Easily automate all software workflows with world-class CI / CD. You can build, test, and deploy code directly from GitHub to get code review, branch management, and problem triage to work the way you want.
In this short post I will introduce links that will help our to determine services that best suits our needs. List will be divided into several sections
Because the volume parameter of docker-compose only accepts WSL format
The test command realized by the
sed command is as follows.
$ echo "c:/Project/test" \
| sed -E 's/^(\w+)+/\L\1/g' \
| sed -e 's/\\/\//g' \
| sed -e 's/://g' \
| sed -e '/^\//!s/^/\//g'
sed -E ‘s/^(\w+)+/\L\1/g’→ Lowercase initial letters
sed -e ‘s/\\/\//g’→ Convert  to [/]
sed -e ‘s/://’ → Remove [:]
sed -e ‘/^\//!s/^/\//g’→ If it does not start with [/], add [/] at the beginning
If we run this the output should be like below:
$ sh wsl.sh
In this post, I will summarize at an overview level how Istio guarantees the security of inter-service communication and how it guarantees it.
What we want to secure as inter-service communication is
to control the access source that communicates and protect it from attacks such as eavesdropping, spoofing, and falsification.
GKE recommends Container Native load balancing. This allows the GCP load balancer to route directly to the pod’s IP using a mechanism called Alias IP, NEG. However, if the pods are not set properly, downtime will occur when the pods are evicted from the node due to cluster maintenance or…
In my last post, we examined how to create an NGINX Ingress Controller to control IP access. This is fine for direct access from the internet, but the front endpoint this is not a Load Balancer.
If you have a layer 7 load balancer such as…
We have multiple web applications deployed on Kubernetes (AKS) and we try to allow each one to access only from a specific IP address.
The general procedure is as follows.
A technology that builds logical segments beyond the physical constraints of L2 switches . This is achieved by assigning a logical number to each physical port of the L2 switch . Although logical, the segments are separated, so for example, a broadcast packet flowing in one logical segment does not…