Essential Ansible Basics Before the Interview

Essential Ansible Basics Before the Interview

First, let’s address the leftover issues from Jenkins. Below is the original pipeline code to add a non-image to the cluster as a deployment. pipeline { agent { kubernetes { inheritFrom 'default' namespace 'xiejiajia' serviceAccount 'jenkins-sa' // Use the newly created ServiceAccount } } environment { ACR_SERVER = 'registry.cn-hangzhou.aliyuncs.com' ACR_NAMESPACE = 'nginx-vmware' ACR_REPOSITORY = 'jenkins-test' … Read more

The Correct Approach to TCP/IP Three-Way Handshake and Four-Way Wave

The Correct Approach to TCP/IP Three-Way Handshake and Four-Way Wave

Background: I have been in a long-distance relationship with my girlfriend for over a year. To maintain our relationship, I suggested that we video chat every night. Since we started dating, we have managed to stick to this for over a year. Author: Champin, Original: https://my.oschina.net/u/3708120/blog/1581023 Issue Sometimes during our chats, either my network or … Read more

AIoT Intelligent IoT Platform Technical Architecture Reference

AIoT Intelligent IoT Platform Technical Architecture Reference

The technical architecture of the AIoT intelligent IoT platform can be divided from the terminal devices to the IoT platform into edge gateways, access gateway layer, infrastructure layer, middle platform layer, and application layer. Edge Gateway The edge gateway is deployed at the customer site of the AIoT intelligent IoT platform, mainly responsible for collecting … Read more

Remote Security Operation and Maintenance System Based on Cloud-Edge Collaboration Technology

Remote Security Operation and Maintenance System Based on Cloud-Edge Collaboration Technology

Abstract: In the digital age, the rapid delivery and efficient deployment of software applications are crucial for the success of enterprises. Traditional application deployment methods are often complex and time-consuming, leading to operational difficulties and resource waste. Enterprises face the constant change of software functional requirements and need to quickly respond to product changes and … Read more

Cloud Task Scheduling System for RISC-V Heterogeneous Clusters Based on Kubernetes

Cloud Task Scheduling System for RISC-V Heterogeneous Clusters Based on Kubernetes

Article Title: Cloud Task Scheduling System for RISC-V Heterogeneous Clusters Based on Kubernetes All Authors: Jiang Xiaobin, Xiong Yixiang, Zhang Heng, Hou Pengpeng, Wu Yanjun, Zhao Chen First Affiliation: Institute of Software, Chinese Academy of Sciences Publication Time: 2022, 31(9): 3–14 Abstract Summary With the widespread application and attention in the field of cloud computing, … Read more

Linux Application and Core Technology Training Course

Linux Application and Core Technology Training Course

Training Background In recent years, the Linux operating system has become the main alternative to the Windows platform, and its rapid development has attracted widespread attention. Major IT companies around the world, such as IBM, ORACLE, and CA, have launched products based on the Linux environment, hoping to break Microsoft’s monopoly and gain more development … Read more

Real-Time Scheduling Example Using OptaPlanner

Real-Time Scheduling Example Using OptaPlanner

Geoffrey De Smet, the founder of OptaPlanner, and his team demonstrated a real-time planning and scheduling example using OptaPlanner at the 2019 Red Hat Summit keynote. Geoffrey and his team dedicated three blog posts to describe this program. This program and its related blog posts are considered classic works of OptaPlanner in the field of … Read more

The Evolution of Container Technology

The Evolution of Container Technology

Click to follow InfoQ, pinned public account Receive the 8 AM technical breakfast for programmers Author|Daniel J Walsh Translator|Jin Lingjie In recent years, container technology has become a hot topic not only among developers but also among many enterprises. This growing interest in containers has led to an increasing demand for enhanced security and hardening, … Read more

Introduction to Istio Traffic Management

Introduction to Istio Traffic Management

1. Istio Traffic Management Istio is an open-source service mesh that provides a network layer abstraction for distributed microservices architectures. It makes communication between services more reliable and secure, and offers fine-grained traffic management, monitoring, and policy enforcement capabilities. Istio achieves this by inserting a transparent proxy (Envoy) between services to intercept all network communication, … Read more

Chaos Engineering Practice: Fault Injection with SMI and Linkerd

Chaos Engineering Practice: Fault Injection with SMI and Linkerd

Author丨Alex Leong Translator丨Liu Yameng Application fault injection is a form of chaos engineering that artificially increases the error rate of certain services in microservices applications to observe its impact on the entire system. Traditionally, some type of fault injection library needs to be added to the service code to perform fault injection on the application. … Read more