0.1/design.yml' -downloadLink: 5fdb64c5-80ca-4f6c-ba6e-1a1f98b553a9/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/6370ffcd-13a6-4a65-b426-30f1e63dc381.md b/collections/_catalog/deployment/6370ffcd-13a6-4a65-b426-30f1e63dc381.md deleted file mode 100644 index 79c71e594d..0000000000 --- a/collections/_catalog/deployment/6370ffcd-13a6-4a65-b426-30f1e63dc381.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Hierarchical Parent Relationship -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 6370ffcd-13a6-4a65-b426-30f1e63dc381 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - A%20relationship%20that%20defines%20whether%20a%20component%20can%20be%20a%20parent%20of%20other%20components.%20Eg%3A%20Namespace%20is%20Parent%20and%20Role%2C%20ConfigMap%20are%20children.%20 -patternCaveats: | - %22%22 -permalink: catalog/deployment/hierarchical-parent-relationship-6370ffcd-13a6-4a65-b426-30f1e63dc381.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6370ffcd-13a6-4a65-b426-30f1e63dc381/0.0.1/design.yml' -downloadLink: 6370ffcd-13a6-4a65-b426-30f1e63dc381/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/66d4e848-fe7e-4baf-b8db-9ff54d0113d6.md b/collections/_catalog/deployment/66d4e848-fe7e-4baf-b8db-9ff54d0113d6.md deleted file mode 100644 index 0362d22fc0..0000000000 --- a/collections/_catalog/deployment/66d4e848-fe7e-4baf-b8db-9ff54d0113d6.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: QAT-TLS-handshake-acceleration-for-Istio.yaml -publishedVersion: 0.0.1 -userId: 0b17a549-c99d-449b-b7b5-147fc490edb1 -userName: Xin Huang -userAvatarURL: -type: deployment -compatibility: - - Istio - - Kubernetes -patternId: 66d4e848-fe7e-4baf-b8db-9ff54d0113d6 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/66d4e848-fe7e-4baf-b8db-9ff54d0113d6-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/66d4e848-fe7e-4baf-b8db-9ff54d0113d6-dark.png -patternInfo: | - Cryptographic operations are among the most compute-intensive and critical operations when it comes to secured connections. Istio uses Envoy as the “gateways/sidecar” to handle secure connections and intercept the traffic. Depending upon use cases, when an ingress gateway must handle a large number of incoming TLS and secured service-to-service connections through sidecar proxies, the load on Envoy increases. The potential performance depends on many factors, such as size of the cpuset on which Envoy is running, incoming traffic patterns, and key size. These factors can impact Envoy serving many new incoming TLS requests. To achieve performance improvements and accelerated handshakes, a new feature was introduced in Envoy 1.20 and Istio 1.14. It can be achieved with 3rd Gen Intel® Xeon® Scalable processors, the Intel® Integrated Performance Primitives (Intel® IPP) crypto library, CryptoMB Private Key Provider Method support in Envoy, and Private Key Provider configuration in Istio using ProxyConfig. -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource for custom Intel configuration -permalink: catalog/deployment/qat-tls-handshake-acceleration-for-istio-yaml-66d4e848-fe7e-4baf-b8db-9ff54d0113d6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/66d4e848-fe7e-4baf-b8db-9ff54d0113d6/0.0.1/design.yml' -downloadLink: 66d4e848-fe7e-4baf-b8db-9ff54d0113d6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/66f483b2-5ca5-457a-b149-46a661468c34.md b/collections/_catalog/deployment/66f483b2-5ca5-457a-b149-46a661468c34.md deleted file mode 100644 index ee5850f359..0000000000 --- a/collections/_catalog/deployment/66f483b2-5ca5-457a-b149-46a661468c34.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: webserver -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 66f483b2-5ca5-457a-b149-46a661468c34 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/66f483b2-5ca5-457a-b149-46a661468c34-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/66f483b2-5ca5-457a-b149-46a661468c34-dark.png -patternInfo: | - This designs runs a simple python webserver at port 8000. It also containers k8s service which connects to the deployment -patternCaveats: | - Ensure port are not pre-occupied. -permalink: catalog/deployment/webserver-66f483b2-5ca5-457a-b149-46a661468c34.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/66f483b2-5ca5-457a-b149-46a661468c34/0.0.1/design.yml' -downloadLink: 66f483b2-5ca5-457a-b149-46a661468c34/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/68a67a3a-eb39-472e-8d9c-a3b34fa23a71.md b/collections/_catalog/deployment/68a67a3a-eb39-472e-8d9c-a3b34fa23a71.md deleted file mode 100644 index 54a2a8501f..0000000000 --- a/collections/_catalog/deployment/68a67a3a-eb39-472e-8d9c-a3b34fa23a71.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple MySQL Pod -publishedVersion: 0.0.1 -userId: 7dde79fb-2778-4a66-9ce5-6772bafe8df8 -userName: Sangram Rath -userAvatarURL: -type: deployment -compatibility: - - mysql-operator -patternId: 68a67a3a-eb39-472e-8d9c-a3b34fa23a71 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/68a67a3a-eb39-472e-8d9c-a3b34fa23a71-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/68a67a3a-eb39-472e-8d9c-a3b34fa23a71-dark.png -patternInfo: | - Testing%20patterns -patternCaveats: | - None -permalink: catalog/deployment/simple-mysql-pod-68a67a3a-eb39-472e-8d9c-a3b34fa23a71.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/68a67a3a-eb39-472e-8d9c-a3b34fa23a71/0.0.1/design.yml' -downloadLink: 68a67a3a-eb39-472e-8d9c-a3b34fa23a71/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/69844b4a-d60d-4705-b255-edf2dbde0f5a.md b/collections/_catalog/deployment/69844b4a-d60d-4705-b255-edf2dbde0f5a.md deleted file mode 100644 index 0021197c5c..0000000000 --- a/collections/_catalog/deployment/69844b4a-d60d-4705-b255-edf2dbde0f5a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: the-new-stack -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 69844b4a-d60d-4705-b255-edf2dbde0f5a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/69844b4a-d60d-4705-b255-edf2dbde0f5a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/69844b4a-d60d-4705-b255-edf2dbde0f5a-dark.png -patternInfo: | - The New Stack (TNS) is a simple three-tier demo application, fully instrumented with the 3 pillars of observability: metrics, logs, and traces. It offers an insight on what a modern observability stack looks like and experience what it's like to pivot among different types of observability data. The TNS app is an example three-tier web app built by Weaveworks. It consists of a data layer, application logic layer, and load-balancing layer. To learn more about it, see How To Detect, Map and Monitor Docker Containers with Weave Scope from Weaveworks. The instrumentation for the TNS app is as follows: Metrics: Each tier of the TNS app exposes metrics on /metrics endpoints, which are scraped by the Grafana Agent. Additionally, these metrics are tagged with exemplar information. The Grafana Agent then writes these metrics to Mimir for storage.Logs: Each tier of the TNS app writes logs to standard output or standard error. It is captured by Kubernetes, which are then collected by the Grafana Agent. Finally, the Agent forwards them to Loki for storage. Traces: Each tier of the TNS app sends traces in Jaeger format to the Grafana Agent, which then converts them to OTel format and forwards them to Tempo for storage. Visualization: A Grafana instance configured to talk to the Mimir, Loki, and Tempo instances makes it possible to query and visualize the metrics, logs, and traces data. -patternCaveats: | - Ensure enough resources are available on the k8s cluster -permalink: catalog/deployment/the-new-stack-69844b4a-d60d-4705-b255-edf2dbde0f5a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/69844b4a-d60d-4705-b255-edf2dbde0f5a/0.0.1/design.yml' -downloadLink: 69844b4a-d60d-4705-b255-edf2dbde0f5a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/69afafc0-f0a6-4c6c-beae-c96956b40a4f.md b/collections/_catalog/deployment/69afafc0-f0a6-4c6c-beae-c96956b40a4f.md deleted file mode 100644 index 2d58baa809..0000000000 --- a/collections/_catalog/deployment/69afafc0-f0a6-4c6c-beae-c96956b40a4f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: RuntimeClass -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 69afafc0-f0a6-4c6c-beae-c96956b40a4f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/69afafc0-f0a6-4c6c-beae-c96956b40a4f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/69afafc0-f0a6-4c6c-beae-c96956b40a4f-dark.png -patternInfo: | - This%20pattern%20establishes%20and%20visualizes%20the%20relationship%20between%20Runtime%20Class(a%20Kubernetes%20component)%20and%20other%20Kubernetes%20components -patternCaveats: | - The%20name%20of%20the%20Runtime%20Class%20is%20referenced%20by%20the%20other%20Kubernetes%20Components -permalink: catalog/deployment/runtimeclass-69afafc0-f0a6-4c6c-beae-c96956b40a4f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/69afafc0-f0a6-4c6c-beae-c96956b40a4f/0.0.1/design.yml' -downloadLink: 69afafc0-f0a6-4c6c-beae-c96956b40a4f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/6da8edb1-cba2-4c81-b9d6-00dfb0386ad1.md b/collections/_catalog/deployment/6da8edb1-cba2-4c81-b9d6-00dfb0386ad1.md deleted file mode 100644 index 5ea32d9fec..0000000000 --- a/collections/_catalog/deployment/6da8edb1-cba2-4c81-b9d6-00dfb0386ad1.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Wordpress Deployment -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 6da8edb1-cba2-4c81-b9d6-00dfb0386ad1 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6da8edb1-cba2-4c81-b9d6-00dfb0386ad1.png -patternInfo: | - This is a sample WordPress deployment. -patternCaveats: | - No caveats. Feel free to reuse or distrubute. -permalink: catalog/deployment/wordpress-deployment-6da8edb1-cba2-4c81-b9d6-00dfb0386ad1.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6da8edb1-cba2-4c81-b9d6-00dfb0386ad1/0.0.1/design.yml' -downloadLink: 6da8edb1-cba2-4c81-b9d6-00dfb0386ad1/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/6f8474c8-d81b-43eb-83a0-52f71af4ce7b.md b/collections/_catalog/deployment/6f8474c8-d81b-43eb-83a0-52f71af4ce7b.md deleted file mode 100644 index 5c2760cf93..0000000000 --- a/collections/_catalog/deployment/6f8474c8-d81b-43eb-83a0-52f71af4ce7b.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Cloud native pizza store -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - dapr - - pg-db - - postgres-with-operator -patternId: 6f8474c8-d81b-43eb-83a0-52f71af4ce7b -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6f8474c8-d81b-43eb-83a0-52f71af4ce7b-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6f8474c8-d81b-43eb-83a0-52f71af4ce7b-dark.png -patternInfo: | - The%20Pizza%20Store%20application%20simulates%20placing%20a%20Pizza%20Order%20that%20is%20going%20to%20be%20processed%20by%20different%20services.%20The%20application%20is%20composed%20by%20the%20Pizza%20Store%20Service%20which%20serve%20as%20the%20front%20end%20and%20backend%20to%20place%20the%20order.%20The%20order%20is%20sent%20to%20the%20Kitchen%20Service%20for%20preparation%20and%20once%20the%20order%20is%20ready%20to%20be%20delivered%20the%20Delivery%20Service%20takes%20the%20order%20to%20your%20door.%0AAs%20any%20other%20application%2C%20these%20services%20will%20need%20to%20store%20and%20read%20data%20from%20a%20persistent%20store%20such%20as%20a%20Database%20and%20exchange%20messages%20if%20a%20more%20event-driven%20approach%20is%20needed.%0A%0AThis%20application%20uses%20PostgreSQL%20and%20Kafka%2C%20as%20they%20are%20well-known%20components%20among%20developers.%0AAs%20you%20can%20see%20in%20the%20diagram%2C%20if%20we%20want%20to%20connect%20to%20PostgreSQL%20from%20the%20Pizza%20Store%20Service%20we%20need%20to%20add%20to%20our%20applications%20the%20PostgreSQL%20driver%20that%20must%20match%20with%20the%20PostgreSQL%20instance%20version%20that%20we%20have%20available.%20A%20Kafka%20client%20is%20required%20in%20all%20the%20services%20that%20are%20interested%20in%20publishing%20or%20consuming%20messages%2Fevents.%20Because%20you%20have%20Drivers%20and%20Clients%20that%20are%20sensitive%20to%20the%20available%20versions%20on%20the%20infrastructure%20components%2C%20the%20lifecycle%20of%20the%20application%20is%20now%20bound%20to%20the%20lifecycle%20of%20these%20components.%0A%0AAdding%20Dapr%20to%20the%20picture%20not%20only%20breaks%20these%20dependencies%2C%20but%20also%20remove%20responsabilities%20from%20developers%20of%20choosing%20the%20right%20Driver%2FClient%20and%20how%20these%20need%20to%20be%20configured%20for%20the%20application%20to%20work%20correctly.%20Dapr%20provides%20developers%20building%20block%20APIs%20such%20as%20the%20StateStore%20and%20PubSub%20API%20that%20developer%20can%20use%20without%20know%20the%20details%20of%20which%20infrastructure%20is%20going%20to%20be%20connected%20under%20the%20covers. -patternCaveats: | - The%20application%20services%20are%20written%20using%20Java%20%2B%20Spring%20Boot.%20These%20services%20use%20the%20Dapr%20Java%20SDK%20to%20interact%20with%20the%20Dapr%20PubSub%20and%20Statestore%20APIs.%0A%0ATo%20run%20the%20services%20locally%20you%20can%20use%20the%20Testcontainer%20integration%20already%20included%20in%20the%20projects.%0A%0AFor%20example%20you%20can%20start%20a%20local%20version%20of%20the%20pizza-store%20service%20by%20running%20the%20following%20command%20inside%20the%20pizza-store%2F%20directory%20(this%20requires%20having%20Java%20and%20Maven%20installed%20locally)%3A%0Afor%20Caveats%20And%20Consideration%20refer%20this%20github%20repo%20https%3A%2F%2Fgithub.com%2Fsalaboy%2Fpizza%3Ftab%3Dreadme-ov-file%23installation -permalink: catalog/deployment/cloud-native-pizza-store-6f8474c8-d81b-43eb-83a0-52f71af4ce7b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6f8474c8-d81b-43eb-83a0-52f71af4ce7b/0.0.1/design.yml' -downloadLink: 6f8474c8-d81b-43eb-83a0-52f71af4ce7b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/79fb7ba9-583d-4e04-af43-5fed438cd416.md b/collections/_catalog/deployment/79fb7ba9-583d-4e04-af43-5fed438cd416.md deleted file mode 100644 index 182a890249..0000000000 --- a/collections/_catalog/deployment/79fb7ba9-583d-4e04-af43-5fed438cd416.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple Kubernetes Pod -publishedVersion: 0.0.1 -userId: 969bfd5e-28fb-4c20-a020-ee9db65da812 -userName: Aabid Sofi -userAvatarURL: -type: deployment -compatibility: - - Kubernetes -patternId: 79fb7ba9-583d-4e04-af43-5fed438cd416 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This cloud-native design consists of a Kubernetes Pod running an Nginx container and a Kubernetes Service named service. The Pod uses the image nginx with an image pull policy of Always. The Service defines two ports: one with port 80 and target port 8080, and another with port 80. The Service allows communication between the Pod and external clients on port 80. -patternCaveats: | - Networking should be properly configured to enable communication between pod and services. Ensure sufficient resources are available in the cluster. -permalink: catalog/deployment/simple-kubernetes-pod-79fb7ba9-583d-4e04-af43-5fed438cd416.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/79fb7ba9-583d-4e04-af43-5fed438cd416/0.0.1/design.yml' -downloadLink: 79fb7ba9-583d-4e04-af43-5fed438cd416/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/7ab91040-5402-406f-8211-37c3ab9eb2bb.md b/collections/_catalog/deployment/7ab91040-5402-406f-8211-37c3ab9eb2bb.md deleted file mode 100644 index c049ccc1bc..0000000000 --- a/collections/_catalog/deployment/7ab91040-5402-406f-8211-37c3ab9eb2bb.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Prometheus adapter -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - kube-prometheus-stack -patternId: 7ab91040-5402-406f-8211-37c3ab9eb2bb -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7ab91040-5402-406f-8211-37c3ab9eb2bb-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7ab91040-5402-406f-8211-37c3ab9eb2bb-dark.png -patternInfo: | - This%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20for%20the%20prometheus-adapter%2C%20a%20component%20of%20the%20kube-prometheus%20stack%20within%20the%20monitoring%20namespace.%20The%20deployment%20manages%20two%20replicas%20of%20the%20prometheus-adapter%20pod%20to%20ensure%20high%20availability.%20Each%20pod%20runs%20a%20container%20using%20the%20prometheus-adapter%20image%20from%20the%20Kubernetes%20registry%2C%20configured%20with%20various%20command-line%20arguments%20to%20specify%20settings%20like%20the%20configuration%20file%20path%2C%20metrics%20re-list%20interval%2C%20and%20Prometheus%20URL. -patternCaveats: | - 1.%20Namespace%3A%20Ensure%20that%20the%20monitoring%20namespace%20exists%20before%20deploying%20this%20configuration.%0A2.%20ConfigMap%3A%20Verify%20that%20the%20adapter-config%20ConfigMap%20is%20created%20and%20contains%20the%20correct%20configuration%20data%20required%20by%20the%20prometheus-adapter.%0A3.%20TLS%20Configuration%3A%20The%20deployment%20includes%20TLS%20settings%20with%20specific%20cipher%20suites%3B%20ensure%20these%20align%20with%20your%20security%20policies%20and%20requirements.%0A4.%20Resource%20Allocation%3A%20The%20specified%20CPU%20and%20memory%20limits%20and%20requests%20should%20be%20reviewed%20to%20match%20the%20expected%20load%20and%20cluster%20capacity.%0A5.%20Service%20Account%3A%20Ensure%20that%20the%20prometheus-adapter%20service%20account%20has%20the%20necessary%20permissions%20to%20operate%20correctly%20within%20the%20cluster -permalink: catalog/deployment/prometheus-adapter-7ab91040-5402-406f-8211-37c3ab9eb2bb.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7ab91040-5402-406f-8211-37c3ab9eb2bb/0.0.1/design.yml' -downloadLink: 7ab91040-5402-406f-8211-37c3ab9eb2bb/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/7be5170d-d13e-4d83-bc1e-f1acc91b4048.md b/collections/_catalog/deployment/7be5170d-d13e-4d83-bc1e-f1acc91b4048.md deleted file mode 100644 index 438ec00953..0000000000 --- a/collections/_catalog/deployment/7be5170d-d13e-4d83-bc1e-f1acc91b4048.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'nginx ingress ' -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - nginx-ingress -patternId: 7be5170d-d13e-4d83-bc1e-f1acc91b4048 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7be5170d-d13e-4d83-bc1e-f1acc91b4048-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7be5170d-d13e-4d83-bc1e-f1acc91b4048-dark.png -patternInfo: | - Creates%20a%20Kubernetes%20deployment%20with%20two%20replicas%20running%20NGINX%20containers%20and%20a%20service%20to%20expose%20these%20pods%20internally%20within%20the%20Kubernetes%20cluster.%20The%20NGINX%20containers%20are%20configured%20to%20listen%20on%20port%2080%2C%20and%20the%20service%20routes%20traffic%20to%20these%20containers. -patternCaveats: | - ImagePullPolicy%3A%20In%20the%20Deployment%20spec%2C%20the%20imagePullPolicy%20is%20set%20to%20Never.%20This%20means%20that%20Kubernetes%20will%20never%20attempt%20to%20pull%20the%20NGINX%20image%20from%20a%20container%20registry%2C%20assuming%20it's%20already%20present%20on%20the%20node%20where%20the%20pod%20is%20scheduled.%20This%20can%20be%20problematic%20if%20the%20image%20is%20not%20present%20or%20if%20you%20need%20to%20update%20to%20a%20newer%20version.%20Consider%20setting%20the%20imagePullPolicy%20to%20Always%20or%20IfNotPresent%20depending%20on%20your%20deployment%20requirements.%0A%0AResource%20Allocation%3A%20The%20provided%20manifest%20doesn't%20specify%20resource%20requests%20and%20limits%20for%20the%20NGINX%20container.%20Without%20resource%20limits%2C%20the%20container%20can%20consume%20excessive%20resources%2C%20impacting%20other%20workloads%20on%20the%20same%20node.%20It's%20recommended%20to%20define%20resource%20requests%20and%20limits%20based%20on%20the%20expected%20workload%20characteristics%20to%20ensure%20stability%20and%20resource%20efficiency. -permalink: catalog/deployment/nginx-ingress-7be5170d-d13e-4d83-bc1e-f1acc91b4048.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7be5170d-d13e-4d83-bc1e-f1acc91b4048/0.0.1/design.yml' -downloadLink: 7be5170d-d13e-4d83-bc1e-f1acc91b4048/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/7beb028d-e332-47b4-9543-b92a8725ac51.md b/collections/_catalog/deployment/7beb028d-e332-47b4-9543-b92a8725ac51.md deleted file mode 100644 index f4a13e4d18..0000000000 --- a/collections/_catalog/deployment/7beb028d-e332-47b4-9543-b92a8725ac51.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: BookInfo App w/o Kubernetes -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - Kubernetes - - Istio -patternId: 7beb028d-e332-47b4-9543-b92a8725ac51 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7beb028d-e332-47b4-9543-b92a8725ac51-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7beb028d-e332-47b4-9543-b92a8725ac51-dark.png -patternInfo: | - The Bookinfo application is a collection of microservices that work together to display information about a book. The main microservice is called productpage, which fetches data from the details and reviews microservices to populate the book's page. The details microservice contains specific information about the book, such as its ISBN and number of pages. The reviews microservice contains reviews of the book and also makes use of the ratings microservice to retrieve ranking information for each review. The reviews microservice has three different versions: v1, v2, and v3. In v1, the microservice does not interact with the ratings service. In v2, it calls the ratings service and displays the rating using black stars, ranging from 1 to 5. In v3, it also calls the ratings service but displays the rating using red stars, again ranging from 1 to 5. These different versions allow for flexibility and experimentation with different ways of presenting the books ratings to users. -patternCaveats: | - Users need to ensure that their cluster is properly configured with Istio, including the installation of the necessary components and enabling sidecar injection for the microservices. Ensure that Meshery Adapter for Istio service mesh is installed properly for easy installation/registration of Istio's MeshModels with Meshery Server. Another consideration is the resource requirements of the application. The Bookinfo application consists of multiple microservices, each running as a separate container. Users should carefully assess the resource needs of the application and ensure that their cluster has sufficient capacity to handle the workload. This includes considering factors such as CPU, memory, and network bandwidth requirements. -permalink: catalog/deployment/bookinfo-app-w-o-kubernetes-7beb028d-e332-47b4-9543-b92a8725ac51.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7beb028d-e332-47b4-9543-b92a8725ac51/0.0.1/design.yml' -downloadLink: 7beb028d-e332-47b4-9543-b92a8725ac51/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac.md b/collections/_catalog/deployment/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac.md deleted file mode 100644 index 12d523b53f..0000000000 --- a/collections/_catalog/deployment/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: GuestBook App -publishedVersion: 0.0.1 -userId: 4084fe17-6938-49cd-8367-1540213b68da -userName: Anshu Kumar -userAvatarURL: https://lh3.googleusercontent.com/a/AGNmyxZfTUigWoHtMd41LAdQaVHtRk3_wg4PjtF01__7=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac-dark.png -patternInfo: | - The GuestBook App is a cloud-native application designed using Kubernetes as the underlying orchestration and management system. It consists of various services and components deployed within Kubernetes namespaces. The default namespace represents the main environment where the application operates. The frontend-cyrdx service is responsible for handling frontend traffic and is deployed as a Kubernetes service with a selector for the guestbook application and frontend tier. The frontend-fsfct deployment runs multiple replicas of the frontend component, which utilizes the gb-frontend image and exposes port 80. The guestbook namespace serves as a logical grouping for components related to the GuestBook App. The redis-follower-armov service handles follower Redis instances for the backend, while the redis-follower-nwlew deployment manages multiple replicas of the follower Redis container. The redis-leader-fhxla deployment represents the leader Redis container, and the redis-leader-vjtmi service exposes it as a Kubernetes service. These components work together to create a distributed and scalable architecture for the GuestBook App, leveraging Kubernetes for container orchestration and management. -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/guestbook-app-7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac/0.0.1/design.yml' -downloadLink: 7d5f9d34-3bbc-4b31-a940-0a4f8583d4ac/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa.md b/collections/_catalog/deployment/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa.md deleted file mode 100644 index 7c9952066d..0000000000 --- a/collections/_catalog/deployment/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Example Edge-Permission Relationship -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 7dd39d30-7b14-4f9f-a66c-06ba3e5000fa -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa-dark.png -patternInfo: | - The%20design%20showcases%20the%20operational%20dynamics%20of%20the%20Edge-Permission%20relationship.%20To%20engage%20with%20its%20functionality%2C%20adhere%20to%20the%20sequential%20steps%20below%3A%0A1.%20Duplicate%20this%20design%20by%20cloning%20it.%0A2.%20Modify%20the%20name%20of%20the%20service%20account.%0AUpon%20completion%2C%20you'll%20notice%20that%20the%20connection%20visually%20represented%20by%20the%20edge%20vanishes%2C%20and%20the%20ClusterRoleBinding%20(CRB)%20is%20disassociated%20from%20both%20the%20ClusterRole%20(CR)%20and%20Service%20Account%20(SA).%0ATo%20restore%20this%20relationship%2C%20you%20can%20either%2C%0A1.%20Drag%20the%20CRB%20from%20the%20CR%20to%20the%20SA%2C%20then%20release%20the%20mouse%20click.%20This%20action%20triggers%20the%20recreation%20of%20the%20relationship%2C%20as%20the%20relationship%20constraints%20get%20satisfied.%0A2.%20Or%2C%20revert%20the%20name%20of%20the%20SA.%20This%20automatically%20recreates%20the%20relationship%2C%20as%20the%20relationship%20constraints%20get%20satisfied.%0A%0AThese%20are%20a%20few%20of%20the%20ways%20to%20experience%20this%20relationship. -patternCaveats: | - NA -permalink: catalog/deployment/example-edge-permission-relationship-7dd39d30-7b14-4f9f-a66c-06ba3e5000fa.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7dd39d30-7b14-4f9f-a66c-06ba3e5000fa/0.0.1/design.yml' -downloadLink: 7dd39d30-7b14-4f9f-a66c-06ba3e5000fa/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/8652b112-80d7-4fde-bc87-9d2dbd4327cc.md b/collections/_catalog/deployment/8652b112-80d7-4fde-bc87-9d2dbd4327cc.md deleted file mode 100644 index 751b966a20..0000000000 --- a/collections/_catalog/deployment/8652b112-80d7-4fde-bc87-9d2dbd4327cc.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Volume Mount SubPath-expr -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 8652b112-80d7-4fde-bc87-9d2dbd4327cc -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20design%20demonstrates%20the%20usage%20of%20Kubernetes'%20subPathExpr%20feature%20to%20mount%20a%20specific%20sub-path%20of%20a%20volume%20into%20a%20container%20within%20a%20pod.%20This%20approach%20allows%20for%20more%20dynamic%20and%20flexible%20volume%20mounts%2C%20enabling%20containers%20to%20access%20different%20parts%20of%20a%20volume%20based%20on%20environment%20variables%20or%20pod%20metadata.%20By%20utilizing%20subPathExpr%2C%20Kubernetes%20administrators%20and%20developers%20can%20configure%20pods%20to%20mount%20unique%20directories%20tailored%20to%20the%20specific%20needs%20of%20each%20container%2C%20without%20needing%20to%20create%20multiple%20volume%20definitions.%20This%20design%20is%20particularly%20useful%20in%20scenarios%20where%20you%20need%20to%20differentiate%20storage%20paths%20for%20various%20instances%20of%20an%20application%20or%20manage%20data%20separation%20within%20shared%20volumes. -patternCaveats: | - 1.%20Not%20all%20volume%20types%20support%20subPathExpr.%20Ensure%20that%20the%20volume%20plugin%20you%20are%20using%20is%20compatible%20with%20this%20feature. -permalink: catalog/deployment/pod-volume-mount-subpath-expr-8652b112-80d7-4fde-bc87-9d2dbd4327cc.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/8652b112-80d7-4fde-bc87-9d2dbd4327cc/0.0.1/design.yml' -downloadLink: 8652b112-80d7-4fde-bc87-9d2dbd4327cc/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/86545f65-1034-437a-ac9b-ed85fe4dcdc8.md b/collections/_catalog/deployment/86545f65-1034-437a-ac9b-ed85fe4dcdc8.md deleted file mode 100644 index 96a60b9d60..0000000000 --- a/collections/_catalog/deployment/86545f65-1034-437a-ac9b-ed85fe4dcdc8.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Life Cycle -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 86545f65-1034-437a-ac9b-ed85fe4dcdc8 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/86545f65-1034-437a-ac9b-ed85fe4dcdc8-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/86545f65-1034-437a-ac9b-ed85fe4dcdc8-dark.png -patternInfo: | - This%20design%20emphasizes%20Kubernetes'%20ability%20to%20manage%20Pod%20life%20cycles%20autonomously%2C%20ensuring%20efficient%20resource%20utilization%20and%20application%20availability.%20It%20addresses%20considerations%20such%20as%20Pod%20initialization%2C%20readiness%2C%20liveness%2C%20scaling%2C%20and%20graceful%20termination%2C%20providing%20a%20comprehensive%20framework%20for%20deploying%20and%20managing%20containerized%20applications%20on%20Kubernetes%20clusters. -patternCaveats: | - Developers%20and%20operators%20need%20to%20carefully%20configure%20readiness%20and%20liveness%20probes%20to%20accurately%20reflect%20application%20health.%20Improper%20configuration%20may%20lead%20to%20unnecessary%20restarts%20or%20erroneous%20scaling%20decisions%2C%20impacting%20application%20stability%20and%20performance.%20Additionally%2C%20managing%20Pod%20life%20cycles%20across%20large-scale%20deployments%20requires%20efficient%20monitoring%20and%20logging%20frameworks%20to%20diagnose%20and%20resolve%20issues%20promptly. -permalink: catalog/deployment/pod-life-cycle-86545f65-1034-437a-ac9b-ed85fe4dcdc8.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/86545f65-1034-437a-ac9b-ed85fe4dcdc8/0.0.1/design.yml' -downloadLink: 86545f65-1034-437a-ac9b-ed85fe4dcdc8/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/89b838d2-b2f4-4377-98fd-855dd84c6958.md b/collections/_catalog/deployment/89b838d2-b2f4-4377-98fd-855dd84c6958.md deleted file mode 100644 index 68368f5273..0000000000 --- a/collections/_catalog/deployment/89b838d2-b2f4-4377-98fd-855dd84c6958.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: bookInfoPatternIstio.yaml -publishedVersion: 0.0.1 -userId: c0228da7-2415-4626-9ea5-19f97147767b -userName: Aaditya Narayan Subedy -userAvatarURL: https://avatars.githubusercontent.com/u/51183483?v=4 -type: deployment -compatibility: - - kubernetes -patternId: 89b838d2-b2f4-4377-98fd-855dd84c6958 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/89b838d2-b2f4-4377-98fd-855dd84c6958-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/89b838d2-b2f4-4377-98fd-855dd84c6958-dark.png -patternInfo: | - A%20deployment%20of%20book%20info%20application%20through%20kubernetes%2C%20this%20design%20uses%20k8s%20components%20like%20deployment%20and%20services%20to%20deploy%20application -patternCaveats: | - Make%20sure%20you%20are%20running%20latest%20version%20of%20k8s -permalink: catalog/deployment/bookinfopatternistio-yaml-89b838d2-b2f4-4377-98fd-855dd84c6958.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/89b838d2-b2f4-4377-98fd-855dd84c6958/0.0.1/design.yml' -downloadLink: 89b838d2-b2f4-4377-98fd-855dd84c6958/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/8b041687-3c09-4cfd-8613-cf326a54e1b2.md b/collections/_catalog/deployment/8b041687-3c09-4cfd-8613-cf326a54e1b2.md deleted file mode 100644 index 00e6f33342..0000000000 --- a/collections/_catalog/deployment/8b041687-3c09-4cfd-8613-cf326a54e1b2.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: JAX 'Hello World' using NVIDIA GPUs A100-80GB on GKE -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 8b041687-3c09-4cfd-8613-cf326a54e1b2 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - JAX%20is%20a%20rapidly%20growing%20Python%20library%20for%20high-performance%20numerical%20computing%20and%20machine%20learning%20(ML)%20research.%20With%20applications%20in%20large%20language%20models%2C%20drug%20discovery%2C%20physics%20ML%2C%20reinforcement%20learning%2C%20and%20neural%20graphics%2C%20JAX%20has%20seen%20incredible%20adoption%20in%20the%20past%20few%20years.%20JAX%20offers%20numerous%20benefits%20for%20developers%20and%20researchers%2C%20including%20an%20easy-to-use%20NumPy%20API%2C%20auto%20differentiation%20and%20optimization.%20JAX%20also%20includes%20support%20for%20distributed%20processing%20across%20multi-node%20and%20multi-GPU%20systems%20in%20a%20few%20lines%20of%20code%2C%20with%20accelerated%20performance%20through%20XLA-optimized%20kernels%20on%20NVIDIA%20GPUs.%0A%0AWe%20show%20how%20to%20run%20JAX%20multi-GPU-multi-node%20applications%20on%20GKE%20(Google%20Kubernetes%20Engine)%20using%20the%20A2%20ultra%20machine%20series%2C%20powered%20by%20NVIDIA%20A100%2080GB%20Tensor%20Core%20%20GPUs.%20It%20runs%20a%20simple%20Hello%20World%20application%20on%204%20nodes%20with%208%20processes%20and%208%20GPUs%20each. -patternCaveats: | - Ensure%20networking%20is%20setup%20properly%20and%20correct%20annotation%20are%20applied%20to%20each%20resource -permalink: catalog/deployment/jax-hello-world-using-nvidia-gpus-a100-80gb-on-gke-8b041687-3c09-4cfd-8613-cf326a54e1b2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/8b041687-3c09-4cfd-8613-cf326a54e1b2/0.0.1/design.yml' -downloadLink: 8b041687-3c09-4cfd-8613-cf326a54e1b2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/8ce06bfa-a917-44e5-b670-15c74ec177c0.md b/collections/_catalog/deployment/8ce06bfa-a917-44e5-b670-15c74ec177c0.md deleted file mode 100644 index 46adfc8e3a..0000000000 --- a/collections/_catalog/deployment/8ce06bfa-a917-44e5-b670-15c74ec177c0.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: marblerun -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 8ce06bfa-a917-44e5-b670-15c74ec177c0 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/8ce06bfa-a917-44e5-b670-15c74ec177c0-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/8ce06bfa-a917-44e5-b670-15c74ec177c0-dark.png -patternInfo: | - MarbleRun%20%20-The%20control%20plane%20for%20confidential%20computing.%0A%0AMarbleRun%20is%20a%20framework%20for%20deploying%20distributed%20confidential%20computing%20applications.%20MarbleRun%20acts%20as%20a%20confidential%20operator%20for%20your%20deployment.%20Think%20of%20a%20trusted%20party%20in%20the%20control%20plane.%0A%0ABuild%20your%20confidential%20microservices%20with%20EGo%2C%20Gramine%2C%20or%20similar%20runtimes%2C%20orchestrate%20them%20with%20Kubernetes%20on%20an%20SGX-enabled%20cluster%2C%20and%20let%20MarbleRun%20take%20care%20of%20the%20rest.%20Deploy%20end-to-end%20secure%20and%20verifiable%20AI%20pipelines%20or%20crunch%20on%20sensitive%20big%20data%20in%20the%20cloud.%20Confidential%20computing%20at%20scale%20has%20never%20been%20easier.%0A%0AMarbleRun%20simplifies%20the%20process%20by%20handling%20much%20of%20the%20groundwork.%20It%20ensures%20that%20your%20app's%20topology%20adheres%20to%20your%20specified%20manifest.%20It%20verifies%20the%20identity%20and%20integrity%20of%20all%20your%20services%2C%20bootstraps%20them%2C%20and%20establishes%20secure%2C%20encrypted%20communication%20channels.%20As%20your%20app%20needs%20to%20scale%2C%20MarbleRun%20manages%20the%20addition%20of%20new%20instances%2C%20ensuring%20their%20secure%20verification. -patternCaveats: | - A%20working%20SGX%20DCAP%20environment%20is%20required%20for%20MarbleRun.%20For%20ease%20of%20exploring%20and%20testing%2C%20we%20provide%20a%20simulation%20mode%20with%20--simulation%20that%20runs%20without%20SGX%20hardware.%20Depending%20on%20your%20setup%2C%20you%20may%20follow%20the%20quickstart%20for%20SGX-enabled%20clusters.