Moving large scale consumer
e-commerce Infrastructure to
Mesh#IstioCon Moving large scale consumer e-commerce Infrastructure to Mesh Rajath Ramesh Principal Software Engineer @Carousell Harshad Rotithor Software Architect @Carousell #IstioCon About Carousell TB/month ● Internal egress bandwidth ~2 PB/month #IstioCon Architecture Overview ● User traffic infrastructure - TW region, all 3 zones ● REST APIs for client traffic ● gRPC for inter-service traffic0 码力 | 14 页 | 1.76 MB | 1 年前3
Your laptop as part
of the service meshcommit at a time from your microservice #IstioCon 3. Reuse existing infrastructure ● Minimize costs ● Reuse existing infrastructure to run tests #IstioCon Why don’t you ? ● Mock ? ● Contract testing Your laptop is not part of the mesh club #IstioCon A dummy proxy for the mesh ● Called by Lua code ● Parses the contract header and makes http call #IstioCon #IstioCon Wait … What about VirtualService Checkpoint 1. Minimize time to bug detection: yes 2. Allow simultaneous tests: yes 3. Reuse infrastructure: yes #IstioCon Drawbacks Contract header needs to be preserved all the way through the call0 码力 | 30 页 | 555.24 KB | 1 年前3
Set Sail for a
Ship-Shape Istio Release#IstioCon Upgrade Working Group Mission: To improve the stability, user experience, and test infrastructure around Istio upgrades #IstioCon Upgrade Working Group - Stability ● Standards and processes Provide a clear path forward #IstioCon Upgrade Working Group - Test Infrastructure ● Extend and improve the testing infrastructure ● Extend and add testing of upgrades across all supported methods. level: experimental, alpha, beta, and stable ● Ensuring appropriate documentation, testing, and code completion is done for each level ● Making sure that features continue to mature #IstioCon Release0 码力 | 18 页 | 199.43 KB | 1 年前3
Istio audit report - ADA Logics - 2023-01-30 - v1.0model of Istio to guide the security audit as well as future security audits. 2. Carry out a manual code audit for security issues. 3. Review the fixes for the issues found in an audit from 2020. 4. Review obtained in parts of code bases that receive less attention. Our assessment is that, not counting the Operator, Istio is a very well-maintained and secure project with a sound code base, well-established test coverage with little to no room for improvement. We identified a few APIs in security-critical code parts that would benefit from fuzzing and wrote fuzzers for these. In total, 6 fuzzers were written0 码力 | 55 页 | 703.94 KB | 1 年前3
Istio 2021 Roadmap A heartwarming work of staggering predictabilityfrictionless upgrade https://istio.io/latest/blog/2020/tradewinds-2020/ ● Fixed budget for infrastructure maintenance ● Desire predictability ● Longer support windows ● Skip releases for upgrades Detecting backwards incompatible changes ● Measuring developer efficiency ○ Test flakes ○ Feature and code coverage ● Feature promotion efficacy ● Improving overall developer experience https://istio.i0 码力 | 17 页 | 633.89 KB | 1 年前3
Istio-redirector: the way
to go to manage
thousands of HTTP
redirectionsstart from scratch New URLs are shown in the Search Engine Results ?????? ? #IstioCon Our infrastructure is deployed on GKE, with GCLB and Istio IngressGateway User Google Cloud Load Balancer Gateways0 码力 | 13 页 | 1.07 MB | 1 年前3
Istio Meetup China 服务网格安全 理解 Istio CNIService Mesh, Google Inc, 2020 Envoy is an edge and service proxy that allows traffic in an infrastructure to flow in a mesh, allowing you to visualize problem areas, tune performance, and add substrate0 码力 | 19 页 | 3.17 MB | 1 年前3
Developing & Debugging WebAssembly FiltersExperience Simplified tooling to bootstrap Wasm modules in Rust, C++, TinyGo, AssemblyScript Infrastructure to build, push, share, deploy, debug Wasm into Istio service mesh Wasm Registry Multi-cluster0 码力 | 22 页 | 2.22 MB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istioimplement common Security, Observability, Service Routing & Discovery functions as features of the infrastructure - ○ Functions: TLS Termination, Traffic Management, Tracing, Rate Limiting, Protocol Adapter0 码力 | 22 页 | 505.96 KB | 1 年前3
Istio Security Assessmentits control plane. The goal of the assessment was to identify security issues related to the Istio code base, highlight high risk configurations commonly used by administrators, and provide perspective areas of focus for subsequent phases of the assessment. A test plan was created which matched areas of code with specific security controls (e.g. service discovery, certificate lifecycle, side car injection) architectures were used to provide testers with a way of validating that security expectations in the code were implemented when deployed. Each environment was deployed following Istio Documentation using0 码力 | 51 页 | 849.66 KB | 1 年前3
共 21 条
- 1
- 2
- 3
相关搜索词
MovinglargescaleconsumercommerceInfrastructuretoMeshYourlaptopaspartoftheservicemeshSetSailforShipShapeIstioReleaseauditreportADALogics20230130v1d1kIstio2021RoadmapNeerajLouisredirectorwaygomanagethousandsHTTPredirectionsMeetupChina服务网格安全理解CNIDevelopingDebuggingWebAssemblyFiltersg2sIstioAtScaleeBaySudhiSecurityAssessment













