A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/distributed-cloud/edge/latest/docs/how-it-works below:

How Distributed Cloud connected works

This page describes how Google Distributed Cloud connected works, including information about its infrastructure, hardware, storage, and networking capabilities.

Google Distributed Cloud connected consists of the following components:

Distributed Cloud connected infrastructure

Google or a Google-certified SI provides, deploys, operates, and maintains the dedicated hardware that runs your Distributed Cloud connected zone. The Distributed Cloud connected nodes that execute your workloads run exclusively on this hardware.

The hardware machines are instantiated as Distributed Cloud connected nodes and grouped into node pools, which you can assign to clusters within your Distributed Cloud connected zone. You can configure your network so that workloads running on Distributed Cloud connected clusters are available only to your local users or accessible from the internet. You can also configure your network to allow only Distributed Cloud connected nodes to use local resources or to communicate with workloads, such as Compute Engine virtual machine (VM) instances and Kubernetes Pods running in a Virtual Private Cloud (VPC) network over a secure Cloud VPN network connection to a VPC network on Google Cloud.

Distributed Cloud connected management

Distributed Cloud connected nodes are not standalone resources and must remain connected to Google Cloud for control plane management and monitoring purposes. The control plane nodes run locally on your Distributed Cloud connected hardware and your workloads continue to run if your Distributed Cloud connected deployment is disconnected from Google Cloud. Workloads continue to run while disconnected from Google Cloud for up to seven days.

Google remotely manages the physical machines and ToR switches that constitute your connected Distributed Cloud deployment. This includes installing software updates and security patches and resolving configuration issues. Your network administrator can also monitor the health and performance of Distributed Cloud connected clusters and nodes and work with Google to resolve any issues.

After Google has successfully deployed the Distributed Cloud connected hardware in your designated location, your cluster administrator can begin configuring the Distributed Cloud connected cluster in a way that's similar to a conventional Kubernetes cluster. They can assign machines to node pools, and node pools to clusters, and grant application owners access as required by their roles. The cluster administrator must, however, keep in mind the processing and storage limitations of the machines in your Distributed Cloud connected rack and plan cluster and workload configuration accordingly.

Distributed Cloud connected provides an API for configuring clusters and node pools.

Access to the Distributed Cloud connected zone

You can configure your network to allow the desired level of access to your Distributed Cloud connected zone, both from your local network and the internet.

You can also grant your Distributed Cloud connected zone access to Google Cloud services by connecting it to your VPC network. Distributed Cloud connected uses Cloud VPN to connect to Google service endpoints. Your network administrator must configure your network to allow this.

Distributed Cloud connected personas

The following personas are involved in the deployment and operation of your Distributed Cloud connected zone:

Distributed Cloud connected form factors

Distributed Cloud connected is available in one of the following form factors:

By default, you can only order Distributed Cloud connected servers in a three-machine configuration. If your business requirements call for single-machine deployments of Distributed Cloud connected servers, contact your Google field sales representative for more information.

Distributed Cloud connected rack hardware

Preview

This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of the Service Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see the launch stage descriptions.

Figure 1 depicts a typical six-machine Distributed Cloud connected base rack configuration with two out of the four machine block slots populated. The empty slots are not shown.

Figure 1. Distributed Cloud connected base rack components.

Figure 2 depicts a typical six-machine Distributed Cloud connected expansion rack configuration with two out of the four machine block slots populated. The empty slots are not shown.

Figure 2. Distributed Cloud connected expansion rack components.

The components of a Distributed Cloud connected rack installation are as follows:

Distributed Cloud connected rack machine slots

A Distributed Cloud connected rack has four slots available for user workloads, each holding a three-machine block, allowing for a maximum capacity of twelve machines. For a rack to be operational, it must contain at least one block composed of compute machines. Additionally, distinct from these four user-configurable slots, a fifth slot is reserved for Google's use.