%20Alternatively%2C%20if%20your%20setup%20doesn't%20support%20SGX%2C%20you%20can%20follow%20the%20quickstart%20in%20simulation%20mode%20by%20selecting%20the%20respective%20tabs.%0A%0AFor%20getting%20more%20context%20on%20consideration%20and%20caveats%20%2Cget%20into%20this%20docs%20of%20https%3A%2F%2Fdocs.edgeless.systems%2Fmarblerun%2Fgetting-started%2Fquickstart -permalink: catalog/deployment/marblerun-8ce06bfa-a917-44e5-b670-15c74ec177c0.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/8ce06bfa-a917-44e5-b670-15c74ec177c0/0.0.1/design.yml' -downloadLink: 8ce06bfa-a917-44e5-b670-15c74ec177c0/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/90ae7d59-1eba-4ce5-b029-d14f79f1895f.md b/collections/_catalog/deployment/90ae7d59-1eba-4ce5-b029-d14f79f1895f.md deleted file mode 100644 index 7e905ef8f5..0000000000 --- a/collections/_catalog/deployment/90ae7d59-1eba-4ce5-b029-d14f79f1895f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Edge Permission Relationship -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: 90ae7d59-1eba-4ce5-b029-d14f79f1895f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/90ae7d59-1eba-4ce5-b029-d14f79f1895f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/90ae7d59-1eba-4ce5-b029-d14f79f1895f-dark.png -patternInfo: | - A%20relationship%20that%20binds%20permission%20between%20components.%20Eg%3A%20ClusterRole%20defines%20a%20set%20of%20permissions%2C%20ClusterRoleBinding%20binds%20those%20permissions%20to%20subjects%20like%20service%20accounts. -patternCaveats: | - NA -permalink: catalog/deployment/edge-permission-relationship-90ae7d59-1eba-4ce5-b029-d14f79f1895f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/90ae7d59-1eba-4ce5-b029-d14f79f1895f/0.0.1/design.yml' -downloadLink: 90ae7d59-1eba-4ce5-b029-d14f79f1895f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/9268856a-57e4-41e0-a18c-03f714f1c023.md b/collections/_catalog/deployment/9268856a-57e4-41e0-a18c-03f714f1c023.md deleted file mode 100644 index 9393ec77f0..0000000000 --- a/collections/_catalog/deployment/9268856a-57e4-41e0-a18c-03f714f1c023.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: ArgoCD-Application [Components added for Network, Storage and Orchestration] -publishedVersion: 0.0.1 -userId: 60d7dbbf-2489-4f41-81b9-8edf4605d939 -userName: Tejas Jamdade -userAvatarURL: -type: deployment -compatibility: - - appmesh-controller - - fluentd - - fluentd-operator -patternId: 9268856a-57e4-41e0-a18c-03f714f1c023 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9268856a-57e4-41e0-a18c-03f714f1c023-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9268856a-57e4-41e0-a18c-03f714f1c023-dark.png -patternInfo: | - This is design that deploys ArgoCD application that includes Nginx virtual service, Nginx server, K8s pod autoscaler, OpenEBS's Jiva volume, and a sample ArgoCD application listening on 127.0.0.4 -patternCaveats: | - Ensure networking is setup properly -permalink: catalog/deployment/argocd-application-components-added-for-network-storage-and-orchestration-9268856a-57e4-41e0-a18c-03f714f1c023.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9268856a-57e4-41e0-a18c-03f714f1c023/0.0.1/design.yml' -downloadLink: 9268856a-57e4-41e0-a18c-03f714f1c023/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/9527442a-7072-4c98-a187-1b9ce1b0001c.md b/collections/_catalog/deployment/9527442a-7072-4c98-a187-1b9ce1b0001c.md deleted file mode 100644 index 15554fa1d7..0000000000 --- a/collections/_catalog/deployment/9527442a-7072-4c98-a187-1b9ce1b0001c.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Busybox (single) -publishedVersion: 0.0.1 -userId: efbdda42-67a0-4cb8-a968-4ef321eb6369 -userName: Abhishek Kumar -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu8pwt7RbFy5nwrRaGTVPkfgnkYn-GF5dfVSrSOB=s96-c -type: deployment -compatibility: - - Kubernetes -patternId: 9527442a-7072-4c98-a187-1b9ce1b0001c -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9527442a-7072-4c98-a187-1b9ce1b0001c-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9527442a-7072-4c98-a187-1b9ce1b0001c-dark.png -patternInfo: | - This design deploys simple busybox app inside Layer5-test namespace -patternCaveats: | - None -permalink: catalog/deployment/busybox-single-9527442a-7072-4c98-a187-1b9ce1b0001c.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9527442a-7072-4c98-a187-1b9ce1b0001c/0.0.1/design.yml' -downloadLink: 9527442a-7072-4c98-a187-1b9ce1b0001c/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/96cc39d9-de6a-4339-96bf-096d09d9d7bd.md b/collections/_catalog/deployment/96cc39d9-de6a-4339-96bf-096d09d9d7bd.md deleted file mode 100644 index 6853bab4d3..0000000000 --- a/collections/_catalog/deployment/96cc39d9-de6a-4339-96bf-096d09d9d7bd.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Running ZooKeeper, A Distributed System Coordinator -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - kubernetes -patternId: 96cc39d9-de6a-4339-96bf-096d09d9d7bd -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/96cc39d9-de6a-4339-96bf-096d09d9d7bd-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/96cc39d9-de6a-4339-96bf-096d09d9d7bd-dark.png -patternInfo: | - This cloud native design defines a Kubernetes configuration for a ZooKeeper deployment. It includes a Service, PodDisruptionBudget, and StatefulSet. It defines a Service named zk-hs with labels indicating it is part of the zk application. It exposes two ports, 2888 and 3888, and has a clusterIP of None meaning it is only accessible within the cluster. The Service selects Pods with the zk label. The next part defines another Service named zk-cs with similar labels and a single port, 2181, used for client connections. It also selects Pods with the zk label. Following that, a PodDisruptionBudget named zk-pdb is defined. It sets the selector to match Pods with the zk label and allows a maximum of 1 Pod to be unavailable during disruptions. Finally, a StatefulSet named zk is defined. It selects Pods with the zk label and uses the zk-hs Service for the headless service. It specifies 3 replicas, a RollingUpdate update strategy, and OrderedReady pod management policy. The Pod template includes affinity rules for pod anti-affinity, resource requests for CPU and memory, container ports for ZooKeeper, a command to start ZooKeeper with specific configurations, and readiness and liveness probes. It also defines a volume claim template for data storage -patternCaveats: | - You must have a cluster with at least four nodes, and each node requires at least 2 CPUs and 4 GiB of memory. -permalink: catalog/deployment/running-zookeeper-a-distributed-system-coordinator-96cc39d9-de6a-4339-96bf-096d09d9d7bd.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/96cc39d9-de6a-4339-96bf-096d09d9d7bd/0.0.1/design.yml' -downloadLink: 96cc39d9-de6a-4339-96bf-096d09d9d7bd/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/9815d6cf-ef6d-49fa-99a7-97e935af67c4.md b/collections/_catalog/deployment/9815d6cf-ef6d-49fa-99a7-97e935af67c4.md deleted file mode 100644 index 1427b78314..0000000000 --- a/collections/_catalog/deployment/9815d6cf-ef6d-49fa-99a7-97e935af67c4.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: fluentd-kubernetes-aws -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - fluent-operator - - fluentd-operator - - kubernetes -patternId: 9815d6cf-ef6d-49fa-99a7-97e935af67c4 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Fluentd%20is%20utilized%20as%20a%20robust%20log%20forwarding%20and%20aggregation%20solution%2C%20essential%20for%20collecting%2C%20processing%2C%20and%20forwarding%20logs%20from%20various%20sources%20within%20Kubernetes%20pods%20to%20AWS-based%20storage%20or%20analytics%20services.%20%0A%0AThis%20design%20focuses%20on%20integrating%20Fluentd%20seamlessly%20into%20Kubernetes%20to%20enhance%20observability%20and%20troubleshoot%20application%20issues%20effectively.%20Key%20considerations%20include%20setting%20up%20Fluentd%20DaemonSets%20to%20ensure%20it%20runs%20on%20every%20node%2C%20configuring%20filters%20and%20parsers%20to%20handle%20different%20log%20formats%2C%20and%20directing%20logs%20to%20Amazon%20S3%2C%20CloudWatch%20Logs%2C%20or%20Elasticsearch%20for%20storage%20and%20analysis.%20Proper%20resource%20allocation%2C%20such%20as%20CPU%20and%20memory%20requests%20and%20limits%2C%20is%20established%20to%20optimize%20Fluentd%20performance%20without%20impacting%20other%20applications.%20Security%20measures%2C%20including%20role-based%20access%20controls%20and%20encryption%2C%20are%20implemented%20to%20protect%20sensitive%20log%20data. -patternCaveats: | - Continuous%20monitoring%20and%20scaling%20strategies%20are%20employed%20to%20maintain%20Fluentd's%20availability%20and%20responsiveness%20as%20Kubernetes%20workloads%20evolve. -permalink: catalog/deployment/fluentd-kubernetes-aws-9815d6cf-ef6d-49fa-99a7-97e935af67c4.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9815d6cf-ef6d-49fa-99a7-97e935af67c4/0.0.1/design.yml' -downloadLink: 9815d6cf-ef6d-49fa-99a7-97e935af67c4/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383.md b/collections/_catalog/deployment/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383.md deleted file mode 100644 index 34046408e2..0000000000 --- a/collections/_catalog/deployment/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Serve an LLM with multiple GPUs in GKE ' -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: 9d3b33bf-eaf6-4d06-9dd6-64aa725ab383 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383-dark.png -patternInfo: | - Serve%20a%20large%20language%20model%20(LLM)%20with%20GPUs%20in%20Google%20Kubernetes%20Engine%20(GKE)%20mode.%20Create%20a%20GKE%20Standard%20cluster%20that%20uses%20multiple%20L4%20GPUs%20and%20prepares%20the%20GKE%20infrastructure%20to%20serve%20any%20of%20the%20following%20models%3A%0A1.%20Falcon%2040b.%0A2.%20Llama%202%2070b -patternCaveats: | - Depending%20on%20the%20data%20format%20of%20the%20model%2C%20the%20number%20of%20GPUs%20varies.%20In%20this%20design%2C%20each%20model%20uses%20two%20L4%20GPUs. -permalink: catalog/deployment/serve-an-llm-with-multiple-gpus-in-gke-9d3b33bf-eaf6-4d06-9dd6-64aa725ab383.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9d3b33bf-eaf6-4d06-9dd6-64aa725ab383/0.0.1/design.yml' -downloadLink: 9d3b33bf-eaf6-4d06-9dd6-64aa725ab383/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/a6386080-a64e-4c1f-89b6-224c356841c1.md b/collections/_catalog/deployment/a6386080-a64e-4c1f-89b6-224c356841c1.md deleted file mode 100644 index 66f330596d..0000000000 --- a/collections/_catalog/deployment/a6386080-a64e-4c1f-89b6-224c356841c1.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: CryptoMB.yml -publishedVersion: 0.0.1 -userId: 852ca803-926a-415a-bddf-f7f391019f74 -userName: Vaibhav Maurya -userAvatarURL: https://avatars.githubusercontent.com/u/52376019?s=200&v=4 -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: a6386080-a64e-4c1f-89b6-224c356841c1 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/a6386080-a64e-4c1f-89b6-224c356841c1-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/a6386080-a64e-4c1f-89b6-224c356841c1-dark.png -patternInfo: | - Cryptographic operations are among the most compute-intensive and critical operations when it comes to secured connections. Istio uses Envoy as the “gateways/sidecar” to handle secure connections and intercept the traffic. Depending upon use cases, when an ingress gateway must handle a large number of incoming TLS and secured service-to-service connections through sidecar proxies, the load on Envoy increases. The potential performance depends on many factors, such as size of the cpuset on which Envoy is running, incoming traffic patterns, and key size. These factors can impact Envoy serving many new incoming TLS requests. To achieve performance improvements and accelerated handshakes, a new feature was introduced in Envoy 1.20 and Istio 1.14. It can be achieved with 3rd Gen Intel® Xeon® Scalable processors, the Intel® Integrated Performance Primitives (Intel® IPP) crypto library, CryptoMB Private Key Provider Method support in Envoy, and Private Key Provider configuration in Istio using ProxyConfig. -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource for custom Intel configuration -permalink: catalog/deployment/cryptomb-yml-a6386080-a64e-4c1f-89b6-224c356841c1.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/a6386080-a64e-4c1f-89b6-224c356841c1/0.0.1/design.yml' -downloadLink: a6386080-a64e-4c1f-89b6-224c356841c1/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/a7c1ed4b-0b4b-4614-afba-8d23082e27c3.md b/collections/_catalog/deployment/a7c1ed4b-0b4b-4614-afba-8d23082e27c3.md deleted file mode 100644 index cb0809adbf..0000000000 --- a/collections/_catalog/deployment/a7c1ed4b-0b4b-4614-afba-8d23082e27c3.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Fortio Server -publishedVersion: 0.0.1 -userId: 0b17a549-c99d-449b-b7b5-147fc490edb1 -userName: Xin Huang -userAvatarURL: -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: a7c1ed4b-0b4b-4614-afba-8d23082e27c3 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/a7c1ed4b-0b4b-4614-afba-8d23082e27c3-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/a7c1ed4b-0b4b-4614-afba-8d23082e27c3-dark.png -patternInfo: | - This infrastructure design defines a service and a deployment for a component called Fortio-server **Service: fortio-server-service**- Type: Kubernetes Service - Namespace: Default - Port: Exposes port 8080 - Selector: Routes traffic to pods with the label app: fortio-server - Session Affinity: None - Service Type: ClusterIP - MeshMap Metadata: Describes its relationship with Kubernetes and its category as Scheduling & Orchestration. - Position: Positioned within a graphical representation of infrastructure. **Deployment: fortio-server-deployment** - Type: Kubernetes Deployment - Namespace: Default - Replicas: 1 - Selector: Matches pods with the label app: fortio-server - Pod Template: Specifies a container image for Fortio-server, its resource requests, and a service account. - Container Image: Uses the fortio/fortio:1.32.1 image - MeshMap Metadata: Specifies its parent-child relationship with the fortio-server-service and provides styling information. - Position: Positioned relative to the service within the infrastructure diagram. This configuration sets up a service and a corresponding deployment for Fortio-server in a Kubernetes environment. The service exposes port 8080, while the deployment runs a container with the Fortio-server image. These components are visualized using MeshMap for tracking and visualization purposes. -patternCaveats: | - Ensure networking is setup properly and enuough resources are available -permalink: catalog/deployment/fortio-server-a7c1ed4b-0b4b-4614-afba-8d23082e27c3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/a7c1ed4b-0b4b-4614-afba-8d23082e27c3/0.0.1/design.yml' -downloadLink: a7c1ed4b-0b4b-4614-afba-8d23082e27c3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/a88ae43c-4a3c-4c57-b839-b1101e20f842.md b/collections/_catalog/deployment/a88ae43c-4a3c-4c57-b839-b1101e20f842.md deleted file mode 100644 index 08175a7d7e..0000000000 --- a/collections/_catalog/deployment/a88ae43c-4a3c-4c57-b839-b1101e20f842.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Kubernetes Service for Product Page App -publishedVersion: 0.0.1 -userId: 8f3bd5ce-f178-4a69-83ba-62341c74d492 -userName: Gaurav Chadha -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu9qHPyJXY8hB8h4Qlmdc1YzI9qXe0if3sRuTpQPJA=s96-c -type: deployment -compatibility: - - kubernetes -patternId: a88ae43c-4a3c-4c57-b839-b1101e20f842 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This design installs a namespace, a deployment and a service. Both deployment and service are deployed in my-bookinfo namespace. Service is exposed at port 9081. -patternCaveats: | - Ensure sufficient resources are available in the cluster and networking is exopsed properly. -permalink: catalog/deployment/kubernetes-service-for-product-page-app-a88ae43c-4a3c-4c57-b839-b1101e20f842.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/a88ae43c-4a3c-4c57-b839-b1101e20f842/0.0.1/design.yml' -downloadLink: a88ae43c-4a3c-4c57-b839-b1101e20f842/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/b2b05f54-fd48-44f5-bf2d-308761874d59.md b/collections/_catalog/deployment/b2b05f54-fd48-44f5-bf2d-308761874d59.md deleted file mode 100644 index 0a53cd7b4d..0000000000 --- a/collections/_catalog/deployment/b2b05f54-fd48-44f5-bf2d-308761874d59.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Exploring Kubernetes Pods With Meshery -publishedVersion: 0.0.1 -userId: 7dde79fb-2778-4a66-9ce5-6772bafe8df8 -userName: Sangram Rath -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: b2b05f54-fd48-44f5-bf2d-308761874d59 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b2b05f54-fd48-44f5-bf2d-308761874d59-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b2b05f54-fd48-44f5-bf2d-308761874d59-dark.png -patternInfo: | - This%20design%20maps%20to%20the%20%22Exploring%20Kubernetes%20Pods%20with%20Meshery%22%20tutorial%20and%20is%20the%20end%20result%20of%20the%20design.%20It%20can%20be%20used%20to%20quickly%20deploy%20an%20nginx%20pod%20exposed%20through%20a%20service. -patternCaveats: | - Service%20type%20is%20NodePort. -permalink: catalog/deployment/exploring-kubernetes-pods-with-meshery-b2b05f54-fd48-44f5-bf2d-308761874d59.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b2b05f54-fd48-44f5-bf2d-308761874d59/0.0.1/design.yml' -downloadLink: b2b05f54-fd48-44f5-bf2d-308761874d59/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/b63e398c-d618-4200-9a78-3ffd02d3a3e9.md b/collections/_catalog/deployment/b63e398c-d618-4200-9a78-3ffd02d3a3e9.md deleted file mode 100644 index fa79f521ad..0000000000 --- a/collections/_catalog/deployment/b63e398c-d618-4200-9a78-3ffd02d3a3e9.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple Kubernetes Pod and Service -publishedVersion: 0.0.1 -userId: 8f3bd5ce-f178-4a69-83ba-62341c74d492 -userName: Gaurav Chadha -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu9qHPyJXY8hB8h4Qlmdc1YzI9qXe0if3sRuTpQPJA=s96-c -type: deployment -compatibility: - - Kubernetes -patternId: b63e398c-d618-4200-9a78-3ffd02d3a3e9 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b63e398c-d618-4200-9a78-3ffd02d3a3e9-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b63e398c-d618-4200-9a78-3ffd02d3a3e9-dark.png -patternInfo: | - This cloud-native design consists of a Kubernetes Pod running an Nginx container and a Kubernetes Service named service. The Pod uses the image nginx with an image pull policy of Always. The Service defines two ports: one with port 80 and target port 8080, and another with port 80. The Service allows communication between the Pod and external clients on port 80. -patternCaveats: | - Networking should be properly configured to enable communication between pod and services. Ensure sufficient resources are available in the cluster. -permalink: catalog/deployment/simple-kubernetes-pod-and-service-b63e398c-d618-4200-9a78-3ffd02d3a3e9.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b63e398c-d618-4200-9a78-3ffd02d3a3e9/0.0.1/design.yml' -downloadLink: b63e398c-d618-4200-9a78-3ffd02d3a3e9/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/bbd15978-2924-48be-bac2-cdfc5331bfb2.md b/collections/_catalog/deployment/bbd15978-2924-48be-bac2-cdfc5331bfb2.md deleted file mode 100644 index 17e237ce33..0000000000 --- a/collections/_catalog/deployment/bbd15978-2924-48be-bac2-cdfc5331bfb2.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Bank of Anthos -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: bbd15978-2924-48be-bac2-cdfc5331bfb2 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/bbd15978-2924-48be-bac2-cdfc5331bfb2-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/bbd15978-2924-48be-bac2-cdfc5331bfb2-dark.png -patternInfo: | - Bank of Anthos is a sample HTTP-based web app that simulates a bank's payment processing network, allowing users to create artificial bank accounts and complete transactions. -patternCaveats: | - Ensure enough resources are available on the cluster. -permalink: catalog/deployment/bank-of-anthos-bbd15978-2924-48be-bac2-cdfc5331bfb2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/bbd15978-2924-48be-bac2-cdfc5331bfb2/0.0.1/design.yml' -downloadLink: bbd15978-2924-48be-bac2-cdfc5331bfb2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/be8c9e9e-1a74-4c5a-b128-235364399410.md b/collections/_catalog/deployment/be8c9e9e-1a74-4c5a-b128-235364399410.md deleted file mode 100644 index 52f7069dd9..0000000000 --- a/collections/_catalog/deployment/be8c9e9e-1a74-4c5a-b128-235364399410.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Hierarchical Inventory Relationship -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: be8c9e9e-1a74-4c5a-b128-235364399410 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - A%20hierarchical%20inventory%20relationship%20in%20which%20the%20configuration%20of%20(parent)%20component%20is%20patched%20with%20the%20configuration%20of%20child%20component.%20%0AEg%3A%20The%20configuration%20of%20the%20Deployment%20(parent)%20component%20is%20patched%20with%20the%20configuration%20as%20received%20from%20ConfigMap%20(child)%20component.%20 -patternCaveats: | - NA%20 -permalink: catalog/deployment/hierarchical-inventory-relationship-be8c9e9e-1a74-4c5a-b128-235364399410.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/be8c9e9e-1a74-4c5a-b128-235364399410/0.0.1/design.yml' -downloadLink: be8c9e9e-1a74-4c5a-b128-235364399410/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/bffca2b7-b3c3-4a9d-86f4-bdae70848cfa.md b/collections/_catalog/deployment/bffca2b7-b3c3-4a9d-86f4-bdae70848cfa.md deleted file mode 100644 index e88a69f8f1..0000000000 --- a/collections/_catalog/deployment/bffca2b7-b3c3-4a9d-86f4-bdae70848cfa.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -layout: item -name: AWS cloudfront controller -publishedVersion: 0.0.2 -userId: 7cc3290b-9c57-4f93-8fb0-dbc5664c95a1 -userName: Awani Alero -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIsyS9IR90Bo2I56iqRPlYulzglXOKhqczvYvf31sttxczvwuTX=s96-c -type: deployment -compatibility: - - amd-gpu - - apisix - - aws-apigatewayv2-controller - - aws-cloudfront-controller -patternId: bffca2b7-b3c3-4a9d-86f4-bdae70848cfa -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20file%20defines%20a%20Kubernetes%20Deployment%20for%20the%20ack-cloudfront-controller%2C%20a%20component%20responsible%20for%20managing%20AWS%20CloudFront%20resources%20in%20a%20Kubernetes%20environment.%20The%20Deployment%20specifies%20that%20one%20replica%20of%20the%20pod%20should%20be%20maintained%20(replicas%3A%201).%20Metadata%20labels%20are%20provided%20for%20identification%20and%20management%20purposes%2C%20such%20as%20app.kubernetes.io%2Fname%2C%20app.kubernetes.io%2Finstance%2C%20and%20others%2C%20to%20ensure%20proper%20categorization%20and%20management%20by%20Helm.%20The%20pod%20template%20section%20within%20the%20Deployment%20spec%20outlines%20the%20desired%20state%20of%20the%20pods%2C%20including%20the%20container's%20configuration.%0A%0AThe%20container%2C%20named%20controller%2C%20uses%20the%20ack-cloudfront-controller%3Alatest%20image%20and%20will%20run%20a%20binary%20(.%2Fbin%2Fcontroller)%20with%20specific%20arguments%20to%20configure%20its%20operation%2C%20such%20as%20AWS%20region%2C%20endpoint%20URL%2C%20logging%20level%2C%20and%20resource%20tags.%20Environment%20variables%20are%20defined%20to%20provide%20necessary%20configuration%20values%20to%20the%20container.%20The%20container%20exposes%20an%20HTTP%20port%20(8080)%20and%20includes%20liveness%20and%20readiness%20probes%20to%20monitor%20and%20manage%20its%20health%2C%20ensuring%20the%20application%20is%20running%20properly%20and%20is%20ready%20to%20serve%20traffic. -patternCaveats: | - 1.%20Environment%20Variables%3A%0AVerify%20that%20the%20environment%20variables%20such%20as%20AWS_REGION%2C%20AWS_ENDPOINT_URL%2C%20and%20ACK_LOG_LEVEL%20are%20correctly%20set%20according%20to%20your%20AWS%20environment%20and%20logging%20preferences.%20Incorrect%20values%20could%20lead%20to%20improper%20functioning%20or%20failure%20of%20the%20controller.%0A%0A2.%20Secrets%20Management%3A%0AIf%20AWS%20credentials%20are%20required%2C%20make%20sure%20the%20AWS_SHARED_CREDENTIALS_FILE%20and%20AWS_PROFILE%20environment%20variables%20are%20correctly%20configured%20and%20the%20referenced%20Kubernetes%20secret%20exists.%20Missing%20or%20misconfigured%20secrets%20can%20prevent%20the%20controller%20from%20authenticating%20with%20AWS.%0A%0A3.%20Resource%20Requests%20and%20Limits%3A%0AReview%20and%20adjust%20the%20resource%20requests%20and%20limits%20to%20match%20the%20expected%20workload%20and%20available%20cluster%20resources.%20Insufficient%20resources%20can%20lead%20to%20performance%20issues%2C%20while%20overly%20generous%20requests%20can%20waste%20cluster%20resources.%0A%0A4.%20Probes%20Configuration%3A%0AThe%20liveness%20and%20readiness%20probes%20are%20configured%20with%20specific%20paths%20and%20ports.%20Ensure%20that%20these%20endpoints%20are%20correctly%20implemented%20in%20the%20application.%20Misconfigured%20probes%20can%20result%20in%20the%20pod%20being%20killed%20or%20marked%20as%20unready. -permalink: catalog/deployment/aws-cloudfront-controller-bffca2b7-b3c3-4a9d-86f4-bdae70848cfa.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/bffca2b7-b3c3-4a9d-86f4-bdae70848cfa/0.0.2/design.yml' -downloadLink: bffca2b7-b3c3-4a9d-86f4-bdae70848cfa/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/c288c409-3ca4-4b20-86a2-c9a28c58f986.md b/collections/_catalog/deployment/c288c409-3ca4-4b20-86a2-c9a28c58f986.md deleted file mode 100644 index 9b7cab18b1..0000000000 --- a/collections/_catalog/deployment/c288c409-3ca4-4b20-86a2-c9a28c58f986.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Guestbook App (All-in-One) -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: deployment -compatibility: - - kubernetes -patternId: c288c409-3ca4-4b20-86a2-c9a28c58f986 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/c288c409-3ca4-4b20-86a2-c9a28c58f986.png -patternInfo: | - This%20is%20a%20sample%20guestbook%20app%20to%20demonstrate%20distributed%20systems -patternCaveats: | - 1.%20Ensure%20networking%20is%20setup%20properly.%0A2.%20Ensure%20enough%20disk%20space%20is%20available -permalink: catalog/deployment/guestbook-app-all-in-one-c288c409-3ca4-4b20-86a2-c9a28c58f986.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/c288c409-3ca4-4b20-86a2-c9a28c58f986/0.0.1/design.yml' -downloadLink: c288c409-3ca4-4b20-86a2-c9a28c58f986/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/c40ae08b-deaa-4fc5-a1e8-8081907b64a3.md b/collections/_catalog/deployment/c40ae08b-deaa-4fc5-a1e8-8081907b64a3.md deleted file mode 100644 index 4088a38b46..0000000000 --- a/collections/_catalog/deployment/c40ae08b-deaa-4fc5-a1e8-8081907b64a3.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple Kubernetes Pod -publishedVersion: 0.0.1 -userId: 8f3bd5ce-f178-4a69-83ba-62341c74d492 -userName: Gaurav Chadha -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu9qHPyJXY8hB8h4Qlmdc1YzI9qXe0if3sRuTpQPJA=s96-c -type: deployment -compatibility: - - Kubernetes -patternId: c40ae08b-deaa-4fc5-a1e8-8081907b64a3 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This cloud-native design consists of a Kubernetes Pod running an Nginx container and a Kubernetes Service named service. The Pod uses the image nginx with an image pull policy of Always. The Service defines two ports: one with port 80 and target port 8080, and another with port 80. The Service allows communication between the Pod and external clients on port 80. -patternCaveats: | - Networking should be properly configured to enable communication between pod and services. Ensure sufficient resources are available in the cluster. -permalink: catalog/deployment/simple-kubernetes-pod-c40ae08b-deaa-4fc5-a1e8-8081907b64a3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/c40ae08b-deaa-4fc5-a1e8-8081907b64a3/0.0.1/design.yml' -downloadLink: c40ae08b-deaa-4fc5-a1e8-8081907b64a3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/c60f32ae-358b-4eab-81b6-2e52ef383bab.md b/collections/_catalog/deployment/c60f32ae-358b-4eab-81b6-2e52ef383bab.md deleted file mode 100644 index 4c74e49afc..0000000000 --- a/collections/_catalog/deployment/c60f32ae-358b-4eab-81b6-2e52ef383bab.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: mattermost operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - mattermost-operator -patternId: c60f32ae-358b-4eab-81b6-2e52ef383bab -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/c60f32ae-358b-4eab-81b6-2e52ef383bab-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/c60f32ae-358b-4eab-81b6-2e52ef383bab-dark.png -patternInfo: | - This%20YAML%20file%20defines%20a%20Kubernetes%20Deployment%20for%20the%20mattermost-operator%20in%20the%20mattermost-operator%20namespace.%20The%20deployment%20is%20configured%20to%20run%20a%20single%20replica%20of%20the%20Mattermost%20operator%2C%20which%20manages%20Mattermost%20instances%20within%20the%20Kubernetes%20cluster.%20The%20pod%20template%20specifies%20the%20container%20details%20for%20the%20operator.%0A%0AThe%20container%2C%20named%20mattermost-operator%2C%20uses%20the%20image%20mattermost%2Fmattermost-operator%3Alatest%20and%20is%20set%20to%20pull%20the%20image%20if%20it%20is%20not%20already%20present%20(IfNotPresent).%20The%20container%20runs%20the%20%2Fmattermost-operator%20command%20with%20arguments%20to%20enable%20leader%20election%20and%20set%20the%20metrics%20address%20to%200.0.0.0%3A8383.%20Several%20environment%20variables%20are%20defined%20to%20configure%20the%20operator's%20behaviour%2C%20such%20as%20MAX_RECONCILING_INSTALLATIONS%20(set%20to%2020)%2C%20REQUEUE_ON_LIMIT_DELAY%20(set%20to%2020%20seconds)%2C%20and%20MAX_RECONCILE_CONCURRENCY%20(set%20to%2010).%20These%20settings%20control%20how%20the%20operator%20handles%20the%20reconciliation%20process%20for%20Mattermost%20installations.%0A%0AThe%20container%20also%20exposes%20a%20port%20(8383)%20for%20metrics%2C%20allowing%20monitoring%20and%20observation%20of%20the%20operator's%20performance.%20The%20deployment%20specifies%20that%20the%20pods%20should%20use%20the%20mattermost-operator%20service%20account%2C%20ensuring%20they%20have%20the%20appropriate%20permissions%20to%20interact%20with%20the%20Kubernetes%20API%20and%20manage%20Mattermost%20resources. -patternCaveats: | - 1.%20Resource%20Allocation%3A%0AThe%20deployment%20specifies%20no%20resource%20limits%20or%20requests%20for%20the%20mattermost-operator%20container.%20It%20is%20crucial%20to%20define%20these%20to%20ensure%20the%20operator%20has%20sufficient%20CPU%20and%20memory%20to%20function%20correctly%20without%20affecting%20other%20workloads%20in%20the%20cluster.%0A%0A2.%20Image%20Tag%3A%0AThe%20latest%20tag%20is%20used%20for%20the%20Mattermost%20operator%20image.%20This%20practice%20can%20lead%20to%20unpredictability%20in%20deployments%2C%20as%20the%20latest%20tag%20may%20change%20and%20introduce%20unexpected%20changes%20or%20issues.%20It%20is%20recommended%20to%20use%20a%20specific%20version%20tag%20to%20ensure%20consistency.%0A%0A3.%20Security%20Context%3A%0AThe%20deployment%20does%20not%20specify%20a%20detailed%20security%20context%20for%20the%20container.%20Adding%20constraints%20such%20as%20runAsNonRoot%2C%20readOnlyRootFilesystem%2C%20and%20dropCapabilities%20can%20enhance%20security%20by%20limiting%20the%20container%E2%80%99s%20privileges.%0A%0A4.%20Environment%20Variables%3A%0AThe%20environment%20variables%20like%20MAX_RECONCILING_INSTALLATIONS%2C%20REQUEUE_ON_LIMIT_DELAY%2C%20and%20MAX_RECONCILE_CONCURRENCY%20are%20set%20directly%20in%20the%20deployment.%20If%20these%20values%20need%20to%20be%20adjusted%20frequently%2C%20consider%20using%20a%20ConfigMap%20to%20manage%20them%20externally.%0A%0A5.%20Metrics%20and%20Monitoring%3A%0AThe%20metrics%20address%20is%20exposed%20on%20port%208383.%20Ensure%20that%20appropriate%20monitoring%20tools%20are%20in%20place%20to%20capture%20and%20analyse%20these%20metrics%20for%20performance%20tuning%20and%20troubleshooting. -permalink: catalog/deployment/mattermost-operator-c60f32ae-358b-4eab-81b6-2e52ef383bab.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/c60f32ae-358b-4eab-81b6-2e52ef383bab/0.0.1/design.yml' -downloadLink: c60f32ae-358b-4eab-81b6-2e52ef383bab/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/c9c97c00-9718-4e6c-a225-6168693e9ae1.md b/collections/_catalog/deployment/c9c97c00-9718-4e6c-a225-6168693e9ae1.md deleted file mode 100644 index 9a3119533d..0000000000 --- a/collections/_catalog/deployment/c9c97c00-9718-4e6c-a225-6168693e9ae1.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple Kubernetes Pod -publishedVersion: 0.0.14 -userId: de7f1b67-5c6d-4c38-8c6c-fda919129ed0 -userName: Workflow Bot -userAvatarURL: https://avatars.githubusercontent.com/u/47201130?v=4 -type: deployment -compatibility: - - hybridnet -patternId: c9c97c00-9718-4e6c-a225-6168693e9ae1 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - kfkf -patternCaveats: | - ffllf -permalink: catalog/deployment/simple-kubernetes-pod-c9c97c00-9718-4e6c-a225-6168693e9ae1.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/c9c97c00-9718-4e6c-a225-6168693e9ae1/0.0.14/design.yml' -downloadLink: c9c97c00-9718-4e6c-a225-6168693e9ae1/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/d3481e21-5000-4c90-a999-f53050863dc3.md b/collections/_catalog/deployment/d3481e21-5000-4c90-a999-f53050863dc3.md deleted file mode 100644 index 0a8594fba2..0000000000 --- a/collections/_catalog/deployment/d3481e21-5000-4c90-a999-f53050863dc3.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: minIO Deployment -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - minio-operator -patternId: d3481e21-5000-4c90-a999-f53050863dc3 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d3481e21-5000-4c90-a999-f53050863dc3-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d3481e21-5000-4c90-a999-f53050863dc3-dark.png -patternInfo: | - This%20configuration%20sets%20up%20a%20single%20MinIO%20instance%20with%20specific%20environment%20variables%2C%20health%20checks%2C%20and%20life%20cycle%20actions%2C%20utilising%20a%20PersistentVolumeClaim%20for%20data%20storage%20within%20a%20Kubernetes%20cluster.%20It%20ensures%20that%20MinIO%20is%20deployed%20and%20managed%20according%20to%20the%20specified%20parameters. -patternCaveats: | - 1.%20Replication%20and%20High%20Availability%3A%20The%20configuration%20specifies%20only%20one%20replica%20(replicas%3A%20For%20production%20environments%20requiring%20high%20availability%20and%20fault%20tolerance%2C%20consider%20increasing%20the%20number%20of%20replicas%20and%20configuring%20MinIO%20for%20distributed%20mode%20to%20ensure%20data%20redundancy%20and%20availability.%0A%0A2.%20Security%20Considerations%3A%20The%20provided%20configuration%20includes%20hard-coded%20access%20and%20secret%20keys%20(MINIO_ACCESS_KEY%20and%20MINIO_SECRET_KEY)%20within%20the%20YAML%20file.%20It%20is%20crucial%20to%20follow%20best%20practices%20for%20secret%20management%20in%20Kubernetes%2C%20such%20as%20using%20Kubernetes%20Secrets%20or%20external%20secret%20management%20solutions%2C%20to%20securely%20manage%20sensitive%20information.%0A%0A3.%20Resource%20Requirements%3A%20Resource%20requests%20and%20limits%20for%20CPU%2C%20memory%2C%20and%20storage%20are%20not%20defined%20in%20the%20configuration.%20Assess%20and%20adjust%20these%20resource%20specifications%20according%20to%20the%20expected%20workload%20and%20performance%20requirements%20to%20ensure%20optimal%20resource%20utilisation%20and%20avoid%20resource%20contention.%0A%0A4.%20Storage%20Provisioning%3A%20The%20configuration%20relies%20on%20a%20PersistentVolumeClaim%20(PVC)%20named%20minio%20to%20provide%20storage%20for%20MinIO.%20Ensure%20that%20the%20underlying%20storage%20provisioner%20and%20PersistentVolume%20(PV)%20configuration%20meet%20the%20performance%2C%20capacity%2C%20and%20durability%20requirements%20of%20the%20MinIO%20workload. -permalink: catalog/deployment/minio-deployment-d3481e21-5000-4c90-a999-f53050863dc3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d3481e21-5000-4c90-a999-f53050863dc3/0.0.1/design.yml' -downloadLink: d3481e21-5000-4c90-a999-f53050863dc3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/d447066e-2f53-48bb-ba7b-a3c43f68dd46.md b/collections/_catalog/deployment/d447066e-2f53-48bb-ba7b-a3c43f68dd46.md deleted file mode 100644 index 3c98fc6e56..0000000000 --- a/collections/_catalog/deployment/d447066e-2f53-48bb-ba7b-a3c43f68dd46.