I bet there have been many times that you were working on the terminal with multiple tabs and you launched an HTTP server, and then you forgot that the server was already being executed, and then you tried to relaunch it from another tab getting the known error:
In a nutshell, Kubernetes admission controllers are plugins that govern and enforce how the cluster is used. They can be thought of as a gatekeeper that intercept (authenticated) API requests and may change the request object or deny the request altogether. …
A few days ago, I was reading about the Kubernetes network model, especially about
services and the
kube-proxy component, and I discovered that
kube-proxy has three modes, which are
userspace mode is too old and slow, nowaday nobody recommends to use it, the
A few days ago, I read an article about BigCache and I was interested to know how they avoided these 2 problems:
I went to their repository and read the code to understand how they achieved it. …
MEGA SHORT DESCRIPTION: Dijkstra’s algorithm is used to find the shortest path between a and b. It picks the unvisited node with the lowest distance, calculates the distance through it to each unvisited neighbor, and updates the neighbor’s distance if smaller.
In my company we have an ETL wrote in Golang to process the integrations with our partners, each integration is executed in an unique and isolate POD using cronjob k8s, each one print a bunch of data and metrics for each step executed using
log the package in the standard…
Authentication is the most common part in any application. You can implement your own authentication system or use one of the many alternatives that exist, but in this case we are going to use OAuth2.