|
You are here |
www.groundcover.com | ||
| | | | |
www.styra.com
|
|
| | | | | Build a solid understanding of how to secure Kubernetes along with some best practices. Learn how to secure nodes, clusters and pods. | |
| | | | |
blog.nodraak.fr
|
|
| | | | | TL;DR: There is no best architecture, it all depends on your requirements and resources Clusters with 1 to 3 nodes are good for testing, but for production you should have at least 5 nodes Feel free to do differently as I say Introduction Since its launch in 2015, Kubernetes is the new bitcoin and every company wants to migrate all its infrastructure (which is obviously made of hundreds of microservices) to show how cool they are. | |
| | | | |
www.datadoghq.com
|
|
| | | | | Learn how to debug Pending pods that fail to get scheduled due to resource constraints, taints, affinity rules, and other reasons. | |
| | | | |
www.techinterviewhandbook.org
|
|
| | | Interview formats of the top tech companies. Know what to expect and prepare well for them | ||