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: prometheus-versus-3 -publishedVersion: 0.0.1 -userId: a551897f-da39-4d4d-812e-6b299e82c457 -userName: Freedisch Batale -userAvatarURL: https://drive.google.com/file/d/1z3rUqsmrAIWuVn5v1fxcfepXL7JkQT_0/view?usp=drive_link -type: deployment -compatibility: - - Kubernetes -patternId: d447066e-2f53-48bb-ba7b-a3c43f68dd46 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d447066e-2f53-48bb-ba7b-a3c43f68dd46-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d447066e-2f53-48bb-ba7b-a3c43f68dd46-dark.png -patternInfo: | - This is a simple prometheus montioring design -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/prometheus-versus-3-d447066e-2f53-48bb-ba7b-a3c43f68dd46.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d447066e-2f53-48bb-ba7b-a3c43f68dd46/0.0.1/design.yml' -downloadLink: d447066e-2f53-48bb-ba7b-a3c43f68dd46/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/d695eba0-7703-42f3-934f-f1779367281a.md b/collections/_catalog/deployment/d695eba0-7703-42f3-934f-f1779367281a.md deleted file mode 100644 index adca1bdab9..0000000000 --- a/collections/_catalog/deployment/d695eba0-7703-42f3-934f-f1779367281a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Jenkins operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - jenkins-operator -patternId: d695eba0-7703-42f3-934f-f1779367281a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d695eba0-7703-42f3-934f-f1779367281a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d695eba0-7703-42f3-934f-f1779367281a-dark.png -patternInfo: | - This%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20for%20the%20Jenkins%20Operator%2C%20ensuring%20the%20deployment%20of%20a%20single%20instance%20within%20the%20cluster.%20It%20specifies%20metadata%20including%20labels%20and%20annotations%20for%20identification%20and%20description%20purposes.%20The%20deployment%20is%20set%20to%20run%20one%20replica%20of%20the%20Jenkins%20Operator%20container%2C%20configured%20with%20security%20settings%20to%20run%20as%20a%20non-root%20user%20and%20disallow%20privilege%20escalation.%20Environment%20variables%20are%20provided%20for%20dynamic%20configuration%20within%20the%20container%2C%20such%20as%20the%20namespace%20and%20Pod%20name.%20Resource%20requests%20and%20limits%20are%20also%20defined%20to%20manage%20CPU%20and%20memory%20allocation%20effectively.%20Overall%2C%20this%20Deployment%20aims%20to%20ensure%20the%20smooth%20and%20secure%20operation%20of%20the%20Jenkins%20Operator%20within%20the%20Kubernetes%20environment. -patternCaveats: | - 1.%20Resource%20Allocation%3A%20The%20CPU%20and%20memory%20requests%20and%20limits%20defined%20in%20the%20configuration%20should%20be%20carefully%20adjusted%20based%20on%20the%20workload%20and%20available%20resources%20in%20the%20Kubernetes%20cluster%20to%20avoid%20resource%20contention%20and%20potential%20performance%20issues.%0A%0A2.%20Image%20Repository%20Access%3A%20Ensure%20that%20the%20container%20image%20specified%20in%20the%20configuration%20(myregistry%2Fjenkins-operator%3Alatest)%20is%20accessible%20from%20the%20Kubernetes%20cluster.%20Proper%20image%20pull%20policies%20and%20authentication%20mechanisms%20should%20be%20configured%20to%20allow%20the%20Kubernetes%20nodes%20to%20pull%20the%20image%20from%20the%20specified%20registry.%0A%0A3.%20Security%20Context%3A%20The%20security%20settings%20configured%20in%20the%20security%20context%20of%20the%20container%20(runAsNonRoot%2C%20allowPrivilegeEscalation)%20are%20essential%20for%20maintaining%20the%20security%20posture%20of%20the%20Kubernetes%20cluster.%20Ensure%20that%20these%20settings%20align%20with%20your%20organization's%20security%20policies%20and%20best%20practices.%0A%0A4.%20Environment%20Variables%3A%20The%20environment%20variables%20defined%20in%20the%20configuration%2C%20such%20as%20WATCH_NAMESPACE%2C%20POD_NAME%2C%20OPERATOR_NAME%2C%20and%20PLATFORM_TYPE%2C%20are%20used%20to%20dynamically%20configure%20the%20Jenkins%20Operator%20container.%20Ensure%20that%20these%20variables%20are%20correctly%20set%20to%20provide%20the%20necessary%20context%20and%20functionality%20to%20the%20operator. -permalink: catalog/deployment/jenkins-operator-d695eba0-7703-42f3-934f-f1779367281a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d695eba0-7703-42f3-934f-f1779367281a/0.0.1/design.yml' -downloadLink: d695eba0-7703-42f3-934f-f1779367281a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/d6a40cd8-3c13-4920-a96c-b6278836565e.md b/collections/_catalog/deployment/d6a40cd8-3c13-4920-a96c-b6278836565e.md deleted file mode 100644 index 2361421203..0000000000 --- a/collections/_catalog/deployment/d6a40cd8-3c13-4920-a96c-b6278836565e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: '[Tutorial] Simple MySQL Pod' -publishedVersion: 0.0.1 -userId: 7dde79fb-2778-4a66-9ce5-6772bafe8df8 -userName: Sangram Rath -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: d6a40cd8-3c13-4920-a96c-b6278836565e -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20design%20is%20used%20as%20a%20starting%20point%20for%20the%20'Kubernetes%20ConfigMaps%20and%20Secrets%20with%20Meshery'%20tutorial.%20 -patternCaveats: | - This%20is%20a%20simple%20pod%20that%20is%20not%20managed%20through%20a%20deployment.%20It%20does%20not%20use%20persistent%20storage%2C%20service%20or%20any%20other%20production%20properties.%20%0AThis%20should%20be%20used%20for%20tutorial%2C%20demonstration%20or%20experimental%20purposes%20only.%20 -permalink: catalog/deployment/tutorial-simple-mysql-pod-d6a40cd8-3c13-4920-a96c-b6278836565e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d6a40cd8-3c13-4920-a96c-b6278836565e/0.0.1/design.yml' -downloadLink: d6a40cd8-3c13-4920-a96c-b6278836565e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/d86c6005-fa0b-4f74-bb66-7e3e47cbc846.md b/collections/_catalog/deployment/d86c6005-fa0b-4f74-bb66-7e3e47cbc846.md deleted file mode 100644 index 78afec9c56..0000000000 --- a/collections/_catalog/deployment/d86c6005-fa0b-4f74-bb66-7e3e47cbc846.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: App-graph -publishedVersion: 0.0.1 -userId: 32e6a999-e884-4fcc-ad17-ea3ae9f7e14f -userName: VAIBHAV Jakkula Jakkula -userAvatarURL: -type: deployment -compatibility: - - argocd-operator - - kubernetes -patternId: d86c6005-fa0b-4f74-bb66-7e3e47cbc846 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d86c6005-fa0b-4f74-bb66-7e3e47cbc846-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d86c6005-fa0b-4f74-bb66-7e3e47cbc846-dark.png -patternInfo: | - Argo%20and%20Kubernetes%20graph%20app -patternCaveats: | - No%20Caveats -permalink: catalog/deployment/app-graph-d86c6005-fa0b-4f74-bb66-7e3e47cbc846.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d86c6005-fa0b-4f74-bb66-7e3e47cbc846/0.0.1/design.yml' -downloadLink: d86c6005-fa0b-4f74-bb66-7e3e47cbc846/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43.md b/collections/_catalog/deployment/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43.md deleted file mode 100644 index 2266b02b93..0000000000 --- a/collections/_catalog/deployment/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Istio BookInfo Application -publishedVersion: 0.0.1 -userId: 173202fe-b94d-4064-8a86-1cf063732884 -userName: Ashish Tiwari -userAvatarURL: https://layer5.io/static/7b1f08e10d271cbfd963c7d435cf84ac/416c3/ashish-tiwari.webp -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43-dark.png -patternInfo: | - This%20design%20deploys%20Istio%20BookInfo%20App.%20The%20Bookinfo%20application%20is%20broken%20into%20four%20separate%20microservices%3A%20%0A%0Aproductpage.%20The%20productpage%20microservice%20calls%20the%20details%20and%20reviews%20microservices%20to%20populate%20the%20page.%20%5C%5C%5C%5Cndetails.%20The%20details%20microservice%20contains%20book%20information.%20%5C%5C%5C%5Cnreviews.%20The%20reviews%20microservice%20contains%20book%20reviews.%20It%20also%20calls%20the%20ratings%20microservice.%20%0A%0Aratings.%20The%20ratings%20microservice%20contains%20book%20ranking%20information%20that%20accompanies%20a%20book%20review. -patternCaveats: | - %20%20Networking%20should%20be%20properly%20configured%20to%20enable%20communication%20between%20the%20different%20services%20of%20the%20app -permalink: catalog/deployment/istio-bookinfo-application-ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43/0.0.1/design.yml' -downloadLink: ddf8a9f1-5fd0-4bda-b074-7dc9ceb1dd43/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/df24a01a-8235-449f-8dad-4a2474059ad3.md b/collections/_catalog/deployment/df24a01a-8235-449f-8dad-4a2474059ad3.md deleted file mode 100644 index b0d7d83a94..0000000000 --- a/collections/_catalog/deployment/df24a01a-8235-449f-8dad-4a2474059ad3.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -layout: item -name: Amazon Web Services IoT Architecture Diagram -publishedVersion: 0.0.1 -userId: 79089163-7195-4727-9be4-7254a673ed46 -userName: Ritik Saxena -userAvatarURL: -type: deployment -compatibility: - - aws-api-gateway-operator - - aws-vpc-cni - - aws-eks-controller - - aws-cloudwatch-controller -patternId: df24a01a-8235-449f-8dad-4a2474059ad3 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/df24a01a-8235-449f-8dad-4a2474059ad3.png -patternInfo: | - This comprehensive IoT architecture harnesses the power of Amazon Web Services (AWS) to create a robust and scalable Internet of Things (IoT) ecosystem -patternCaveats: | - It cannot be deployed because the nodes used to create the diagram are shapes and not components. -permalink: catalog/deployment/amazon-web-services-iot-architecture-diagram-df24a01a-8235-449f-8dad-4a2474059ad3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/df24a01a-8235-449f-8dad-4a2474059ad3/0.0.1/design.yml' -downloadLink: df24a01a-8235-449f-8dad-4a2474059ad3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/e5c65f06-4616-4ce7-9fe9-cb528128d242.md b/collections/_catalog/deployment/e5c65f06-4616-4ce7-9fe9-cb528128d242.md deleted file mode 100644 index e68ffb53f4..0000000000 --- a/collections/_catalog/deployment/e5c65f06-4616-4ce7-9fe9-cb528128d242.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: knative-service -publishedVersion: 0.0.1 -userId: 74dac12a-bd26-4e79-9e74-a2da32efb5f2 -userName: Shail Pujan -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKFqU74gUshDVOoxrgvrc2MtY_uM6710vYtmJ1lK3e3W7_L4Vef=s96-c -type: deployment -compatibility: - - knative-serving -patternId: e5c65f06-4616-4ce7-9fe9-cb528128d242 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20configuration%20defines%20a%20Kubernetes%20Deployment%20for%20a%20Knative%20service.%20This%20Deployment%2C%20named%20%22knative-service%2C%22%20specifies%20that%20a%20container%20will%20be%20created%20using%20a%20specified%20container%20image%2C%20which%20should%20be%20replaced%20with%20the%20actual%20image%20name.%20The%20container%20is%20configured%20to%20listen%20on%20port%208080.%20The%20Deployment%20ensures%20that%20a%20single%20replica%20of%20the%20container%20is%20maintained%20within%20the%20%22knative-serving%22%20namespace.%20The%20Deployment%20uses%20labels%20to%20identify%20the%20pods%20it%20manages.%0A%0AAdditionally%2C%20a%20Kubernetes%20Service%20is%20defined%20to%20expose%20the%20Deployment.%20This%20Service%2C%20named%20%22knative-service%2C%22%20is%20also%20created%20within%20the%20%22knative-serving%22%20namespace.%20It%20uses%20a%20selector%20to%20match%20the%20pods%20labeled%20with%20%22app%3A%20knative-service%22%20and%20maps%20the%20Service%20port%2080%20to%20the%20container%20port%208080%2C%20facilitating%20external%20access%20to%20the%20deployed%20application.%0A%0AFurthermore%2C%20a%20Knative%20Service%20resource%20is%20configured%20to%20manage%20the%20Knative%20service.%20This%20Knative%20Service%2C%20also%20named%20%22knative-service%22%20and%20located%20in%20the%20%22knative-serving%22%20namespace%2C%20is%20configured%20with%20the%20same%20container%20image%20and%20port%20settings.%20The%20Knative%20Service%20template%20includes%20metadata%20labels%20and%20container%20specifications%2C%20ensuring%20consistent%20deployment%20and%20management%20within%20the%20Knative%20environment.%20This%20setup%20allows%20the%20Knative%20service%20to%20handle%20HTTP%20requests%20efficiently%20and%20leverage%20Knative's%20autoscaling%20capabilities. -patternCaveats: | - Image%20Pull%20Policy%3AEnsure%20the%20image%20pull%20policy%20is%20appropriately%20set%2C%20especially%20if%20using%20a%20custom%20or%20private%20container%20image.%20You%20may%20need%20to%20configure%20Kubernetes%20to%20access%20private%20image%20repositories%20by%20setting%20up%20image%20pull%20secrets.%0A%0AResource%20Requests%20and%20Limits%3A%20Define%20resource%20requests%20and%20limits%20for%20CPU%20and%20memory%20to%20ensure%20that%20the%20Knative%20service%20runs%20efficiently%20without%20exhausting%20cluster%20resources.%20This%20helps%20in%20resource%20allocation%20and%20autoscaling.%0A%0ANamespace%20Management%3A%20Deploying%20to%20the%20knative-serving%20namespace%20is%20typical%20for%20Knative%20components%2C%20but%20for%20user%20applications%2C%20consider%20using%20a%20separate%20namespace%20for%20better%20organization%20and%20access%20control.%0A%0AAutoscaling%20Configuration%3A%20Knative%20supports%20autoscaling%20based%20on%20metrics%20like%20concurrency%20or%20CPU%20usage.%20Configure%20autoscaling%20settings%20to%20match%20your%20application's%20load%20characteristics.%0A%0ANetworking%20and%20Ingress%3A%20Ensure%20your%20Knative%20service%20is%20properly%20exposed%20via%20an%20ingress%20or%20gateway%20if%20external%20access%20is%20required.%20Configure%20DNS%20settings%20and%20TLS%20for%20secure%20access.%0A%0AMonitoring%20and%20Logging%3A%20Implement%20monitoring%20and%20logging%20to%20track%20the%20performance%20and%20health%20of%20your%20Knative%20service.%20Use%20tools%20like%20Prometheus%2C%20Grafana%2C%20and%20Elasticsearch%20for%20this%20purpose.%0A%0A -permalink: catalog/deployment/knative-service-e5c65f06-4616-4ce7-9fe9-cb528128d242.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e5c65f06-4616-4ce7-9fe9-cb528128d242/0.0.1/design.yml' -downloadLink: e5c65f06-4616-4ce7-9fe9-cb528128d242/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/e79ebaa2-06f1-498b-8307-c434a8911b18.md b/collections/_catalog/deployment/e79ebaa2-06f1-498b-8307-c434a8911b18.md deleted file mode 100644 index 3309df88d6..0000000000 --- a/collections/_catalog/deployment/e79ebaa2-06f1-498b-8307-c434a8911b18.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Online Boutique -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: deployment -compatibility: - - gcp - - istio-base - - istio-operator -patternId: e79ebaa2-06f1-498b-8307-c434a8911b18 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Google's%20Microservices%20sample%20app%20is%20named%20Online%20Boutique.%20%0A%0ADocs%20-%20https%3A%2F%2Fdocs.meshery.io%2Fguides%2Fsample-apps%23online-boutique%0ASource%20-%20https%3A%2F%2Fgithub.com%2FGoogleCloudPlatform%2Fmicroservices-demo -patternCaveats: | - N%2FA -permalink: catalog/deployment/online-boutique-e79ebaa2-06f1-498b-8307-c434a8911b18.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e79ebaa2-06f1-498b-8307-c434a8911b18/0.0.1/design.yml' -downloadLink: e79ebaa2-06f1-498b-8307-c434a8911b18/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/e801059d-9fc8-41bb-b6e8-66248ca54c5f.md b/collections/_catalog/deployment/e801059d-9fc8-41bb-b6e8-66248ca54c5f.md deleted file mode 100644 index d3b08570b1..0000000000 --- a/collections/_catalog/deployment/e801059d-9fc8-41bb-b6e8-66248ca54c5f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Catalog Design2 -publishedVersion: 0.0.1 -userId: d7b56d0c-1fa7-4895-b9c2-ebbfd070f4c8 -userName: Colby Stoker -userAvatarURL: https://lh3.googleusercontent.com/a/AEdFTp4CZjjxz4hW0P_kBw7ZteyRGxQPFQiOd-F5Y6b1iGw=s96-c -type: deployment -compatibility: - - kubernetes -patternId: e801059d-9fc8-41bb-b6e8-66248ca54c5f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e801059d-9fc8-41bb-b6e8-66248ca54c5f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e801059d-9fc8-41bb-b6e8-66248ca54c5f-dark.png -patternInfo: | - Design%20contains%20k8s%20resources%20like%20deployment%2C%20service -patternCaveats: | - There%20is%20no%20caveats -permalink: catalog/deployment/catalog-design2-e801059d-9fc8-41bb-b6e8-66248ca54c5f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e801059d-9fc8-41bb-b6e8-66248ca54c5f/0.0.1/design.yml' -downloadLink: e801059d-9fc8-41bb-b6e8-66248ca54c5f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5.md b/collections/_catalog/deployment/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5.md deleted file mode 100644 index 94ce47db79..0000000000 --- a/collections/_catalog/deployment/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: api-backend -publishedVersion: 0.0.1 -userId: 06758e04-f420-49b6-ae5d-c02d468a02ca -userName: chaitu bhojane -userAvatarURL: https://google.com/favico.ico -type: deployment -compatibility: - - kubernetes -patternId: e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5-dark.png -patternInfo: | - API%20deployment%20using%20kubernetes%20and%20it's%20components -patternCaveats: | - No%2C%20there%20is%20no%20caveats -permalink: catalog/deployment/api-backend-e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5/0.0.1/design.yml' -downloadLink: e8f285f5-e7a5-4e4a-b8b1-2f7d3667c0f5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/ea07d238-15f4-4693-afe2-e413b3b93d6f.md b/collections/_catalog/deployment/ea07d238-15f4-4693-afe2-e413b3b93d6f.md deleted file mode 100644 index 94eaa7e105..0000000000 --- a/collections/_catalog/deployment/ea07d238-15f4-4693-afe2-e413b3b93d6f.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: MySQL installation with cinder volume plugin -publishedVersion: 0.0.1 -userId: 878488d5-c394-4b04-91b4-fd2f9e67ffaf -userName: Vivek Vishal -userAvatarURL: https://lh3.googleusercontent.com/a/AEdFTp4cegl_eVvmX8msycqpmZqZjkpHkrR5ZAZLOANmjg=s96-c -type: deployment -compatibility: - - kubernetes - - mysql-operator -patternId: ea07d238-15f4-4693-afe2-e413b3b93d6f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea07d238-15f4-4693-afe2-e413b3b93d6f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea07d238-15f4-4693-afe2-e413b3b93d6f-dark.png -patternInfo: | - Cinder%20is%20a%20Block%20Storage%20service%20for%20OpenStack.%20It%20can%20be%20used%20as%20an%20attachment%20mounted%20to%20a%20pod%20in%20Kubernetes. -patternCaveats: | - Currently%20the%20cinder%20volume%20plugin%20is%20designed%20to%20work%20only%20on%20linux%20hosts%20and%20offers%20ext4%20and%20ext3%20as%20supported%20fs%20types%20Make%20sure%20that%20kubelet%20host%20machine%20has%20the%20following%20executables -permalink: catalog/deployment/mysql-installation-with-cinder-volume-plugin-ea07d238-15f4-4693-afe2-e413b3b93d6f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ea07d238-15f4-4693-afe2-e413b3b93d6f/0.0.1/design.yml' -downloadLink: ea07d238-15f4-4693-afe2-e413b3b93d6f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3.md b/collections/_catalog/deployment/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3.md deleted file mode 100644 index 8cb65d0230..0000000000 --- a/collections/_catalog/deployment/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: mysql operator -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: deployment -compatibility: - - mysql-operator -patternId: ea57586d-7d26-4367-bf9e-1a0fe1fe81f3 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3-dark.png -patternInfo: | - This%20YAML%20file%20defines%20a%20Kubernetes%20Deployment%20for%20the%20mysql-operator%20in%20the%20mysql-operator%20namespace.%20The%20deployment%20specifies%20a%20single%20replica%20of%20the%20operator%20to%20manage%20MySQL%20instances%20within%20the%20cluster.%20The%20operator%20container%20uses%20the%20image%20container-registry.oracle.com%2Fmysql%2Fcommunity-operator%3A8.4.0-2.1.3%20and%20runs%20the%20mysqlsh%20command%20with%20specific%20arguments%20for%20the%20MySQL%20operator.%20 -patternCaveats: | - 1.%20Single%20Replica%3A%0ARunning%20a%20single%20replica%20of%20the%20operator%20can%20be%20a%20single%20point%20of%20failure.%20Consider%20increasing%20the%20number%20of%20replicas%20for%20high%20availability%20if%20supported.%0A%0A2.%20Image%20Version%3A%0AThe%20image%20version%208.4.0-2.1.3%20is%20specified%2C%20ensuring%20consistent%20deployments.%20Be%20mindful%20of%20updating%20this%20version%20in%20accordance%20with%20operator%20updates%20and%20testing%20compatibility.%0A%0A3.%20Security%20Context%3A%0AThe%20security%20context%20is%20configured%20to%20run%20as%20a%20non-root%20user%20(runAsUser%3A%202)%2C%20with%20no%20privilege%20escalation%20(allowPrivilegeEscalation%3A%20false)%2C%20and%20a%20read-only%20root%20filesystem%20(readOnlyRootFilesystem%3A%20true).%20This%20enhances%20the%20security%20posture%20of%20the%20deployment.%0A%0A4.%20Environment%20Variables%3A%0ASensitive%20information%20should%20be%20handled%20securely.%20Environment%20variables%20such%20as%20credentials%20should%20be%20managed%20using%20Kubernetes%20Secrets%20if%20necessary.%0A%0A5.%20Readiness%20Probe%3A%0AThe%20readiness%20probe%20uses%20a%20file-based%20check%2C%20which%20is%20simple%20but%20ensure%20that%20the%20mechanism%20creating%20the%20%2Ftmp%2Fmysql-operator-ready%20file%20is%20reliable. -permalink: catalog/deployment/mysql-operator-ea57586d-7d26-4367-bf9e-1a0fe1fe81f3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ea57586d-7d26-4367-bf9e-1a0fe1fe81f3/0.0.1/design.yml' -downloadLink: ea57586d-7d26-4367-bf9e-1a0fe1fe81f3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/eb7a21e0-afd8-4263-94f2-e9083ac0b602.md b/collections/_catalog/deployment/eb7a21e0-afd8-4263-94f2-e9083ac0b602.md deleted file mode 100644 index 26466e1b7c..0000000000 --- a/collections/_catalog/deployment/eb7a21e0-afd8-4263-94f2-e9083ac0b602.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: GuestBook App (Copy) -publishedVersion: 0.0.1 -userId: 53ccd221-c66b-4815-93df-397013b0200a -userName: Yash Sharma -userAvatarURL: https://avatars.githubusercontent.com/u/68152307?v=4 -type: deployment -compatibility: - - Kubernetes -patternId: eb7a21e0-afd8-4263-94f2-e9083ac0b602 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/eb7a21e0-afd8-4263-94f2-e9083ac0b602-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/eb7a21e0-afd8-4263-94f2-e9083ac0b602-dark.png -patternInfo: | - The GuestBook App is a cloud-native application designed using Kubernetes as the underlying orchestration and management system. It consists of various services and components deployed within Kubernetes namespaces. The default namespace represents the main environment where the application operates. The frontend-cyrdx service is responsible for handling frontend traffic and is deployed as a Kubernetes service with a selector for the guestbook application and frontend tier. The frontend-fsfct deployment runs multiple replicas of the frontend component, which utilizes the gb-frontend image and exposes port 80. The guestbook namespace serves as a logical grouping for components related to the GuestBook App. The redis-follower-armov service handles follower Redis instances for the backend, while the redis-follower-nwlew deployment manages multiple replicas of the follower Redis container. The redis-leader-fhxla deployment represents the leader Redis container, and the redis-leader-vjtmi service exposes it as a Kubernetes service. These components work together to create a distributed and scalable architecture for the GuestBook App, leveraging Kubernetes for container orchestration and management. -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/deployment/guestbook-app-copy-eb7a21e0-afd8-4263-94f2-e9083ac0b602.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/eb7a21e0-afd8-4263-94f2-e9083ac0b602/0.0.1/design.yml' -downloadLink: eb7a21e0-afd8-4263-94f2-e9083ac0b602/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/ec343550-04ea-440f-b17e-5de2c171194a.md b/collections/_catalog/deployment/ec343550-04ea-440f-b17e-5de2c171194a.md deleted file mode 100644 index f9cdb98f6d..0000000000 --- a/collections/_catalog/deployment/ec343550-04ea-440f-b17e-5de2c171194a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Network(Service -> Endpoint) -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: deployment -compatibility: - - kubernetes -patternId: ec343550-04ea-440f-b17e-5de2c171194a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ec343550-04ea-440f-b17e-5de2c171194a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ec343550-04ea-440f-b17e-5de2c171194a-dark.png -patternInfo: | - A%20relationship%20that%20defines%20network%20edges%20between%20components.%20In%20the%20design%20Edge%20network%20relationship%20defines%20a%20network%20configuration%20for%20managing%20services%20and%20endpoints%20in%20a%20Kubernetes%20environment.%20This%20design%20shows%20the%20relationship%20between%20two%20Kubernetes%20components%20Endpoint%20and%20Service. -patternCaveats: | - NA -permalink: catalog/deployment/network-service-endpoint-ec343550-04ea-440f-b17e-5de2c171194a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ec343550-04ea-440f-b17e-5de2c171194a/0.0.1/design.yml' -downloadLink: ec343550-04ea-440f-b17e-5de2c171194a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313.md b/collections/_catalog/deployment/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313.md deleted file mode 100644 index 5ae482a127..0000000000 --- a/collections/_catalog/deployment/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: hello-app -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: deployment -compatibility: - - kubernetes - - nginx-ingress -patternId: ec6a41d2-d2bd-4089-b1c2-72a5c76b9313 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313-dark.png -patternInfo: | - An%20hello%20app%20application%20by%20using%20nginx%20and%20kubernentes%20components -patternCaveats: | - No%20caveats -permalink: catalog/deployment/hello-app-ec6a41d2-d2bd-4089-b1c2-72a5c76b9313.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ec6a41d2-d2bd-4089-b1c2-72a5c76b9313/0.0.1/design.yml' -downloadLink: ec6a41d2-d2bd-4089-b1c2-72a5c76b9313/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/f129b08a-c024-441b-ba56-577c4f67665f.md b/collections/_catalog/deployment/f129b08a-c024-441b-ba56-577c4f67665f.md deleted file mode 100644 index 1f1e3b77a4..0000000000 --- a/collections/_catalog/deployment/f129b08a-c024-441b-ba56-577c4f67665f.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: CryptoMB.yml -publishedVersion: 0.0.1 -userId: c0228da7-2415-4626-9ea5-19f97147767b -userName: Aaditya Narayan Subedy -userAvatarURL: https://avatars.githubusercontent.com/u/51183483?v=4 -type: deployment -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: f129b08a-c024-441b-ba56-577c4f67665f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f129b08a-c024-441b-ba56-577c4f67665f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f129b08a-c024-441b-ba56-577c4f67665f-dark.png -patternInfo: | - Cryptographic%20operations%20are%20among%20the%20most%20compute-intensive%20and%20critical%20operations%20when%20it%20comes%20to%20secured%20connections.%20Istio%20uses%20Envoy%20as%20the%20%E2%80%9Cgateways%2Fsidecar%E2%80%9D%20to%20handle%20secure%20connections%20and%20intercept%20the%20traffic.%20Depending%20upon%20use%20cases%2C%20when%20an%20ingress%20gateway%20must%20handle%20a%20large%20number%20of%20incoming%20TLS%20and%20secured%20service-to-service%20connections%20through%20sidecar%20proxies%2C%20the%20load%20on%20Envoy%20increases.%20The%20potential%20performance%20depends%20on%20many%20factors%2C%20such%20as%20size%20of%20the%20cpuset%20on%20which%20Envoy%20is%20running%2C%20incoming%20traffic%20patterns%2C%20and%20key%20size.%20These%20factors%20can%20impact%20Envoy%20serving%20many%20new%20incoming%20TLS%20requests.%20To%20achieve%20performance%20improvements%20and%20accelerated%20handshakes%2C%20a%20new%20feature%20was%20introduced%20in%20Envoy%201.20%20and%20Istio%201.14.%20It%20can%20be%20achieved%20with%203rd%20Gen%20Intel%C2%AE%20Xeon%C2%AE%20Scalable%20processors%2C%20the%20Intel%C2%AE%20Integrated%20Performance%20Primitives%20(Intel%C2%AE%20IPP)%20crypto%20library%2C%20CryptoMB%20Private%20Key%20Provider%20Method%20support%20in%20Envoy%2C%20and%20Private%20Key%20Provider%20configuration%20in%20Istio%20using%20ProxyConfig. -patternCaveats: | - Ensure%20networking%20is%20setup%20properly%20and%20correct%20annotation%20are%20applied%20to%20each%20resource%20for%20custom%20Intel%20configuration -permalink: catalog/deployment/cryptomb-yml-f129b08a-c024-441b-ba56-577c4f67665f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f129b08a-c024-441b-ba56-577c4f67665f/0.0.1/design.yml' -downloadLink: f129b08a-c024-441b-ba56-577c4f67665f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/f26e8729-1de7-477c-b6d1-ce704ad29aef.md b/collections/_catalog/deployment/f26e8729-1de7-477c-b6d1-ce704ad29aef.md deleted file mode 100644 index a213099981..0000000000 --- a/collections/_catalog/deployment/f26e8729-1de7-477c-b6d1-ce704ad29aef.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Deployment Web -publishedVersion: 0.0.1 -userId: 9bbbb782-2dd4-4ec3-86fd-0a769c0b98f9 -userName: Yogesh saini -userAvatarURL: https://lh3.googleusercontent.com/a/AAcHTtdv793k9BnK_G6ryNpm4m2meNvSqFBW16N8tqhGkes=s96-c -type: deployment -compatibility: - - kubernetes -patternId: f26e8729-1de7-477c-b6d1-ce704ad29aef -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f26e8729-1de7-477c-b6d1-ce704ad29aef-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f26e8729-1de7-477c-b6d1-ce704ad29aef-dark.png -patternInfo: | - Simple%20deployment%20of%20web%20application%20 -patternCaveats: | - There%20is%20no%20caveats -permalink: catalog/deployment/deployment-web-f26e8729-1de7-477c-b6d1-ce704ad29aef.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f26e8729-1de7-477c-b6d1-ce704ad29aef/0.0.1/design.yml' -downloadLink: f26e8729-1de7-477c-b6d1-ce704ad29aef/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/f60a00b8-2038-48cc-9f44-818ffac4987f.md b/collections/_catalog/deployment/f60a00b8-2038-48cc-9f44-818ffac4987f.md deleted file mode 100644 index bf888d5597..0000000000 --- a/collections/_catalog/deployment/f60a00b8-2038-48cc-9f44-818ffac4987f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Redis Leader Deployment -publishedVersion: 0.0.1 -userId: 8f3bd5ce-f178-4a69-83ba-62341c74d492 -userName: Gaurav Chadha -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu9qHPyJXY8hB8h4Qlmdc1YzI9qXe0if3sRuTpQPJA=s96-c -type: deployment -compatibility: - - kubernetes -patternId: f60a00b8-2038-48cc-9f44-818ffac4987f -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This is a simple deployment of redis leader app. Its deployment includes 1 replica that uses image:docker.io/redis:6.0.5, cpu: 100m, memory: 100Mi and exposes containerPort: 6379 -patternCaveats: | - None -permalink: catalog/deployment/redis-leader-deployment-f60a00b8-2038-48cc-9f44-818ffac4987f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f60a00b8-2038-48cc-9f44-818ffac4987f/0.0.1/design.yml' -downloadLink: f60a00b8-2038-48cc-9f44-818ffac4987f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/f752c99c-cbe9-4af2-98a7-c3b7a05b94b6.md b/collections/_catalog/deployment/f752c99c-cbe9-4af2-98a7-c3b7a05b94b6.md deleted file mode 100644 index b3b5904590..0000000000 --- a/collections/_catalog/deployment/f752c99c-cbe9-4af2-98a7-c3b7a05b94b6.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: RBAC for ElasticSearch -publishedVersion: 0.0.1 -userId: 8f3bd5ce-f178-4a69-83ba-62341c74d492 -userName: Gaurav Chadha -userAvatarURL: https://lh3.googleusercontent.com/a-/ACNPEu9qHPyJXY8hB8h4Qlmdc1YzI9qXe0if3sRuTpQPJA=s96-c -type: deployment -compatibility: - - Kubernetes -patternId: f752c99c-cbe9-4af2-98a7-c3b7a05b94b6 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This infrastructure design defines resources related to Role-Based Access Control (RBAC) for Elasticsearch in a Kubernetes environment. Here's a brief description of the components: 1.) zk (ZooKeeper StatefulSet): - A StatefulSet named zk with 3 replicas is defined to manage ZooKeeper instances. - It uses ordered pod management policy, ensuring that pods are started in order. - ZooKeeper is configured with specific settings, including ports, data directories, and resource requests. - It has affinity settings to avoid running multiple ZooKeeper instances on the same node. - The configuration includes liveness and readiness probes to ensure the health of the pods. 2.) zk-cs (ZooKeeper Service): - A Kubernetes Service named zk-cs is defined to provide access to the ZooKeeper instances. - It exposes the client port (port 2181) used to connect to ZooKeeper. 3.) zk-hs (ZooKeeper Headless Service): - Another Kubernetes Service named `zk-hs` is defined as headless (with cluster IP set to None). - It exposes ports for ZooKeeper server (port 2888) and leader election (port 3888). - This headless service is typically used for direct communication with individual ZooKeeper instances. 4.) **zk-pdb (ZooKeeper PodDisruptionBudget):** - A PodDisruptionBudget named `zk-pdb` is defined to control the maximum number of unavailable ZooKeeper pods to 1. - This ensures that at least one ZooKeeper instance remains available during disruptions. -patternCaveats: | - Networking should be properly configured to enable communication between pod and services. Ensure sufficient resources are available in the cluster. -permalink: catalog/deployment/rbac-for-elasticsearch-f752c99c-cbe9-4af2-98a7-c3b7a05b94b6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f752c99c-cbe9-4af2-98a7-c3b7a05b94b6/0.0.1/design.yml' -downloadLink: f752c99c-cbe9-4af2-98a7-c3b7a05b94b6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061.md b/collections/_catalog/deployment/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061.md deleted file mode 100644 index 5150fdf8ed..0000000000 --- a/collections/_catalog/deployment/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: k8s Deployment-2 -publishedVersion: 0.0.1 -userId: 846d0933-57da-44ff-9ae8-098007e03cb3 -userName: Aboobaker Siddiq -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKlewp0NRo0Yp1m40vRGhfJJth8VN49qOqc7L5YE1MQ_w=s96-c -type: deployment -compatibility: - - kubernetes -patternId: f90ecf87-6ca5-4d32-8ecf-f67cb20e3061 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061-dark.png -patternInfo: | - Sample%20kubernetes%20deployment -patternCaveats: | - No%20caveats -permalink: catalog/deployment/k8s-deployment-2-f90ecf87-6ca5-4d32-8ecf-f67cb20e3061.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f90ecf87-6ca5-4d32-8ecf-f67cb20e3061/0.0.1/design.yml' -downloadLink: f90ecf87-6ca5-4d32-8ecf-f67cb20e3061/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547.md b/collections/_catalog/deployment/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547.md deleted file mode 100644 index 70b8bc712c..0000000000 --- a/collections/_catalog/deployment/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Serving T5 Large Language Model with TorchServe -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: deployment -compatibility: - - kubernetes -patternId: fb8a31f7-0adb-40e7-ac26-bffb0a0f4547 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547-dark.png -patternInfo: | - Deploy%20torchserve%20inference%20server%20with%20prepared%20T5%20model%20and%20Client%20Application.%0A%0AManifests%20were%20tested%20against%20GKE%20Autopilot%20Kubernetes%20cluster. -patternCaveats: | - To%20configure%20HPA%20base%20on%20metrics%20from%20torchserve%20you%20need%20to%3A%0A%0AEnable%20Google%20Manager%20Prometheus%20or%20install%20OSS%20Prometheus.%0AInstall%20Custom%20Metrics%20Adapter.%0AApply%20pod-monitoring.yaml%20and%20hpa.yaml -permalink: catalog/deployment/serving-t5-large-language-model-with-torchserve-fb8a31f7-0adb-40e7-ac26-bffb0a0f4547.