kubernetes 1.24.2 combat and source code (6)

kubernetes 1.24.2 actual combat and source code

Chapter 37 Interpretation of the metrics-server source code that k8s hpa and vpa depend on and the principle of kubelet top

37.1 Interpretation of metrics-server source code

37.2 Principle of kubelet top

Chapter 38 k8s crd development

38.1 Introduction to crd technology and custom crd requirement analysis

38.2 Write crd code using kubebuilder

38.3 Deploy crd to k8s for use

Chapter 39 Getting started with istio and analyzing the principle of sidecar traffic hijacking

39.1 Microservices and istio preparation knowledge

39.2 istio installation and deployment

39.3 istio's identity-based request routing, fault injection, and traffic transfer functions

39.4 istio access external services

39.6 Analysis of Sidecar traffic hijacking in istio

Chapter 40 Envoy Basics

40.1 envoy basics

40.2 envoy proxy https traffic

40.3 envoy file-based dynamic EDS and CDS configuration

40.4 envoy API-based dynamic endpoint discovery

Chapter 41 Analysis of isito Components

41.1 What are the components of istio and what do they do

41.2 Introduction to istio xds protocol knowledge

41.3 istio-ingressgateway and istio-proxy correspond to pilot-agent analysis

41.4 Pilot-discovery analysis corresponding to istio pod

Guess you like

Origin blog.csdn.net/niwoxiangyu/article/details/131125454