Skip to main content

你们以为配置K8S是折腾的终点么?



你们以为配置K8S是折腾的终点么?
现在新的Hype是 service mesh
https://istio.io/docs/concepts/what-is-istio/
https://www.envoyproxy.io/

你们折腾完K8S那一坨, 趁着它热乎, 还可以折腾所谓 service mesh
一波波的好像时尚界... 静下来仔细想想,几年后还有几个流行?
 


那也不见得,当成生意做,所有的问题都是风险评估的问题。
只要风险评估的比人家好,具体做什么,其实都没有关系。。。

【 在 guvest (我爱你老婆Anna) 的大作中提到: 】
: 执行肯定比选什么架构更重要。
: 只要不选有明显硬伤的就可以。
: 不然修不好憋死了投资就打水漂了。
: 最怕的就是选个小众方向,自己又没本事修好。
:
: 这种tradeoff,其实意思是说,不管你如何选择,其实都是在赌一把。

:
: 决策其实容易,不管你懂不懂技术,只要不是自己在干活,其实乱选一把

: 就可以
: 。背着
:
: ,和抱着,是一样沉的。。。

:
 





大架构选择,有两个方面要考虑:
1. avoid vendor lockin
2. enough market share

【 在 walkrandom (walkrandom) 的大作中提到: 】
: 大系统看重的是redundancy。everything is replaceble. 
: 比如,牛人走了,菜鸟能不能接手。
: 一个云不行了,另外的云能不能顶上。
: 所以这是一个complexity vs performance 的tradeoff
: 宝。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...