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/fb8a31f7-0adb-40e7-ac26-bffb0a0f4547/0.0.1/design.yml' -downloadLink: fb8a31f7-0adb-40e7-ac26-bffb0a0f4547/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/deployment/fe260015-147d-487a-9e2c-44cbff354f60.md b/collections/_catalog/deployment/fe260015-147d-487a-9e2c-44cbff354f60.md deleted file mode 100644 index 91b4532b86..0000000000 --- a/collections/_catalog/deployment/fe260015-147d-487a-9e2c-44cbff354f60.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -layout: item -name: Kubernetes Deployment with Azure File Storage -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: deployment -compatibility: - - kubernetes - - nginx - - nginx-ingress - - nginx-service-mesh -patternId: fe260015-147d-487a-9e2c-44cbff354f60 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fe260015-147d-487a-9e2c-44cbff354f60-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fe260015-147d-487a-9e2c-44cbff354f60-dark.png -patternInfo: | - This design sets up a Kubernetes Deployment deploying two NGINX containers. Each container utilizes an Azure File storage volume for shared data. The NGINX instances serve web content while accessing an Azure File share, enabling scalable and shared storage for the web servers. -patternCaveats: | - 1. Azure Configuration: Ensure that your Azure configuration, including secrets, is correctly set up to access the Azure File share.\n\n2. Data Sharing: Multiple NGINX containers share the same storage. Be cautious when handling write operations to avoid conflicts or data corruption.\n\n3. Scalability: Consider the scalability of both NGINX and Azure File storage to meet your application's demands.\n\n4. Security: Safeguard the secrets used to access Azure resources and limit access to only authorized entities.\n\n5. Pod Recovery: Ensure that the pod recovery strategy is well-defined to handle disruptions or node failures.\n\n6. Azure Costs: Monitor and manage costs associated with Azure File storage, as it may incur charges based on usage.\n\n7. Maintenance: Plan for regular maintenance and updates of both NGINX and Azure configurations to address security and performance improvements.\n\n8. Monitoring: Implement monitoring and alerts for both the NGINX containers and Azure File storage to proactively detect and address issues.\n\n9. Backup and Disaster Recovery: Establish a backup and disaster recovery plan to safeguard data stored in Azure File storage. -permalink: catalog/deployment/kubernetes-deployment-with-azure-file-storage-fe260015-147d-487a-9e2c-44cbff354f60.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/fe260015-147d-487a-9e2c-44cbff354f60/0.0.1/design.yml' -downloadLink: fe260015-147d-487a-9e2c-44cbff354f60/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/0194ff83-0a43-4b83-9c75-b8f0f32da6b7.md b/collections/_catalog/observability/0194ff83-0a43-4b83-9c75-b8f0f32da6b7.md deleted file mode 100644 index 2cbbba8aef..0000000000 --- a/collections/_catalog/observability/0194ff83-0a43-4b83-9c75-b8f0f32da6b7.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Readiness -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: observability -compatibility: - - kubernetes -patternId: 0194ff83-0a43-4b83-9c75-b8f0f32da6b7 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0194ff83-0a43-4b83-9c75-b8f0f32da6b7-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0194ff83-0a43-4b83-9c75-b8f0f32da6b7-dark.png -patternInfo: | - Pod%20readiness%20in%20Kubernetes%20indicates%20when%20a%20Pod%20is%20prepared%20to%20handle%20requests%20and%20execute%20its%20intended%20tasks.%20It%20hinges%20on%20the%20successful%20initialization%20of%20its%20containers%20and%20the%20positive%20response%20from%20readiness%20probes%2C%20which%20verify%20the%20health%20and%20operational%20readiness%20of%20the%20Pod's%20components.%20This%20readiness%20status%20is%20crucial%20for%20ensuring%20that%20services%20can%20safely%20direct%20traffic%20to%20the%20Pod%20without%20encountering%20errors%20or%20delays%20caused%20by%20incomplete%20initialization%20or%20unavailability.%20Managing%20Pod%20readiness%20effectively%20enhances%20application%20reliability%20and%20performance%20by%20enabling%20Kubernetes%20to%20efficiently%20distribute%20Pods%20across%20nodes%20while%20ensuring%20they%20are%20capable%20of%20fulfilling%20their%20roles.%20Regular%20monitoring%20and%20adjustment%20of%20readiness%20probes%20and%20configurations%20are%20essential%20for%20maintaining%20optimal%20application%20responsiveness%20and%20resilience%20in%20dynamic%20Kubernetes%20environments. -patternCaveats: | - No%20caveats -permalink: catalog/observability/pod-readiness-0194ff83-0a43-4b83-9c75-b8f0f32da6b7.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0194ff83-0a43-4b83-9c75-b8f0f32da6b7/0.0.1/design.yml' -downloadLink: 0194ff83-0a43-4b83-9c75-b8f0f32da6b7/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/2d54f372-10e5-4c4e-8d23-b9c35c68ce98.md b/collections/_catalog/observability/2d54f372-10e5-4c4e-8d23-b9c35c68ce98.md deleted file mode 100644 index 2dd5d6989f..0000000000 --- a/collections/_catalog/observability/2d54f372-10e5-4c4e-8d23-b9c35c68ce98.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -layout: item -name: Robot Shop Sample App -publishedVersion: 0.0.1 -userId: 79089163-7195-4727-9be4-7254a673ed46 -userName: Ritik Saxena -userAvatarURL: -type: observability -compatibility: - - kubernetes - - nginx - - nginx-ingress - - apache-shardingsphere-operator-charts -patternId: 2d54f372-10e5-4c4e-8d23-b9c35c68ce98 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Stans Robot Shop is a sample microservice application you can use as a sandbox to test and learn containerised application orchestration and monitoring techniques. It is not intended to be a comprehensive reference example of how to write a microservices application, although you will better understand some of those concepts by playing with Stans Robot Shop. To be clear, the error handling is patchy and there is not any security built into the application. -patternCaveats: | - This sample microservice application has been built using these technologies: NodeJS (Express), Java (Spring Boot), Python (Flask), Golang, PHP (Apache), MongoDB, Redis, MySQL (Maxmind data), RabbitMQ, Nginx, AngularJS (1.x) -permalink: catalog/observability/robot-shop-sample-app-2d54f372-10e5-4c4e-8d23-b9c35c68ce98.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2d54f372-10e5-4c4e-8d23-b9c35c68ce98/0.0.1/design.yml' -downloadLink: 2d54f372-10e5-4c4e-8d23-b9c35c68ce98/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/3c3439a0-d215-4a71-aa47-13a5f2d007b7.md b/collections/_catalog/observability/3c3439a0-d215-4a71-aa47-13a5f2d007b7.md deleted file mode 100644 index 754cf06ec9..0000000000 --- a/collections/_catalog/observability/3c3439a0-d215-4a71-aa47-13a5f2d007b7.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: prometheus_kubernetes -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - kube-prometheus - - kube-prometheus-stack - - kubernetes -patternId: 3c3439a0-d215-4a71-aa47-13a5f2d007b7 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3c3439a0-d215-4a71-aa47-13a5f2d007b7-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3c3439a0-d215-4a71-aa47-13a5f2d007b7-dark.png -patternInfo: | - This%20outlines%20a%20configuration%20for%20deploying%20Prometheus%20to%20monitor%20Kubernetes%20clusters%20effectively.%20It%20focuses%20on%20setting%20up%20Prometheus%20to%20collect%20and%20store%20metrics%20from%20various%20Kubernetes%20components%20such%20as%20nodes%2C%20pods%2C%20and%20services. -patternCaveats: | - Prometheus%20can%20consume%20significant%20CPU%20and%20memory%20resources%2C%20especially%20when%20monitoring%20large-scale%20Kubernetes%20clusters%20with%20numerous%20pods%20and%20services.%20Careful%20resource%20allocation%20and%20monitoring%20are%20essential%20to%20prevent%20performance%20degradation%20or%20cluster%20instability. -permalink: catalog/observability/prometheus-kubernetes-3c3439a0-d215-4a71-aa47-13a5f2d007b7.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3c3439a0-d215-4a71-aa47-13a5f2d007b7/0.0.1/design.yml' -downloadLink: 3c3439a0-d215-4a71-aa47-13a5f2d007b7/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/464b4f2a-78d8-4034-915a-612475f757d2.md b/collections/_catalog/observability/464b4f2a-78d8-4034-915a-612475f757d2.md deleted file mode 100644 index 11134e277b..0000000000 --- a/collections/_catalog/observability/464b4f2a-78d8-4034-915a-612475f757d2.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -layout: item -name: Thanos Query Design -publishedVersion: 0.0.1 -userId: 878488d5-c394-4b04-91b4-fd2f9e67ffaf -userName: Vivek Vishal -userAvatarURL: https://lh3.googleusercontent.com/a/AEdFTp4cegl_eVvmX8msycqpmZqZjkpHkrR5ZAZLOANmjg=s96-c -type: observability -compatibility: - - thanos - - thanos-operator - - kubernetes - - prometheus-operator-crds - - prometheus -patternId: 464b4f2a-78d8-4034-915a-612475f757d2 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/464b4f2a-78d8-4034-915a-612475f757d2-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/464b4f2a-78d8-4034-915a-612475f757d2-dark.png -patternInfo: | - This is sample app for testing k8s deployment and thanos -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource -permalink: catalog/observability/thanos-query-design-464b4f2a-78d8-4034-915a-612475f757d2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/464b4f2a-78d8-4034-915a-612475f757d2/0.0.1/design.yml' -downloadLink: 464b4f2a-78d8-4034-915a-612475f757d2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/4fe5b8f3-d8c7-487c-9860-bc7cb8674d48.md b/collections/_catalog/observability/4fe5b8f3-d8c7-487c-9860-bc7cb8674d48.md deleted file mode 100644 index 839542ab60..0000000000 --- a/collections/_catalog/observability/4fe5b8f3-d8c7-487c-9860-bc7cb8674d48.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Prometheus dummy exporter -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - gcp - - kube-prometheus-stack - - kubernetes -patternId: 4fe5b8f3-d8c7-487c-9860-bc7cb8674d48 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - A%20simple%20prometheus-dummy-exporter%20container%20exposes%20a%20single%20Prometheus%20metric%20with%20a%20constant%20value.%20The%20metric%20name%2C%20value%20and%20port%20on%20which%20it%20will%20be%20served%20can%20be%20passed%20by%20flags.%0A%0AThis%20container%20is%20then%20deployed%20in%20the%20same%20pod%20with%20another%20container%2C%20prometheus-to-sd%2C%20configured%20to%20use%20the%20same%20port.%20It%20scrapes%20the%20metric%20and%20publishes%20it%20to%20Stackdriver.%20This%20adapter%20isn't%20part%20of%20the%20sample%20code%2C%20but%20a%20standard%20component%20used%20by%20many%20Kubernetes%20applications.%20You%20can%20learn%20more%20about%20it%20%20from%20given%20below%20link%20https%3A%2F%2Fgithub.com%2FGoogleCloudPlatform%2Fk8s-stackdriver%2Ftree%2Fmaster%2Fprometheus-to-sd -patternCaveats: | - It%20is%20only%20%20developed%20for%20Google%20Kubernetes%20Engine%20to%20collect%20metrics%20from%20system%20services%20in%20order%20to%20support%20Kubernetes%20users.%20We%20designed%20the%20tool%20to%20be%20lean%20when%20deployed%20as%20a%20sidecar%20in%20your%20pod.%20It's%20intended%20to%20support%20only%20the%20metrics%20the%20Kubernetes%20team%20at%20Google%20needs%20and%20is%20not%20meant%20for%20end-users. -permalink: catalog/observability/prometheus-dummy-exporter-4fe5b8f3-d8c7-487c-9860-bc7cb8674d48.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/4fe5b8f3-d8c7-487c-9860-bc7cb8674d48/0.0.1/design.yml' -downloadLink: 4fe5b8f3-d8c7-487c-9860-bc7cb8674d48/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/5479aed9-669a-4bea-9693-56921b55d04d.md b/collections/_catalog/observability/5479aed9-669a-4bea-9693-56921b55d04d.md deleted file mode 100644 index a06fef17c0..0000000000 --- a/collections/_catalog/observability/5479aed9-669a-4bea-9693-56921b55d04d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Prometheus Sample -publishedVersion: 0.0.1 -userId: 08a365f5-5305-4007-8088-d57f45b4966c -userName: ashu adhana -userAvatarURL: -type: observability -compatibility: - - Kubernetes -patternId: 5479aed9-669a-4bea-9693-56921b55d04d -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This is a simple prometheus montioring design -patternCaveats: | - Networking should be properly configured to enable communication between the frontend and backend components of the app. -permalink: catalog/observability/prometheus-sample-5479aed9-669a-4bea-9693-56921b55d04d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5479aed9-669a-4bea-9693-56921b55d04d/0.0.1/design.yml' -downloadLink: 5479aed9-669a-4bea-9693-56921b55d04d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/5b755f6d-92fa-4616-aeb8-7c932baf3bc0.md b/collections/_catalog/observability/5b755f6d-92fa-4616-aeb8-7c932baf3bc0.md deleted file mode 100644 index 374f50a64b..0000000000 --- a/collections/_catalog/observability/5b755f6d-92fa-4616-aeb8-7c932baf3bc0.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: prometheus-opencost-exporter -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - kubernetes -patternId: 5b755f6d-92fa-4616-aeb8-7c932baf3bc0 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5b755f6d-92fa-4616-aeb8-7c932baf3bc0-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5b755f6d-92fa-4616-aeb8-7c932baf3bc0-dark.png -patternInfo: | - Prometheus%20exporter%20for%20OpenCost%20%20Kubernetes%20cost%20monitoring%20data.%0AThis%20design%20%20bootstraps%20a%20Prometheus%20OpenCost%20Exporter%20%20%20deployment%20on%20a%20Kuberentes%20%20cluster%20using%20the%20%20meshery%20playground%20.%0A%0AOpenCost%20is%20a%20vendor-neutral%20open%20source%20project%20for%20measuring%20and%20allocating%20cloud%20infrastructure%20and%20container%20costs%20in%20real%20time.%20Built%20by%20Kubernetes%20experts%20and%20supported%20by%20Kubernetes%20practitioners%2C%20OpenCost%20shines%20a%20light%20into%20the%20black%20box%20of%20Kubernetes%20spend.%0A -patternCaveats: | - Set%20the%20PROMETHEUS_SERVER_ENDPOINT%20environment%20variable%20to%20the%20address%20of%20your%20Prometheus%20server.%0AAdd%20the%20scrapeConfig%20to%20it%2C%20using%20the%20preferred%20means%20for%20your%20Prometheus%20install%20(ie.%20-f%20https%3A%2F%2Fraw.githubusercontent.com%2Fopencost%2Fopencost%2Fdevelop%2Fkubernetes%2Fprometheus%2FextraScrapeConfigs.yaml).%0AConsider%20using%20the%20OpenCost%20Helm%20Chart%20for%20additional%20Prometheus%20configuration%20options.%0Afor%20more%20information%20refer%20this%20docs%20%20https%3A%2F%2Fwww.opencost.io%2Fdocs%2Finstallation%2Fprometheus%0A -permalink: catalog/observability/prometheus-opencost-exporter-5b755f6d-92fa-4616-aeb8-7c932baf3bc0.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5b755f6d-92fa-4616-aeb8-7c932baf3bc0/0.0.1/design.yml' -downloadLink: 5b755f6d-92fa-4616-aeb8-7c932baf3bc0/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/5f7a16fe-00bb-43e0-b752-05913156535d.md b/collections/_catalog/observability/5f7a16fe-00bb-43e0-b752-05913156535d.md deleted file mode 100644 index a51cda62ce..0000000000 --- a/collections/_catalog/observability/5f7a16fe-00bb-43e0-b752-05913156535d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Relationship Master Design -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: observability -compatibility: - - kubernetes -patternId: 5f7a16fe-00bb-43e0-b752-05913156535d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5f7a16fe-00bb-43e0-b752-05913156535d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/5f7a16fe-00bb-43e0-b752-05913156535d-dark.png -patternInfo: | - A%20desgin%20which%20shows%20relationship%20between%20various%20K8s%20resources -patternCaveats: | - No%20Caveats -permalink: catalog/observability/relationship-master-design-5f7a16fe-00bb-43e0-b752-05913156535d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/5f7a16fe-00bb-43e0-b752-05913156535d/0.0.1/design.yml' -downloadLink: 5f7a16fe-00bb-43e0-b752-05913156535d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/6036b918-a3c7-4b16-9da1-8727909ab2be.md b/collections/_catalog/observability/6036b918-a3c7-4b16-9da1-8727909ab2be.md deleted file mode 100644 index b913c99572..0000000000 --- a/collections/_catalog/observability/6036b918-a3c7-4b16-9da1-8727909ab2be.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: ELK stack -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - elasticsearch-operator - - kubernetes -patternId: 6036b918-a3c7-4b16-9da1-8727909ab2be -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6036b918-a3c7-4b16-9da1-8727909ab2be-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6036b918-a3c7-4b16-9da1-8727909ab2be-dark.png -patternInfo: | - ELK%20stack%20in%20kubernetes%20deployed%20with%20simple%20python%20%20app%20%20using%20logstash%20%2Ckibana%20%2C%20filebeat%20%2Celastic%20search. -patternCaveats: | - here%20technologies%20included%20are%20kubernetes%20%2C%20elastic%20search%20%2Clog%20stash%20%2Clog%20stash%20%2Ckibana%20%2Cpython%20etc -permalink: catalog/observability/elk-stack-6036b918-a3c7-4b16-9da1-8727909ab2be.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6036b918-a3c7-4b16-9da1-8727909ab2be/0.0.1/design.yml' -downloadLink: 6036b918-a3c7-4b16-9da1-8727909ab2be/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/88794a57-f0f7-4ff6-9192-54ab7241ded8.md b/collections/_catalog/observability/88794a57-f0f7-4ff6-9192-54ab7241ded8.md deleted file mode 100644 index 9ffe1828f2..0000000000 --- a/collections/_catalog/observability/88794a57-f0f7-4ff6-9192-54ab7241ded8.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Azure-monitor-containers -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - aks-appgw-fe - - kubernetes -patternId: 88794a57-f0f7-4ff6-9192-54ab7241ded8 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/88794a57-f0f7-4ff6-9192-54ab7241ded8-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/88794a57-f0f7-4ff6-9192-54ab7241ded8-dark.png -patternInfo: | - Azure%20Monitor%20managed%20service%20for%20Prometheus%20and%20Container%20insights%20work%20together%20for%20complete%20monitoring%20of%20your%20Kubernetes%20environment.%20This%20article%20describes%20both%20features%20and%20the%20data%20they%20collect.%0A%0AAzure%20Monitor%20managed%20service%20for%20Prometheus%20is%20a%20fully%20managed%20service%20based%20on%20the%20Prometheus%20project%20from%20the%20Cloud%20Native%20Computing%20Foundation.%20It%20allows%20you%20to%20collect%20and%20analyze%20metrics%20from%20your%20Kubernetes%20cluster%20at%20scale%20and%20analyze%20them%20using%20prebuilt%20dashboards%20in%20Grafana.%0AContainer%20insights%20is%20a%20feature%20of%20Azure%20Monitor%20that%20collects%20and%20analyzes%20container%20logs%20from%20Azure%20Kubernetes%20clusters%20or%20Azure%20Arc-enabled%20Kubernetes%20clusters%20and%20their%20components.%20You%20can%20analyze%20the%20collected%20data%20for%20the%20different%20components%20in%20your%20cluster%20with%20a%20collection%20of%20views%20and%20prebuilt%20workbooks. -patternCaveats: | - Container%20insights%20collects%20metric%20data%20from%20your%20cluster%20in%20addition%20to%20logs.%20This%20functionality%20has%20been%20replaced%20by%20Azure%20Monitor%20managed%20service%20for%20Prometheus.%20You%20can%20analyze%20that%20data%20using%20built-in%20dashboards%20in%20Managed%20Grafana%20and%20alert%20on%20them%20using%20prebuilt%20Prometheus%20alert%20rules.%0A%0AYou%20can%20continue%20to%20have%20Container%20insights%20collect%20metric%20data%20so%20you%20can%20use%20the%20Container%20insights%20monitoring%20experience.%20Or%20you%20can%20save%20cost%20by%20disabling%20this%20collection%20and%20using%20Grafana%20for%20metric%20analysis.%20See%20Configure%20data%20collection%20in%20Container%20insights%20using%20data%20collection%20rule%20for%20configuration%20options.%0A%0AFor%20more%20information%20checkout%20this%20doc%0A%20https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fcontainers%2Fcontainer-insights-overview -permalink: catalog/observability/azure-monitor-containers-88794a57-f0f7-4ff6-9192-54ab7241ded8.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/88794a57-f0f7-4ff6-9192-54ab7241ded8/0.0.1/design.yml' -downloadLink: 88794a57-f0f7-4ff6-9192-54ab7241ded8/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/9144ecb9-36e3-4b82-9725-b5e1b60d565a.md b/collections/_catalog/observability/9144ecb9-36e3-4b82-9725-b5e1b60d565a.md deleted file mode 100644 index 9eef4b455d..0000000000 --- a/collections/_catalog/observability/9144ecb9-36e3-4b82-9725-b5e1b60d565a.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Aws Cloudwatch Agent for Cluster Metrics -publishedVersion: 0.0.4 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - aws-cloudwatch-controller - - aws-cloudwatchlogs-controller - - kubernetes -patternId: 9144ecb9-36e3-4b82-9725-b5e1b60d565a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9144ecb9-36e3-4b82-9725-b5e1b60d565a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9144ecb9-36e3-4b82-9725-b5e1b60d565a-dark.png -patternInfo: | - CloudWatch%20Agent%20to%20collect%20Kubernetes%20cluster%20metrics%20involves%20configuring%20and%20deploying%20the%20CloudWatch%20Agent%20within%20your%20Kubernetes%20environment.%20This%20agent%20facilitates%20the%20collection%20and%20forwarding%20of%20various%20system-level%20and%20application-level%20metrics%20to%20AWS%20CloudWatch%2C%20enabling%20comprehensive%20monitoring%20and%20analysis.%20By%20integrating%20the%20CloudWatch%20Agent%2C%20Kubernetes%20administrators%20can%20effortlessly%20monitor%20cluster%20performance%20metrics%20such%20as%20CPU%20utilization%2C%20memory%20usage%2C%20disk%20I%2FO%2C%20and%20network%20traffic.%20This%20setup%20enhances%20operational%20visibility%2C%20supports%20proactive%20capacity%20planning%2C%20and%20enables%20the%20creation%20of%20alarms%20and%20notifications%20based%20on%20customizable%20thresholds%2C%20ensuring%20robust%20and%20reliable%20management%20of%20Kubernetes%20infrastructure%20at%20scale. -patternCaveats: | - When%20deploying%20the%20CloudWatch%20Agent%20to%20collect%20Kubernetes%20cluster%20metrics%2C%20there%20are%20several%20caveats%20and%20considerations%20to%20keep%20in%20mind%3A%0A%0AResource%20Consumption%3A%20The%20CloudWatch%20Agent%20runs%20as%20a%20daemon%20set%20within%20Kubernetes%2C%20consuming%20resources%20(CPU%2C%20memory)%20on%20each%20node%20where%20it's%20deployed.%20Ensure%20your%20cluster%20has%20sufficient%20resources%20to%20accommodate%20this%20additional%20workload.%0A%0ANetworking%3A%20Verify%20that%20nodes%20in%20your%20Kubernetes%20cluster%20can%20communicate%20with%20AWS%20CloudWatch%20endpoints%20over%20the%20network.%20This%20may%20involve%20configuring%20network%20policies%2C%20security%20groups%2C%20or%20VPC%20settings%20to%20allow%20outbound%20traffic%20to%20AWS%20services.%0A%0APermissions%3A%20Set%20up%20IAM%20roles%20or%20IAM%20users%20with%20appropriate%20permissions%20to%20allow%20the%20CloudWatch%20Agent%20to%20publish%20metrics%20to%20CloudWatch.%20Follow%20the%20principle%20of%20least%20privilege%20to%20minimize%20security%20risks.%0A%0AConfiguration%3A%20Properly%20configure%20the%20CloudWatch%20Agent%20to%20collect%20relevant%20metrics%20based%20on%20your%20application%20and%20infrastructure%20requirements.%20Incorrect%20configuration%20can%20lead%20to%20incomplete%20or%20inaccurate%20monitoring%20data.%0A%0AVersion%20Compatibility%3A%20Ensure%20compatibility%20between%20the%20CloudWatch%20Agent%20version%20and%20your%20Kubernetes%20cluster%20version.%20Updates%20or%20changes%20in%20Kubernetes%20versions%20may%20require%20corresponding%20updates%20to%20the%20CloudWatch%20Agent%20for%20optimal%20performance%20and%20compatibility.%0A%0AMonitoring%20Costs%3A%20Regularly%20monitor%20and%20review%20the%20costs%20associated%20with%20CloudWatch%20metrics%20ingestion%20and%20storage.%20Depending%20on%20the%20volume%20of%20metrics%20collected%2C%20costs%20can%20vary%2C%20especially%20if%20high-resolution%20metrics%20are%20enabled.%0A%0AHigh%20Availability%3A%20Design%20your%20deployment%20for%20high%20availability%20to%20ensure%20continuous%20monitoring%20and%20metric%20collection.%20Consider%20deploying%20multiple%20instances%20of%20the%20CloudWatch%20Agent%20across%20different%20availability%20zones%20or%20regions%20for%20resilience.%0A%0ASecurity%3A%20Implement%20best%20practices%20for%20securing%20the%20CloudWatch%20Agent%20deployment%2C%20including%20encrypting%20sensitive%20data%20in%20transit%20and%20at%20rest%2C%20using%20secure%20IAM%20roles%2C%20and%20regularly%20updating%20to%20the%20latest%20agent%20version%20to%20mitigate%20security%20vulnerabilities.%0A%0AIntegration%20with%20Monitoring%20Tools%3A%20Integrate%20CloudWatch%20metrics%20with%20your%20existing%20monitoring%20and%20alerting%20tools%20to%20streamline%20incident%20response%20and%20operational%20workflows.%20Ensure%20that%20metrics%20from%20CloudWatch%20can%20be%20correlated%20with%20other%20monitoring%20data%20for%20comprehensive%20visibility. -permalink: catalog/observability/aws-cloudwatch-agent-for-cluster-metrics-9144ecb9-36e3-4b82-9725-b5e1b60d565a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9144ecb9-36e3-4b82-9725-b5e1b60d565a/0.0.4/design.yml' -downloadLink: 9144ecb9-36e3-4b82-9725-b5e1b60d565a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8.md b/collections/_catalog/observability/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8.md deleted file mode 100644 index 8be0bdf727..0000000000 --- a/collections/_catalog/observability/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: fluentd deployment -publishedVersion: 0.0.1 -userId: 1cb30087-3787-4aad-8da8-addcb556ae17 -userName: Bhuminjay Soni -userAvatarURL: https://avatars.githubusercontent.com/u/76656712?v=4 -type: observability -compatibility: - - fluentd-operator -patternId: 96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8-dark.png -patternInfo: | - This%20configuration%20sets%20up%20Fluentd-ES%20to%20collect%20and%20forward%20logs%20from%20Kubernetes%20pods%20to%20Elasticsearch%20for%20storage%20and%20analysis.%20Ensure%20that%20Elasticsearch%20is%20properly%20configured%20and%20accessible%20by%20Fluentd-ES%20for%20successful%20log%20aggregation%20and%20visualization.%20Additionally%2C%20adjust%20resource%20requests%20and%20limits%20according%20to%20your%20cluster's%20capacity%20and%20requirements. -patternCaveats: | - 1.%20Resource%20Utilisation%3A%0AFluentd%20can%20consume%20significant%20CPU%20and%20memory%20resources%2C%20especially%20in%20environments%20with%20high%20log%20volumes.%20Monitor%20resource%20usage%20closely%20and%20adjust%20resource%20requests%20and%20limits%20according%20to%20your%20cluster's%20capacity%20and%20workload%20requirements.%0A%0A2.%20Configuration%20Complexity%3A%0AFluentd's%20configuration%20can%20be%20complex%2C%20particularly%20when%20configuring%20input%2C%20filtering%2C%20and%20output%20plugins.%20Thoroughly%20test%20and%20validate%20the%20Fluentd%20configuration%20to%20ensure%20it%20meets%20your%20logging%20requirements%20and%20effectively%20captures%20relevant%20log%20data.%0A%0A3.%20Security%20Considerations%3A%0ASecure%20the%20Fluentd%20deployment%20by%20following%20best%20practices%20for%20managing%20secrets%20and%20access%20control.%20Ensure%20that%20sensitive%20information%2C%20such%20as%20credentials%20and%20configuration%20details%2C%20are%20properly%20encrypted%20and%20protected. -permalink: catalog/observability/fluentd-deployment-96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8/0.0.1/design.yml' -downloadLink: 96c43aaf-4bd9-4f28-bc02-c64e3d26f1f8/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/aaae149b-95d2-458f-b3c1-710fb544acad.md b/collections/_catalog/observability/aaae149b-95d2-458f-b3c1-710fb544acad.md deleted file mode 100644 index 2b3eddbe66..0000000000 --- a/collections/_catalog/observability/aaae149b-95d2-458f-b3c1-710fb544acad.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: ebpf-exporter -publishedVersion: 0.0.6 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - kube-prometheus - - kube-prometheus-stack -patternId: aaae149b-95d2-458f-b3c1-710fb544acad -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Export%20your%20eBPF%20metrics%20in%20Prometheus%20format%20using%20ebpf_exporter.%0A%0AeBPF%20is%20an%20enchanment%20to%20BPF%20(Berkeley%20Packet%20Filter)%20and%20allow%20custom%20analysis%20programs%20to%20be%20executed%20on%20Linux%20tracing%20tools.%0A -patternCaveats: | - Prerequisites%0AK8s%20host%20running%20Linux%20kernel%20with%20kernel%20sources%20%0A%0Alearn%20more%20about%20ebpf%20exporter%20from%20this%20git%20repo%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Febpf_exporter -permalink: catalog/observability/ebpf-exporter-aaae149b-95d2-458f-b3c1-710fb544acad.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/aaae149b-95d2-458f-b3c1-710fb544acad/0.0.6/design.yml' -downloadLink: aaae149b-95d2-458f-b3c1-710fb544acad/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/abf90eeb-9cd9-4186-b9e4-118946f35ac4.md b/collections/_catalog/observability/abf90eeb-9cd9-4186-b9e4-118946f35ac4.md deleted file mode 100644 index 1e86fe90d4..0000000000 --- a/collections/_catalog/observability/abf90eeb-9cd9-4186-b9e4-118946f35ac4.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: jaegar -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - jaeger-operator - - kubernetes -patternId: abf90eeb-9cd9-4186-b9e4-118946f35ac4 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Distributed%20tracing%20observability%20platforms%2C%20such%20as%20Jaeger%2C%20are%20essential%20for%20modern%20software%20applications%20that%20are%20architected%20as%20microservices.%20Jaeger%20maps%20the%20flow%20of%20requests%20and%20data%20as%20they%20traverse%20a%20distributed%20system.%20These%20requests%20may%20make%20calls%20to%20multiple%20services%2C%20which%20may%20introduce%20their%20own%20delays%20or%20errors.%20Jaeger%20connects%20the%20dots%20between%20these%20disparate%20components%2C%20helping%20to%20identify%20performance%20bottlenecks%2C%20troubleshoot%20errors%2C%20and%20improve%20overall%20application%20reliability. -patternCaveats: | - technologies%20used%20in%20this%20design%20is%20jaegar%20for%20distributed%20%20tracing%20%2Csample%20%20services%20%2Cdeployments%20to%20show%20distributed%20tracing%20in%20kubernetes -permalink: catalog/observability/jaegar-abf90eeb-9cd9-4186-b9e4-118946f35ac4.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/abf90eeb-9cd9-4186-b9e4-118946f35ac4/0.0.1/design.yml' -downloadLink: abf90eeb-9cd9-4186-b9e4-118946f35ac4/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/b7782414-0dd6-486d-ba77-888577e9fa2e.md b/collections/_catalog/observability/b7782414-0dd6-486d-ba77-888577e9fa2e.md deleted file mode 100644 index c2b73b0684..0000000000 --- a/collections/_catalog/observability/b7782414-0dd6-486d-ba77-888577e9fa2e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: elastic-stack -publishedVersion: 0.0.15 -userId: 65a09154-3ae0-47c4-b19a-e0185ffb694f -userName: shridhar kute -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocJO5oe9gDlO9cSHCoVRuTOqRLlfnlf3W9cEdz7HVgGZBge5OQY=s96-c -type: observability -compatibility: - - elasticsearch-operator -patternId: b7782414-0dd6-486d-ba77-888577e9fa2e -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20YAML%20file%20deploys%20an%20Elasticsearch%20cluster%20(version%208.9.0)%20in%20Kubernetes%2C%20configured%20with%20roles%20including%20master%2C%20data%2C%20ingest%2C%20ML%2C%20and%20remote%20cluster%20client.%20It%20sets%20up%20a%20pod%20disruption%20budget%20to%20maintain%20high%20availability%20and%20specifies%20resource%20requests%20and%20limits%20for%20CPU%2C%20memory%2C%20and%20storage.%20Persistent%20storage%20is%20configured%20with%20a%202Gi%20volume%20using%20the%20standard-rwo%20storage%20class. -patternCaveats: | - Version%20Compatibility%3A%20Ensure%20Elasticsearch%208.9.0%20matches%20your%20Kubernetes%20version%20and%20other%20components.%0AResource%20Management%3A%20Adjust%20CPU%2C%20memory%2C%20and%20storage%20settings%20based%20on%20your%20specific%20needs.%0AStorage%20Class%3A%20Confirm%20that%20the%20standard-rwo%20storage%20class%20is%20appropriate%20for%20your%20environment.%0APod%20Disruption%3A%20Verify%20the%20pod%20disruption%20budget%20settings%20align%20with%20your%20high-availability%20requirements.%0ANode%20Selector%3A%20Modify%20the%20node%20selector%20if%20not%20using%20Google%20Cloud%20Platform.%0ATesting%3A%20Test%20the%20configuration%20in%20a%20staging%20environment%20before%20production%20deployment.%0A%0A%0A -permalink: catalog/observability/elastic-stack-b7782414-0dd6-486d-ba77-888577e9fa2e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b7782414-0dd6-486d-ba77-888577e9fa2e/0.0.15/design.yml' -downloadLink: b7782414-0dd6-486d-ba77-888577e9fa2e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/bda951e5-329a-48c8-a4e2-1f3d269cc8b6.md b/collections/_catalog/observability/bda951e5-329a-48c8-a4e2-1f3d269cc8b6.md deleted file mode 100644 index 6325a31bea..0000000000 --- a/collections/_catalog/observability/bda951e5-329a-48c8-a4e2-1f3d269cc8b6.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Argocd metrics -publishedVersion: 0.0.3 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: observability -compatibility: - - argo-cd -patternId: bda951e5-329a-48c8-a4e2-1f3d269cc8b6 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20is%20%20%20%0Aa%20sample%20argocd%20%0Adesign%20%20%20%20%20%20%20%20%40%20%20and%20mesasuring%20%20Metric%40%20a%20*%24kubernetes%20manifes-%3E! -patternCaveats: | - No%20caveats -permalink: catalog/observability/argocd-metrics-bda951e5-329a-48c8-a4e2-1f3d269cc8b6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/bda951e5-329a-48c8-a4e2-1f3d269cc8b6/0.0.3/design.yml' -downloadLink: bda951e5-329a-48c8-a4e2-1f3d269cc8b6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/cce763fc-508a-4d3d-95da-0cfcf722d7cf.md b/collections/_catalog/observability/cce763fc-508a-4d3d-95da-0cfcf722d7cf.md deleted file mode 100644 index 4746bbab88..0000000000 --- a/collections/_catalog/observability/cce763fc-508a-4d3d-95da-0cfcf722d7cf.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: instana-agent-for-Kubernetes -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - kubernetes -patternId: cce763fc-508a-4d3d-95da-0cfcf722d7cf -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/cce763fc-508a-4d3d-95da-0cfcf722d7cf-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/cce763fc-508a-4d3d-95da-0cfcf722d7cf-dark.png -patternInfo: | - instana%20agent%20is%20built%20for%20microservices%20that%20enables%20IT%20Ops%20to%20build%20applications%20faster%20and%20deliver%20higher%20quality%20services%20by%20automating%20monitoring%2C%20tracing%20and%20root%20cause%20analysis.%0AIt%20provides%20automated%20observability%20with%20AI%20and%20the%20ability%20to%20democratize%20observability%2C%20making%20it%20accessible%20to%20anyone%20across%20DevOps%2C%20SRE%2C%20platform%20engineering%2C%20ITOps%20and%20development.%20%0A%0AInstana%20gives%20you%201-second%20granularity%2C%20which%20helps%20you%20quickly%20detect%20problems%20or%20transactions%20%0AAdditionally%2C%20you%20get%20100%25%20traces%20that%20allow%20you%20to%20fix%20issues%20easily%20%0AInstana%20contextualizes%20data%20from%20all%20sources%2C%20including%20OpenTelemetry%2C%20to%20provide%20the%20insights%20needed%20to%20keep%20up%20with%20the%20pace%20of%20change -patternCaveats: | - for%20Caveats%20And%20Considerations%20consider%20checking%20this%20docs%20https%3A%2F%2Fwww.ibm.com%2Fproducts%2Finstana%0A -permalink: catalog/observability/instana-agent-for-kubernetes-cce763fc-508a-4d3d-95da-0cfcf722d7cf.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/cce763fc-508a-4d3d-95da-0cfcf722d7cf/0.0.1/design.yml' -downloadLink: cce763fc-508a-4d3d-95da-0cfcf722d7cf/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/e31a3c6d-2102-4215-8ea2-3ab399ca29f6.md b/collections/_catalog/observability/e31a3c6d-2102-4215-8ea2-3ab399ca29f6.md deleted file mode 100644 index e806d66891..0000000000 --- a/collections/_catalog/observability/e31a3c6d-2102-4215-8ea2-3ab399ca29f6.