You must select and order all of the Distributed Cloud connected hardware for each Distributed Cloud connected zone at the same time. You cannot add or remove hardware from a zone after that hardware has been deployed. This includes adding or removing machine blocks and adding or removing expansion racks.

As of this release of Distributed Cloud connected, the only machine type available is the network-optimized compute machine.

Distributed Cloud connected server hardware

Figure 3 depicts a typical Distributed Cloud connected server configuration.

Figure 3. Distributed Cloud connected server components.

The components of a Distributed Cloud connected server installation are as follows:

Distributed Cloud service

The Distributed Cloud connected service runs directly on the Distributed Cloud hardware. It serves as a control plane for the nodes and clusters on your Distributed Cloud connected hardware. This control plane instantiates and configures your Distributed Cloud connected zone. The specific Google Cloud data center to which your Distributed Cloud hardware connects for management is chosen according to its proximity to your Distributed Cloud connected installation.

A Distributed Cloud connected zone consists of the machines installed in your Distributed Cloud connected racks or of the Distributed Cloud connected server machines deployed on your premises. With Distributed Cloud connected rack, you can assign these machines, instantiated as Kubernetes nodes, to a node pool, and the node pool to a Distributed Cloud cluster. With Distributed Cloud connected servers, node pools are populated automatically and not configurable.

Your workloads continue to run even if Distributed Cloud cannot connect to Google Cloud for up to 7 days. After this period, Distributed Cloud must communicate with Google Cloud to refresh authentication tokens, storage encryption keys, and synchronize hardware management and audit logging data.

Figure 4 depicts the logical organization of Distributed Cloud connected entities.

Figure 4. Distributed Cloud connected entities.

The entities are as follows:

Distributed Cloud connected Google Cloud projects

Distributed Cloud connected lets you create multiple clusters within a single Distributed Cloud connected zone. While the zone itself is associated with one specific Google Cloud project, individual clusters operating within that zone can be attached to different Google Cloud projects that are independent of the zone's project affiliation. This architecture lets you share the physical zone infrastructure across various teams or applications that might operate under separate project structures for billing or management purposes.

Storage

Distributed Cloud connected provides usable storage on each physical machine. This storage is configured as Linux logical volumes. When you create a cluster, Distributed Cloud creates one or more Kubernetes PersistentVolumes and exposes them as block volumes that you can assign to a workload by using PersistentVolumeClaims. Keep in mind that these PersistentVolumes don't provide data durability and are only suitable for ephemeral data. For information about working with block volumes, see PersistentVolumeClaim requesting a Raw Block Volume.

Storage security

Distributed Cloud connected uses Linux Unified Key Setup (LUKS) to encrypt local machine storage and supports customer-managed encryption keys (CMEK) with Cloud KMS. For more information, see Security best practices.

Symcloud Storage integration

On select Distributed Cloud connected configurations, you can configure Distributed Cloud to use Rakuten Symcloud Storage, which acts as a local storage abstraction layer on each Distributed Cloud connected node and makes its local storage available to workloads running on other nodes. For more information, see Configure Distributed Cloud connected for Symcloud Storage.

Networking

This section describes the network connectivity requirements and features of Distributed Cloud connected.

Google pre-configures some of the virtual networking components for your installation before shipping the Distributed Cloud connected hardware to you. You cannot modify the pre-configured settings after the hardware is delivered.

Figure 5 depicts the topology of virtual network in a Distributed Cloud connected deployment.

Figure 5. Distributed Cloud networking components.

The components of the virtual network in a Distributed Cloud connected deployment are as follows:

Distributed Cloud connected networking components share similarities with their Google Cloud equivalents with the following differences:

Your network administrator configures Distributed Cloud connected networking components, except interconnects, which Google configures before shipping the Distributed Cloud connected hardware to you.

Your network administrator must have the Edge Network Admin role (roles/edgenetwork.admin) on the target Google Cloud project, while application developers that deploy workloads on Distributed Cloud connected must have the Edge Network Viewer role (roles/edgenetwork.viewer) on the target Google Cloud project.

