当前位置:网站首页>Cloud native enthusiast weekly: cool collection of grafana monitoring panels
Cloud native enthusiast weekly: cool collection of grafana monitoring panels
2022-06-29 22:30:00 【KubeSphere】
Open source project recommendation
grafana-dashboards-kubernetes
This project provides a series of cool for monitoring Kubernetes Of Grafana Monitor dashboard , Inspiration comes from kubernetes-mixin and grafana.com.

Stash
Stash It is a cloud native backup disaster recovery tool , It will be to Operator The form of deployment to Kubernetes In the cluster , And use restic perhaps CSI drive VolumeSnapshotter To perform backup and recovery operations .
Spin
Spin It's an open source framework , Used to quickly build and run Webassembly application .

postgres-operator
postgres-operator yes Crunchy Data Open source PostgreSQL Operator, Used in Kubernetes Deployment in China PostgreSQL colony .
Viddy
Viddy yes watch The modernization of orders , Many new features are supported , For example, check the past status 、 Pause and restart 、 Custom highlight colors, etc .

Dolt
Dolt It's a SQL database , In addition to supporting regular SQL sentence , It also supports a variety of git operation , such as fork、clone、merge、push and pull. There is also a DoltHub To share Dolt database , Be similar to DockerHub.

VirtualBuddy
VirtualBuddy Used in Apple Silicon Chip macOS Created in macOS virtual machine , It is convenient for developers to test applications in various versions locally macOS Medium compatibility .

mammoth.js
This project will be able to Microsoft Word、Google Docs as well as LibreOffice Created .docx Document conversion to html file .
Linux Surface
This project can be implemented in Microsoft Surface Installed on the tablet device Linux operating system . The following models are supported :

Article recommendation
be based on KubeSphere Hierarchical management practice
stay KubeSphere in , Resources can be shared among tenants , According to the different roles assigned , Various resources can be operated . Between tenant and resource 、 There is a high degree of freedom between resources , Permission granularity is also relatively large . In our system , Resources have permission levels , For example, low-level users can invite 、 Give permission and other operations to operate high-level resources , Or like in a low-level project Pod It can be dispatched to high-level nodes , For such problems as cross level operation of resources , We are KubeSphere Based on this, the hierarchical management is realized .
Kubernetes Several schemes of traffic exposure in cluster
Use... In business Kubernetes When editing management , Access to the north-south traffic of the service , stay Kuberentes There are usually several schemes in , This paper briefly introduces the access scheme .
stay KubeSphere Deployment in China Wiki System wiki.js And enable Chinese full-text search
wiki.js Is an excellent open source Wiki System , Compare with xwiki , The functionality is currently better than xwiki Not perfect enough , But it is also making progress .Wiki writing 、 Share 、 Permission management functions still exist , The victory lies in UI The design is beautiful , It can meet the basic knowledge management needs of small teams . This article introduces how to do it in KubeSphere Deployment in China wiki.js.
Use GitOps To manage Kubernetes Medium Secret
This article discusses how to use Argo CD be based on GitOps To manage Kubernetes in Secret In many ways , These methods also apply in addition to Argo CD Other than GitOps Tools .
Cloud native dynamics
KubeSphere 3.3.0 Release : A full embrace GitOps
2022 year 6 month 27 Japan ,KubeSphere The open source community is excited to announce ,KubeSphere 3.3.0 Official release !
KubeSphere 3.3.0 Bring more desirable features , New base GitOps Continuous deployment , Further optimized DevOps Using experience of . It also enhances “ Multi cluster management 、 Multi tenant management 、 Observability 、 The app store 、 Micro service governance 、 Edge of computing 、 Storage ” Other characteristics , Further improve the interaction design , And comprehensively improve the user experience .