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Dapr with Kubernetes events -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - dapr -patternId: e31a3c6d-2102-4215-8ea2-3ab399ca29f6 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e31a3c6d-2102-4215-8ea2-3ab399ca29f6-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e31a3c6d-2102-4215-8ea2-3ab399ca29f6-dark.png -patternInfo: | - This%20design%20will%20show%20an%20example%20of%20running%20Dapr%20with%20a%20Kubernetes%20events%20input%20binding.%20You'll%20be%20deploying%20the%20Node%20application%20and%20will%20require%20a%20component%20definition%20with%20a%20Kubernetes%20event%20binding%20component.%0Acheckout%20this%20https%3A%2F%2Fgithub.com%2Fdapr%2Fsamples%2Ftree%2Fmaster%2Fread-kubernetes-events%23read-kubernetes-events%20for%20more%20info%20.%0A -patternCaveats: | - make%20sure%20to%20replace%20some%20things%20like%20docker%20images%20%2Ccredentials%20to%20try%20out%20on%20your%20local%20cluster%20. -permalink: catalog/observability/dapr-with-kubernetes-events-e31a3c6d-2102-4215-8ea2-3ab399ca29f6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e31a3c6d-2102-4215-8ea2-3ab399ca29f6/0.0.1/design.yml' -downloadLink: e31a3c6d-2102-4215-8ea2-3ab399ca29f6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f.md b/collections/_catalog/observability/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f.md deleted file mode 100644 index 94138dd4b7..0000000000 --- a/collections/_catalog/observability/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Liveness -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: observability -compatibility: - - kubernetes -patternId: fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f-dark.png -patternInfo: | - Continuous%20availability%20and%20health%20of%20Kubernetes%20Pods.%20It%20defines%20liveness%20probes%20that%20periodically%20check%20the%20state%20of%20application%20instances%20within%20Pods.%20These%20probes%20determine%20if%20Pods%20are%20responsive%20and%20functioning%20correctly%20based%20on%20configured%20criteria%2C%20such%20as%20HTTP%20requests%20or%20custom%20executable%20scripts.%20By%20automatically%20restarting%20Pods%20that%20fail%20these%20checks%2C%20this%20design%20enhances%20application%20reliability%20and%20uptime%2C%20ensuring%20seamless%20operation%20and%20minimal%20disruption%20to%20services%20in%20Kubernetes%20environments. -patternCaveats: | - No%20caveats -permalink: catalog/observability/pod-liveness-fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f/0.0.1/design.yml' -downloadLink: fe3bf101-18ec-4a7e-86bb-3f69a53b1e5f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/observability/fffb7c9d-3051-4dd9-a198-39aee88da1d6.md b/collections/_catalog/observability/fffb7c9d-3051-4dd9-a198-39aee88da1d6.md deleted file mode 100644 index 7e053de314..0000000000 --- a/collections/_catalog/observability/fffb7c9d-3051-4dd9-a198-39aee88da1d6.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -layout: item -name: prometheus-postgres-exporter -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: observability -compatibility: - - kube-prometheus - - kube-prometheus-stack - - postgres-controller - - postgres-operator - - postgres-with-operator -patternId: fffb7c9d-3051-4dd9-a198-39aee88da1d6 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fffb7c9d-3051-4dd9-a198-39aee88da1d6-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fffb7c9d-3051-4dd9-a198-39aee88da1d6-dark.png -patternInfo: | - This%20design%20enables%20seamless%20integration%20with%20Prometheus'%20robust%20ecosystem%20of%20visualization%20and%20alerting%20tools%2C%20empowering%20teams%20to%20monitor%20database%20health%2C%20query%20performance%2C%20resource%20utilization%2C%20and%20other%20critical%20metrics. -patternCaveats: | - No%20caveats -permalink: catalog/observability/prometheus-postgres-exporter-fffb7c9d-3051-4dd9-a198-39aee88da1d6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/fffb7c9d-3051-4dd9-a198-39aee88da1d6/0.0.1/design.yml' -downloadLink: fffb7c9d-3051-4dd9-a198-39aee88da1d6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/067737d5-1c7e-4135-b879-44cb4ed07876.md b/collections/_catalog/resiliency/067737d5-1c7e-4135-b879-44cb4ed07876.md deleted file mode 100644 index 1fcb5d888c..0000000000 --- a/collections/_catalog/resiliency/067737d5-1c7e-4135-b879-44cb4ed07876.md +++ /dev/null @@ -1,30 +0,0 @@ ---- -layout: item -name: NGINX with init container and vhost -publishedVersion: 0.0.1 -userId: e38890c8-1b66-4a72-ae40-a8ae4a64af6c -userName: Sudhanshu Dasgupta -userAvatarURL: -type: resiliency -compatibility: - - nginx-service-mesh -patternId: 067737d5-1c7e-4135-b879-44cb4ed07876 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This design involves setting up NGINX using an init container to handle initialization tasks before the main NGINX container starts. The init container is responsible for configuration setup, such as generating or fetching configuration files. The Virtual Host (VHost) configuration allows NGINX to host multiple domains on a single server, each with its own configuration. This setup ensures a clean separation of initialization logic and main server functionality, enhancing modularity and maintainability. -patternCaveats: | - 1. Init Container Overhead: Using an init container adds a slight delay to the startup process, as it must complete its tasks before the main NGINX container can start. - -2.Configuration Management: Ensure that the init container correctly manages and updates the configuration files, as any errors can prevent NGINX from starting properly. - -3. Security: Validate and sanitize any external inputs or configurations handled by the init container to avoid security vulnerabilities. - -4. Resource Allocation: Allocate sufficient resources for both the init and main containers to prevent performance bottlenecks. - -5. Maintenance Complexity: This setup adds an extra layer of complexity, so proper documentation and monitoring are essential for ongoing maintenance. - -6.Compatibility: Ensure that the version of NGINX used is compatible with the init container's setup and the desired VHost configurations. -permalink: catalog/resiliency/nginx-with-init-container-and-vhost-067737d5-1c7e-4135-b879-44cb4ed07876.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/067737d5-1c7e-4135-b879-44cb4ed07876/0.0.1/design.yml' -downloadLink: 067737d5-1c7e-4135-b879-44cb4ed07876/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/17c46515-50ef-436c-9383-451e13348ddd.md b/collections/_catalog/resiliency/17c46515-50ef-436c-9383-451e13348ddd.md deleted file mode 100644 index 9662d9d983..0000000000 --- a/collections/_catalog/resiliency/17c46515-50ef-436c-9383-451e13348ddd.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Multi Containers -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: resiliency -compatibility: - - kubernetes -patternId: 17c46515-50ef-436c-9383-451e13348ddd -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/17c46515-50ef-436c-9383-451e13348ddd-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/17c46515-50ef-436c-9383-451e13348ddd-dark.png -patternInfo: | - %22Pod%20Multi%20Containers%22%20design%20facilitates%20the%20deployment%20of%20Kubernetes%20Pods%20that%20consist%20of%20multiple%20containers%2C%20each%20serving%20a%20distinct%20role%20within%20a%20single%20cohesive%20unit. -patternCaveats: | - No%20caveats -permalink: catalog/resiliency/pod-multi-containers-17c46515-50ef-436c-9383-451e13348ddd.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/17c46515-50ef-436c-9383-451e13348ddd/0.0.1/design.yml' -downloadLink: 17c46515-50ef-436c-9383-451e13348ddd/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/31ed2484-4aeb-4dcc-aa98-b61933d371cc.md b/collections/_catalog/resiliency/31ed2484-4aeb-4dcc-aa98-b61933d371cc.md deleted file mode 100644 index ec218f1814..0000000000 --- a/collections/_catalog/resiliency/31ed2484-4aeb-4dcc-aa98-b61933d371cc.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Delay Action for Chaos Mesh -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: resiliency -compatibility: - - chaos-mesh -patternId: 31ed2484-4aeb-4dcc-aa98-b61933d371cc -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/31ed2484-4aeb-4dcc-aa98-b61933d371cc.png -patternInfo: | - A simple example -patternCaveats: | - An example the delay action -permalink: catalog/resiliency/delay-action-for-chaos-mesh-31ed2484-4aeb-4dcc-aa98-b61933d371cc.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/31ed2484-4aeb-4dcc-aa98-b61933d371cc/0.0.1/design.yml' -downloadLink: 31ed2484-4aeb-4dcc-aa98-b61933d371cc/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/3460a23b-e14d-49ba-9e6f-4d25afe14f98.md b/collections/_catalog/resiliency/3460a23b-e14d-49ba-9e6f-4d25afe14f98.md deleted file mode 100644 index 3357847778..0000000000 --- a/collections/_catalog/resiliency/3460a23b-e14d-49ba-9e6f-4d25afe14f98.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Postgres Deployment -publishedVersion: 0.0.1 -userId: 173202fe-b94d-4064-8a86-1cf063732884 -userName: Ashish Tiwari -userAvatarURL: https://layer5.io/static/7b1f08e10d271cbfd963c7d435cf84ac/416c3/ashish-tiwari.webp -type: resiliency -compatibility: - - kubernetes -patternId: 3460a23b-e14d-49ba-9e6f-4d25afe14f98 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3460a23b-e14d-49ba-9e6f-4d25afe14f98-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/3460a23b-e14d-49ba-9e6f-4d25afe14f98-dark.png -patternInfo: | - The combination of PostgreSQL and Kubernetes provides a scalable and highly available (HA) database solution that’s well suited for modern application development and deployment practices. While creating a HA solution is out of the scope of this article, you’ll learn how to set up a simple container with PostgreSQL, which offers a number of benefits. -patternCaveats: | - It’s important to remember that this need to be configured to store data in node-local memory. -permalink: catalog/resiliency/postgres-deployment-3460a23b-e14d-49ba-9e6f-4d25afe14f98.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3460a23b-e14d-49ba-9e6f-4d25afe14f98/0.0.1/design.yml' -downloadLink: 3460a23b-e14d-49ba-9e6f-4d25afe14f98/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/378da4da-dc81-4b6f-9473-fc91b5ce88e1.md b/collections/_catalog/resiliency/378da4da-dc81-4b6f-9473-fc91b5ce88e1.md deleted file mode 100644 index 15bdb9775a..0000000000 --- a/collections/_catalog/resiliency/378da4da-dc81-4b6f-9473-fc91b5ce88e1.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: KEDA Setup -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: resiliency -compatibility: - - keda -patternId: 378da4da-dc81-4b6f-9473-fc91b5ce88e1 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e958fd44-4a43-4096-9cd5-ef1e9204996f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e958fd44-4a43-4096-9cd5-ef1e9204996f-dark.png -patternInfo: | - KEDA%20is%20a%20Kubernetes-based%20Event%20Driven%20Autoscaling%20component.%20It%20provides%20event%20driven%20scale%20for%20any%20container%20running%20in%20Kubernetes.%20The%20design%20deploys%20essential%20KEDA%20components%20(including%20CRDs)%20to%20ensure%20your%20cluster%20is%20properly%20setup%20for%20autoscaling%20using%20KEDA. -patternCaveats: | - For%20this%20design%20to%20function%20properly%2C%20Kubernetes%20version%20v1.23%20or%20above%20is%20required. -permalink: catalog/resiliency/keda-setup-378da4da-dc81-4b6f-9473-fc91b5ce88e1.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/378da4da-dc81-4b6f-9473-fc91b5ce88e1/0.0.1/design.yml' -downloadLink: 378da4da-dc81-4b6f-9473-fc91b5ce88e1/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/4690406b-60e7-4c82-87c3-20b22862f5b5.md b/collections/_catalog/resiliency/4690406b-60e7-4c82-87c3-20b22862f5b5.md deleted file mode 100644 index 455e7eb6f1..0000000000 --- a/collections/_catalog/resiliency/4690406b-60e7-4c82-87c3-20b22862f5b5.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Argo CD w/Dex -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: resiliency -compatibility: - - argo-cd - - argocd-operator -patternId: 4690406b-60e7-4c82-87c3-20b22862f5b5 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The%20Argo%20CD%20server%20component%20exposes%20the%20API%20and%20UI.%20The%20operator%20creates%20a%20Service%20to%20expose%20this%20component%20and%20can%20be%20accessed%20through%20the%20various%20methods%20available%20in%20Kubernetes. -patternCaveats: | - Dex%20can%20be%20used%20to%20delegate%20authentication%20to%20external%20identity%20providers%20like%20GitHub%2C%20SAML%20and%20others.%20SSO%20configuration%20of%20Argo%20CD%20requires%20updating%20the%20Argo%20CD%20CR%20with%20Dex%20connector%20settings. -permalink: catalog/resiliency/argo-cd-w-dex-4690406b-60e7-4c82-87c3-20b22862f5b5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/4690406b-60e7-4c82-87c3-20b22862f5b5/0.0.1/design.yml' -downloadLink: 4690406b-60e7-4c82-87c3-20b22862f5b5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/51c39685-93ce-4803-b36c-ffdfeb40f1aa.md b/collections/_catalog/resiliency/51c39685-93ce-4803-b36c-ffdfeb40f1aa.md deleted file mode 100644 index bae4f6c683..0000000000 --- a/collections/_catalog/resiliency/51c39685-93ce-4803-b36c-ffdfeb40f1aa.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Apache ShardingSphere Operator -publishedVersion: 0.0.1 -userId: 0f0e1517-b824-4d90-b9a8-c5791eedf3c2 -userName: usman siddique -userAvatarURL: https://lh3.googleusercontent.com/a/AGNmyxaWL7i3EyzqfpwJ8QaO5M0CNzCTlYVefNLAviG2LA=s96-c -type: resiliency -compatibility: - - Kubernetes -patternId: 51c39685-93ce-4803-b36c-ffdfeb40f1aa -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/51c39685-93ce-4803-b36c-ffdfeb40f1aa-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/51c39685-93ce-4803-b36c-ffdfeb40f1aa-dark.png -patternInfo: | - The ShardingSphere Kubernetes Operator automates provisioning, management, and operations of ShardingSphere Proxy clusters running on Kubernetes. Apache ShardingSphere is an ecosystem to transform any database into a distributed database system, and enhance it with sharding, elastic scaling, encryption features & more. -patternCaveats: | - Ensure Apache ShardingSphere and Knative Service is registered as a MeshModel -permalink: catalog/resiliency/apache-shardingsphere-operator-51c39685-93ce-4803-b36c-ffdfeb40f1aa.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/51c39685-93ce-4803-b36c-ffdfeb40f1aa/0.0.1/design.yml' -downloadLink: 51c39685-93ce-4803-b36c-ffdfeb40f1aa/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/62e3f0ef-503e-4637-85d3-288584db81a5.md b/collections/_catalog/resiliency/62e3f0ef-503e-4637-85d3-288584db81a5.md deleted file mode 100644 index c4a335f1bf..0000000000 --- a/collections/_catalog/resiliency/62e3f0ef-503e-4637-85d3-288584db81a5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: KEDA HTTPRequestsScaler -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: resiliency -compatibility: - - keda -patternId: 62e3f0ef-503e-4637-85d3-288584db81a5 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/62e3f0ef-503e-4637-85d3-288584db81a5-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/62e3f0ef-503e-4637-85d3-288584db81a5-dark.png -patternInfo: | - This%20design%20makes%20use%20of%20the%20external%20add-on%2C%20KEDA%20HTTP%2C%20for%20event-based%20autoscaling%20of%20HTTP%20workloads%20on%20Kubernetes.%20See%20https%3A%2F%2Fartifacthub.io%2Fpackages%2Fkeda-scaler%2Fkeda-official-external-scalers%2Fkeda-add-ons-http%20for%20details%20on%20this%20specific%20scaler.%0A%0AThe%20KEDA%20HTTP%20Add-on%20allows%20Kubernetes%20users%20to%20automatically%20scale%20their%20HTTP%20servers%20up%20and%20down%20(including%20to%2Ffrom%20zero)%20based%20on%20incoming%20HTTP%20traffic.%20 -patternCaveats: | - KEDA%20scalers%20can%20both%20detect%20if%20a%20deployment%20should%20be%20activated%20or%20deactivated%2C%20and%20feed%20custom%20metrics%20for%20a%20specific%20event%20source. -permalink: catalog/resiliency/keda-httprequestsscaler-62e3f0ef-503e-4637-85d3-288584db81a5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/62e3f0ef-503e-4637-85d3-288584db81a5/0.0.1/design.yml' -downloadLink: 62e3f0ef-503e-4637-85d3-288584db81a5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/8ba59757-4ae6-4568-be5c-32e32fe51031.md b/collections/_catalog/resiliency/8ba59757-4ae6-4568-be5c-32e32fe51031.md deleted file mode 100644 index 14a32cb62f..0000000000 --- a/collections/_catalog/resiliency/8ba59757-4ae6-4568-be5c-32e32fe51031.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Priviledged Simple -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: resiliency -compatibility: - - kubernetes -patternId: 8ba59757-4ae6-4568-be5c-32e32fe51031 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - This%20design%20configuration%20involves%20running%20Kubernetes%20pods%20with%20privileged%20access%2C%20which%20grants%20them%20elevated%20permissions%20within%20their%20host%20environment.%20This%20setup%20is%20typically%20used%20when%20applications%20or%20services%20require%20access%20to%20privileged%20resources%20or%20functionalities%20that%20are%20not%20available%20in%20standard%20pod%20configurations.%20 -patternCaveats: | - Careful%20consideration%20and%20adherence%20to%20best%20practices%20are%20crucial%20to%20maintain%20the%20balance%20between%20operational%20flexibility%20and%20security%20when%20implementing%20the%20%22Pod%20Privileged%20Simple%22%20design%20in%20Kubernetes%20environments. -permalink: catalog/resiliency/pod-priviledged-simple-8ba59757-4ae6-4568-be5c-32e32fe51031.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/8ba59757-4ae6-4568-be5c-32e32fe51031/0.0.1/design.yml' -downloadLink: 8ba59757-4ae6-4568-be5c-32e32fe51031/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/95cb2be3-4052-45d9-9156-34fd4b8fe17e.md b/collections/_catalog/resiliency/95cb2be3-4052-45d9-9156-34fd4b8fe17e.md deleted file mode 100644 index 8e2c1b0afd..0000000000 --- a/collections/_catalog/resiliency/95cb2be3-4052-45d9-9156-34fd4b8fe17e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Resource Memory Request Limit -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: resiliency -compatibility: - - kubernetes -patternId: 95cb2be3-4052-45d9-9156-34fd4b8fe17e -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/95cb2be3-4052-45d9-9156-34fd4b8fe17e-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/95cb2be3-4052-45d9-9156-34fd4b8fe17e-dark.png -patternInfo: | - This%20design%20ensures%20efficient%20resource%20management%20and%20optimization%20in%20Kubernetes%20clusters%20by%20defining%20how%20much%20memory%20each%20pod%20requests%20and%20the%20maximum%20it%20can%20consume.%0A%0AMemory%20requests%20define%20the%20amount%20of%20memory%20Kubernetes%20guarantees%20to%20allocate%20to%20a%20pod%20when%20scheduling%20it%20onto%20a%20node%2C%20ensuring%20that%20sufficient%20resources%20are%20available%20for%20the%20pod%20to%20operate%20without%20contention. -patternCaveats: | - No%20caveats -permalink: catalog/resiliency/pod-resource-memory-request-limit-95cb2be3-4052-45d9-9156-34fd4b8fe17e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/95cb2be3-4052-45d9-9156-34fd4b8fe17e/0.0.1/design.yml' -downloadLink: 95cb2be3-4052-45d9-9156-34fd4b8fe17e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/b82e1abb-318b-4462-badc-494a21612381.md b/collections/_catalog/resiliency/b82e1abb-318b-4462-badc-494a21612381.md deleted file mode 100644 index 7846c64bd3..0000000000 --- a/collections/_catalog/resiliency/b82e1abb-318b-4462-badc-494a21612381.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: KEDA HTTPRequestsScaler -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: resiliency -compatibility: - - keda-http-scaler -patternId: b82e1abb-318b-4462-badc-494a21612381 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b82e1abb-318b-4462-badc-494a21612381-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b82e1abb-318b-4462-badc-494a21612381-dark.png -patternInfo: | - This%20design%20makes%20use%20of%20the%20external%20add-on%2C%20KEDA%20HTTP%2C%20for%20event-based%20autoscaling%20of%20HTTP%20workloads%20on%20Kubernetes.%20See%20https%3A%2F%2Fartifacthub.io%2Fpackages%2Fkeda-scaler%2Fkeda-official-external-scalers%2Fkeda-add-ons-http%20for%20details%20on%20this%20specific%20scaler.%0A%0AThe%20KEDA%20HTTP%20Add-on%20allows%20Kubernetes%20users%20to%20automatically%20scale%20their%20HTTP%20servers%20up%20and%20down%20(including%20to%2Ffrom%20zero)%20based%20on%20incoming%20HTTP%20traffic.%20In%20order%20to%20do%20so%2C%20KEDA%20HTTP%20add-on%2C%20deploys%20a%20proxy%20service%20and%20requires%20all%20traffic%20to%20be%20routed%20via%20this%20proxy%20service.%20The%20proxy%20service%20is%20deployed%20automatically%20by%20the%20KEDA%20add-on%20operator%2C%20the%20name%20for%20the%20deployed%20service%20follows%20the%20following%20scheme%20%22keda-add-ons-http-interceptor-proxy%22. -patternCaveats: | - 1.%20The%20dependent%20design%20%22KEDA%20Setup%22%2C%20needs%20to%20be%20deployed%20first%20for%20the%20overall%20design%20to%20function%20properly.%0A%0A2.%20After%20deploying%20the%20design%2C%20initiate%20the%20performance%20test%20on%20the%20exposed%20endpoint%20for%20the%20service%20named%20%22keda-add-ons-http-interceptor-proxy%22%2C%20ensuring%20to%20include%20%22httpbin.com%22%20as%20the%20host%20header%20if%20utilizing%20a%20different%20host. -permalink: catalog/resiliency/keda-httprequestsscaler-b82e1abb-318b-4462-badc-494a21612381.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b82e1abb-318b-4462-badc-494a21612381/0.0.1/design.yml' -downloadLink: b82e1abb-318b-4462-badc-494a21612381/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/d223427e-1f46-4390-8fc9-51e499c44b7d.md b/collections/_catalog/resiliency/d223427e-1f46-4390-8fc9-51e499c44b7d.md deleted file mode 100644 index c92f9dbd11..0000000000 --- a/collections/_catalog/resiliency/d223427e-1f46-4390-8fc9-51e499c44b7d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Kubernetes Global Balancer -publishedVersion: 0.0.3 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: resiliency -compatibility: - - kubernetes -patternId: d223427e-1f46-4390-8fc9-51e499c44b7d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d223427e-1f46-4390-8fc9-51e499c44b7d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d223427e-1f46-4390-8fc9-51e499c44b7d-dark.png -patternInfo: | - K8GB%20%2Ccommonly%20referred%20to%20as%20GSLB%20(Global%20Server%20Load%20Balancing)%20solutions%2C%20has%20been%20typically%20the%20domain%20of%20proprietary%20network%20software%20and%20hardware%20vendors%20and%20installed%20and%20managed%20by%20siloed%20network%20teams.%0A%0Ak8gb%20is%20a%20completely%20open%20source%2C%20cloud%20native%2C%20global%20load%20balancing%20solution%20for%20Kubernetes.%0A%0Ak8gb%20focuses%20on%20load%20balancing%20traffic%20across%20geographically%20dispersed%20Kubernetes%20clusters%20using%20multiple%20load%20balancing%20strategies%20to%20meet%20requirements%20such%20as%20region%20failover%20for%20high%20availability.%0A%0AGlobal%20load%20balancing%20for%20any%20Kubernetes%20Service%20can%20now%20be%20enabled%20and%20managed%20by%20any%20operations%20or%20development%20teams%20in%20the%20same%20Kubernetes%20native%20way%20as%20any%20other%20custom%20resource. -patternCaveats: | - Key%20Differentiators%0A%0ALoad%20balancing%20is%20based%20on%20timeproof%20DNS%20protocol%20which%20is%20perfect%20for%20global%20scope%20and%20extremely%20reliable.%0ANo%20dedicated%20management%20cluster%20and%20no%20single%20point%20of%20failure.%0AKubernetes%20native%20application%20health%20checks%20utilizing%20status%20of%20Liveness%20and%20Readiness%20probes%20for%20load%20balancing%20decisions%0AConfiguration%20with%20a%20single%20Kubernetes%20CRD%20of%20Gslb%20kind%0A%0Arefer%20this%20repo%20for%20more%20info%20https%3A%2F%2Fgithub.com%2Fk8gb-io%2Fk8gb -permalink: catalog/resiliency/kubernetes-global-balancer-d223427e-1f46-4390-8fc9-51e499c44b7d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d223427e-1f46-4390-8fc9-51e499c44b7d/0.0.3/design.yml' -downloadLink: d223427e-1f46-4390-8fc9-51e499c44b7d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576.md b/collections/_catalog/resiliency/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576.md deleted file mode 100644 index f72d50d4b6..0000000000 --- a/collections/_catalog/resiliency/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Limit Range -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: resiliency -compatibility: - - kubernetes -patternId: d6d78cdd-6bc8-4cb9-8ed3-c392e6152576 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576-dark.png -patternInfo: | - Kubernetes%20policies%20for%20resource%20allocation%20and%20usage%20limits%20within%20Pods%20and%20containers.%20It%20provides%20guidelines%20on%20setting%20constraints%20such%20as%20CPU%20and%20memory%20limits%2C%20ensuring%20efficient%20resource%20management%20across%20clusters.%20%0A%0AThis%20design%20supports%20enforcing%20resource%20quotas%20at%20the%20namespace%20level%2C%20promoting%20fair%20resource%20distribution%20and%20preventing%20resource%20contention.%20It%20emphasizes%20Kubernetes'%20flexibility%20in%20defining%20and%20enforcing%20resource%20limits%20based%20on%20application%20requirements%20and%20cluster%20capacity. -patternCaveats: | - %20Careful%20consideration%20is%20required%20when%20setting%20resource%20limits%20to%20avoid%20underprovisioning%20or%20overprovisioning%20resources%2C%20which%20can%20affect%20application%20performance%20and%20cluster%20efficiency. -permalink: catalog/resiliency/limit-range-d6d78cdd-6bc8-4cb9-8ed3-c392e6152576.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d6d78cdd-6bc8-4cb9-8ed3-c392e6152576/0.0.1/design.yml' -downloadLink: d6d78cdd-6bc8-4cb9-8ed3-c392e6152576/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/e958fd44-4a43-4096-9cd5-ef1e9204996f.md b/collections/_catalog/resiliency/e958fd44-4a43-4096-9cd5-ef1e9204996f.md deleted file mode 100644 index b97549bf8b..0000000000 --- a/collections/_catalog/resiliency/e958fd44-4a43-4096-9cd5-ef1e9204996f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: KEDA Setup -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: resiliency -compatibility: - - keda -patternId: e958fd44-4a43-4096-9cd5-ef1e9204996f -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - KEDA%20is%20a%20Kubernetes-based%20Event%20Driven%20Autoscaling%20component.%20It%20provides%20event%20driven%20scale%20for%20any%20container%20running%20in%20Kubernetes.%20The%20design%20deploys%20essential%20KEDA%20components%20(including%20CRDs)%20to%20ensure%20your%20cluster%20is%20properly%20setup%20for%20autoscaling%20using%20KEDA. -patternCaveats: | - For%20this%20design%20to%20function%20properly%2C%20Kubernetes%20version%20v1.23%20or%20above%20is%20required. -permalink: catalog/resiliency/keda-setup-e958fd44-4a43-4096-9cd5-ef1e9204996f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e958fd44-4a43-4096-9cd5-ef1e9204996f/0.0.1/design.yml' -downloadLink: e958fd44-4a43-4096-9cd5-ef1e9204996f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/resiliency/ee3ba7b5-551e-4d2c-b988-211f5e4487ca.md b/collections/_catalog/resiliency/ee3ba7b5-551e-4d2c-b988-211f5e4487ca.md deleted file mode 100644 index f0ce4c95ec..0000000000 --- a/collections/_catalog/resiliency/ee3ba7b5-551e-4d2c-b988-211f5e4487ca.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Minimal Nginx Ingress -publishedVersion: 0.0.1 -userId: 173202fe-b94d-4064-8a86-1cf063732884 -userName: Ashish Tiwari -userAvatarURL: https://layer5.io/static/7b1f08e10d271cbfd963c7d435cf84ac/416c3/ashish-tiwari.webp -type: resiliency -compatibility: - - nginx-ingress -patternId: ee3ba7b5-551e-4d2c-b988-211f5e4487ca -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ee3ba7b5-551e-4d2c-b988-211f5e4487ca-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ee3ba7b5-551e-4d2c-b988-211f5e4487ca-dark.png -patternInfo: | - %22Minimal%20Nginx%20Ingress%22%20involves%20deploying%20a%20lightweight%20Nginx%20controller%20in%20Kubernetes%20to%20efficiently%20manage%20incoming%20HTTP%20and%20HTTPS%20traffic%2C%20directing%20it%20to%20the%20relevant%20services%20within%20the%20cluster.%20This%20approach%20emphasizes%20simplicity%20and%20essential%20functionality%2C%20making%20it%20ideal%20for%20straightforward%20routing%20needs%20without%20the%20overhead%20of%20complex%20configurations.%20It%20offers%20flexibility%20to%20scale%20with%20application%20demands%20while%20ensuring%20efficient%20resource%20utilization.%20However%2C%20it's%20important%20to%20note%20that%20it%20may%20lack%20advanced%20features%20like%20intricate%20traffic%20routing%20based%20on%20headers%20or%20request%20parameters.%20Security%20measures%20such%20as%20SSL%20certificate%20management%20and%20monitoring%20tools%20are%20crucial%20for%20maintaining%20robust%20ingress%20operations.%20Overall%2C%20the%20minimal%20Nginx%20Ingress%20provides%20a%20streamlined%20solution%20for%20small%20to%20medium-scale%20deployments%2C%20prioritizing%20ease%20of%20setup%20and%20operational%20efficiency. -patternCaveats: | - No%20caveats -permalink: catalog/resiliency/minimal-nginx-ingress-ee3ba7b5-551e-4d2c-b988-211f5e4487ca.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ee3ba7b5-551e-4d2c-b988-211f5e4487ca/0.0.1/design.yml' -downloadLink: ee3ba7b5-551e-4d2c-b988-211f5e4487ca/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/05ff8dbb-2552-4a23-a6a8-318fe412bf30.md b/collections/_catalog/scaling/05ff8dbb-2552-4a23-a6a8-318fe412bf30.md deleted file mode 100644 index 8663581004..0000000000 --- a/collections/_catalog/scaling/05ff8dbb-2552-4a23-a6a8-318fe412bf30.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Resource Request -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 05ff8dbb-2552-4a23-a6a8-318fe412bf30 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/05ff8dbb-2552-4a23-a6a8-318fe412bf30-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/05ff8dbb-2552-4a23-a6a8-318fe412bf30-dark.png -patternInfo: | - This%20design%20focuses%20on%20specifying%20the%20minimum%20CPU%20and%20memory%20requirements%20for%20Kubernetes%20Pods.%20By%20setting%20resource%20requests%2C%20this%20design%20ensures%20optimal%20resource%20allocation%20within%20Kubernetes%20clusters%2C%20thereby%20enhancing%20workload%20performance%20and%20maintaining%20stability%20across%20various%20applications%20and%20services.%20This%20feature%20is%20essential%20for%20fine-tuning%20resource%20utilization%2C%20preventing%20resource%20contention%2C%20and%20supporting%20efficient%20scaling%20and%20management%20of%20containerized%20workloads%20in%20cloud-native%20environments. -patternCaveats: | - No%20caveats -permalink: catalog/scaling/pod-resource-request-05ff8dbb-2552-4a23-a6a8-318fe412bf30.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/05ff8dbb-2552-4a23-a6a8-318fe412bf30/0.0.1/design.yml' -downloadLink: 05ff8dbb-2552-4a23-a6a8-318fe412bf30/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/070b4569-2b26-4e13-93f7-9992fdf1e6fd.md b/collections/_catalog/scaling/070b4569-2b26-4e13-93f7-9992fdf1e6fd.md deleted file mode 100644 index b33d127c4b..0000000000 --- a/collections/_catalog/scaling/070b4569-2b26-4e13-93f7-9992fdf1e6fd.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: GCP DataMesh -publishedVersion: 0.0.332 -userId: 51f49d2c-0050-4bdb-9bce-fdddcb4742be -userName: Akshay Sharma -userAvatarURL: https://raw.githubusercontent.com/leecalcote/talks/1b704173ab69ba37b3f7a725b1c58eeb56b83a8d/img/five-avatar-circle.png -type: scaling -compatibility: - - k8s-config-connector -patternId: 070b4569-2b26-4e13-93f7-9992fdf1e6fd -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - *Implementing%20Data%20Mesh%20on%20Google%20Cloud%20Platform%3A*%0A%0ALeverage%20Google%20Cloud's%20comprehensive%20suite%20of%20data%20services%2C%20including%20BigQuery%2C%20Dataflow%2C%20and%20Dataproc%2C%20to%20build%20a%20scalable%20and%20flexible%20Data%20Mesh%20platform.%0AUtilize%20tools%20like%20Dataplex%20to%20create%20a%20unified%20data%20catalog%20and%20metadata%20management%20system%2C%20facilitating%20data%20discovery%20and%20access.%0AImplement%20robust%20data%20governance%20policies%20and%20access%20controls%20using%20tools%20like%20Cloud%20IAM%20and%20DLP%20to%20ensure%20data%20security%20and%20compliance.%0A -patternCaveats: | - This%20design%20is%20a%20reference%20architecture%20%3Cu%3Eonly%3C%2Fu%3E%2C%20and%20as%20such%20is%20not%20immediately%20deployable. -permalink: catalog/scaling/gcp-datamesh-070b4569-2b26-4e13-93f7-9992fdf1e6fd.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/070b4569-2b26-4e13-93f7-9992fdf1e6fd/0.0.332/design.yml' -downloadLink: 070b4569-2b26-4e13-93f7-9992fdf1e6fd/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/19b4edf1-a88c-4255-9544-ea7268c9b466.md b/collections/_catalog/scaling/19b4edf1-a88c-4255-9544-ea7268c9b466.md deleted file mode 100644 index aefce43ffd..0000000000 --- a/collections/_catalog/scaling/19b4edf1-a88c-4255-9544-ea7268c9b466.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Hello WASM -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 19b4edf1-a88c-4255-9544-ea7268c9b466 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/19b4edf1-a88c-4255-9544-ea7268c9b466-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/19b4edf1-a88c-4255-9544-ea7268c9b466-dark.png -patternInfo: | - Sample%20WASM%20implementation%20with%20service%20mesh -patternCaveats: | - No%20caveats -permalink: catalog/scaling/hello-wasm-19b4edf1-a88c-4255-9544-ea7268c9b466.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/19b4edf1-a88c-4255-9544-ea7268c9b466/0.0.1/design.yml' -downloadLink: 19b4edf1-a88c-4255-9544-ea7268c9b466/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/1fa80124-d38d-41d1-a768-0fcb7cdae31e.md b/collections/_catalog/scaling/1fa80124-d38d-41d1-a768-0fcb7cdae31e.md deleted file mode 100644 index 0427723142..0000000000 --- a/collections/_catalog/scaling/1fa80124-d38d-41d1-a768-0fcb7cdae31e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: HorizontalPodAutoscaler -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 1fa80124-d38d-41d1-a768-0fcb7cdae31e -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - A%20HorizontalPodAutoscaler%20(HPA%20for%20short)%20automatically%20updates%20a%20workload%20resource%20(such%20as%20a%20Deployment%20or%20StatefulSet)%2C%20with%20the%20aim%20of%20automatically%20scaling%20the%20workload%20to%20match%20demand%0AHorizontal%20scaling%20means%20that%20the%20response%20to%20increased%20load%20is%20to%20deploy%20more%20Pods.%20This%20is%20different%20from%20vertical%20scaling%2C%20which%20for%20Kubernetes%20would%20mean%20assigning%20more%20resources%20(for%20example%3A%20memory%20or%20CPU)%20to%20the%20Pods%20that%20are%20already%20running%20for%20the%20workload.%0AIf%20the%20load%20decreases%2C%20and%20the%20number%20of%20Pods%20is%20above%20the%20configured%20minimum%2C%20the%20HorizontalPodAutoscaler%20instructs%20the%20workload%20resource%20(the%20Deployment%2C%20StatefulSet%2C%20or%20other%20similar%20resource)%20to%20scale%20back%20down. -patternCaveats: | - %20Modify%20deployments%20and%20names%20according%20to%20requirement -permalink: catalog/scaling/horizontalpodautoscaler-1fa80124-d38d-41d1-a768-0fcb7cdae31e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/1fa80124-d38d-41d1-a768-0fcb7cdae31e/0.0.1/design.yml' -downloadLink: 1fa80124-d38d-41d1-a768-0fcb7cdae31e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/29561962-16f9-4ba3-884c-9fcebed9adc6.md b/collections/_catalog/scaling/29561962-16f9-4ba3-884c-9fcebed9adc6.md deleted file mode 100644 index b57b4844d4..0000000000 --- a/collections/_catalog/scaling/29561962-16f9-4ba3-884c-9fcebed9adc6.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Distributed Database w/ Shardingshpere -publishedVersion: 0.0.1 -userId: 6126611f-41d6-4206-8504-822a5262d110 -userName: David Hunter Hunter -userAvatarURL: -type: scaling -compatibility: - - postgres-controller - - postgres-operator - - postgres-with-operator -patternId: 29561962-16f9-4ba3-884c-9fcebed9adc6 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/29561962-16f9-4ba3-884c-9fcebed9adc6-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/29561962-16f9-4ba3-884c-9fcebed9adc6-dark.png -patternInfo: | - The%20Distributed%20Database%20with%20ShardingSphere%20design%20outlines%20a%20robust%20architecture%20for%20deploying%20and%20managing%20a%20distributed%20database%20system.