Connectivity to your local network

For outbound traffic to resources on your local network, Pods in a Distributed Cloud connected cluster use the default routes advertised by your peering edge routers. Distributed Cloud connected uses its built-in NAT to connect Pods to those resources.

For inbound traffic from resources on your local network, your network administrator must configure routing policies that match your business requirements to control access to Pods in each of your Distributed Cloud connected clusters. This means, at a minimum, completing the steps in Firewall configuration and configuring additional policies as required by your workloads. For example, you can set up 'allow' or 'deny' policies for individual node subnetworks or virtual IP addresses exposed by the built-in load balancer in Distributed Cloud connected. The Distributed Cloud connected Pod and Distributed Cloud connected Service CIDR blocks are not directly accessible.

Connectivity to the internet

For outbound traffic to resources on the internet, Pods in a Distributed Cloud connected cluster use the default route advertised by your routers to the Distributed Cloud connected ToR switches. This means, at a minimum, completing the steps in Firewall configuration and configuring additional policies as required by your workloads. Distributed Cloud connected uses its built-in NAT to connect Pods to those resources. You can optionally configure your own layer of NAT on top of the built-in layer in Distributed Cloud connected.

For inbound traffic, you must configure your WAN routers according to your business requirements. These requirements dictate the level of access that you need to provide from the public internet to the Pods in your Distributed Cloud connected clusters. Distributed Cloud connected uses its built-in NAT for Pod CIDR blocks and Service management CIDR blocks, so those CIDR blocks are not accessible from the internet.

Connectivity to a VPC network

Distributed Cloud connected includes a built-in VPN solution that lets you connect a Distributed Cloud connected cluster directly to a VPC network in Google Cloud if that network is in the same Google Cloud project as the Distributed Cloud connected cluster.

If you use Cloud Interconnect to connect your local network to a VPC network, your Distributed Cloud connected clusters can reach that VPC network by using the standard northbound eBGP peering. Your peering edge routers must be able to reach the appropriate VPC prefixes, and your Cloud Interconnect routers must correctly announce your Distributed Cloud connected prefixes, such as Distributed Cloud connected load balancer, management, and system subnetworks.

After you establish a VPN connection between your Distributed Cloud connected cluster and your VPC network, the following connectivity rules apply by default:

The functionality described in this section is not available on Distributed Cloud connected servers.

Connectivity to Google Cloud APIs and services

After you configure a VPN connection to your VPC network, workloads running on your Distributed Cloud connected installation can access Google Cloud APIs and services.

You can additionally configure the following features if your business requirements call for them:

VPN connectivity is not available on Distributed Cloud connected servers.

Network security

Your business requirements and your organization's network security policy dictate the steps necessary to secure network traffic that flows in and out of your Distributed Cloud connected installation. For more information, see Security best practices.

Other networking features

Distributed Cloud connected supports the following networking features:

High-performance networking support

Distributed Cloud connected racks support the execution of workloads that require the best possible networking performance. To this end, Distributed Cloud connected ships with a specialized Network Function operator and a set of Kubernetes Custom Resource Definitions (CRDs) that implement the features required for high-performance workload execution.

Distributed Cloud connected racks also support virtualizing network interfaces by using SR-IOV.

The features described in this section are not available on Distributed Cloud connected servers.

Virtual machine workload support

On select hardware configurations, Distributed Cloud connected can run workloads in virtual machines in addition to containers. For more information, see Manage virtual machines.

To learn about how virtual machines serve as an essential component of the Google Distributed Cloud connected platform, see Extending GKE Enterprise to manage on-premises edge VMs.

GPU workload support

On select hardware configurations, Distributed Cloud connected can run GPU-based workloads on NVIDIA L4 and Tesla T4 GPUs. You must specify this requirement when ordering your Distributed Cloud connected hardware. For more information, see Manage GPU workloads.

What's next

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4