 Istio Security Assessmentrecommended or default way to connect the proxies with the control plane; instead, DNS certificates, which can be signed by Kubernetes or Istiod, will be used to connect to Istiod over port 15012.” Documentation created before other users’ legitimate VirtualServices. Note: During testing, NCC Group observed an instance of a later created VirtualService being able to gain precedence over an earlier created one, but In other words, the Gateway resource must reside in the same namespace as the gateway workload instance. Such behavior could be configured by setting the PILOT_SCOPE_GATEWAY_TO_NAMESPACE environment0 码力 | 51 页 | 849.66 KB | 1 年前3 Istio Security Assessmentrecommended or default way to connect the proxies with the control plane; instead, DNS certificates, which can be signed by Kubernetes or Istiod, will be used to connect to Istiod over port 15012.” Documentation created before other users’ legitimate VirtualServices. Note: During testing, NCC Group observed an instance of a later created VirtualService being able to gain precedence over an earlier created one, but In other words, the Gateway resource must reside in the same namespace as the gateway workload instance. Such behavior could be configured by setting the PILOT_SCOPE_GATEWAY_TO_NAMESPACE environment0 码力 | 51 页 | 849.66 KB | 1 年前3
 Kubernetes容器应用基于Istio的灰度发布实践Mesh Meetup #3 深圳站 Agenda • Istio & Kubernetes • Istio & Kubernetes上的灰度发布 An open platform to connect, manage, and secure microservices. Istio项目 微服务角度看Istio: 治理形态的演变 Node 1 svc1 自身业务 SDK Sidecar ServcieDiscovery接口上的服务发 现方法和用户配置的规则构造xDS 4. Envoy从Discovery获取xDS,动态 更新 Kubernetes Service Instance Instance Service Endpoint Endpoint Istio Istio & Kubernetes:Mixer attribute Mixer proxy svc0 码力 | 38 页 | 14.93 MB | 1 年前3 Kubernetes容器应用基于Istio的灰度发布实践Mesh Meetup #3 深圳站 Agenda • Istio & Kubernetes • Istio & Kubernetes上的灰度发布 An open platform to connect, manage, and secure microservices. Istio项目 微服务角度看Istio: 治理形态的演变 Node 1 svc1 自身业务 SDK Sidecar ServcieDiscovery接口上的服务发 现方法和用户配置的规则构造xDS 4. Envoy从Discovery获取xDS,动态 更新 Kubernetes Service Instance Instance Service Endpoint Endpoint Istio Istio & Kubernetes:Mixer attribute Mixer proxy svc0 码力 | 38 页 | 14.93 MB | 1 年前3
 Kubernetes容器应用基于Istio的灰度发布实践Mesh Meetup #3 深圳站2 Agenda • Istio & Kubernetes • Istio & Kubernetes上的灰度发布3 An open platform to connect, manage, and secure microservices.4 Istio项目5 微服务角度看Istio: 治理形态的演变 Node 1 svc1 自身业务 SDK Sidecar ServcieDiscovery接口上的服务发 现方法和用户配置的规则构造xDS 4. Envoy从Discovery获取xDS,动态 更新 Kubernet es Service Instance Instance Service Endpoint Endpoint Istio14 Istio & Kubernetes:Mixer attribute Mixer proxy svc0 码力 | 34 页 | 2.64 MB | 6 月前3 Kubernetes容器应用基于Istio的灰度发布实践Mesh Meetup #3 深圳站2 Agenda • Istio & Kubernetes • Istio & Kubernetes上的灰度发布3 An open platform to connect, manage, and secure microservices.4 Istio项目5 微服务角度看Istio: 治理形态的演变 Node 1 svc1 自身业务 SDK Sidecar ServcieDiscovery接口上的服务发 现方法和用户配置的规则构造xDS 4. Envoy从Discovery获取xDS,动态 更新 Kubernet es Service Instance Instance Service Endpoint Endpoint Istio14 Istio & Kubernetes:Mixer attribute Mixer proxy svc0 码力 | 34 页 | 2.64 MB | 6 月前3
 How HP set up secure and
wise platform with Istioalso have project specified feature. We provide a common platform includes all common features, connect all projects with istio. #IstioCon Common services are in core cluster Projects shared solution cluster connect core cluster with Istio multi-cluster - Replicated control planes Some standalone cluster without Istio can access core cluster also, as tenant. HP Horizon Platform Connect With Istio0 码力 | 23 页 | 1.18 MB | 1 年前3 How HP set up secure and
wise platform with Istioalso have project specified feature. We provide a common platform includes all common features, connect all projects with istio. #IstioCon Common services are in core cluster Projects shared solution cluster connect core cluster with Istio multi-cluster - Replicated control planes Some standalone cluster without Istio can access core cluster also, as tenant. HP Horizon Platform Connect With Istio0 码力 | 23 页 | 1.18 MB | 1 年前3
 Istio is a long wild river: how to navigate it safelythe code: - RetryOn: "connect-failure,refused-stream,unavailable,cancelled,retriable-status-codes", + RetryOn: "connect-failure”, Connect-failure is retry-safe even for non-idempotent0 码力 | 69 页 | 1.58 MB | 1 年前3 Istio is a long wild river: how to navigate it safelythe code: - RetryOn: "connect-failure,refused-stream,unavailable,cancelled,retriable-status-codes", + RetryOn: "connect-failure”, Connect-failure is retry-safe even for non-idempotent0 码力 | 69 页 | 1.58 MB | 1 年前3