%20ShardingSphere%20facilitates%20horizontal%20partitioning%20of%20data%20across%20multiple%20nodes%2C%20known%20as%20shards%2C%20to%20enhance%20scalability%2C%20performance%2C%20and%20fault%20tolerance.%20This%20design%20details%20the%20configuration%20of%20ShardingSphere%20to%20manage%20shard%20key%20distribution%2C%20data%20sharding%20strategies%2C%20and%20query%20routing%20mechanisms%20efficiently.%20It%20emphasizes%20optimizing%20data%20access%20and%20synchronization%20while%20ensuring%20high%20availability%20and%20data%20integrity.%20Key%20considerations%20include%20defining%20shard%20key%20strategies%20for%20balanced%20data%20distribution%2C%20implementing%20robust%20monitoring%20and%20alerting%20systems%2C%20and%20integrating%20backup%20and%20recovery%20solutions%20for%20comprehensive%20data%20management.%20This%20design%20is%20ideal%20for%20applications%20requiring%20scalable%20and%20resilient%20database%20solutions%20in%20distributed%20computing%20environments. -patternCaveats: | - While%20deploying%20the%20Distributed%20Database%20with%20ShardingSphere%20design%2C%20several%20caveats%20should%20be%20considered%20to%20ensure%20optimal%20performance%20and%20reliability.%20First%2C%20configuring%20and%20maintaining%20the%20sharding%20strategy%20requires%20careful%20planning%20to%20avoid%20uneven%20data%20distribution%20among%20shards%2C%20which%20can%20lead%20to%20performance%20bottlenecks.%20Additionally%2C%20managing%20shard%20synchronization%20and%20ensuring%20data%20consistency%20across%20distributed%20nodes%20can%20be%20complex%20and%20requires%20robust%20monitoring%20and%20management%20tools.%20Security%20concerns%20such%20as%20data%20encryption%2C%20access%20control%2C%20and%20securing%20inter-node%20communication%20must%20also%20be%20addressed%20to%20prevent%20unauthorized%20access%20and%20data%20breaches.%20Furthermore%2C%20the%20operational%20overhead%20of%20maintaining%20multiple%20database%20instances%20and%20coordinating%20schema%20changes%20across%20shards%20can%20be%20significant%20and%20should%20be%20managed%20effectively%20to%20minimize%20downtime%20and%20operational%20risks. -permalink: catalog/scaling/distributed-database-w-shardingshpere-29561962-16f9-4ba3-884c-9fcebed9adc6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/29561962-16f9-4ba3-884c-9fcebed9adc6/0.0.1/design.yml' -downloadLink: 29561962-16f9-4ba3-884c-9fcebed9adc6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/33307744-8085-4f09-9dda-28666c6bb8c1.md b/collections/_catalog/scaling/33307744-8085-4f09-9dda-28666c6bb8c1.md deleted file mode 100644 index 61e45d5dd7..0000000000 --- a/collections/_catalog/scaling/33307744-8085-4f09-9dda-28666c6bb8c1.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: rabbitmq-cluster-operator -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: scaling -compatibility: - - kubernetes - - rabbitmq-cluster-operator - - rabbitmq-operator -patternId: 33307744-8085-4f09-9dda-28666c6bb8c1 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/33307744-8085-4f09-9dda-28666c6bb8c1-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/33307744-8085-4f09-9dda-28666c6bb8c1-dark.png -patternInfo: | - The%20RabbitMQ%20Cluster%20Operator%20design%20leverages%20Kubernetes%20to%20automate%20the%20deployment%20and%20management%20of%20RabbitMQ%20clusters%2C%20a%20widely-used%20open-source%20message%20broker.%0A%0AThis%20design%20facilitates%20streamlined%20operations%20and%20enables%20developers%20to%20focus%20on%20application%20logic%2C%20leveraging%20RabbitMQ's%20robust%20messaging%20capabilities%20for%20building%20resilient%20and%20scalable%20distributed%20systems -patternCaveats: | - The%20RabbitMQ%20Cluster%20Operator%20itself%20requires%20maintenance%20and%20updates%20to%20stay%20aligned%20with%20RabbitMQ%20and%20Kubernetes%20versions.%20Keeping%20the%20operator%20up%20to%20date%20with%20the%20latest%20patches%20and%20features%20is%20essential%20for%20stability%20and%20security. -permalink: catalog/scaling/rabbitmq-cluster-operator-33307744-8085-4f09-9dda-28666c6bb8c1.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/33307744-8085-4f09-9dda-28666c6bb8c1/0.0.1/design.yml' -downloadLink: 33307744-8085-4f09-9dda-28666c6bb8c1/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/35ecff6c-41f5-400b-92c4-f959dd23ee15.md b/collections/_catalog/scaling/35ecff6c-41f5-400b-92c4-f959dd23ee15.md deleted file mode 100644 index 9077b8cc53..0000000000 --- a/collections/_catalog/scaling/35ecff6c-41f5-400b-92c4-f959dd23ee15.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Autoscaling based on Metrics in GKE -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: scaling -compatibility: - - gcp - - kubernetes -patternId: 35ecff6c-41f5-400b-92c4-f959dd23ee15 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/35ecff6c-41f5-400b-92c4-f959dd23ee15-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/35ecff6c-41f5-400b-92c4-f959dd23ee15-dark.png -patternInfo: | - This%20design%20demonstrates%20how%20to%20automatically%20scale%20your%20Google%20Kubernetes%20Engine%20(GKE)%0Aworkloads%20based%20on%20Prometheus-style%20metrics%20emitted%20by%20your%20application.%20%20It%20uses%20the%20%5BGKE%20workload%0Ametrics%5D(https%3A%2F%2Fcloud.google.com%2Fstackdriver%2Fdocs%2Fsolutions%2Fgke%2Fmanaging-metrics%23workload-metrics)%0Apipeline%20to%20collect%20the%20metrics%20emitted%20from%20the%20example%20application%20and%20send%20them%20to%0A%5BCloud%20Monitoring%5D(https%3A%2F%2Fcloud.google.com%2Fmonitoring)%2C%20and%20then%20uses%20the%0A%5BHorizontalPodAutoscaler%5D(https%3A%2F%2Fcloud.google.com%2Fkubernetes-engine%2Fdocs%2Fconcepts%2Fhorizontalpodautoscaler)%0Aalong%20with%20the%20%5BCustom%20Metrics%20Adapter%5D(https%3A%2F%2Fgithub.com%2FGoogleCloudPlatform%2Fk8s-stackdriver%2Ftree%2Fmaster%2Fcustom-metrics-stackdriver-adapter)%20to%20scale%20the%20application. -patternCaveats: | - Add%20your%20own%20custom%20prometheus%20to%20GKE%20%20for%20better%20scaling%20%20of%20workloads%20 -permalink: catalog/scaling/autoscaling-based-on-metrics-in-gke-35ecff6c-41f5-400b-92c4-f959dd23ee15.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/35ecff6c-41f5-400b-92c4-f959dd23ee15/0.0.1/design.yml' -downloadLink: 35ecff6c-41f5-400b-92c4-f959dd23ee15/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed.md b/collections/_catalog/scaling/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed.md deleted file mode 100644 index aedb8c206f..0000000000 --- a/collections/_catalog/scaling/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'K8''s-Cluster-overprovisioner ' -publishedVersion: 0.0.5 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed-dark.png -patternInfo: | - This%20design%20provide%20a%20buffer%20for%20cluster%20autoscaling%20to%20allow%20overprovisioning%20of%20cluster%20nodes.%20This%20is%20desired%20when%20you%20have%20work%20loads%20that%20need%20to%20scale%20up%20quickly%20without%20waiting%20for%20the%20new%20cluster%20nodes%20to%20be%20created%20and%20join%20the%20cluster.%0A%0AIt%20works%20by%20creating%20a%20deployment%20that%20creates%20pods%20of%20a%20lower%20than%20default%20PriorityClass.%20These%20pods%20request%20resources%20from%20the%20cluster%20but%20don't%20actually%20consume%20any%20resources.%20These%20pods%20are%20then%20evicted%20allowing%20other%20normal%20pods%20to%20be%20created%20while%20also%20triggering%20a%20scale-up%20by%20the%20. -patternCaveats: | - get%20info%20from%20this%20https%3A%2F%2Fgithub.com%2Fkubernetes%2Fautoscaler%2Fblob%2Fmaster%2Fcluster-autoscaler%2FFAQ.md%23how-can-i-configure-overprovisioning-with-cluster-autoscaler -permalink: catalog/scaling/k8-s-cluster-overprovisioner-6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed/0.0.5/design.yml' -downloadLink: 6b6e5bbd-1c8b-4aab-87be-b7b397f2aeed/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/6d4bb838-2a05-447e-bba4-b59104ace089.md b/collections/_catalog/scaling/6d4bb838-2a05-447e-bba4-b59104ace089.md deleted file mode 100644 index 4d73361f0a..0000000000 --- a/collections/_catalog/scaling/6d4bb838-2a05-447e-bba4-b59104ace089.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Redis_using_configmap -publishedVersion: 0.0.1 -userId: 4a508c2f-5bdf-41ba-b00f-8b81953b86e0 -userName: chandravijay Rai -userAvatarURL: https://lh3.googleusercontent.com/a/AGNmyxYe79ZDptvk-bLHVH3JPa8Uj88asr6r_aT405fsbw=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 6d4bb838-2a05-447e-bba4-b59104ace089 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6d4bb838-2a05-447e-bba4-b59104ace089-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6d4bb838-2a05-447e-bba4-b59104ace089-dark.png -patternInfo: | - The%20%22Redis%20Using%20ConfigMap%22%20design%20configures%20and%20deploys%20a%20Redis%20instance%20on%20Kubernetes%20using%20ConfigMaps%20to%20manage%20configuration%20settings.%20This%20design%20leverages%20Kubernetes%20ConfigMaps%20to%20store%20and%20inject%20Redis%20configuration%20files%2C%20allowing%20for%20dynamic%20and%20centralized%20management%20of%20configuration%20parameters%20without%20altering%20the%20Redis%20container%20image.%20By%20decoupling%20the%20configuration%20from%20the%20application%2C%20it%20facilitates%20easier%20updates%20and%20management%20of%20Redis%20settings%2C%20improving%20maintainability%20and%20operational%20efficiency.%20This%20approach%20is%20ideal%20for%20scenarios%20where%20configuration%20flexibility%20and%20quick%20adjustments%20are%20crucial%2C%20such%20as%20in%20development%2C%20testing%2C%20and%20production%20environments. -patternCaveats: | - While%20ConfigMaps%20simplify%20configuration%20management%2C%20changes%20to%20the%20ConfigMap%20require%20a%20pod%20restart%20to%20take%20effect.%20Ensure%20that%20updates%20are%20carefully%20planned%20to%20avoid%20unintended%20downtime.%0A -permalink: catalog/scaling/redis-using-configmap-6d4bb838-2a05-447e-bba4-b59104ace089.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6d4bb838-2a05-447e-bba4-b59104ace089/0.0.1/design.yml' -downloadLink: 6d4bb838-2a05-447e-bba4-b59104ace089/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/755b64db-59c5-41a3-896b-788aa579de41.md b/collections/_catalog/scaling/755b64db-59c5-41a3-896b-788aa579de41.md deleted file mode 100644 index 25f39c85d0..0000000000 --- a/collections/_catalog/scaling/755b64db-59c5-41a3-896b-788aa579de41.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Resource Limit -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 755b64db-59c5-41a3-896b-788aa579de41 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/755b64db-59c5-41a3-896b-788aa579de41-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/755b64db-59c5-41a3-896b-788aa579de41-dark.png -patternInfo: | - This%20design%20ensures%20efficient%20resource%20utilization%2C%20prevents%20resource%20contention%2C%20and%20enhances%20overall%20stability%20and%20reliability%20of%20applications%20running%20in%20Kubernetes. -patternCaveats: | - Setting%20appropriate%20resource%20limits%20and%20requests%20requires%20careful%20consideration%20of%20application%20requirements%2C%20monitoring%20for%20potential%20resource%20bottlenecks%2C%20and%20periodic%20adjustments%20to%20optimize%20performance%20and%20scalability%20as%20workload%20demands%20evolve. -permalink: catalog/scaling/pod-resource-limit-755b64db-59c5-41a3-896b-788aa579de41.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/755b64db-59c5-41a3-896b-788aa579de41/0.0.1/design.yml' -downloadLink: 755b64db-59c5-41a3-896b-788aa579de41/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/7607aeb0-3248-4c89-8a63-22ccd8d9cf79.md b/collections/_catalog/scaling/7607aeb0-3248-4c89-8a63-22ccd8d9cf79.md deleted file mode 100644 index fd35e2e2e6..0000000000 --- a/collections/_catalog/scaling/7607aeb0-3248-4c89-8a63-22ccd8d9cf79.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Nginx Deployment -publishedVersion: 0.0.1 -userId: 173202fe-b94d-4064-8a86-1cf063732884 -userName: Ashish Tiwari -userAvatarURL: https://layer5.io/static/7b1f08e10d271cbfd963c7d435cf84ac/416c3/ashish-tiwari.webp -type: scaling -compatibility: - - kubernetes - - nginx-ingress -patternId: 7607aeb0-3248-4c89-8a63-22ccd8d9cf79 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - A%20widely-used%20web%20server%20and%20reverse%20proxy%20server%2C%20within%20a%20Kubernetes%20cluster.%20This%20example%20provides%20a%20design%20for%20deploying%2C%20configuring%2C%20and%20managing%20Nginx%20in%20a%20containerized%20environment%2C%20leveraging%20Kubernetes%20resources%20to%20ensure%20scalability%2C%20resilience%2C%20and%20ease%20of%20management. -patternCaveats: | - Ensure%20that%20the%20Nginx%20deployment%20is%20secure%20by%20using%20network%20policies%20to%20restrict%20traffic%20flow%2C%20RBAC%20to%20control%20access%20to%20Kubernetes%20resources%2C%20and%20Secrets%20to%20manage%20sensitive%20data%20such%20as%20SSL%20certificates.%0A -permalink: catalog/scaling/nginx-deployment-7607aeb0-3248-4c89-8a63-22ccd8d9cf79.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7607aeb0-3248-4c89-8a63-22ccd8d9cf79/0.0.1/design.yml' -downloadLink: 7607aeb0-3248-4c89-8a63-22ccd8d9cf79/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/792f17b4-08f5-4654-8c10-3628fd56ac03.md b/collections/_catalog/scaling/792f17b4-08f5-4654-8c10-3628fd56ac03.md deleted file mode 100644 index 0beb4e0903..0000000000 --- a/collections/_catalog/scaling/792f17b4-08f5-4654-8c10-3628fd56ac03.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: ElasticSearch -publishedVersion: 0.0.1 -userId: 551dcb82-7643-4709-8500-9a60e60030b9 -userName: Yash Sharma -userAvatarURL: https://avatars.githubusercontent.com/u/71271069?v=4 -type: scaling -compatibility: - - kubernetes -patternId: 792f17b4-08f5-4654-8c10-3628fd56ac03 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/792f17b4-08f5-4654-8c10-3628fd56ac03.png -patternInfo: | - Kubernetes%20makes%20it%20trivial%20for%20anyone%20to%20easily%20build%20and%20scale%20Elasticsearch%20clusters.%20Here%2C%20you'll%20find%20how%20to%20do%20so.%20Current%20Elasticsearch%20version%20is%205.6.2. -patternCaveats: | - Elasticsearch%20for%20Kubernetes%3A%0A%0ACurrent%20pod%20descriptors%20use%20an%20emptyDir%20for%20storing%20data%20in%20each%20data%20node%20container.%20This%20is%20meant%20to%20be%20for%20the%20sake%20of%20simplicity%20and%20should%20be%20adapted%20according%20to%20your%20storage%20needs. -permalink: catalog/scaling/elasticsearch-792f17b4-08f5-4654-8c10-3628fd56ac03.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/792f17b4-08f5-4654-8c10-3628fd56ac03/0.0.1/design.yml' -downloadLink: 792f17b4-08f5-4654-8c10-3628fd56ac03/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/7fae3c13-8807-4134-a35b-3c531fa21e4e.md b/collections/_catalog/scaling/7fae3c13-8807-4134-a35b-3c531fa21e4e.md deleted file mode 100644 index 3ff6754d63..0000000000 --- a/collections/_catalog/scaling/7fae3c13-8807-4134-a35b-3c531fa21e4e.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Node Affinity -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 7fae3c13-8807-4134-a35b-3c531fa21e4e -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7fae3c13-8807-4134-a35b-3c531fa21e4e-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7fae3c13-8807-4134-a35b-3c531fa21e4e-dark.png -patternInfo: | - By%20defining%20node%20affinity%20rules%2C%20this%20design%20ensures%20that%20Pods%20are%20deployed%20on%20nodes%20with%20specific%20labels%2C%20such%20as%20hardware%20capabilities%20or%20geographical%20location%2C%20aligning%20with%20application%20requirements%20and%20operational%20policies.%20This%20capability%20enhances%20workload%20performance%2C%20optimizes%20resource%20utilization%2C%20and%20supports%20efficient%20workload%20distribution%20across%20Kubernetes%20clusters%2C%20enhancing%20scalability%20and%20fault%20tolerance%20in%20distributed%20computing%20environments. -patternCaveats: | - While%20node%20affinity%20provides%20powerful%20capabilities%20for%20workload%20optimization%2C%20improper%20configuration%20or%20overly%20restrictive%20rules%20can%20lead%20to%20uneven%20distribution%20of%20Pods%20across%20nodes%2C%20potentially%20underutilizing%20cluster%20resources%20or%20causing%20nodes%20to%20become%20overwhelmed.%20Careful%20consideration%20of%20node%20labels%2C%20resource%20requirements%2C%20and%20workload%20characteristics%20is%20necessary%20to%20achieve%20balanced%20resource%20allocation%20and%20maximize%20cluster%20efficiency.%20Additionally%2C%20changes%20in%20node%20labels%20or%20availability%20might%20impact%20Pod%20scheduling%2C%20necessitating%20regular%20review%20and%20adjustment%20of%20node%20affinity%20rules%20to%20maintain%20optimal%20deployment%20strategies. -permalink: catalog/scaling/pod-node-affinity-7fae3c13-8807-4134-a35b-3c531fa21e4e.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7fae3c13-8807-4134-a35b-3c531fa21e4e/0.0.1/design.yml' -downloadLink: 7fae3c13-8807-4134-a35b-3c531fa21e4e/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/855884db-267b-4357-8e8e-cf189ec971a5.md b/collections/_catalog/scaling/855884db-267b-4357-8e8e-cf189ec971a5.md deleted file mode 100644 index f6a302b488..0000000000 --- a/collections/_catalog/scaling/855884db-267b-4357-8e8e-cf189ec971a5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Redis master deployment -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: scaling -compatibility: - - kubernetes -patternId: 855884db-267b-4357-8e8e-cf189ec971a5 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/855884db-267b-4357-8e8e-cf189ec971a5-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/855884db-267b-4357-8e8e-cf189ec971a5-dark.png -patternInfo: | - In%20this%20design%2C%20the%20Redis%20master%20node%20is%20configured%20for%20high%20availability%20and%20reliability%2C%20crucial%20for%20applications%20requiring%20fast%20data%20access%20and%20storage.%20It%20leverages%20Kubernetes'%20capabilities%20to%20manage%20Redis%20master%20pods%2C%20ensuring%20fault%20tolerance%20through%20replication%20and%20monitoring.%20This%20design%20typically%20involves%20setting%20up%20persistent%20storage%20for%20data%20durability%2C%20defining%20resource%20requests%20and%20limits%20to%20optimize%20performance%2C%20and%20configuring%20appropriate%20networking%20for%20seamless%20communication%20within%20the%20cluster. -patternCaveats: | - Careful%20consideration%20is%20given%20to%20security%20practices%2C%20such%20as%20access%20controls%20and%20encryption%2C%20to%20safeguard%20sensitive%20data%20stored%20in%20Redis.%20%0A%0AContinuous%20monitoring%20and%20scaling%20strategies%20are%20implemented%20to%20maintain%20optimal%20performance%20and%20availability%20as%20workload%20demands%20fluctuate. -permalink: catalog/scaling/redis-master-deployment-855884db-267b-4357-8e8e-cf189ec971a5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/855884db-267b-4357-8e8e-cf189ec971a5/0.0.1/design.yml' -downloadLink: 855884db-267b-4357-8e8e-cf189ec971a5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/ae801c1f-8134-4f48-bc2e-d97c14f6a99c.md b/collections/_catalog/scaling/ae801c1f-8134-4f48-bc2e-d97c14f6a99c.md deleted file mode 100644 index de81bb1788..0000000000 --- a/collections/_catalog/scaling/ae801c1f-8134-4f48-bc2e-d97c14f6a99c.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: ISCSI pod creation -publishedVersion: 0.0.16 -userId: 65a09154-3ae0-47c4-b19a-e0185ffb694f -userName: shridhar kute -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocJO5oe9gDlO9cSHCoVRuTOqRLlfnlf3W9cEdz7HVgGZBge5OQY=s96-c -type: scaling -compatibility: - - kubernetes -patternId: ae801c1f-8134-4f48-bc2e-d97c14f6a99c -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ae801c1f-8134-4f48-bc2e-d97c14f6a99c-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ae801c1f-8134-4f48-bc2e-d97c14f6a99c-dark.png -patternInfo: | - %20Connect%20Kubernetes%20clusters%20to%20iSCSI%20devices%20for%20scalable%20storage%20solutions%2C%20supporting%20direct%20or%20multipath%20connections%20with%20CHAP%20authentication. -patternCaveats: | - Ensure%20compatibility%20of%20Kubernetes%20and%20iSCSI%20versions%2C%20configure%20network%20settings%20appropriately%2C%20and%20monitor%20performance%20and%20scalability%20of%20both%20storage%20and%20network%20infrastructure.%0A%0A%0A -permalink: catalog/scaling/iscsi-pod-creation-ae801c1f-8134-4f48-bc2e-d97c14f6a99c.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ae801c1f-8134-4f48-bc2e-d97c14f6a99c/0.0.16/design.yml' -downloadLink: ae801c1f-8134-4f48-bc2e-d97c14f6a99c/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d.md b/collections/_catalog/scaling/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d.md deleted file mode 100644 index 9b86e4809a..0000000000 --- a/collections/_catalog/scaling/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: gke-online-serving-single-gpu -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: scaling -compatibility: - - gcp - - kubernetes -patternId: c0db1f13-46e8-481f-b5b5-27b6d2e0b74d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d-dark.png -patternInfo: | - This%20design%20outlines%20a%20Kubernetes%20architecture%20tailored%20for%20online%20serving%20workloads%20that%20require%20GPU%20acceleration.%20This%20design%20is%20optimized%20for%20Google%20Kubernetes%20Engine%20(GKE)%2C%20leveraging%20a%20single%20GPU%20instance%20to%20enhance%20computational%20performance%20for%20machine%20learning%20inference%2C%20real-time%20analytics%2C%20or%20other%20GPU-intensive%20tasks. -patternCaveats: | - Continuous%20monitoring%20and%20optimization%20of%20GPU%20utilization%20and%20workload%20distribution%20are%20necessary%20to%20maintain%20optimal%20performance%20and%20avoid%20resource%20contention%20among%20Pods%20sharing%20GPU%20resources. -permalink: catalog/scaling/gke-online-serving-single-gpu-c0db1f13-46e8-481f-b5b5-27b6d2e0b74d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/c0db1f13-46e8-481f-b5b5-27b6d2e0b74d/0.0.1/design.yml' -downloadLink: c0db1f13-46e8-481f-b5b5-27b6d2e0b74d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/ec728414-5dd9-48a0-9be4-2ca0dffa1f2c.md b/collections/_catalog/scaling/ec728414-5dd9-48a0-9be4-2ca0dffa1f2c.md deleted file mode 100644 index c8f773f42e..0000000000 --- a/collections/_catalog/scaling/ec728414-5dd9-48a0-9be4-2ca0dffa1f2c.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: iscsi -publishedVersion: 0.0.4 -userId: 65a09154-3ae0-47c4-b19a-e0185ffb694f -userName: shridhar kute -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocJO5oe9gDlO9cSHCoVRuTOqRLlfnlf3W9cEdz7HVgGZBge5OQY=s96-c -type: scaling -compatibility: - - kubernetes -patternId: ec728414-5dd9-48a0-9be4-2ca0dffa1f2c -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Connect%20Kubernetes%20clusters%20to%20iSCSI%20devices%20for%20scalable%20storage%20solutions%2C%20supporting%20direct%20or%20multipath%20connections%20with%20CHAP%20authentication. -patternCaveats: | - Ensure%20compatibility%20of%20Kubernetes%20and%20iSCSI%20versions%2C%20configure%20network%20settings%20appropriately%2C%20and%20monitor%20performance%20and%20scalability%20of%20both%20storage%20and%20network%20infrastructure. -permalink: catalog/scaling/iscsi-ec728414-5dd9-48a0-9be4-2ca0dffa1f2c.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ec728414-5dd9-48a0-9be4-2ca0dffa1f2c/0.0.4/design.yml' -downloadLink: ec728414-5dd9-48a0-9be4-2ca0dffa1f2c/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/scaling/ff84d220-d1ea-44ee-8473-a44b972ff85b.md b/collections/_catalog/scaling/ff84d220-d1ea-44ee-8473-a44b972ff85b.md deleted file mode 100644 index f1f13bffb4..0000000000 --- a/collections/_catalog/scaling/ff84d220-d1ea-44ee-8473-a44b972ff85b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Resource Memory Request Limit -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: scaling -compatibility: - - kubernetes -patternId: ff84d220-d1ea-44ee-8473-a44b972ff85b -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ff84d220-d1ea-44ee-8473-a44b972ff85b-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ff84d220-d1ea-44ee-8473-a44b972ff85b-dark.png -patternInfo: | - Define%20a%20limit%20on%20the%20amount%20of%20resources%20that%20a%20K8s%20pod%20can%20use. -patternCaveats: | - None -permalink: catalog/scaling/pod-resource-memory-request-limit-ff84d220-d1ea-44ee-8473-a44b972ff85b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ff84d220-d1ea-44ee-8473-a44b972ff85b/0.0.1/design.yml' -downloadLink: ff84d220-d1ea-44ee-8473-a44b972ff85b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6.md b/collections/_catalog/security/075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6.md deleted file mode 100644 index 476f14ff59..0000000000 --- a/collections/_catalog/security/075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Accelerated mTLS handshake for Envoy data planes -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: security -compatibility: - - Istio - - Kubernetes -patternId: 075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Cryptographic operations are among the most compute-intensive and critical operations when it comes to secured connections. Istio uses Envoy as the “gateways/sidecar” to handle secure connections and intercept the traffic. Depending upon use cases, when an ingress gateway must handle a large number of incoming TLS and secured service-to-service connections through sidecar proxies, the load on Envoy increases. The potential performance depends on many factors, such as size of the cpuset on which Envoy is running, incoming traffic patterns, and key size. These factors can impact Envoy serving many new incoming TLS requests. To achieve performance improvements and accelerated handshakes, a new feature was introduced in Envoy 1.20 and Istio 1.14. It can be achieved with 3rd Gen Intel® Xeon® Scalable processors, the Intel® Integrated Performance Primitives (Intel® IPP) crypto library, CryptoMB Private Key Provider Method support in Envoy, and Private Key Provider configuration in Istio using ProxyConfig. -patternCaveats: | - Ensure networking is setup properly and correct annotation are applied to each resource for custom Intel configuration -permalink: catalog/security/accelerated-mtls-handshake-for-envoy-data-planes-075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6/0.0.1/design.yml' -downloadLink: 075ec9ba-6ad7-4421-a09c-3b8edd5fb4a6/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542.md b/collections/_catalog/security/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542.md deleted file mode 100644 index 9031e81072..0000000000 --- a/collections/_catalog/security/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Design With Validation Errors -publishedVersion: 0.0.1 -userId: e7f3c5e0-4c15-470b-b012-67ff1ce9ed25 -userName: Rishav Chattopadhyay -userAvatarURL: -type: security -compatibility: - - nginx-ingress -patternId: 0d8d6d6d-362f-49e3-9a88-2d7e6aa20542 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542-dark.png -patternInfo: | - Design%20with%20proper%20validation -patternCaveats: | - Nothing%20specific -permalink: catalog/security/design-with-validation-errors-0d8d6d6d-362f-49e3-9a88-2d7e6aa20542.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0d8d6d6d-362f-49e3-9a88-2d7e6aa20542/0.0.1/design.yml' -downloadLink: 0d8d6d6d-362f-49e3-9a88-2d7e6aa20542/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/254aa1d3-d972-4894-813a-f58fdd24021c.md b/collections/_catalog/security/254aa1d3-d972-4894-813a-f58fdd24021c.md deleted file mode 100644 index 2be8006141..0000000000 --- a/collections/_catalog/security/254aa1d3-d972-4894-813a-f58fdd24021c.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Hashicorp Vault ' -publishedVersion: 0.0.8 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: security -compatibility: - - vault-secrets -patternId: 254aa1d3-d972-4894-813a-f58fdd24021c -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The%20Vault%20server%20cluster%20can%20run%20directly%20on%20Kubernetes.%20This%20can%20be%20used%20by%20applications%20running%20within%20Kubernetes%20as%20well%20as%20external%20to%20Kubernetes%2C%20as%20long%20as%20they%20can%20communicate%20to%20the%20server%20via%20the%20network.%0A%0AAccessing%20and%20Storing%20Secrets%3A%20Applications%20using%20the%20Vault%20service%20running%20in%20Kubernetes%20can%20access%20and%20store%20secrets%20from%20Vault%20using%20a%20number%20of%20different%20secret%20engines%20and%20authentication%20methods.%0A%0ARunning%20a%20Highly%20Available%20Vault%20Service%3A%20By%20using%20pod%20affinities%2C%20highly%20available%20backend%20storage%20(such%20as%20Consul)%20and%20auto-unseal%2C%20Vault%20can%20become%20a%20highly%20available%20service%20in%20Kubernetes.%0A%0AEncryption%20as%20a%20Service%3A%20Applications%20using%20the%20Vault%20service%20running%20in%20Kubernetes%20can%20leverage%20the%20Transit%20secret%20engine%20as%20%22encryption%20as%20a%20service%22.%20This%20allows%20applications%20to%20offload%20encryption%20needs%20to%20Vault%20before%20storing%20data%20at%20rest.%0A%0AAudit%20Logs%20for%20Vault%3A%20Operators%20can%20choose%20to%20attach%20a%20persistent%20volume%20to%20the%20Vault%20cluster%20which%20can%20be%20used%20to%20store%20audit%20logs.%0A%0AAnd%20more!%20Vault%20can%20run%20directly%20on%20Kubernetes%2C%20so%20in%20addition%20to%20the%20native%20integrations%20provided%20by%20Vault%20itself%2C%20any%20other%20tool%20built%20for%20Kubernetes%20can%20choose%20to%20leverage%20Vault. -patternCaveats: | - refer%20for%20%20Caveats%20And%20Considerations%20from%20this%20docs%20https%3A%2F%2Fdeveloper.hashicorp.com%2Fvault%2Fdocs%2Fplatform%2Fk8s -permalink: catalog/security/hashicorp-vault-254aa1d3-d972-4894-813a-f58fdd24021c.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/254aa1d3-d972-4894-813a-f58fdd24021c/0.0.8/design.yml' -downloadLink: 254aa1d3-d972-4894-813a-f58fdd24021c/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/2a42de8b-3c58-4571-b092-2fda29ecfb1a.md b/collections/_catalog/security/2a42de8b-3c58-4571-b092-2fda29ecfb1a.md deleted file mode 100644 index 37068e94fa..0000000000 --- a/collections/_catalog/security/2a42de8b-3c58-4571-b092-2fda29ecfb1a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: prometheus-operator-crd-cluster-roles -publishedVersion: 0.0.1 -userId: 54a58e68-8c83-4683-a84e-4cf8d3256649 -userName: Senali Dilumika -userAvatarURL: https://lh3.googleusercontent.com/a/AGNmyxZ7hYDbFyTeUENk9J_gYTz9lE2aDWynV1ubCGWhGA=s96-c -type: security -compatibility: - - kubernetes -patternId: 2a42de8b-3c58-4571-b092-2fda29ecfb1a -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - prometheus operator crd cluster roles -patternCaveats: | - prometheus operator crd cluster roles -permalink: catalog/security/prometheus-operator-crd-cluster-roles-2a42de8b-3c58-4571-b092-2fda29ecfb1a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/2a42de8b-3c58-4571-b092-2fda29ecfb1a/0.0.1/design.yml' -downloadLink: 2a42de8b-3c58-4571-b092-2fda29ecfb1a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/3fe52f86-0214-4813-9d23-727f2e57469b.md b/collections/_catalog/security/3fe52f86-0214-4813-9d23-727f2e57469b.md deleted file mode 100644 index 1ca8b43867..0000000000 --- a/collections/_catalog/security/3fe52f86-0214-4813-9d23-727f2e57469b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Serve an LLM using multi-host TPUs on GKE -publishedVersion: 0.0.1 -userId: 62b081a5-1273-4c58-807f-b6be539275d0 -userName: Shubham Pandey -userAvatarURL: -type: security -compatibility: - - kubernetes -patternId: 3fe52f86-0214-4813-9d23-727f2e57469b -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - The%20%22Serve%20an%20LLM%20using%20multi-host%20TPUs%20on%20GKE%22%20design%20in%20Meshmap%20details%20the%20configuration%20and%20deployment%20of%20a%20Language%20Model%20(LLM)%20service%20on%20Google%20Kubernetes%20Engine%20(GKE)%20utilizing%20multi-host%20Tensor%20Processing%20Units%20(TPUs).%20%0A%0AThis%20design%20leverages%20the%20high-performance%20computing%20capabilities%20of%20TPUs%20to%20enhance%20the%20inference%20speed%20and%20efficiency%20of%20the%20language%20model.%20Key%20aspects%20of%20this%20design%20include%20setting%20up%20Kubernetes%20pods%20with%20TPU%20node%20affinity%20to%20ensure%20the%20LLM%20workloads%20are%20scheduled%20on%20nodes%20equipped%20with%20TPUs.%20%0A%0AConfiguration%20includes%20defining%20resource%20limits%20and%20requests%20to%20optimize%20TPU%20utilization%20and%20ensure%20stable%20performance%20under%20varying%20workloads.%20Integration%20with%20Google%20Cloud's%20TPU%20provisioning%20and%20monitoring%20tools%20enables%20automated%20scaling%20and%20efficient%20management%20of%20TPUs%20based%20on%20demand.%20Security%20measures%2C%20such%20as%20role-based%20access%20controls%20and%20encryption%2C%20are%20implemented%20to%20safeguard%20data%20processed%20by%20the%20LLM. -patternCaveats: | - TPUs%20may%20not%20always%20be%20available%20in%20sufficient%20quantities%20or%20sizes%20based%20on%20demand.%20This%20can%20lead%20to%20scalability%20challenges%20or%20delays%20in%20provisioning%20resources%20for%20LLM%20inference%20tasks. -permalink: catalog/security/serve-an-llm-using-multi-host-tpus-on-gke-3fe52f86-0214-4813-9d23-727f2e57469b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/3fe52f86-0214-4813-9d23-727f2e57469b/0.0.1/design.yml' -downloadLink: 3fe52f86-0214-4813-9d23-727f2e57469b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f.md b/collections/_catalog/security/571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f.md deleted file mode 100644 index 9ae24070bb..0000000000 --- a/collections/_catalog/security/571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Browerless Chrome -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: security -compatibility: - - kubernetes -patternId: 571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Chrome%20as%20a%20service%20container.%20Bring%20your%20own%20hardware%20or%20cloud.%0A%0AHomepage%3A%20https%3A%2F%2Fwww.browserless.io%0A%0A%23%23%20Configuration%0A%0ABrowserless%20can%20be%20configured%20via%20environment%20variables%3A%0A%0A%60%60%60yaml%0Aenv%3A%0A%20%20%20%20PREBOOT_CHROME%3A%20%22true%22%0A%60%60%60 -patternCaveats: | - Check%20out%20the%20%5Bofficial%20documentation%5D(https%3A%2F%2Fdocs.browserless.io%2Fdocs%2Fdocker.html)%20for%20the%20available%20options.%0A%0A%23%23%20Values%0A%0A%7C%20Key%20%7C%20Type%20%7C%20Default%20%7C%20Description%20%7C%0A%7C-----%7C------%7C---------%7C-------------%7C%0A%7C%20replicaCount%20%7C%20int%20%7C%20%601%60%20%7C%20Number%20of%20replicas%20(pods)%20to%20launch.%20%7C%0A%7C%20image.repository%20%7C%20string%20%7C%20%60%22browserless%2Fchrome%22%60%20%7C%20Name%20of%20the%20image%20repository%20to%20pull%20the%20container%20image%20from.%20%7C%0A%7C%20image.pullPolicy%20%7C%20string%20%7C%20%60%22IfNotPresent%22%60%20%7C%20%5BImage%20pull%20policy%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fcontainers%2Fimages%2F%23updating-images)%20for%20updating%20already%20existing%20images%20on%20a%20node.%20%7C%0A%7C%20image.tag%20%7C%20string%20%7C%20%60%22%22%60%20%7C%20Image%20tag%20override%20for%20the%20default%20value%20(chart%20appVersion).%20%7C%0A%7C%20imagePullSecrets%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20Reference%20to%20one%20or%20more%20secrets%20to%20be%20used%20when%20%5Bpulling%20images%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Fconfigure-pod-container%2Fpull-image-private-registry%2F%23create-a-pod-that-uses-your-secret)%20(from%20private%20registries).%20%7C%0A%7C%20nameOverride%20%7C%20string%20%7C%20%60%22%22%60%20%7C%20A%20name%20in%20place%20of%20the%20chart%20name%20for%20%60app%3A%60%20labels.%20%7C%0A%7C%20fullnameOverride%20%7C%20string%20%7C%20%60%22%22%60%20%7C%20A%20name%20to%20substitute%20for%20the%20full%20names%20of%20resources.%20%7C%0A%7C%20volumes%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20Additional%20storage%20%5Bvolumes%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fstorage%2Fvolumes%2F).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23volumes-1)%20for%20details.%20%7C%0A%7C%20volumeMounts%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20Additional%20%5Bvolume%20mounts%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Fconfigure-pod-container%2Fconfigure-volume-storage%2F).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23volumes-1)%20for%20details.