1) node management
2) ip management
3) load balancer
4) restart of applications
5) replica management
6) network policies
7) monitoring of applications
8) storage policies
9) logging management
10) desired state of applications
For further actions, you may consider blocking this person and/or reporting abuse
Top comments (0)