PinnedTony’s Recommended ArticlesCloud Native, DevOps, Linux, K8s, ProgrammingJan 29, 20232Jan 29, 20232
In-depth Understanding of SSL and Its Working PrincipleSSL stands for Secure Sockets Layer, a security protocol. SSL and its successor, Transport Layer Security (TLS), are security protocols…Nov 41Nov 41
Linux — How to Troubleshoot High Disk I/OIn this article, let’s do some war gaming and have fun with a high disk I/O troubleshooting use case.Oct 28Oct 28
Linux Basics — Disk I/O PerformanceWe know that the Linux storage system I/O stack consists of the file system layer, the general block layer, and the device layer.Oct 25Oct 25
SRE — How to Manage Multi-Environment Configuration in Continuous DeliveryPreviously, we discussed code configuration and application configuration in software. The biggest difference between the two lies in…Oct 221Oct 221
K8s CKA Certificate 9 — Persistent StorageIn applications, there are two main scenarios for handling data storage:Oct 17Oct 17
Seven Deprecated Python libraries That You Should Stop UsingWith each new Python release, new modules are added, and new, better ways of doing things are introduced. Although we’re accustomed to…Oct 15Oct 15
SRE — How to Evaluate Network Performance?Before we can even talk about evaluating network performance, we have to collect the metrics used to measure your system network…Oct 14Oct 14
SRE — Key Points of Implementing Continuous Delivery?Previously we introduced some very basic aspects of operations management. If we want these fundamental operations to generate greater…Oct 131Oct 131