In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Author | Sun Jianbo, Wang Menghai
The first KubeCon 2020 online Summit was held ceremoniously.
The "Cloud Native + Open Source Virtual Summit China 2020 China online Summit" (hereinafter referred to as KubeCon 2020), jointly sponsored by CNCF and global open source volunteers, was solemnly held from July 30 to August 1, 2020. At the same time, many cloud native technology celebrities, such as CNCF TOC, etcd project author and senior technical expert of Aliyun container platform, Yi Li, head of Aliyun container service, and many cloud native technology celebrities such as Ambassador CNCF, Kubernetes project maintainer and Aliyun senior technical expert Zhang Lei, will share their technologies online.
CNCF webinar playback
Zhang Lei, a senior technical expert from Alibaba, shared various practices and principles behind building an application management platform based on Kubernetes.
Important upstream progress Implement PodSecurityPolicy enforcement for seccomp GA
Seccomp to GA realizes the logic of mandatory inspection of pod security policy in annotation.
Kubernetes The Hard Way is recommended for open source projects
This open source project is a series of tutorials that teach you how to deploy a K8s cluster step by step, different from automated scripts, each component of this tutorial will be deployed in detail. The purpose is to let you fully understand the various components of K8s through this tutorial, which is helpful for in-depth study of K8s.
Kustomize-controller
A server-side kustomize controller can work with gitops to continuously render template parameters and patch work.
Read the recommended "Kubernetes-Pod Security Policies:A fully fleshed out example with exception management" this week
This paper introduces the configuration of Kubernetes Pod security policy in detail, describes how to configure a highly secure pod security policy, and introduces how to configure policy whitelist for some requirements, such as logging, monitoring and so on.
"Aliyun Senior Technical expert: integrated Cloud and Network for 5G and Cloud Native Application practice"
In recent years, the edge computing industry as a whole has developed rapidly. This paper shares the practice of 5G-oriented cloud network integration and cloud native application.
"How to dump oomkilled process on Kubernetes"
This paper introduces how to kill the process state of dump because of memory overrun in K8s.
"I made a Kubernetes game where you explore your cluster and destroy pods"
Foreign K8s developers have developed a Mini Game that can find clusters and kill pod, which is a very interesting exploration.
"Alibaba Cloud Native focus on micro services, Serverless, containers, Service Mesh and other technology areas, focus on cloud native popular technology trends, cloud native large-scale landing practice, to be the official account of cloud native developers."
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.