This article describes how to use Open Policy Agent (OPA) to define fine-grained access control in Alibaba Cloud Service Mesh (ASM) using sample code.
In this blog, Andy Shi talks about how the OAM can address the concerns of both developers and DevOps operators, creating a smooth user experience in a unified approach.
This article discusses how to customize external authorization in ASM and demonstrates the customization with the help of sample code.
Guyi, an Alibaba Cloud Senior Technical Expert, recommends two tools for initializing projects and running applications locally.
Guyi, an Alibaba Cloud Senior Technical Expert, describes the deployment tools in EDAS.
Guyi, an Alibaba Cloud Senior Technical Expert, describes how to run the Spring Cloud application on the cloud.
In this post, we'll explore the concept of serverless, and build a meme generator using Alibaba Cloud's Function Compute service.
Yili, a senior technical expert at Alibaba Cloud, shares the best practices of container technology implementation through Alibaba Cloud Container Service.
A rundown of KMS Secret Manager, Alibaba Cloud Kubernetes Clusters, and how to make them work together.
In this tutorial, we are going to setup multi-node Kubernetes Cluster on Ubuntu 16.04 server using Alibaba Cloud Elastic Compute Service (ECS).
At the Alibaba Cloud Summit, Guoqiang Li talked about the release of two popular open source software products on the cloud, Prometheus and EDAS3.0.
Zhang Cheng, a technical expert, discusses log systems and how to build a log monitoring system in kubernetes with simple shortcuts.
Li Xiang and Zhang Lei, two technical experts, discuss what OAM is and how it's being used to upgrade of Alibaba's standardized and unified application management architecture.
This blog talks about some of the newest projects to be included the Sandbox family by the CNCF TOC board.
This blog highlights the key takeaways from the online presentation Tang Zhimin and Xie Yaoyao gave about SIG Cloud Providers.
Zhang Cheng, a technical expert, explains how to build a flexible, powerful, reliable, and scalable log system in Cloud Native scenarios.
Zhang Cheng, a storage service technical expert, talks about log collection and the purpose of log output.
Deng Qingling, a technical expert, gives his thoughts on Serverless Kubernetes and the emergence and operations from a business development perspective.
This article describes how to define two types of Istio resources, namely virtual services and Istio gateways.
This article describes how to deploy a sample application to a cluster on the data plane of an ASM instance.