HashiCorp Vault 1.11 Release
recently ,HashiCorp Vault 1.11 Release .Vault Provide confidential management for any application on any infrastructure 、 Data encryption and identity management .
Vault 1.11 Focus on improving Vault And enable key functions to be put into production . In this release ,Vault Added a new Kubernetes Key engine to dynamically generate credentials , Improved KV( Key value ) Availability of key engine , Added to PKI Engine support for non disruptive rotation , Allow for Transit Bring your own key (BYOK) , And many other improvements .
Linux The foundation announced a new OPI project
Linux The foundation announced a new open programmable infrastructure (OPI) project .OPI Will be based on DPU and IPU The next generation architecture and framework of technology foster a community driven 、 Standards based open ecosystems .OPI Designed to simplify networking in applications 、 Storage and security API, So as to develop operation and maintenance 、 Realize more portable and high-performance applications in the cloud and data center between security operation and maintenance and network operation and maintenance .
OPI Its founding members include Dell technologies 、F5、 Intel 、 It's German technology 、Marvell、NVIDIA and Red Hat, More and more contributors represent many leading companies in their field , From chip and device manufacturers 、 Independent software developers 、 Testing and measurement partners 、 OEM to end user .
Snyk and Linux The foundation publishes an open source security status report
Snyk and Linux The foundation today announced its first joint research report —— Open source security status (The State of Open Source Security)—— Result .
The results illustrate in detail the , Significant security risks arising from the widespread use of open source software , And how many organizations are not prepared to effectively manage these risks . To be specific , The report found :
- There are more than four out of ten (41%) Of organizations have little confidence in the security of their open source software ;
- General application development projects include 49 A loophole ,80 A direct dependency ( Open source code called by a project ); and ,
- The time required to fix open source project vulnerabilities has steadily increased , from 2018 Year of 49 Days increased to 2021 Year of 110 God , More than doubled .
This article by the blog one article many sends the platform OpenWrite Release !
边栏推荐
- 在线文本数字识别列表求和工具
- 客户端可以连接远程mysql
- Hidden worries behind the listing of shushulang: the performance has declined significantly, the market position is relatively backward, and the competitiveness is questionable
- 研发测试时间比,BUG数据分析
- Introduction to gaofen-3 satellite (GF-3)
- Which securities to choose for securities account opening? In addition, is it safe to open an account online now?
- 软件快速交付真的需要以安全为代价吗?
- static关键字续、继承、重写、多态
- ASP dynamically creates table table
- The inadvertently discovered [tidb cache table] can solve the read / write hotspot problem
猜你喜欢

中国数据库崛起,阿里云李飞飞:中国云数据库多种主流技术创新已领先国外

ASP using panel to realize simple registration page

2022年第一季度保险服务数字化跟踪分析
A mysql IBD file is too large processing record

Can you be a coder if you don't learn English well? Stop worrying and learn it first

【多线程】 如何自己实现定时器
为什么在局域网(ERP服务器)共享文件夹上拷贝文件时导致全局域英特网断网
![[php8+oracle11g+windows environment without tools] Intranet / no network /win10/php connecting to Oracle database instance](/img/72/214ee6d3842f393164cc93bb387926.png)
[php8+oracle11g+windows environment without tools] Intranet / no network /win10/php connecting to Oracle database instance

AI场景存储优化:云知声超算平台基于 JuiceFS 的存储实践
![Realizing deep learning framework from zero -- LSTM from theory to practice [theory]](/img/ac/164140eff1a6518d49ce25599d9c7b.png)
Realizing deep learning framework from zero -- LSTM from theory to practice [theory]
随机推荐
Portable 4K audio and video conference terminal all-in-one machine with 8x digital zoom
生产环境AIX小机报错B6267342问题处理
5-2web application vulnerability scanning
正如以往我们对于互联网的看法一样,我们对于互联网的认识开始变得深度
为什么要同时重写hashcode和equals方法之简单理解
软件快速交付真的需要以安全为代价吗?
低代码、端到端,一小时构建IoT示例场景,声网发布灵隼物联网云平台
The MySQL data cannot be read after the checkpoint recovery. Do you know the reason
细说GaussDB(DWS)复杂多样的资源负载管理手段
论文浅尝 | KR-GCN: 知识感知推理的可解释推荐系统
5-1系统漏洞扫描
Graduation summary of construction practice camp
这次跟大家聊聊技术,也聊聊人生
Huawei cloud AOM version 2.0 release
Underlying principles of file operations (file descriptors and buffers)
The database of the server cannot be connected [the service has been started, the firewall has been closed, the port has been opened, and the netlent port is not connected]
leetcode 416. Partition Equal Subset Sum 分割等和子集(中等)
The logic behind the three whys encountered in technical communication
5分钟快速上手 pytest 测试框架
Reflections on remote sensing image interpretation