%20%7C%0A%7C%20envFrom%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20Additional%20environment%20variables%20mounted%20from%20%5Bsecrets%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fconfiguration%2Fsecret%2F%23using-secrets-as-environment-variables)%20or%20%5Bconfig%20maps%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Fconfigure-pod-container%2Fconfigure-pod-configmap%2F%23configure-all-key-value-pairs-in-a-configmap-as-container-environment-variables).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23environment-variables)%20for%20details.%20%7C%0A%7C%20env%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Additional%20environment%20variables%20passed%20directly%20to%20containers.%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23environment-variables)%20for%20details.%20%7C%0A%7C%20serviceAccount.create%20%7C%20bool%20%7C%20%60true%60%20%7C%20Enable%20service%20account%20creation.%20%7C%0A%7C%20serviceAccount.annotations%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Annotations%20to%20be%20added%20to%20the%20service%20account.%20%7C%0A%7C%20serviceAccount.name%20%7C%20string%20%7C%20%60%22%22%60%20%7C%20The%20name%20of%20the%20service%20account%20to%20use.%20If%20not%20set%20and%20create%20is%20true%2C%20a%20name%20is%20generated%20using%20the%20fullname%20template.%20%7C%0A%7C%20podAnnotations%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Annotations%20to%20be%20added%20to%20pods.%20%7C%0A%7C%20podSecurityContext%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Pod%20%5Bsecurity%20context%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Fconfigure-pod-container%2Fsecurity-context%2F%23set-the-security-context-for-a-pod).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23security-context)%20for%20details.%20%7C%0A%7C%20securityContext%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Container%20%5Bsecurity%20context%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Fconfigure-pod-container%2Fsecurity-context%2F%23set-the-security-context-for-a-container).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23security-context-1)%20for%20details.%20%7C%0A%7C%20service.annotations%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20Annotations%20to%20be%20added%20to%20the%20service.%20%7C%0A%7C%20service.type%20%7C%20string%20%7C%20%60%22ClusterIP%22%60%20%7C%20Kubernetes%20%5Bservice%20type%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fservices-networking%2Fservice%2F%23publishing-services-service-types).%20%7C%0A%7C%20service.loadBalancerIP%20%7C%20string%20%7C%20%60nil%60%20%7C%20Only%20applies%20when%20the%20service%20type%20is%20LoadBalancer.%20Load%20balancer%20will%20get%20created%20with%20the%20IP%20specified%20in%20this%20field.%20%7C%0A%7C%20service.loadBalancerSourceRanges%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20If%20specified%20(and%20supported%20by%20the%20cloud%20provider)%2C%20traffic%20through%20the%20load%20balancer%20will%20be%20restricted%20to%20the%20specified%20client%20IPs.%20Valid%20values%20are%20IP%20CIDR%20blocks.%20%7C%0A%7C%20service.port%20%7C%20int%20%7C%20%6080%60%20%7C%20Service%20port.%20%7C%0A%7C%20service.nodePort%20%7C%20int%20%7C%20%60nil%60%20%7C%20Service%20node%20port%20(when%20applicable).%20%7C%0A%7C%20service.externalTrafficPolicy%20%7C%20string%20%7C%20%60nil%60%20%7C%20Route%20external%20traffic%20to%20node-local%20or%20cluster-wide%20endoints.%20Useful%20for%20%5Bpreserving%20the%20client%20source%20IP%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Ftasks%2Faccess-application-cluster%2Fcreate-external-load-balancer%2F%23preserving-the-client-source-ip).%20%7C%0A%7C%20resources%20%7C%20object%20%7C%20No%20requests%20or%20limits.%20%7C%20Container%20resource%20%5Brequests%20and%20limits%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fconfiguration%2Fmanage-resources-containers%2F).%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23resources)%20for%20details.%20%7C%0A%7C%20autoscaling%20%7C%20object%20%7C%20Disabled%20by%20default.%20%7C%20Autoscaling%20configuration%20(see%20%5Bvalues.yaml%5D(values.yaml)%20for%20details).%20%7C%0A%7C%20nodeSelector%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20%5BNode%20selector%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fscheduling-eviction%2Fassign-pod-node%2F%23nodeselector)%20configuration.%20%7C%0A%7C%20tolerations%20%7C%20list%20%7C%20%60%5B%5D%60%20%7C%20%5BTolerations%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fscheduling-eviction%2Ftaint-and-toleration%2F)%20for%20node%20taints.%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23scheduling)%20for%20details.%20%7C%0A%7C%20affinity%20%7C%20object%20%7C%20%60%7B%7D%60%20%7C%20%5BAffinity%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fscheduling-eviction%2Fassign-pod-node%2F%23affinity-and-anti-affinity)%20configuration.%20See%20the%20%5BAPI%20reference%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Freference%2Fkubernetes-api%2Fworkload-resources%2Fpod-v1%2F%23scheduling)%20for%20details.%20%7C -permalink: catalog/security/browerless-chrome-571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f/0.0.1/design.yml' -downloadLink: 571a79c9-01c5-4c4b-b8c6-c3f0b2f2415f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/757c6d13-0bfc-447c-a1c3-847cf0816050.md b/collections/_catalog/security/757c6d13-0bfc-447c-a1c3-847cf0816050.md deleted file mode 100644 index 86fafb8e8e..0000000000 --- a/collections/_catalog/security/757c6d13-0bfc-447c-a1c3-847cf0816050.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Envoy using BoringSSL -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: security -compatibility: - - Kubernetes - - Argo CD -patternId: 757c6d13-0bfc-447c-a1c3-847cf0816050 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/757c6d13-0bfc-447c-a1c3-847cf0816050-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/757c6d13-0bfc-447c-a1c3-847cf0816050-dark.png -patternInfo: | - Envoy uses BoringSSL as the default TLS library. BoringSSL supports setting private key methods for offloading asynchronous private key operations, and Envoy implements a private key provider framework to allow creation of Envoy extensions which handle TLS handshakes private key operations (signing and decryption) using the BoringSSL hooks.\n\nCryptoMB private key provider is an Envoy extension which handles BoringSSL TLS RSA operations using Intel AVX-512 multi-buffer acceleration. When a new handshake happens, BoringSSL invokes the private key provider to request the cryptographic operation, and then the control returns to Envoy. The RSA requests are gathered in a buffer. When the buffer is full or the timer expires, the private key provider invokes Intel AVX-512 processing of the buffer. When processing is done, Envoy is notified that the cryptographic operation is done and that it may continue with the handshakes.\nEnvoy uses BoringSSL as the default TLS library. BoringSSL supports setting private key methods for offloading asynchronous private key operations, and Envoy implements a private key provider framework to allow creation of Envoy extensions which handle TLS handshakes private key operations (signing and decryption) using the BoringSSL hooks.\n\nCryptoMB private key provider is an Envoy extension which handles BoringSSL TLS RSA operations using Intel AVX-512 multi-buffer acceleration. When a new handshake happens, BoringSSL invokes the private key provider to request the cryptographic operation, and then the control returns to Envoy. The RSA requests are gathered in a buffer. When the buffer is full or the timer expires, the private key provider invokes Intel AVX-512 processing of the buffer. When processing is done, Envoy is notified that the cryptographic operation is done and that it may continue with the handshakes.\n\n\n -patternCaveats: | - test -permalink: catalog/security/envoy-using-boringssl-757c6d13-0bfc-447c-a1c3-847cf0816050.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/757c6d13-0bfc-447c-a1c3-847cf0816050/0.0.1/design.yml' -downloadLink: 757c6d13-0bfc-447c-a1c3-847cf0816050/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5.md b/collections/_catalog/security/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5.md deleted file mode 100644 index 0a300023ff..0000000000 --- a/collections/_catalog/security/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Dapr OAuth Authorization to External Service -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: security -compatibility: - - dapr -patternId: 962c49f4-39c0-4ce9-ad79-0adc78ebb4f5 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5-dark.png -patternInfo: | - This%20design%20walks%20you%20through%20the%20steps%20of%20setting%20up%20the%20OAuth%20middleware%20to%20enable%20a%20service%20to%20interact%20with%20external%20services%20requiring%20authentication.%20This%20design%20seperates%20the%20authentication%2Fauthorization%20concerns%20from%20the%20application.%0A%0Acheckout%20this%20https%3A%2F%2Fgithub.com%2Fdapr%2Fsamples%2Ftree%2Fmaster%2Fmiddleware-oauth-microsoftazure%20for%20more%20inoformation%20and%20try%20out%20in%20your%20own%20environment.%0A%0A -patternCaveats: | - Certainly!%20Here's%20how%20you%20would%20replace%20the%20placeholders%20with%20actual%20values%20and%20apply%20the%20configuration%20to%20your%20Kubernetes%20cluster%3A%0A%0A1.%20Replace%20%60%22YOUR_APPLICATION_ID%22%60%2C%20%60%22YOUR_CLIENT_SECRET%22%60%2C%20and%20%60%22YOUR_TENANT_ID%22%60%20with%20your%20actual%20values%20in%20the%20%60msgraphsp%60%20component%20metadata%3A%0A%0A%60%60%60yaml%0A%20%20metadata%3A%0A%20%20%20%20%23%20OAuth2%20ClientID%2C%20for%20Microsoft%20Identity%20Platform%20it%20is%20the%20AAD%20Application%20ID%0A%20%20-%20name%3A%20clientId%0A%20%20%20%20value%3A%20%22your_actual_application_id%22%0A%20%20%20%20%23%20OAuth2%20Client%20Secret%0A%20%20-%20name%3A%20clientSecret%0A%20%20%20%20value%3A%20%22your_actual_client_secret%22%0A%20%20%20%20%23%20Application%20Scope%20for%20Microsoft%20Graph%20API%20(vs.%20User%20Scope)%0A%20%20-%20name%3A%20scopes%0A%20%20%20%20value%3A%20%22https%3A%2F%2Fgraph.microsoft.com%2F.default%22%0A%20%20%20%20%23%20Token%20URL%20for%20Microsoft%20Identity%20Platform%2C%20TenantID%20is%20the%20Tenant%20(also%20sometimes%20called%20Directory)%20ID%20of%20the%20AAD%0A%20%20-%20name%3A%20tokenURL%0A%20%20%20%20value%3A%20%22https%3A%2F%2Flogin.microsoftonline.com%2Fyour_actual_tenant_id%2Foauth2%2Fv2.0%2Ftoken%22%0A%60%60%60%0A%0A2.%20Apply%20the%20modified%20YAML%20configuration%20to%20your%20Kubernetes%20cluster%20using%20%60kubectl%20apply%20-f%20your_file.yaml%60.%0A%0AEnsure%20you've%20replaced%20%60%22your_actual_application_id%22%60%2C%20%60%22your_actual_client_secret%22%60%2C%20and%20%60%22your_actual_tenant_id%22%60%20with%20the%20appropriate%20values%20corresponding%20to%20your%20Microsoft%20Graph%20application%20and%20Azure%20Active%20Directory%20configuration%20before%20applying%20the%20configuration%20to%20your%20cluster. -permalink: catalog/security/dapr-oauth-authorization-to-external-service-962c49f4-39c0-4ce9-ad79-0adc78ebb4f5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/962c49f4-39c0-4ce9-ad79-0adc78ebb4f5/0.0.1/design.yml' -downloadLink: 962c49f4-39c0-4ce9-ad79-0adc78ebb4f5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3.md b/collections/_catalog/security/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3.md deleted file mode 100644 index 4fffc40a30..0000000000 --- a/collections/_catalog/security/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: GlusterFS Service -publishedVersion: 0.0.1 -userId: dbc3408b-886d-423f-9a1d-f02316ce711a -userName: Sashank Thapa -userAvatarURL: https://avatars.githubusercontent.com/u/91571529?v=4 -type: security -compatibility: - - kubernetes -patternId: b991c21e-5147-4aa9-bb8d-fce2b37bb3c3 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3-dark.png -patternInfo: | - GlusterFS%20is%20implemented%20as%20a%20distributed%20storage%20backend%20that%20spans%20multiple%20nodes%2C%20ensuring%20high%20availability%20and%20data%20redundancy.%20This%20design%20typically%20includes%20components%20such%20as%20GlusterFS%20servers%20deployed%20across%20Kubernetes%20nodes%2C%20which%20collectively%20form%20a%20distributed%20storage%20pool%20accessible%20to%20applications%20running%20in%20the%20cluster.%20The%20design%20leverages%20Kubernetes'%20persistent%20volume%20framework%20to%20dynamically%20provision%20and%20manage%20storage%20volumes%20backed%20by%20GlusterFS%2C%20enabling%20applications%20to%20store%20and%20retrieve%20data%20seamlessly.%20 -patternCaveats: | - While%20GlusterFS%20offers%20scalability%2C%20performance%20can%20vary%20depending%20on%20the%20workload%20and%20network%20conditions.%20Latency%20issues%20may%20arise -permalink: catalog/security/glusterfs-service-b991c21e-5147-4aa9-bb8d-fce2b37bb3c3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b991c21e-5147-4aa9-bb8d-fce2b37bb3c3/0.0.1/design.yml' -downloadLink: b991c21e-5147-4aa9-bb8d-fce2b37bb3c3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2.md b/collections/_catalog/security/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2.md deleted file mode 100644 index 02574dbeaf..0000000000 --- a/collections/_catalog/security/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Service Account Token -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: security -compatibility: - - kubernetes -patternId: e2d3f5c8-3ff8-4756-8848-0c9b5797bec2 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2-dark.png -patternInfo: | - Kubernetes%20Service%20Account%20tokens%20used%20by%20Pods.%20It%20emphasizes%20the%20importance%20of%20limiting%20token%20permissions%20to%20minimize%20the%20risk%20of%20unauthorized%20access%20to%20Kubernetes%20API%20resources.%20%0A%0AThis%20design%20advocates%20for%20regular%20rotation%20of%20Service%20Account%20tokens%20to%20mitigate%20potential%20security%20vulnerabilities%2C%20ensuring%20that%20compromised%20tokens%20have%20a%20limited%20lifespan. -patternCaveats: | - Administrators%20must%20carefully%20manage%20Service%20Account%20token%20lifecycles%20to%20avoid%20disruptions%20in%20Pod%20functionality%20caused%20by%20expired%20tokens.%20Additionally%2C%20strict%20adherence%20to%20least%20privilege%20principles%20is%20essential%20when%20assigning%20permissions%20to%20Service%20Accounts%2C%20as%20overly%20permissive%20tokens%20can%20increase%20the%20attack%20surface%20and%20compromise%20cluster%20security. -permalink: catalog/security/pod-service-account-token-e2d3f5c8-3ff8-4756-8848-0c9b5797bec2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/e2d3f5c8-3ff8-4756-8848-0c9b5797bec2/0.0.1/design.yml' -downloadLink: e2d3f5c8-3ff8-4756-8848-0c9b5797bec2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/security/ea75ea93-1f5a-4c85-8efd-0d862599fbed.md b/collections/_catalog/security/ea75ea93-1f5a-4c85-8efd-0d862599fbed.md deleted file mode 100644 index f4fbf67abb..0000000000 --- a/collections/_catalog/security/ea75ea93-1f5a-4c85-8efd-0d862599fbed.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pods Image Pull Policy -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: security -compatibility: - - kubernetes -patternId: ea75ea93-1f5a-4c85-8efd-0d862599fbed -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea75ea93-1f5a-4c85-8efd-0d862599fbed-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ea75ea93-1f5a-4c85-8efd-0d862599fbed-dark.png -patternInfo: | - Configuration%20and%20management%20of%20image%20pull%20policies%20for%20Kubernetes%20pods.%20The%20image%20pull%20policy%20determines%20how%20and%20when%20the%20container%20images%20are%20pulled%20from%20the%20container%20registry%2C%20impacting%20both%20the%20efficiency%20and%20reliability%20of%20application%20deployments.%20Kubernetes%20provides%20three%20image%20pull%20policies%3A%20Always%2C%20IfNotPresent%2C%20and%20Never.%0A%0A1.%20Always%3A%20The%20image%20is%20always%20pulled%20from%20the%20registry%2C%20ensuring%20the%20latest%20version%20is%20used%20but%20potentially%20increasing%20deployment%20times%20and%20registry%20load.%0A2.%20IfNotPresent%3A%20The%20image%20is%20pulled%20only%20if%20it%20is%20not%20already%20present%20on%20the%20node%2C%20optimizing%20for%20faster%20deployments%20when%20the%20image%20hasn't%20changed.%0A3.%20Never%3A%20The%20image%20is%20never%20pulled%20from%20the%20registry%2C%20assuming%20it%20is%20pre-installed%20on%20the%20node%2C%20which%20can%20be%20useful%20in%20air-gapped%20environments.%0A%0AThis%20design%20helps%20Kubernetes%20administrators%20and%20developers%20choose%20the%20appropriate%20image%20pull%20policy%20based%20on%20their%20specific%20needs%20for%20development%2C%20testing%2C%20and%20production%20environments.%0A%0A -patternCaveats: | - Using%20the%20Always%20policy%20can%20lead%20to%20increased%20network%20dependency%20and%20potential%20delays%20in%20deployments%20if%20the%20registry%20is%20slow%20or%20inaccessible. -permalink: catalog/security/pods-image-pull-policy-ea75ea93-1f5a-4c85-8efd-0d862599fbed.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ea75ea93-1f5a-4c85-8efd-0d862599fbed/0.0.1/design.yml' -downloadLink: ea75ea93-1f5a-4c85-8efd-0d862599fbed/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215.md b/collections/_catalog/traffic-management/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215.md deleted file mode 100644 index 3a9629ca7e..0000000000 --- a/collections/_catalog/traffic-management/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Service Internal Traffic Policy -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: traffic-management -compatibility: - - kubernetes -patternId: 58fc14c4-1ba6-41b6-8dd0-ed1dabd87215 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215-dark.png -patternInfo: | - Service%20Internal%20Traffic%20Policy%20enables%20internal%20traffic%20restrictions%20to%20only%20route%20internal%20traffic%20to%20endpoints%20within%20the%20node%20the%20traffic%20originated%20from.%20The%20%22internal%22%20traffic%20here%20refers%20to%20traffic%20originated%20from%20Pods%20in%20the%20current%20cluster.%20This%20can%20help%20to%20reduce%20costs%20and%20improve%20performance.%20%0A%0AHow%20it%20works%20%20%20%3F%3F%0AThe%20kube-proxy%20filters%20the%20endpoints%20it%20routes%20to%20based%20on%20the%20spec.internalTrafficPolicy%20setting.%20When%20it's%20set%20to%20Local%2C%20only%20node%20local%20endpoints%20are%20considered.%20When%20it's%20Cluster%20(the%20default)%2C%20or%20is%20not%20set%2C%20Kubernetes%20considers%20all%20endpoints.%0A -patternCaveats: | - Note%3A%20For%20pods%20on%20nodes%20with%20no%20endpoints%20for%20a%20given%20Service%2C%20the%20Service%20behaves%20as%20if%20it%20has%20zero%20endpoints%20(for%20Pods%20on%20this%20node)%20even%20if%20the%20service%20does%20have%20endpoints%20on%20other%20nodes.%20%20%20%20%20%20%20%20%20%20%0A -permalink: catalog/traffic-management/service-internal-traffic-policy-58fc14c4-1ba6-41b6-8dd0-ed1dabd87215.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/58fc14c4-1ba6-41b6-8dd0-ed1dabd87215/0.0.1/design.yml' -downloadLink: 58fc14c4-1ba6-41b6-8dd0-ed1dabd87215/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/60769e03-f392-4796-9c20-a141c6fa3ab2.md b/collections/_catalog/traffic-management/60769e03-f392-4796-9c20-a141c6fa3ab2.md deleted file mode 100644 index 34a7d4c4c2..0000000000 --- a/collections/_catalog/traffic-management/60769e03-f392-4796-9c20-a141c6fa3ab2.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Install-Traefik-as-ingress-controller -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: traffic-management -compatibility: - - istio-base - - kubernetes -patternId: 60769e03-f392-4796-9c20-a141c6fa3ab2 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/60769e03-f392-4796-9c20-a141c6fa3ab2-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/60769e03-f392-4796-9c20-a141c6fa3ab2-dark.png -patternInfo: | - This%20design%20creates%20a%20ServiceAccount%2C%20DaemonSet%2C%20Service%2C%20ClusterRole%2C%20and%20ClusterRoleBinding%20resources%20for%20Traefik.%20The%20DaemonSet%20ensures%20that%20a%20single%20Traefik%20instance%20is%20deployed%20on%20each%20node%20in%20the%20cluster%2C%20facilitating%20load%20balancing%20and%20routing%20of%20incoming%20traffic.%20The%20Service%20allows%20external%20traffic%20to%20reach%20Traefik%2C%20while%20the%20ClusterRole%20and%20ClusterRoleBinding%20provide%20the%20necessary%20permissions%20for%20Traefik%20to%20interact%20with%20Kubernetes%20resources%20such%20as%20services%2C%20endpoints%2C%20and%20ingresses.%20Overall%2C%20this%20setup%20enables%20Traefik%20to%20efficiently%20manage%20ingress%20traffic%20within%20the%20Kubernetes%20environment%2C%20providing%20features%20like%20routing%2C%20load%20balancing%2C%20and%20SSL%20termination. -patternCaveats: | - -Resource%20Utilization%3A%20Ensure%20monitoring%20and%20scalability%20to%20manage%20resource%20consumption%20across%20nodes%2C%20especially%20in%20large%20clusters.%0A%0A-Security%20Measures%3A%20Implement%20strict%20access%20controls%20and%20firewall%20rules%20to%20protect%20Traefik's%20admin%20port%20(8080)%20from%20unauthorized%20access.%0A%0A-Configuration%20Complexity%3A%20Understand%20Traefik's%20configuration%20intricacies%20for%20routing%20rules%20and%20SSL%20termination%20to%20avoid%20misconfigurations.%0A%0A-Compatibility%20Testing%3A%20Regularly%20test%20Traefik's%20compatibility%20with%20Kubernetes%20and%20other%20cluster%20components%20before%20upgrading%20versions.%0A%0A-High%20Availability%20Setup%3A%20Employ%20strategies%20like%20pod%20anti-affinity%20rules%20to%20ensure%20Traefik's%20availability%20and%20uptime.%0A%0A-Performance%20Optimization%3A%20Conduct%20performance%20tests%20to%20minimize%20latency%20and%20overhead%20introduced%20by%20Traefik%20in%20the%20data%20path. -permalink: catalog/traffic-management/install-traefik-as-ingress-controller-60769e03-f392-4796-9c20-a141c6fa3ab2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/60769e03-f392-4796-9c20-a141c6fa3ab2/0.0.1/design.yml' -downloadLink: 60769e03-f392-4796-9c20-a141c6fa3ab2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a.md b/collections/_catalog/traffic-management/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a.md deleted file mode 100644 index b07981ef8c..0000000000 --- a/collections/_catalog/traffic-management/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Network policy -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: traffic-management -compatibility: - - kubernetes -patternId: 7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a-dark.png -patternInfo: | - If%20you%20want%20to%20control%20traffic%20flow%20at%20the%20IP%20address%20or%20port%20level%20for%20TCP%2C%20UDP%2C%20and%20SCTP%20protocols%2C%20then%20you%20might%20consider%20using%20Kubernetes%20NetworkPolicies%20for%20particular%20applications%20in%20your%20cluster.%20NetworkPolicies%20are%20an%20application-centric%20construct%20which%20allow%20you%20to%20specify%20how%20a%20pod%20is%20allowed%20to%20communicate%20with%20various%20network%20%22entities%22%20(we%20use%20the%20word%20%22entity%22%20here%20to%20avoid%20overloading%20the%20more%20common%20terms%20such%20as%20%22endpoints%22%20and%20%22services%22%2C%20which%20have%20specific%20Kubernetes%20connotations)%20over%20the%20network.%20NetworkPolicies%20apply%20to%20a%20connection%20with%20a%20pod%20on%20one%20or%20both%20ends%2C%20and%20are%20not%20relevant%20to%20other%20connections.%20 -patternCaveats: | - This%20is%20an%20sample%20network%20%20policy%20with%20ingress%2Cegress%20defined%20%2C%20change%20according%20to%20your%20requirements -permalink: catalog/traffic-management/network-policy-7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a/0.0.1/design.yml' -downloadLink: 7b2e40b0-3cc8-4da3-bccd-b66bc6cd206a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/8ba4a8da-9455-4079-a771-388eb5a14a21.md b/collections/_catalog/traffic-management/8ba4a8da-9455-4079-a771-388eb5a14a21.md deleted file mode 100644 index 6d93c63e6b..0000000000 --- a/collections/_catalog/traffic-management/8ba4a8da-9455-4079-a771-388eb5a14a21.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: Load Balanced AWS Architecture -publishedVersion: 0.0.1 -userId: 9a06d488-b34c-43b9-874a-d224b044b4e5 -userName: Kameshwar Nayak -userAvatarURL: https://media.licdn.com/dms/image/C5603AQFRj-WewKjLig/profile-displayphoto-shrink_400_400/0/1598562082319?e=1707955200&v=beta&t=XU1e2RJx-oA5oztko-_w3YiO-atHe59-fI80Fe8dumk -type: traffic-management -compatibility: - - aws-apigatewayv2-controller - - aws-ec2-controller - - aws-load-balancer-controller -patternId: 8ba4a8da-9455-4079-a771-388eb5a14a21 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/8ba4a8da-9455-4079-a771-388eb5a14a21-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/8ba4a8da-9455-4079-a771-388eb5a14a21-dark.png -patternInfo: | - This%20design%20illustrates%20a%20robust%20and%20scalable%20architecture%20for%20deploying%20applications%20on%20Amazon%20Web%20Services%20(AWS)%20with%20load%20balancing%20capabilities.%20This%20design%20leverages%20AWS%20Elastic%20Load%20Balancers%20(ELB)%20to%20distribute%20incoming%20traffic%20across%20multiple%20instances%20of%20your%20application%2C%20ensuring%20high%20availability%20and%20reliability.%20The%20architecture%20typically%20includes%20Auto%20Scaling%20groups%20to%20automatically%20adjust%20the%20number%20of%20running%20instances%20based%20on%20traffic%20demand%2C%20further%20enhancing%20the%20system%E2%80%99s%20ability%20to%20handle%20varying%20loads. -patternCaveats: | - 1.%20AWS%20services%20can%20accumulate%20costs%20quickly%2C%20especially%20with%20high%20traffic%20volumes%20and%20large-scale%20deployments.%20It's%20essential%20to%20monitor%20and%20manage%20usage%20to%20avoid%20unexpected%20expenses.%0A%0A2.%20Network%20latency%20can%20be%20introduced%20by%20load%20balancers%20and%20cross-region%20data%20transfers.%20It's%20important%20to%20design%20your%20architecture%20to%20minimize%20latency%2C%20particularly%20for%20latency-sensitive%20applications. -permalink: catalog/traffic-management/load-balanced-aws-architecture-8ba4a8da-9455-4079-a771-388eb5a14a21.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/8ba4a8da-9455-4079-a771-388eb5a14a21/0.0.1/design.yml' -downloadLink: 8ba4a8da-9455-4079-a771-388eb5a14a21/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/9b677af7-478c-48d4-83a5-9b20d5094007.md b/collections/_catalog/traffic-management/9b677af7-478c-48d4-83a5-9b20d5094007.md deleted file mode 100644 index 86640501f8..0000000000 --- a/collections/_catalog/traffic-management/9b677af7-478c-48d4-83a5-9b20d5094007.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -layout: item -name: istio-ingress-service-web-api-v1-only -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: traffic-management -compatibility: - - istio-base - - istio-operator - - kubernetes -patternId: 9b677af7-478c-48d4-83a5-9b20d5094007 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9b677af7-478c-48d4-83a5-9b20d5094007-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/9b677af7-478c-48d4-83a5-9b20d5094007-dark.png -patternInfo: | - Requests%20with%20the%20URI%20prefix%20kiali%20are%20routed%20to%20the%20kiali.istio-system.svc.cluster.local%20service%20on%20port%2020001.%20Requests%20with%20URI%20prefixes%20like%20%2Fweb-api%2Fv1%2Fgetmultiple%2C%20%2Fweb-api%2Fv1%2Fcreate%2C%20and%20%2Fweb-api%2Fv1%2Fmanage%20are%20routed%20to%20the%20web-api%20service%20with%20the%20subset%20v1.%20Requests%20with%20URI%20prefixes%20openapi%2Fui%2F%20and%20%2Fopenapi%20are%20routed%20to%20the%20web-api%20service%20on%20port%209080.%20Requests%20with%20URI%20prefixes%20like%20%2Floginwithtoken%2C%20%2Flogin%2C%20and%20%2Fcallback%20are%20routed%20to%20different%20services%2C%20including%20web-app%20and%20authentication.%20Requests%20with%20any%20other%20URI%20prefix%20are%20routed%20to%20the%20web-app%20service%20on%20port%2080. -patternCaveats: | - Ensure%20Istio%20control%20plane%20is%20up%20and%20running -permalink: catalog/traffic-management/istio-ingress-service-web-api-v1-only-9b677af7-478c-48d4-83a5-9b20d5094007.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/9b677af7-478c-48d4-83a5-9b20d5094007/0.0.1/design.yml' -downloadLink: 9b677af7-478c-48d4-83a5-9b20d5094007/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/a70386a6-2b09-45dd-9c91-15b7beb0ac87.md b/collections/_catalog/traffic-management/a70386a6-2b09-45dd-9c91-15b7beb0ac87.md deleted file mode 100644 index 859241edf6..0000000000 --- a/collections/_catalog/traffic-management/a70386a6-2b09-45dd-9c91-15b7beb0ac87.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: HAProxy_Ingress_Controller -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: traffic-management -compatibility: - - kubernetes-ingress -patternId: a70386a6-2b09-45dd-9c91-15b7beb0ac87 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - HAProxy%20Ingress%20is%20a%20Kubernetes%20ingress%20controller%3A%20it%20configures%20a%20HAProxy%20instance%20to%20route%20incoming%20requests%20from%20an%20external%20network%20to%20the%20in-cluster%20applications.%20The%20routing%20configurations%20are%20built%20reading%20specs%20from%20the%20Kubernetes%20cluster.%20Updates%20made%20to%20the%20cluster%20are%20applied%20on%20the%20fly%20to%20the%20HAProxy%20instance. -patternCaveats: | - Make%20sure%20that%20paths%20in%20ingress%20are%20configured%20correctly%20and%20for%20more%20Caveats%20And%20Considerations%20checkout%20this%20docs%20https%3A%2F%2Fhaproxy-ingress.github.io%2Fdocs%2F -permalink: catalog/traffic-management/haproxy-ingress-controller-a70386a6-2b09-45dd-9c91-15b7beb0ac87.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/a70386a6-2b09-45dd-9c91-15b7beb0ac87/0.0.1/design.yml' -downloadLink: a70386a6-2b09-45dd-9c91-15b7beb0ac87/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/bb80642c-2179-4817-b0b7-6d0e28151f9a.md b/collections/_catalog/traffic-management/bb80642c-2179-4817-b0b7-6d0e28151f9a.md deleted file mode 100644 index e7c395bd95..0000000000 --- a/collections/_catalog/traffic-management/bb80642c-2179-4817-b0b7-6d0e28151f9a.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: nginx-deployment -publishedVersion: 0.0.1 -userId: 9ce6dc53-ed27-4d1e-b739-656a5c79732b -userName: Gulcan Topcu -userAvatarURL: -type: traffic-management -compatibility: - - kubernetes - - nginx-ingress -patternId: bb80642c-2179-4817-b0b7-6d0e28151f9a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/bb80642c-2179-4817-b0b7-6d0e28151f9a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/bb80642c-2179-4817-b0b7-6d0e28151f9a-dark.png -patternInfo: | - Simple%20application%20deployment%20with%20nginx -patternCaveats: | - No%20caveats -permalink: catalog/traffic-management/nginx-deployment-bb80642c-2179-4817-b0b7-6d0e28151f9a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/bb80642c-2179-4817-b0b7-6d0e28151f9a/0.0.1/design.yml' -downloadLink: bb80642c-2179-4817-b0b7-6d0e28151f9a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/traffic-management/f732b20e-08a0-4db0-9977-90b9009ced09.md b/collections/_catalog/traffic-management/f732b20e-08a0-4db0-9977-90b9009ced09.md deleted file mode 100644 index da7a0bf3c6..0000000000 --- a/collections/_catalog/traffic-management/f732b20e-08a0-4db0-9977-90b9009ced09.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: External-Dns for Kubernetes -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: traffic-management -compatibility: - - kubernetes -patternId: f732b20e-08a0-4db0-9977-90b9009ced09 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f732b20e-08a0-4db0-9977-90b9009ced09-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f732b20e-08a0-4db0-9977-90b9009ced09-dark.png -patternInfo: | - ExternalDNS%20synchronizes%20exposed%20Kubernetes%20Services%20and%20Ingresses%20with%20DNS%20providers.%0A%0AKubernetes'%20cluster-internal%20DNS%20server%2C%20ExternalDNS%20makes%20Kubernetes%20resources%20discoverable%20via%20public%20DNS%20servers.%20Like%20KubeDNS%2C%20it%20retrieves%20a%20list%20of%20resources%20(Services%2C%20Ingresses%2C%20etc.)%20from%20the%20Kubernetes%20API%20to%20determine%20a%20desired%20list%20of%20DNS%20records.%20Unlike%20KubeDNS%2C%20however%2C%20it's%20not%20a%20DNS%20server%20itself%2C%20but%20merely%20configures%20other%20DNS%20providers%20accordingly%E2%80%94e.g.%20AWS%20Route%2053%20or%20Google%20Cloud%20DNS.%0A%0AIn%20a%20broader%20sense%2C%20ExternalDNS%20allows%20you%20to%20control%20DNS%20records%20dynamically%20via%20Kubernetes%20resources%20in%20a%20DNS%20provider-agnostic%20way. -patternCaveats: | - For%20more%20information%20and%20considerations%20checkout%20this%20repo%20https%3A%2F%2Fgithub.com%2Fkubernetes-sigs%2Fexternal-dns%2F%3Ftab%3Dreadme-ov-file -permalink: catalog/traffic-management/external-dns-for-kubernetes-f732b20e-08a0-4db0-9977-90b9009ced09.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f732b20e-08a0-4db0-9977-90b9009ced09/0.0.1/design.yml' -downloadLink: f732b20e-08a0-4db0-9977-90b9009ced09/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/troubleshooting/107f4fc2-0655-4d00-be3d-164947159647.md b/collections/_catalog/troubleshooting/107f4fc2-0655-4d00-be3d-164947159647.md deleted file mode 100644 index 24686ab81c..0000000000 --- a/collections/_catalog/troubleshooting/107f4fc2-0655-4d00-be3d-164947159647.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Hello Kubernetes Tutorial -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: troubleshooting -compatibility: - - dapr - - kubernetes -patternId: 107f4fc2-0655-4d00-be3d-164947159647 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/107f4fc2-0655-4d00-be3d-164947159647-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/107f4fc2-0655-4d00-be3d-164947159647-dark.png -patternInfo: | - This%20tutorial%20will%20get%20you%20up%20and%20running%20with%20Dapr%20in%20a%20Kubernetes%20cluster.%20You%20will%20be%20deploying%20the%20same%20applications%20from%20Hello%20World.%20To%20recap%2C%20the%20Python%20App%20generates%20messages%20and%20the%20Node%20app%20consumes%20and%20persists%20them. -patternCaveats: | - make%20sure%20to%20deploy%20dapr%20helm%20chart%20%20into%20meshery%20playground%20%20before%20deplying%20this%20%20application%20including%20crd's%20%2C%20so%20that%20native%20dapr%20objects%20can%20come%20into%20consideration%20 -permalink: catalog/troubleshooting/hello-kubernetes-tutorial-107f4fc2-0655-4d00-be3d-164947159647.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/107f4fc2-0655-4d00-be3d-164947159647/0.0.1/design.yml' -downloadLink: 107f4fc2-0655-4d00-be3d-164947159647/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/troubleshooting/57fd2528-fa40-4627-9a4a-67144982b9c3.md b/collections/_catalog/troubleshooting/57fd2528-fa40-4627-9a4a-67144982b9c3.md deleted file mode 100644 index aa01da7c8e..0000000000 --- a/collections/_catalog/troubleshooting/57fd2528-fa40-4627-9a4a-67144982b9c3.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Acme Operator -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: troubleshooting -compatibility: - - external-secrets-operator -patternId: 57fd2528-fa40-4627-9a4a-67144982b9c3 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Let%E2%80%99s%20Encrypt%20uses%20the%20ACME%20protocol%20to%20verify%20that%20you%20control%20a%20given%20domain%20name%20and%20to%20issue%20you%20a%20certificate.%20To%20get%20a%20Let%E2%80%99s%20Encrypt%20certificate%2C%20you%E2%80%99ll%20need%20to%20choose%20a%20piece%20of%20ACME%20client%20software%20to%20use. -patternCaveats: | - We%20recommend%20that%20most%20people%20start%20with%20the%20Certbot%20client.%20It%20can%20simply%20get%20a%20cert%20for%20you%20or%20also%20help%20you%20install%2C%20depending%20on%20what%20you%20prefer.%20It%E2%80%99s%20easy%20to%20use%2C%20works%20on%20many%20operating%20systems%2C%20and%20has%20great%20documentation. -permalink: catalog/troubleshooting/acme-operator-57fd2528-fa40-4627-9a4a-67144982b9c3.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/57fd2528-fa40-4627-9a4a-67144982b9c3/0.0.1/design.yml' -downloadLink: 57fd2528-fa40-4627-9a4a-67144982b9c3/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/081aa52c-7921-48dd-b81e-03f4ebfc70b5.md b/collections/_catalog/workloads/081aa52c-7921-48dd-b81e-03f4ebfc70b5.md deleted file mode 100644 index 9cefb35668..0000000000 --- a/collections/_catalog/workloads/081aa52c-7921-48dd-b81e-03f4ebfc70b5.