PinnedTony’s Recommended ArticlesCloud Native, DevOps, Linux, K8s, ProgrammingJan 29, 20232Jan 29, 20232
Python Tips — Efficient Methods for Sending 100k RequestsImagine you have a file containing 100,000 URLs, and your goal is to send an HTTP request to each one, then print the status codes from…Nov 27Nov 27
Linux — Tools to Analyze Network PerformanceIn my last article I introduced tools such as ping , ip , ss and sar to measure network performance. Using these tools/commands, you can…Nov 20Nov 20
Linux — How to Measure Network PerformanceWe all know that the Linux network stack is based on the TCP/IP model. The TCP/IP model consists of five layers:Nov 14Nov 14
In-depth Understanding of SSL and Its Working PrincipleSSL stands for Secure Sockets Layer, a security protocol. SSL and its successor, Transport Layer Security (TLS), are security protocols…Nov 41Nov 41
Linux — How to Troubleshoot High Disk I/OIn this article, let’s do some war gaming and have fun with a high disk I/O troubleshooting use case.Oct 28Oct 28
Linux Basics — Disk I/O PerformanceWe know that the Linux storage system I/O stack consists of the file system layer, the general block layer, and the device layer.Oct 25Oct 25
SRE — How to Manage Multi-Environment Configuration in Continuous DeliveryPreviously, we discussed code configuration and application configuration in software. The biggest difference between the two lies in…Oct 221Oct 221
K8s CKA Certificate 9 — Persistent StorageIn applications, there are two main scenarios for handling data storage:Oct 17Oct 17