How to Isolate Memory Leaks | A Kubernetes Guide
Discover how to isolate memory leaks in complex systems like Kubernetes using production traffic replication.
In my previous post on scaling Kong deployments with and without a database, we covered the concepts of deploying Kong with and without a database, as well as using decK, distributed, and hybrid deployments. In this article, we take a tour of some of the possible Kubernetes deployments of Kong. Kubernetes (K8s) is the container orchestration war winner. While there are still deployments using other engines, we see K8s far more.
Programmable data planes offer dynamic control for cloud native applications. Technologies like eBPF and Kubernetes provide an abstraction to improve flexibility, scalability, and performance.