kubernetes 1.24.2 actual combat and source code
Chapter 37 Interpretation of the metrics-server source code that k8s hpa and vpa depend on and the principle of kubelet top
37.1 Interpretation of metrics-server source code
37.2 Principle of kubelet top
Chapter 38 k8s crd development
38.1 Introduction to crd technology and custom crd requirement analysis
38.2 Write crd code using kubebuilder
38.3 Deploy crd to k8s for use
Chapter 39 Getting started with istio and analyzing the principle of sidecar traffic hijacking
39.1 Microservices and istio preparation knowledge
39.2 istio installation and deployment
39.3 istio's identity-based request routing, fault injection, and traffic transfer functions
39.4 istio access external services
39.6 Analysis of Sidecar traffic hijacking in istio
Chapter 40 Envoy Basics
40.1 envoy basics
40.2 envoy proxy https traffic
40.3 envoy file-based dynamic EDS and CDS configuration
40.4 envoy API-based dynamic endpoint discovery
Chapter 41 Analysis of isito Components
41.1 What are the components of istio and what do they do
41.2 Introduction to istio xds protocol knowledge
41.3 istio-ingressgateway and istio-proxy correspond to pilot-agent analysis
41.4 Pilot-discovery analysis corresponding to istio pod