 Optimal Canary Deployments using
Istio and how it scores over Spring
Cloud and KubernetesService Instance V1 SPRING CLOUD GATEWAY www.my-application.com 75% or Header: X-User-Type: Non-Admin RIBBON (Client-Side Load Balancer) 25% or Header: X-User-Type: Admin Service Instance V1 Service Service Instance V1 Service Instance V2 Service Instance V1 Service Instance V1 Service Instance V1 My-data-service Service Service Instance V2 SPRING EUREKA Cross-version Traffic Service Instance V1 SPRING CLOUD GATEWAY www.my-application.com 75% or Header: X-User-Type: Non-Admin RIBBON (Client-Side Load Balancer) 25% or Header: X-User-Type: Admin Service Instance V1 Service0 码力 | 9 页 | 1011.00 KB | 1 年前3 Optimal Canary Deployments using
Istio and how it scores over Spring
Cloud and KubernetesService Instance V1 SPRING CLOUD GATEWAY www.my-application.com 75% or Header: X-User-Type: Non-Admin RIBBON (Client-Side Load Balancer) 25% or Header: X-User-Type: Admin Service Instance V1 Service Service Instance V1 Service Instance V2 Service Instance V1 Service Instance V1 Service Instance V1 My-data-service Service Service Instance V2 SPRING EUREKA Cross-version Traffic Service Instance V1 SPRING CLOUD GATEWAY www.my-application.com 75% or Header: X-User-Type: Non-Admin RIBBON (Client-Side Load Balancer) 25% or Header: X-User-Type: Admin Service Instance V1 Service0 码力 | 9 页 | 1011.00 KB | 1 年前3
 Observability and Istio Telemetryuses the name you defined in platform such as Istio. • Service Instance. Each one workload in the Service group is named as an instance. Like pods in Kubernetes, it doesn't need to be a single process process in OS. Also if you are using instrument agents, an instance is actually a real process in OS. • Endpoint. It is a path in the certain service for incoming requests, such as HTTP URI path or gRPC new storage entities ENTITY TYPE DESCRIPTION INVENTORAY Inventory includes service, service_instance, endpoint, network_address. They are metadata for SkyWalking. Don’t delete these. INDICATOR0 码力 | 21 页 | 5.29 MB | 6 月前3 Observability and Istio Telemetryuses the name you defined in platform such as Istio. • Service Instance. Each one workload in the Service group is named as an instance. Like pods in Kubernetes, it doesn't need to be a single process process in OS. Also if you are using instrument agents, an instance is actually a real process in OS. • Endpoint. It is a path in the certain service for incoming requests, such as HTTP URI path or gRPC new storage entities ENTITY TYPE DESCRIPTION INVENTORAY Inventory includes service, service_instance, endpoint, network_address. They are metadata for SkyWalking. Don’t delete these. INDICATOR0 码力 | 21 页 | 5.29 MB | 6 月前3
 5 tips for your first
Istio.io ContributionIstio is a complex project, and Istio.io is the perfect place to start committing. #IstioCon Connect With the Community ● Working groups - great way to get to know the community ● Join the Discuss0 码力 | 14 页 | 717.74 KB | 1 年前3 5 tips for your first
Istio.io ContributionIstio is a complex project, and Istio.io is the perfect place to start committing. #IstioCon Connect With the Community ● Working groups - great way to get to know the community ● Join the Discuss0 码力 | 14 页 | 717.74 KB | 1 年前3
 Moving large scale consumer
e-commerce Infrastructure to
MeshSidecar injection by namespace or on-demand ● Passthrough mode during rollout ● Service entry to connect internal proxy ● Kubernetes Cluster-IP services deployed across clusters #IstioCon Rollout -0 码力 | 14 页 | 1.76 MB | 1 年前3 Moving large scale consumer
e-commerce Infrastructure to
MeshSidecar injection by namespace or on-demand ● Passthrough mode during rollout ● Service entry to connect internal proxy ● Kubernetes Cluster-IP services deployed across clusters #IstioCon Rollout -0 码力 | 14 页 | 1.76 MB | 1 年前3
 Istio Meetup China 服务网格安全 理解 Istio CNIsubstrate features. Istio is the industry-standard service mesh control plane that makes it easier to connect, observe, and secure microservices. SkyWalking is an observability power tool that provides distributed0 码力 | 19 页 | 3.17 MB | 1 年前3 Istio Meetup China 服务网格安全 理解 Istio CNIsubstrate features. Istio is the industry-standard service mesh control plane that makes it easier to connect, observe, and secure microservices. SkyWalking is an observability power tool that provides distributed0 码力 | 19 页 | 3.17 MB | 1 年前3
共 17 条
- 1
- 2














