当前位置:网站首页>Cloud native enthusiast weekly: cool collection of grafana monitoring panels
Cloud native enthusiast weekly: cool collection of grafana monitoring panels
2022-06-30 00:07:00 【Kubesphere cloud native】
Open source project recommendation
grafana-dashboards-kubernetes
This project provides a series of cool for monitoring Kubernetes Of Grafana Monitor dashboard , Inspiration comes from kubernetes-mixin and grafana.com.

Stash
Stash It is a cloud native backup disaster recovery tool , It will be to Operator The form of deployment to Kubernetes In the cluster , And use restic perhaps CSI drive VolumeSnapshotter To perform backup and recovery operations .
Spin
Spin It's an open source framework , Used to quickly build and run Webassembly application .

postgres-operator
postgres-operator yes Crunchy Data Open source PostgreSQL Operator, Used in Kubernetes Deployment in China PostgreSQL colony .
Viddy
Viddy yes watch The modernization of orders , Many new features are supported , For example, check the past status 、 Pause and restart 、 Custom highlight colors, etc .

Dolt
Dolt It's a SQL database , In addition to supporting regular SQL sentence , It also supports a variety of git operation , such as fork、clone、merge、push and pull. There is also a DoltHub To share Dolt database , Be similar to DockerHub.

VirtualBuddy
VirtualBuddy Used in Apple Silicon Chip macOS Created in macOS virtual machine , It is convenient for developers to test applications in various versions locally macOS Medium compatibility .

mammoth.js
This project will be able to Microsoft Word、Google Docs as well as LibreOffice Created .docx Document conversion to html file .
Linux Surface
This project can be implemented in Microsoft Surface Installed on the tablet device Linux operating system . The following models are supported :

Article recommendation
be based on KubeSphere Hierarchical management practice
stay KubeSphere in , Resources can be shared among tenants , According to the different roles assigned , Various resources can be operated . Between tenant and resource 、 There is a high degree of freedom between resources , Permission granularity is also relatively large . In our system , Resources have permission levels , For example, low-level users can invite 、 Give permission and other operations to operate high-level resources , Or like in a low-level project Pod It can be dispatched to high-level nodes , For such problems as cross level operation of resources , We are KubeSphere Based on this, the hierarchical management is realized .
Kubernetes Several schemes of traffic exposure in cluster
Use... In business Kubernetes When editing management , Access to the north-south traffic of the service , stay Kuberentes There are usually several schemes in , This paper briefly introduces the access scheme .
stay KubeSphere Deployment in China Wiki System wiki.js And enable Chinese full-text search
wiki.js Is an excellent open source Wiki System , Compare with xwiki , The functionality is currently better than xwiki Not perfect enough , But it is also making progress .Wiki writing 、 Share 、 Permission management functions still exist , The victory lies in UI The design is beautiful , It can meet the basic knowledge management needs of small teams . This article introduces how to do it in KubeSphere Deployment in China wiki.js.
Use GitOps To manage Kubernetes Medium Secret
This article discusses how to use Argo CD be based on GitOps To manage Kubernetes in Secret In many ways , These methods also apply in addition to Argo CD Other than GitOps Tools .
Cloud native dynamics
KubeSphere 3.3.0 Release : A full embrace GitOps
2022 year 6 month 27 Japan ,KubeSphere The open source community is excited to announce ,KubeSphere 3.3.0 Official release !
KubeSphere 3.3.0 Bring more desirable features , New base GitOps Continuous deployment , Further optimized DevOps Using experience of . It also enhances “ Multi cluster management 、 Multi tenant management 、 Observability 、 The app store 、 Micro service governance 、 Edge of computing 、 Storage ” Other characteristics , Further improve the interaction design , And comprehensively improve the user experience .

