CocCoc TechblogFiner permission control using K8s Admission ControllerHow to open more permissions for developers in K8s cluster without compromising security and stability?Apr 5, 2022Apr 5, 2022
CocCoc TechbloginCoccoc Engineering BlogFrom Log-Structured Merge-Tree storage engine to a toy databaseBuild a simple LSMTree toy databaseDec 30, 2021Dec 30, 2021
CocCoc TechbloginCoccoc Engineering BlogWebserver’s Concurency Models in PythonIn the very beginning, I was wondering how a webserver works, how mighty Apache — extremely dominating in the market at that time — was…Sep 30, 2021Sep 30, 2021
CocCoc TechbloginCoccoc Engineering BlogThe Redis StoriesHow we use Redis as time goes by, from the very beginning of single instances evolving to a complex clusters of multiple containers…Jun 21, 2021Jun 21, 2021
CocCoc TechbloginCoccoc Engineering BlogDistributed Computing: Paxos Algorithm (Part 2)In this blogpost, we go into Paxos, a consensus algorithm which is powering modern distributed systems nowadays.Mar 28, 2021Mar 28, 2021
CocCoc TechbloginCoccoc Engineering BlogDistributed Computing: Consensus Protocol (Part 1)Discover the heart of Distributed Computing: The consensus protocolJan 7, 2021Jan 7, 2021
CocCoc TechbloginThe StartupLinux Zero-Copy Using sendfile()sendfile() has been gradually becoming prevalent over the past few yearsNov 19, 20201Nov 19, 20201
CocCoc TechbloginCoccoc Engineering BlogAdding authorization to a running Kafka clusterWe have several Kafka clusters of growing importance at CocCoc. As usage scales up, we would like to get a handle on the dataflow…Sep 25, 2020Sep 25, 2020
CocCoc TechbloginCoccoc Engineering BlogKVM guest’s CPU flagsHow KVM virtualizes CPU architecture from host machineJul 2, 2020Jul 2, 2020
CocCoc TechbloginCoccoc Engineering BlogLoad-balancing for K8s services in Coccoc InfrastructureHow Loadbalancing for K8s services is designed and implemented in CoccocJun 23, 2020Jun 23, 2020