×
Microservices

IngressNightmare: Ingress Nginx Exposed Five More Security Vulnerabilities That Can Take Over Your K8s Cluster

This article discusses discovered security vulnerabilities in Ingress Nginx that can lead to unauthorized control over Kubernetes clusters.

Beyond Code: Leveraging Log Monitoring for App Security and User Privacy

With our comprehensive guide, explore how log monitoring enhances app security, detects threats, ensures compliance, and protects user data proactively.

End-to-end Canary Release through Alibaba Cloud ASM Lanes and Kruise Rollout

This article explains the canary release strategy for microservices, highlighting its role in reducing release risks and enabling rapid iterations usi...

DeepSeek Brings New Excitement to API Gateways

This article aims to offer a more comprehensive understanding of API gateways by discussing related concepts and how DeepSeek integrates with API gateways.

API Gateway に基づく API ファーストの開発方法

この記事では、API GatewayをベースとしたAPIファーストの開発手法のコンセプトとメリットを紹介する。

An API-first Development Practice Based on an API Gateway

The article introduces the concept and benefits of an API-first development practice based on an API Gateway.

Best Practices for Dynamic Configuration with Spring Cloud, Nacos, and KMS

The article introduces how to integrate Nacos with Spring Cloud to achieve dynamic configuration updates and secure sensitive data using KMS without code modification.

Evolution and Classification of Application Gateways

This article describes the evolution of gateways and the new features of gateways in the AI era.

Best Practice for Using KMS to Encrypt Sensitive Configurations in MSE Nacos

This article explains how to address security risks from data leaks by encrypting sensitive data, such as AccessKey IDs, with keys generated by KMS.

ZooKeeper Practice: Master the Authentication Mode of ZooKeeper

The article introduces best practices for securing ZooKeeper instances with SASL to prevent data theft, leakage, and tampering.

ZooKeeper Practice: Leader Election Caused by zxid Overflow

This article describes the issue that a ZooKeeper transaction ID (zxid) overflow occurs when a ZooKeeper instance is used and provides the cause and solutions to the issue.

ZooKeeper Practice: How to Tune jute.maxbuffer

This article delves into the source code of ZooKeeper to explore the best practices for the jute.maxbuffer parameter in ZooKeeper.

ZooKeeper Practice: Exhausted Disk Space and Unavailable Service Caused by Inappropriate snapCount Setting

This article explores the best practice for solving ZooKeeper disk issues by delving into the mechanism of ZooKeeper data file generation.

Spring Cloud Alibaba Integrates the Distributed Scheduled Task Scheduling

Spring Cloud Alibaba released the Scheduling module #3732 to help you quickly develop distributed scheduled tasks in the microservice system.

Access Redis by Using Higress Based on Custom Plug-ins

This article introduces Higress and describes how Redis plugins can be utilized for implementing sophisticated features such as rate limiting, caching, and session management.

Achieve the Go Application Microservice Governance Capability Without Changing a Line of Code

This article introduces the MSE microservice governance solution without changing business code.

How to Integrate Dubbo Applications into Service Mesh

This article describes how customers who use the traditional Dubbo microservice system can integrate their services into the service mesh, the new-generation cloud-native infrastructure.

Comprehensive Analysis of Service Mesh Load Balancing Algorithm

This article analyzes the implementation principles and use scenarios of various Service Mesh load balancing algorithms, and provide a reference for t...

Best Practices for Microservice Application Canary Release

This article provides an overview of canary release practices from a DevOps perspective, explaining how to integrate canary release with DevOps workflows.

High-Performance and User-Friendly HTTP Access with Dubbo3

This article explains how Dubbo3's Triple protocol simplifies development, testing, and ingress traffic access with efficient communication and an easy-to-use interface.