HashiCorp Vault 1.11 Release
recently ,HashiCorp Vault 1.11 Release .Vault Provide confidential management for any application on any infrastructure 、 Data encryption and identity management .
Vault 1.11 Focus on improving Vault And enable key functions to be put into production . In this release ,Vault Added a new Kubernetes Key engine to dynamically generate credentials , Improved KV( Key value ) Availability of key engine , Added to PKI Engine support for non disruptive rotation , Allow for Transit Bring your own key (BYOK) , And many other improvements .
Linux The foundation announced a new OPI project
Linux The foundation announced a new open programmable infrastructure (OPI) project .OPI Will be based on DPU and IPU The next generation architecture and framework of technology foster a community driven 、 Standards based open ecosystems .OPI Designed to simplify networking in applications 、 Storage and security API, So as to develop operation and maintenance 、 Realize more portable and high-performance applications in the cloud and data center between security operation and maintenance and network operation and maintenance .
OPI Its founding members include Dell technologies 、F5、 Intel 、 It's German technology 、Marvell、NVIDIA and Red Hat, More and more contributors represent many leading companies in their field , From chip and device manufacturers 、 Independent software developers 、 Testing and measurement partners 、 OEM to end user .
Snyk and Linux The foundation publishes an open source security status report
Snyk and Linux The foundation today announced its first joint research report —— Open source security status (The State of Open Source Security)—— Result .
The results illustrate in detail the , Significant security risks arising from the widespread use of open source software , And how many organizations are not prepared to effectively manage these risks . To be specific , The report found :
- There are more than four out of ten (41%) Of organizations have little confidence in the security of their open source software ;
- General application development projects include 49 A loophole ,80 A direct dependency ( Open source code called by a project ); and ,
- The time required to fix open source project vulnerabilities has steadily increased , from 2018 Year of 49 Days increased to 2021 Year of 110 God , More than doubled .
This article by the blog one article many sends the platform OpenWrite Release !
边栏推荐
- MySQL:SQL概述及数据库系统介绍 | 黑马程序员
- Set up enterprise NTP time server
- 【微信小程序】认识小程序项目的基本组成结构
- Golang泛型的巧妙应用,防止变量空指针错误,防止结构体字段空指针错误
- 请指教什么是在线开户?另外,手机开户安全么?
- Yunhe enmo, gaiguoqiang, identify it and grasp it before the domestic database boils
- Viewing splitchunks code segmentation from MPX resource construction optimization
- Root cause of glideexception: failed decodepath{directbytebuffer- > gifdrawable- > drawable}
- After working in the software development industry for six years, I changed my ideas in those years
- [leetcode] a number that appears only once [136]
猜你喜欢
![多数元素II[求众数类之摩尔投票法]](/img/8f/5925f97c0f5f8c50c19a9ef6d7723c.png)
多数元素II[求众数类之摩尔投票法]

Leetcode (680) -- verifying palindrome string II

Serialization of binary tree 297 Serialization and deserialization of binary tree 652 Find duplicate subtrees

Introduction to reptiles: data capture of Betta barrage, with 11 introductory notes attached

JVM之栈空间

Sword finger offer 13 Range of motion of robot

FPGA Development (1) -- serial port communication

AI首席架构师9-胡晓光 《飞桨模型库与行业应用》

Sword finger offer 15 Number of 1 in binary
solo 博客皮肤导入 skins 文件夹后出现 500 错误
随机推荐
Construction of module 5 of actual combat Battalion
一步步教你在Edge浏览器上安装网风笔记
Which securities company is good for opening a mobile account? In addition, is it safe to open a mobile account?
数莓派 4怎么样?可能的玩法有哪些?
Bee常用配置
Is China Merchants Securities reliable? Is it safe to open a stock account?
@Scheduled annotation pit, I stepped on it for you
Halcon practical: design idea of solder joint detection
Unity about failure (delay) of destroy and ondestroy
How to write controller layer code gracefully?
Majority element ii[molar voting method for finding modes]
雲和恩墨蓋國强,識別它、抓住它,在國產數據庫沸騰以前
數莓派 4怎麼樣?可能的玩法有哪些?
Cloner un Graphe non recté [bfs accède à chaque bord et pas seulement aux noeuds]
gyctf_2020_document
Bee common configuration
golang7_ TCP programming
Yunhe enmo, gaiguoqiang, identify it and grasp it before the domestic database boils
Some specifications based on zfoo development project
Siemens low code version 9.14: meet different needs