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Minecraft App -publishedVersion: 0.0.1 -userId: aaeb3b36-ac02-450a-bb7e-964ad9d818e4 -userName: Sandra Ashipala -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocJl8EqHgsBfPquM_WaRdveLT8nZKtnpvAkIp3cFJxz8yA=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 081aa52c-7921-48dd-b81e-03f4ebfc70b5 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/081aa52c-7921-48dd-b81e-03f4ebfc70b5-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/081aa52c-7921-48dd-b81e-03f4ebfc70b5-dark.png -patternInfo: | - Deploying%20minecraft%20application -patternCaveats: | - Works%20on%20k8s%201.25V%20only -permalink: catalog/workloads/minecraft-app-081aa52c-7921-48dd-b81e-03f4ebfc70b5.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/081aa52c-7921-48dd-b81e-03f4ebfc70b5/0.0.1/design.yml' -downloadLink: 081aa52c-7921-48dd-b81e-03f4ebfc70b5/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9.md b/collections/_catalog/workloads/0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9.md deleted file mode 100644 index 74f8c412e0..0000000000 --- a/collections/_catalog/workloads/0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Apache Airflow -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Apache%20Airflow%20(or%20simply%20Airflow)%20is%20a%20platform%20to%20programmatically%20author%2C%20schedule%2C%20and%20monitor%20workflows.%0A%0AWhen%20workflows%20are%20defined%20as%20code%2C%20they%20become%20more%20maintainable%2C%20versionable%2C%20testable%2C%20and%20collaborative.%0A%0AUse%20Airflow%20to%20author%20workflows%20as%20directed%20acyclic%20graphs%20(DAGs)%20of%20tasks.%20The%20Airflow%20scheduler%20executes%20your%20tasks%20on%20an%20array%20of%20workers%20while%20following%20the%20specified%20dependencies.%20Rich%20command%20line%20utilities%20make%20performing%20complex%20surgeries%20on%20DAGs%20a%20snap.%20The%20rich%20user%20interface%20makes%20it%20easy%20to%20visualize%20pipelines%20running%20in%20production%2C%20monitor%20progress%2C%20and%20troubleshoot%20issues%20when%20needed.%0A%0AAirflow%20works%20best%20with%20workflows%20that%20are%20mostly%20static%20and%20slowly%20changing.%20When%20the%20DAG%20structure%20is%20similar%20from%20one%20run%20to%20the%20next%2C%20it%20clarifies%20the%20unit%20of%20work%20and%20continuity.%20Other%20similar%20projects%20include%20Luigi%2C%20Oozie%20and%20Azkaban.%0A%0AAirflow%20is%20commonly%20used%20to%20process%20data%2C%20but%20has%20the%20opinion%20that%20tasks%20should%20ideally%20be%20idempotent%20(i.e.%2C%20results%20of%20the%20task%20will%20be%20the%20same%2C%20and%20will%20not%20create%20duplicated%20data%20in%20a%20destination%20system)%2C%20and%20should%20not%20pass%20large%20quantities%20of%20data%20from%20one%20task%20to%20the%20next%20(though%20tasks%20can%20pass%20metadata%20using%20Airflow's%20XCom%20feature).%20For%20high-volume%2C%20data-intensive%20tasks%2C%20a%20best%20practice%20is%20to%20delegate%20to%20external%20services%20specializing%20in%20that%20type%20of%20work.%0A%0AAirflow%20is%20not%20a%20streaming%20solution%2C%20but%20it%20is%20often%20used%20to%20process%20real-time%20data%2C%20pulling%20data%20off%20streams%20in%20batches.%0A%0APrinciples%0ADynamic%3A%20Airflow%20pipelines%20are%20configuration%20as%20code%20(Python)%2C%20allowing%20for%20dynamic%20pipeline%20generation.%20This%20allows%20for%20writing%20code%20that%20instantiates%20pipelines%20dynamically.%0AExtensible%3A%20Easily%20define%20your%20own%20operators%2C%20executors%20and%20extend%20the%20library%20so%20that%20it%20fits%20the%20level%20of%20abstraction%20that%20suits%20your%20environment.%0AElegant%3A%20Airflow%20pipelines%20are%20lean%20and%20explicit.%20Parameterizing%20your%20scripts%20is%20built%20into%20the%20core%20of%20Airflow%20using%20the%20powerful%20Jinja%20templating%20engine.%0AScalable%3A%20Airflow%20has%20a%20modular%20architecture%20and%20uses%20a%20message%20queue%20to%20orchestrate%20an%20arbitrary%20number%20of%20workers. -patternCaveats: | - Make%20sure%20to%20fill%20out%20your%20own%20postgres%20username%20%2Cpassword%2C%20host%2Cport%20etc%20to%20see%20airflow%20working%20as%20per%20your%20database%20requirements.%20pass%20them%20as%20environment%20variables%20or%20create%20secrets%20%20%20for%20password%20and%20config%20map%20for%20ports%20%2Chost%20. -permalink: catalog/workloads/apache-airflow-0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9/0.0.1/design.yml' -downloadLink: 0b6b1ff8-cb2e-41d4-baff-e0a053f7e4d9/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/287dc0fe-6497-4483-b54e-178eb8d65da8.md b/collections/_catalog/workloads/287dc0fe-6497-4483-b54e-178eb8d65da8.md deleted file mode 100644 index 4fc1cc32a8..0000000000 --- a/collections/_catalog/workloads/287dc0fe-6497-4483-b54e-178eb8d65da8.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: Kubernetes cronjob -publishedVersion: 0.0.1 -userId: 090e7114-509a-4046-81f1-9c5fb8daf724 -userName: Lee Calcote -userAvatarURL: https://pbs.twimg.com/profile_images/880205475643441152/V_vhfnzb_400x400.jpg -type: workloads -compatibility: - - KUBERNETES -patternId: 287dc0fe-6497-4483-b54e-178eb8d65da8 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/287dc0fe-6497-4483-b54e-178eb8d65da8-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/287dc0fe-6497-4483-b54e-178eb8d65da8-dark.png -patternInfo: | - This design contains a single Kubernetes Cronjob. -patternCaveats: | - This design is for learning purposes and may be freely copied and distributed. - -permalink: catalog/workloads/kubernetes-cronjob-287dc0fe-6497-4483-b54e-178eb8d65da8.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/287dc0fe-6497-4483-b54e-178eb8d65da8/0.0.1/design.yml' -downloadLink: 287dc0fe-6497-4483-b54e-178eb8d65da8/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/45d7d037-52a2-457b-a670-06526c4f814b.md b/collections/_catalog/workloads/45d7d037-52a2-457b-a670-06526c4f814b.md deleted file mode 100644 index 3484fc87a8..0000000000 --- a/collections/_catalog/workloads/45d7d037-52a2-457b-a670-06526c4f814b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: mongoDB-Sample-app -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 45d7d037-52a2-457b-a670-06526c4f814b -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/45d7d037-52a2-457b-a670-06526c4f814b-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/45d7d037-52a2-457b-a670-06526c4f814b-dark.png -patternInfo: | - This%20design%20%20contains%20a%20very%20simple%20application%20that%20you%20can%20use%20to%20test%20your%20MongoDB%20Deployment.%20This%20application%20requires%20a%20MongoDB%20resource%20deployed%20with%20one%20of%20the%20MongoDB%20Operators.%0A -patternCaveats: | - make%20sure%20to%20use%20mongodb%20operator%20deployed%20with%20this%20sample%20app%20and%20make%20sure%20to%20use%20own%20custom%20secrets%20to%20connect%20mongodb%20 -permalink: catalog/workloads/mongodb-sample-app-45d7d037-52a2-457b-a670-06526c4f814b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/45d7d037-52a2-457b-a670-06526c4f814b/0.0.1/design.yml' -downloadLink: 45d7d037-52a2-457b-a670-06526c4f814b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/57b9de8d-2ab3-4d18-9314-11125e63e551.md b/collections/_catalog/workloads/57b9de8d-2ab3-4d18-9314-11125e63e551.md deleted file mode 100644 index 90840b8dd0..0000000000 --- a/collections/_catalog/workloads/57b9de8d-2ab3-4d18-9314-11125e63e551.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Volumes Projected -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 57b9de8d-2ab3-4d18-9314-11125e63e551 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/57b9de8d-2ab3-4d18-9314-11125e63e551-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/57b9de8d-2ab3-4d18-9314-11125e63e551-dark.png -patternInfo: | - Kubernetes%20involves%20the%20configuration%20of%20projected%20volumes%20within%20pods%2C%20allowing%20them%20to%20access%20multiple%20sources%20of%20data%20simultaneously.%20%0A%0AThis%20design%20enhances%20the%20flexibility%20and%20functionality%20of%20pods%20by%20aggregating%20information%20from%20various%20Kubernetes%20and%20non-Kubernetes%20sources%20into%20a%20unified%20view%20accessible%20within%20the%20pod's%20filesystem. -patternCaveats: | - Projected%20volumes%20may%20include%20sensitive%20information%20such%20as%20secrets%20and%20service%20account%20tokens.%20Care%20must%20be%20taken%20to%20ensure%20that%20only%20authorized%20pods%20have%20access%20to%20these%20volumes%20and%20that%20access%20is%20tightly%20controlled%20to%20prevent%20unauthorized%20access. -permalink: catalog/workloads/pod-volumes-projected-57b9de8d-2ab3-4d18-9314-11125e63e551.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/57b9de8d-2ab3-4d18-9314-11125e63e551/0.0.1/design.yml' -downloadLink: 57b9de8d-2ab3-4d18-9314-11125e63e551/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/57f7230d-015b-4892-9042-cd1ea97fcb30.md b/collections/_catalog/workloads/57f7230d-015b-4892-9042-cd1ea97fcb30.md deleted file mode 100644 index 1420168590..0000000000 --- a/collections/_catalog/workloads/57f7230d-015b-4892-9042-cd1ea97fcb30.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Kubernetes Metrics Server Configuration -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: workloads -compatibility: - - kubernetes -patternId: 57f7230d-015b-4892-9042-cd1ea97fcb30 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/57f7230d-015b-4892-9042-cd1ea97fcb30-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/57f7230d-015b-4892-9042-cd1ea97fcb30-dark.png -patternInfo: | - This design configures the Kubernetes Metrics Server for monitoring cluster-wide resource metrics. It defines a Kubernetes Deployment, Role-Based Access Control (RBAC) rules, and other resources for the Metrics Server's deployment and operation. -patternCaveats: | - This design configures the Kubernetes Metrics Server for resource monitoring. Ensure that RBAC and ServiceAccount configurations are secure to prevent unauthorized access. Adjust Metrics Server settings for specific metrics and monitor resource usage regularly to prevent resource overuse. Implement probes for reliability and maintain correct API service settings. Plan for scalability and choose the appropriate namespace. Set up monitoring for issue detection and establish data backup and recovery plans. Regularly update components for improved security and performance. -permalink: catalog/workloads/kubernetes-metrics-server-configuration-57f7230d-015b-4892-9042-cd1ea97fcb30.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/57f7230d-015b-4892-9042-cd1ea97fcb30/0.0.1/design.yml' -downloadLink: 57f7230d-015b-4892-9042-cd1ea97fcb30/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/623a0154-3c09-4e52-9c87-fa8abeda2fe7.md b/collections/_catalog/workloads/623a0154-3c09-4e52-9c87-fa8abeda2fe7.md deleted file mode 100644 index bac9c8f14a..0000000000 --- a/collections/_catalog/workloads/623a0154-3c09-4e52-9c87-fa8abeda2fe7.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Pod Volume Mount SubPath -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 623a0154-3c09-4e52-9c87-fa8abeda2fe7 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/623a0154-3c09-4e52-9c87-fa8abeda2fe7-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/623a0154-3c09-4e52-9c87-fa8abeda2fe7-dark.png -patternInfo: | - This%20design%20demonstrates%20the%20usage%20of%20Kubernetes'%20subPathExpr%20feature%20to%20mount%20a%20specific%20sub-path%20of%20a%20volume%20into%20a%20container%20within%20a%20pod.%20This%20approach%20allows%20for%20more%20dynamic%20and%20flexible%20volume%20mounts%2C%20enabling%20containers%20to%20access%20different%20parts%20of%20a%20volume%20based%20on%20environment%20variables%20or%20pod%20metadata.%20By%20utilizing%20subPathExpr%2C%20Kubernetes%20administrators%20and%20developers%20can%20configure%20pods%20to%20mount%20unique%20directories%20tailored%20to%20the%20specific%20needs%20of%20each%20container%2C%20without%20needing%20to%20create%20multiple%20volume%20definitions.%20This%20design%20is%20particularly%20useful%20in%20scenarios%20where%20you%20need%20to%20differentiate%20storage%20paths%20for%20various%20instances%20of%20an%20application%20or%20manage%20data%20separation%20within%20shared%20volumes. -patternCaveats: | - No%20caveats -permalink: catalog/workloads/pod-volume-mount-subpath-623a0154-3c09-4e52-9c87-fa8abeda2fe7.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/623a0154-3c09-4e52-9c87-fa8abeda2fe7/0.0.1/design.yml' -downloadLink: 623a0154-3c09-4e52-9c87-fa8abeda2fe7/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/6482df99-27aa-4a51-9aab-92d2a2a9d0ca.md b/collections/_catalog/workloads/6482df99-27aa-4a51-9aab-92d2a2a9d0ca.md deleted file mode 100644 index 96f2e449ef..0000000000 --- a/collections/_catalog/workloads/6482df99-27aa-4a51-9aab-92d2a2a9d0ca.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Node Problem Detector -publishedVersion: 0.0.10 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 6482df99-27aa-4a51-9aab-92d2a2a9d0ca -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6482df99-27aa-4a51-9aab-92d2a2a9d0ca-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6482df99-27aa-4a51-9aab-92d2a2a9d0ca-dark.png -patternInfo: | - node-problem-detector%20aims%20to%20make%20various%20node%20problems%20visible%20to%20the%20upstream%0Alayers%20in%20the%20cluster%20management%20stack.%0AIt%20is%20a%20daemon%20that%20runs%20on%20each%20node%2C%20detects%20node%0Aproblems%20and%20reports%20them%20to%20apiserver.%0A%0Anode-problem-detector%20can%20either%20run%20as%20a%0A%5BDaemonSet%5D(https%3A%2F%2Fkubernetes.io%2Fdocs%2Fconcepts%2Fworkloads%2Fcontrollers%2Fdaemonset%2F)%20or%20run%20standalone.%0ANow%20it%20is%20running%20as%20a%0A%5BKubernetes%20Addon%5D(https%3A%2F%2Fgithub.com%2Fkubernetes%2Fkubernetes%2Ftree%2Fmaster%2Fcluster%2Faddons)%0Aenabled%20by%20default%20in%20the%20GKE%20cluster.%20It%20is%20also%20enabled%20by%20default%20in%20AKS%20as%20part%20of%20the%0A%5BAKS%20Linux%20Extension%5D(https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Faks%2Ffaq%23what-is-the-purpose-of-the-aks-linux-extension-i-see-installed-on-my-linux-vmss-instances).%0A%0A%0AThere%20are%20tons%20of%20node%20problems%20that%20could%20possibly%20affect%20the%20pods%20running%20on%20the%20node%2C%20such%20as%3A%0A%0AInfrastructure%20daemon%20issues%3A%20ntp%20service%20down%3B%0AHardware%20issues%3A%20Bad%20CPU%2C%20memory%20or%20disk%3B%0AKernel%20issues%3A%20Kernel%20deadlock%2C%20corrupted%20file%20system%3B%0AContainer%20runtime%20issues%3A%20Unresponsive%20runtime%20daemon%3B%0A...%0ACurrently%2C%20these%20problems%20are%20invisible%20to%20the%20upstream%20layers%20in%20the%20cluster%20management%20stack%2C%20so%20Kubernetes%20will%20continue%20scheduling%20pods%20to%20the%20bad%20nodes.%0A%0ATo%20solve%20this%20problem%2C%20we%20introduced%20this%20new%20daemon%20node-problem-detector%20to%20collect%20node%20problems%20from%20various%20daemons%20and%20make%20them%20visible%20to%20the%20upstream%20layers.%20Once%20upstream%20layers%20have%20visibility%20to%20those%20problems%2C%20we%20can%20discuss%20the%20remedy%20system.%0A -patternCaveats: | - node-problem-detector%20uses%20Event%20and%20NodeCondition%20to%20report%20problems%20to%20apiserver.%0A%0ANodeCondition%3A%20Permanent%20problem%20that%20makes%20the%20node%20unavailable%20for%20pods%20should%20be%20reported%20as%20NodeCondition.%0AEvent%3A%20Temporary%20problem%20that%20has%20limited%20impact%20on%20pod%20but%20is%20informative%20should%20be%20reported%20as%20Event.%0AFor%20more%20Caveats%20And%20Considerations%20checkout%20this%20https%3A%2F%2Fgithub.com%2Fkubernetes%2Fnode-problem-detector -permalink: catalog/workloads/node-problem-detector-6482df99-27aa-4a51-9aab-92d2a2a9d0ca.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6482df99-27aa-4a51-9aab-92d2a2a9d0ca/0.0.10/design.yml' -downloadLink: 6482df99-27aa-4a51-9aab-92d2a2a9d0ca/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/6a0492fd-73b2-496d-9c5f-278c00d3a5ca.md b/collections/_catalog/workloads/6a0492fd-73b2-496d-9c5f-278c00d3a5ca.md deleted file mode 100644 index 76ca90cf94..0000000000 --- a/collections/_catalog/workloads/6a0492fd-73b2-496d-9c5f-278c00d3a5ca.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: My first k8s app -publishedVersion: 0.0.1 -userId: 777357e1-3bb4-4014-9790-50484c9596d6 -userName: Adarsh Bhaskar Bhaskar -userAvatarURL: -type: workloads -compatibility: - - kubernetes -patternId: 6a0492fd-73b2-496d-9c5f-278c00d3a5ca -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6a0492fd-73b2-496d-9c5f-278c00d3a5ca-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/6a0492fd-73b2-496d-9c5f-278c00d3a5ca-dark.png -patternInfo: | - This%20is%20a%20simple%20kubernetes%20workflow%20application%20that%20has%20deployment%2C%20pods%20and%20service.%20This%20is%20first%20design%20used%20for%20eexploring%20Meshery%20Cloud%20platform -patternCaveats: | - No%20caveats%3B%20Free%20to%20reuse -permalink: catalog/workloads/my-first-k8s-app-6a0492fd-73b2-496d-9c5f-278c00d3a5ca.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/6a0492fd-73b2-496d-9c5f-278c00d3a5ca/0.0.1/design.yml' -downloadLink: 6a0492fd-73b2-496d-9c5f-278c00d3a5ca/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/7182c6f4-fe51-496f-8890-72ce45e36079.md b/collections/_catalog/workloads/7182c6f4-fe51-496f-8890-72ce45e36079.md deleted file mode 100644 index ebef97517b..0000000000 --- a/collections/_catalog/workloads/7182c6f4-fe51-496f-8890-72ce45e36079.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Nodejs-kubernetes-microservices -publishedVersion: 0.0.1 -userId: 9cb4bfce-ad8f-4a8e-8647-bb138fa07e7f -userName: Sudhanshu Dasgupta -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKsiEMwlXt4o4UZEKifgZtLFGZMxetGW979Xj_Dk3G6wAxu_KF8=s360-c-no -type: workloads -compatibility: - - kubernetes -patternId: 7182c6f4-fe51-496f-8890-72ce45e36079 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7182c6f4-fe51-496f-8890-72ce45e36079-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/7182c6f4-fe51-496f-8890-72ce45e36079-dark.png -patternInfo: | - NA -patternCaveats: | - NA -permalink: catalog/workloads/nodejs-kubernetes-microservices-7182c6f4-fe51-496f-8890-72ce45e36079.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/7182c6f4-fe51-496f-8890-72ce45e36079/0.0.1/design.yml' -downloadLink: 7182c6f4-fe51-496f-8890-72ce45e36079/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/736a8f97-c3f8-4481-888a-1eff27414caa.md b/collections/_catalog/workloads/736a8f97-c3f8-4481-888a-1eff27414caa.md deleted file mode 100644 index b1ab92a686..0000000000 --- a/collections/_catalog/workloads/736a8f97-c3f8-4481-888a-1eff27414caa.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: node-feature-discovery -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: 736a8f97-c3f8-4481-888a-1eff27414caa -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/736a8f97-c3f8-4481-888a-1eff27414caa-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/736a8f97-c3f8-4481-888a-1eff27414caa-dark.png -patternInfo: | - Node%20Feature%20Discovery%20(NFD)%20is%20a%20Kubernetes%20add-on%20for%20detecting%20hardware%20features%20and%20system%20configuration.%20Detected%20features%20are%20advertised%20as%20node%20labels.%20NFD%20provides%20flexible%20configuration%20and%20extension%20points%20for%20a%20wide%20range%20of%20vendor%20and%20application%20specific%20node%20labeling%20needs. -patternCaveats: | - Checkout%20this%20docs%20for%20Caveats%20And%20Considerations%20%20https%3A%2F%2Fkubernetes-sigs.github.io%2Fnode-feature-discovery%2Fv0.16%2Fget-started%2Fintroduction.html -permalink: catalog/workloads/node-feature-discovery-736a8f97-c3f8-4481-888a-1eff27414caa.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/736a8f97-c3f8-4481-888a-1eff27414caa/0.0.1/design.yml' -downloadLink: 736a8f97-c3f8-4481-888a-1eff27414caa/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/85d5a84d-85e1-492d-98c7-6a365c00cc1b.md b/collections/_catalog/workloads/85d5a84d-85e1-492d-98c7-6a365c00cc1b.md deleted file mode 100644 index 3c5be3eea2..0000000000 --- a/collections/_catalog/workloads/85d5a84d-85e1-492d-98c7-6a365c00cc1b.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: MySQL Deployment -publishedVersion: 0.0.1 -userId: a550f4d6-d3bd-44f1-9b4c-167114452062 -userName: Pranav Singh -userAvatarURL: https://avatars.githubusercontent.com/u/73700530?v=4 -type: workloads -compatibility: - - kubernetes -patternId: 85d5a84d-85e1-492d-98c7-6a365c00cc1b -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/85d5a84d-85e1-492d-98c7-6a365c00cc1b.png -patternInfo: | - This is a simple SQL deployment that would install a k8s deployment, volume and a service. -patternCaveats: | - No caveats. Ensure the ports are exposed accurately. -permalink: catalog/workloads/mysql-deployment-85d5a84d-85e1-492d-98c7-6a365c00cc1b.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/85d5a84d-85e1-492d-98c7-6a365c00cc1b/0.0.1/design.yml' -downloadLink: 85d5a84d-85e1-492d-98c7-6a365c00cc1b/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/b319f0f5-2abd-4f33-b134-824b5ac3ba2d.md b/collections/_catalog/workloads/b319f0f5-2abd-4f33-b134-824b5ac3ba2d.md deleted file mode 100644 index 8a5d60875b..0000000000 --- a/collections/_catalog/workloads/b319f0f5-2abd-4f33-b134-824b5ac3ba2d.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Persistent Volume -publishedVersion: 0.0.1 -userId: a7b465ad-21eb-4f3f-9c84-56de76aebe62 -userName: Ripul Handoo -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocKBVmrCH-kszcRj5jpdBR53K1-E7YPUd3-kFmRFGGRN=s96-c -type: workloads -compatibility: - - kubernetes -patternId: b319f0f5-2abd-4f33-b134-824b5ac3ba2d -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b319f0f5-2abd-4f33-b134-824b5ac3ba2d-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b319f0f5-2abd-4f33-b134-824b5ac3ba2d-dark.png -patternInfo: | - The%20%22Persistent%20Volume%22%20design%20enables%20Kubernetes%20clusters%20to%20manage%20stateful%20applications%20by%20providing%20a%20reliable%20and%20consistent%20storage%20solution.%20This%20design%20ensures%20that%20data%20remains%20intact%20and%20accessible%20even%20if%20pods%20are%20rescheduled%20or%20fail. -patternCaveats: | - 1.%20Ensure%20that%20the%20selected%20storage%20class%20supports%20your%20desired%20storage%20backend%20and%20meets%20the%20performance%20and%20availability%20requirements%20of%20your%20applications.%0A2.%20Misconfigurations%20can%20lead%20to%20suboptimal%20performance%20or%20even%20data%20loss. -permalink: catalog/workloads/persistent-volume-b319f0f5-2abd-4f33-b134-824b5ac3ba2d.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b319f0f5-2abd-4f33-b134-824b5ac3ba2d/0.0.1/design.yml' -downloadLink: b319f0f5-2abd-4f33-b134-824b5ac3ba2d/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/b7bdd606-40a0-4849-a58e-d89af0d9688a.md b/collections/_catalog/workloads/b7bdd606-40a0-4849-a58e-d89af0d9688a.md deleted file mode 100644 index ce745baff4..0000000000 --- a/collections/_catalog/workloads/b7bdd606-40a0-4849-a58e-d89af0d9688a.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: replication controller -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: b7bdd606-40a0-4849-a58e-d89af0d9688a -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b7bdd606-40a0-4849-a58e-d89af0d9688a-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/b7bdd606-40a0-4849-a58e-d89af0d9688a-dark.png -patternInfo: | - A%20ReplicationController%20ensures%20that%20a%20specified%20number%20of%20pod%20replicas%20are%20running%20at%20any%20one%20time.%20In%20other%20words%2C%20a%20ReplicationController%20makes%20sure%20that%20a%20pod%20or%20a%20homogeneous%20set%20of%20pods%20is%20always%20up%20and%20available.%20%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0AIf%20there%20are%20too%20many%20pods%2C%20the%20ReplicationController%20terminates%20the%20extra%20pods.%20If%20there%20are%20too%20few%2C%20the%20ReplicationController%20starts%20more%20pods.%20Unlike%20manually%20created%20pods%2C%20the%20pods%20maintained%20by%20a%20ReplicationController%20are%20automatically%20replaced%20if%20they%20fail%2C%20are%20deleted%2C%20or%20are%20terminated.%20For%20example%2C%20your%20pods%20are%20re-created%20on%20a%20node%20after%20disruptive%20maintenance%20such%20as%20a%20kernel%20upgrade.%20For%20this%20reason%2C%20you%20should%20use%20a%20ReplicationController%20even%20if%20your%20application%20requires%20only%20a%20single%20pod.%20A%20ReplicationController%20is%20similar%20to%20a%20process%20supervisor%2C%20but%20instead%20of%20supervising%20individual%20processes%20on%20a%20single%20node%2C%20the%20ReplicationController%20supervises%20multiple%20pods%20across%20multiple%20nodes. -patternCaveats: | - This%20example%20ReplicationController%20config%20runs%20three%20copies%20of%20the%20nginx%20web%20server.%20u%20can%20add%20deployments%20%2C%20config%20maps%20%2C%20services%20to%20this%20design%20as%20per%20requirements%20. -permalink: catalog/workloads/replication-controller-b7bdd606-40a0-4849-a58e-d89af0d9688a.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/b7bdd606-40a0-4849-a58e-d89af0d9688a/0.0.1/design.yml' -downloadLink: b7bdd606-40a0-4849-a58e-d89af0d9688a/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/ce4eb460-b6c0-429d-befb-88cf2f1f883f.md b/collections/_catalog/workloads/ce4eb460-b6c0-429d-befb-88cf2f1f883f.md deleted file mode 100644 index bd1d9ce718..0000000000 --- a/collections/_catalog/workloads/ce4eb460-b6c0-429d-befb-88cf2f1f883f.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Consul on kubernetes -publishedVersion: 0.0.1 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: ce4eb460-b6c0-429d-befb-88cf2f1f883f -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ce4eb460-b6c0-429d-befb-88cf2f1f883f-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/ce4eb460-b6c0-429d-befb-88cf2f1f883f-dark.png -patternInfo: | - Consul%20is%20a%20tool%20for%20discovering%2C%20configuring%2C%20and%20managing%20services%20in%20distributed%20systems.%20It%20provides%20features%20like%20service%20discovery%2C%20health%20checking%2C%20key-value%20storage%2C%20and%20distributed%20coordination.%0A%0AIn%20Kubernetes%2C%20Consul%20can%20be%20useful%20in%20several%20ways%3A%0A%0A1.%20Service%20Discovery%3A%20Kubernetes%20already%20has%20built-in%20service%20discovery%20through%20DNS%20and%20environment%20variables.%20However%2C%20Consul%20provides%20more%20advanced%20features%20such%20as%20service%20registration%2C%20DNS-based%20service%20discovery%2C%20and%20health%20checking.%20This%20can%20be%20particularly%20useful%20if%20you%20have%20services%20deployed%20both%20within%20and%20outside%20of%20Kubernetes%2C%20as%20Consul%20can%20provide%20a%20unified%20service%20discovery%20mechanism%20across%20your%20entire%20infrastructure.%0A%0A2.%20Configuration%20Management%3A%20Consul%20includes%20a%20key-value%20store%20that%20can%20be%20used%20to%20store%20configuration%20data.%20This%20can%20be%20used%20to%20configure%20applications%20dynamically%20at%20runtime%2C%20allowing%20for%20more%20flexible%20and%20dynamic%20deployments.%0A%0A3.%20Health%20Checking%20Consul%20can%20perform%20health%20checks%20on%20services%20to%20ensure%20they%20are%20functioning%20correctly.%20If%20a%20service%20fails%20its%20health%20check%2C%20Consul%20can%20automatically%20remove%20it%20from%20the%20pool%20of%20available%20instances%2C%20preventing%20traffic%20from%20being%20routed%20to%20it%20until%20it%20recovers.%0A%0A4.%20Service%20Mesh%3A%20Consul%20can%20also%20be%20used%20as%20a%20service%20mesh%20in%20Kubernetes%2C%20providing%20features%20like%20traffic%20splitting%2C%20encryption%2C%20and%20observability.%20This%20can%20help%20you%20to%20manage%20communication%20between%20services%20within%20your%20Kubernetes%20cluster%20more%20effectively.%0A%0AOverall%2C%20Consul%20can%20complement%20Kubernetes%20by%20providing%20additional%20features%20and%20capabilities%20for%20managing%20services%20in%20distributed%20systems.%20It%20can%20help%20to%20simplify%20and%20streamline%20the%20management%20of%20complex%20microservices%20architectures%2C%20providing%20greater%20visibility%2C%20resilience%2C%20and%20flexibility. -patternCaveats: | - customize%20the%20design%20according%20to%20your%20requirements%20and%20the%20image%20is%20pulled%20from%20docker%20hub -permalink: catalog/workloads/consul-on-kubernetes-ce4eb460-b6c0-429d-befb-88cf2f1f883f.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/ce4eb460-b6c0-429d-befb-88cf2f1f883f/0.0.1/design.yml' -downloadLink: ce4eb460-b6c0-429d-befb-88cf2f1f883f/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/d20a6041-ed06-454a-9d69-739ebaed4651.md b/collections/_catalog/workloads/d20a6041-ed06-454a-9d69-739ebaed4651.md deleted file mode 100644 index 14f65e3d5c..0000000000 --- a/collections/_catalog/workloads/d20a6041-ed06-454a-9d69-739ebaed4651.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: Simple Kubernetes Pod -publishedVersion: 0.0.1 -userId: 61e7ef73-54e5-4c7a-ae12-fe6e3e8da18b -userName: Udit Takkar -userAvatarURL: https://avatars.githubusercontent.com/u/53316345?v=4 -type: workloads -compatibility: - - kubernetes -patternId: d20a6041-ed06-454a-9d69-739ebaed4651 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - Just an example of how to use a Kubernetes Pod. -patternCaveats: | - None -permalink: catalog/workloads/simple-kubernetes-pod-d20a6041-ed06-454a-9d69-739ebaed4651.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/d20a6041-ed06-454a-9d69-739ebaed4651/0.0.1/design.yml' -downloadLink: d20a6041-ed06-454a-9d69-739ebaed4651/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/f176d529-767d-485b-a68d-79db3f6e8dd2.md b/collections/_catalog/workloads/f176d529-767d-485b-a68d-79db3f6e8dd2.md deleted file mode 100644 index df787f08b5..0000000000 --- a/collections/_catalog/workloads/f176d529-767d-485b-a68d-79db3f6e8dd2.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: 'Multi tenancy Virtual Cluster ' -publishedVersion: 0.0.29 -userId: 9222bde1-64c6-4fb2-971a-3402d5ae2fd9 -userName: Deepak Reddy -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocIGbiDtE0q65qVvAUdzHw8Qky81rM0kSAknIqbgysfDCw=s96-c -type: workloads -compatibility: - - kubernetes -patternId: f176d529-767d-485b-a68d-79db3f6e8dd2 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f176d529-767d-485b-a68d-79db3f6e8dd2-light.png,https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/f176d529-767d-485b-a68d-79db3f6e8dd2-dark.png -patternInfo: | - Virtual%20clusters%20are%20fully%20functional%20Kubernetes%20clusters%20nested%20inside%20a%20physical%20host%20cluster%20providing%20better%20isolation%20and%20flexibility%20to%20support%20multi-tenancy.%20Multiple%20teams%20can%20operate%20independently%20within%20the%20same%20physical%20infrastructure%20while%20minimizing%20conflicts%2C%20maximizing%20autonomy%2C%20and%20reducing%20costs.%0A%0AVirtual%20clusters%20run%20inside%20host%20cluster%20namespaces%20but%20function%20as%20separate%20Kubernetes%20clusters%2C%20with%20their%20own%20API%20server%2C%20control%20plane%2C%20syncer%2C%20and%20set%20of%20resources.%20While%20virtual%20clusters%20share%20the%20physical%20resources%20of%20the%20host%20cluster%20(such%20as%20CPU%2C%20memory%2C%20and%20storage)%2C%20they%20manage%20their%20resources%20independently%2C%20allowing%20for%20efficient%20utilization%20and%20scaling.%0A%0AVirtual%20clusters%20interact%20with%20the%20host%20cluster%20for%20resource%20scheduling%20and%20networking%20but%20maintain%20a%20level%20of%20abstraction%20to%20ensure%20operations%20within%20a%20virtual%20cluster%20don't%20directly%20affect%20the%20host%20cluster's%20global%20state.%0A%0A -patternCaveats: | - To%20get%20to%20know%20%20about%20Caveats%20And%20Considerations%20checkout%20this%20docs%20%20https%3A%2F%2Fwww.vcluster.com%2Fdocs%2Fvcluster -permalink: catalog/workloads/multi-tenancy-virtual-cluster-f176d529-767d-485b-a68d-79db3f6e8dd2.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f176d529-767d-485b-a68d-79db3f6e8dd2/0.0.29/design.yml' -downloadLink: f176d529-767d-485b-a68d-79db3f6e8dd2/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/f970dc8a-137e-49cc-a53e-362a924bf726.md b/collections/_catalog/workloads/f970dc8a-137e-49cc-a53e-362a924bf726.md deleted file mode 100644 index 7c079e9155..0000000000 --- a/collections/_catalog/workloads/f970dc8a-137e-49cc-a53e-362a924bf726.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -layout: item -name: aws-k8s-cni.yaml -publishedVersion: 0.0.4 -userId: 7c176f74-d3aa-4e98-af10-24eb219c0e3e -userName: Rahul Rana -userAvatarURL: https://lh3.googleusercontent.com/a/ACg8ocJqDwcL0l-dPTe8Ic7gU-BoXl2uje2bBhZyCQe52y7upfoZCI43=s96-c -type: workloads -compatibility: - - awx-operator - - kubernetes -patternId: f970dc8a-137e-49cc-a53e-362a924bf726 -image: /assets/images/logos/service-mesh-pattern.svg -patternInfo: | - AWS%20CNI%20networking%20integration%20with%20Kubernetes -patternCaveats: | - No%20caveats -permalink: catalog/workloads/aws-k8s-cni-yaml-f970dc8a-137e-49cc-a53e-362a924bf726.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/f970dc8a-137e-49cc-a53e-362a924bf726/0.0.4/design.yml' -downloadLink: f970dc8a-137e-49cc-a53e-362a924bf726/design.yml ---- \ No newline at end of file diff --git a/collections/_catalog/workloads/fde9c2da-e402-4f53-b7cd-02036ac65043.md b/collections/_catalog/workloads/fde9c2da-e402-4f53-b7cd-02036ac65043.md deleted file mode 100644 index afdc13baf1..0000000000 --- a/collections/_catalog/workloads/fde9c2da-e402-4f53-b7cd-02036ac65043.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -layout: item -name: ZooKeeper Cluster -publishedVersion: 0.0.1 -userId: b6467d0a-f11e-4614-9eb2-ab80c4f1c58d -userName: Mohd Uzair Shaikh -userAvatarURL: https://lh3.googleusercontent.com/a/default-user=s96-c -type: workloads -compatibility: - - kubernetes -patternId: fde9c2da-e402-4f53-b7cd-02036ac65043 -image: https://raw.githubusercontent.com/layer5labs/meshery-extensions-packages/master/action-assets/design-assets/fde9c2da-e402-4f53-b7cd-02036ac65043.png -patternInfo: | - %20%20This%20StatefulSet%20will%20create%20three%20Pods%2C%20each%20running%20a%20ZooKeeper%20server%20container.%20The%20Pods%20will%20be%20named%20my-zookeeper-cluster-0%2C%20my-zookeeper-cluster-1%2C%20and%20my-zookeeper-cluster-2.%20The%20volumeMounts%20section%20of%20the%20spec%20tells%20the%20Pods%20to%20mount%20the%20PersistentVolumeClaim%20my-zookeeper-cluster-pvc%20to%20the%20%2Fzookeeper%2Fdata%20directory.%20This%20will%20ensure%20that%20the%20ZooKeeper%20data%20is%20persistent%20and%20stored%20across%20restarts. -patternCaveats: | - 1.%20The%20storage%20for%20a%20given%20Pod%20must%20either%20be%20provisioned%20by%20a%20PersistentVolume%20Provisioner%20based%20on%20the%20requested%20storage%20class%2C%20or%20pre-provisioned%20by%20an%20admin.%0A2.%20Deleting%20and%2For%20scaling%20a%20StatefulSet%20down%20will%20not%20delete%20the%20volumes%20associated%20with%20the%20StatefulSet.%20This%20is%20done%20to%20ensure%20data%20safety%2C%20which%20is%20generally%20more%20valuable%20than%20an%20automatic%20purge%20of%20all%20related%20StatefulSet%20resources.%0A3.%20StatefulSets%20currently%20require%20a%20Headless%20Service%20to%20be%20responsible%20for%20the%20network%20identity%20of%20the%20Pods.%20You%20are%20responsible%20for%20creating%20this%20Service.%0A4.%20StatefulSets%20do%20not%20provide%20any%20guarantees%20on%20the%20termination%20of%20pods%20when%20a%20StatefulSet%20is%20deleted.%20To%20achieve%20ordered%20and%20graceful%20termination%20of%20the%20pods%20in%20the%20StatefulSet%2C%20it%20is%20possible%20to%20scale%20the%20StatefulSet%20down%20to%200%20prior%20to%20deletion.%0A5.%20When%20using%20Rolling%20Updates%20with%20the%20default%20Pod%20Management%20Policy%20(OrderedReady)%2C%20it's%20possible%20to%20get%20into%20a%20broken%20state%20that%20requires%20manual%20intervention%20to%20repair. -permalink: catalog/workloads/zookeeper-cluster-fde9c2da-e402-4f53-b7cd-02036ac65043.html -URL: 'https://raw.githubusercontent.com/meshery/meshery.io/master/catalog/fde9c2da-e402-4f53-b7cd-02036ac65043/0.0.1/design.yml' -downloadLink: fde9c2da-e402-4f53-b7cd-02036ac65043/design.yml ---- \ No newline at end of file