Finer permission control using K8s Admission ControllerHow to open more permissions for developers in K8s cluster without compromising security and stability?Apr 5, 2022Apr 5, 2022
Published inCoccoc Engineering BlogFrom Log-Structured Merge-Tree storage engine to a toy databaseBuild a simple LSMTree toy databaseDec 30, 2021Dec 30, 2021
Published inCoccoc Engineering BlogWebserver’s Concurency Models in PythonIn the very beginning, I was wondering how a webserver works, how mighty Apache — extremely dominating in the market at that time — was…Sep 30, 2021Sep 30, 2021
Published inCoccoc Engineering BlogThe Redis StoriesHow we use Redis as time goes by, from the very beginning of single instances evolving to a complex clusters of multiple containers…Jun 21, 2021Jun 21, 2021
Published inCoccoc Engineering BlogDistributed Computing: Paxos Algorithm (Part 2)In this blogpost, we go into Paxos, a consensus algorithm which is powering modern distributed systems nowadays.Mar 28, 2021Mar 28, 2021
Published inCoccoc Engineering BlogDistributed Computing: Consensus Protocol (Part 1)Discover the heart of Distributed Computing: The consensus protocolJan 7, 2021Jan 7, 2021
Published inThe StartupLinux Zero-Copy Using sendfile()sendfile() has been gradually becoming prevalent over the past few yearsNov 19, 20201Nov 19, 20201
Published inCoccoc Engineering BlogAdding authorization to a running Kafka clusterWe have several Kafka clusters of growing importance at CocCoc. As usage scales up, we would like to get a handle on the dataflow…Sep 25, 2020Sep 25, 2020
Published inCoccoc Engineering BlogKVM guest’s CPU flagsHow KVM virtualizes CPU architecture from host machineJul 2, 2020Jul 2, 2020
Published inCoccoc Engineering BlogLoad-balancing for K8s services in Coccoc InfrastructureHow Loadbalancing for K8s services is designed and implemented in CoccocJun 23, 2020Jun 23, 2020