PinnedTony’s Recommended ArticlesCloud Native, DevOps, Linux, K8s, ProgrammingJan 29, 20232Jan 29, 20232
Python Tips — Efficient Methods for Sending 100k RequestsImagine you have a file containing 100,000 URLs, and your goal is to send an HTTP request to each one, then print the status codes from…Nov 27, 2024Nov 27, 2024
Linux — Tools to Analyze Network PerformanceIn my last article I introduced tools such as ping , ip , ss and sar to measure network performance. Using these tools/commands, you can…Nov 20, 2024Nov 20, 2024
Linux — How to Measure Network PerformanceWe all know that the Linux network stack is based on the TCP/IP model. The TCP/IP model consists of five layers:Nov 14, 2024Nov 14, 2024
In-depth Understanding of SSL and Its Working PrincipleSSL stands for Secure Sockets Layer, a security protocol. SSL and its successor, Transport Layer Security (TLS), are security protocols…Nov 4, 20241Nov 4, 20241
Linux — How to Troubleshoot High Disk I/OIn this article, let’s do some war gaming and have fun with a high disk I/O troubleshooting use case.Oct 28, 2024Oct 28, 2024
Linux Basics — Disk I/O PerformanceWe know that the Linux storage system I/O stack consists of the file system layer, the general block layer, and the device layer.Oct 25, 2024Oct 25, 2024
SRE — How to Manage Multi-Environment Configuration in Continuous DeliveryPreviously, we discussed code configuration and application configuration in software. The biggest difference between the two lies in…Oct 22, 20242Oct 22, 20242
K8s CKA Certificate 9 — Persistent StorageIn applications, there are two main scenarios for handling data storage:Oct 17, 2024Oct 17, 2024