Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Edge Computing Systems with Kubernetes

You're reading from   Edge Computing Systems with Kubernetes A use case guide for building edge systems using K3s, k3OS, and open source cloud native technologies

Arrow left icon
Product type Paperback
Published in Oct 2022
Publisher Packt
ISBN-13 9781800568594
Length 458 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Sergio Mendez Sergio Mendez
Author Profile Icon Sergio Mendez
Sergio Mendez
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Part 1: Edge Computing Basics
2. Chapter 1: Edge Computing with Kubernetes FREE CHAPTER 3. Chapter 2: K3s Installation and Configuration 4. Chapter 3: K3s Advanced Configurations and Management 5. Chapter 4: k3OS Installation and Configurations 6. Chapter 5: K3s Homelab for Edge Computing Experiments 7. Part 2: Cloud Native Applications at the Edge
8. Chapter 6: Exposing Your Applications Using Ingress Controllers and Certificates 9. Chapter 7: GitOps with Flux for Edge Applications 10. Chapter 8: Observability and Traffic Splitting Using Linkerd 11. Chapter 9: Edge Serverless and Event-Driven Architectures with Knative and Cloud Events 12. Chapter 10: SQL and NoSQL Databases at the Edge 13. Part 3: Edge Computing Use Cases in Practice
14. Chapter 11: Monitoring the Edge with Prometheus and Grafana 15. Chapter 12: Communicating with Edge Devices across Long Distances Using LoRa 16. Chapter 13: Geolocalization Applications Using GPS, NoSQL, and K3s Clusters 17. Chapter 14: Computer Vision with Python and K3s Clusters 18. Chapter 15: Designing Your Own Edge Computing System 19. Index 20. Other Books You May Enjoy

Summary

In this chapter, we learned how to use different ingress controllers, such as NGINX, Traefik, and Contour. These ingress controllers are the most used ones, starting with NGINX, then Traefik, and finally Contour, which is based on Envoy. This chapter showed you how to use NGINX, Traefik, and Contour to solve common daily tasks in real production environments. The examples covered the use of TLS, routes, and some basic limit rates to access your applications. This chapter covered the last topic necessary to start with practical applications of all these technologies in the next chapter.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime