Using Istio to Build the Next 5G Platform©2021 Aspen Mesh. All rights reserved. Key Platform Requirements Multi-Vendor Real-Time (RAN) Workload Mobility Networking outside CNF Encryption & Authorization between CNFs 5 ©2021 Aspen Mesh. avoid escalated pod privileges ● Integrate with PKI minted Intermediate CA ● Enable ECC certificates ● Configure workload certificate TTLs ● Enable strict mutual TLS (mTLS) instead of auto ● Use dedicated architectural changes ● SPIFFE only certificates ● Configuring workload certificate TTLs ● RSA to ECC migration ● Missing www-authenticate header ● Tuning per-workload proxy concurrency ● Consuming Istio0 码力 | 18 页 | 3.79 MB | 1 年前3
Service mesh security best practices: from implementation to verification Surfaces Istio is both a collection of security controls and an attack target. Workload Cluster Edge Operations Workload Data Exfiltration Man-In-The-Middle Denial of Service Privilege Escalation Escalation Application Compromise Control Plane Service mesh security architecture Cluster Workload Edge Operations Ingress Policies Egress Policies WAF / IDS Firewall User AuthN/Z Data Loss Authority K8s Network Policy K8s RBAC Audit Logging Image Verification Admission Control Workload Identity K8s RBAC K8s CNI AuthZ Policy Peer AuthN Policy KMS Control Plane Hardening0 码力 | 29 页 | 1.77 MB | 1 年前3
Is Your Virtual Machine Really Ready-to-go with Istio?1 ServiceEntry #IstioCon V1.6-1.8 Better VM Workload Abstraction A K8s Service and Pods Two separate object with distinct lifecycles Before Workload Entry, a single Istio Service Entry object combined giving a first-class representation for the workloads themselves #IstioCon V1.6-1.8 Better VM Workload Abstraction Item Kubernetes Virtual Machine Basic schedule unit Pod WorkloadEntry Component selector: app: foo Istio Workload Entries labels: app: foo class: vm #IstioCon V1.6-1.8 Better VM Workload Abstraction ● Workload Entry ○ single non-Kubernetes workload ○ mTLS using service account0 码力 | 50 页 | 2.19 MB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istioservices - Global IPAM, Access-control Policy store, etc. ● AZ Control Plane ○ Syncs specs to workload K8s clusters in the AZ ○ Shared-Nothing Architecture ■ Hosts services catering to the AZ, e Configuration watch Client Traffic tunneled to Ingress Gateways One Istio Deployment per workload K8s cluster #IstioCon Step 3: Evolve into AZ architecture ● One Istio deployment per K8s cluster Server Istiod East-West Gateway watch API Server Pods, Services Workload Cluster API Server Pods, Services Workload Cluster watch Services talk directly #IstioCon Step 4: Evolving0 码力 | 22 页 | 505.96 KB | 1 年前3
Performance tuning and best practices in a Knative based, large-scale serverless platform with Istioperf) is a benchmark tool for Knative which can generate specific Knative Service provisioning workload and provides aggregated data of Knative Service ready duration. o Knative Performance Testing Framework ensure enough capacity Leveraged Metrics to monitor Istio & Knative components’ CPU and MEM under workload to avoid CPU throttling and OOM and ensure enough capacity. In Istio 1.5.4: Istio scalability PILOT_DEBOUNCE_MAX=10s are the env vars on pilot that can be tuned. o Set PILOT_DEBOUNCE_AFTER=1s helps under our workload. (we tested with 100ms, 1s, 2s, 5s, 10s) o With 800 Knative Services in total, ingress_ready p980 码力 | 23 页 | 2.51 MB | 1 年前3
Apache Cassandra™ 10 Documentation February 16, 2012detection mechanism to calculate a per-node threshold that takes into account network conditions, workload, or other conditions that might affect perceived heartbeat rate. During gossip exchanges, every Cassandra nodes in order to segregate analytic and real-time workloads. It can be used for mixed-workload DSE clusters located in one physical data center. It can also be used for multi-data center DSE good idea of the initial volume of data you plan to store, as well as what your typical application workload will be. Selecting Hardware As with any application, choosing appropriate hardware depends on0 码力 | 141 页 | 2.52 MB | 1 年前3
DBeaver Lite User Guide v24.2.eaextensions Working with extension SVG format Extension office for Data Transfer Importing CA certificates from your local Java into DBeaver Contribute your code Localization Brazilian Portuguese standardization bypass hostname validation. Use self signed certificate (non-secure) Acceptance of self-signed certificates. Force TLS 1.2 Enforce using TLS version 1.2. DBeaver Lite User Guide 24.2.ea. Page 94 of 1010 authentication. MONGODB- X509 A certificate-based authentication mechanism that validates the client's certificates. X.509 NONE No authentication is required. This method should only be used in secure, isolated0 码力 | 1010 页 | 79.48 MB | 1 年前3
DBeaver Ultimate User Guide v24.2.eaextensions Working with extension SVG format Extension office for Data Transfer Importing CA certificates from your local Java into DBeaver Contribute your code Localization Brazilian Portuguese standardization bypass hostname validation. Use self signed certificate (non-secure) Acceptance of self-signed certificates. Force TLS 1.2 Enforce using TLS version 1.2. DBeaver Ultimate User Guide 24.2.ea. Page 97 of authentication. MONGODB- X509 A certificate-based authentication mechanism that validates the client's certificates. X.509 NONE No authentication is required. This method should only be used in secure, isolated0 码力 | 1171 页 | 94.65 MB | 1 年前3
DBeaver User Guide v24.2.eaDBeaver User Guide 24.2.ea. Page 14 of 1171. Extension office for Data Transfer Importing CA certificates from your local Java into DBeaver Contribute your code Localization Brazilian Portuguese standardization bypass hostname validation. Use self signed certificate (non-secure) Acceptance of self-signed certificates. Force TLS 1.2 Enforce using TLS version 1.2. DBeaver User Guide 24.2.ea. Page 97 of 1171. authentication. MONGODB- X509 A certificate-based authentication mechanism that validates the client's certificates. X.509 NONE No authentication is required. This method should only be used in secure, isolated0 码力 | 1171 页 | 94.79 MB | 1 年前3
Ozone meetup Nov 10, 2022 Ozone User Group SummitContainers} Container Container Storage Container Manager {Manage Containers, allocate blocks, certificates, datanodes} Container Container DataNodes {Store Data Blocks In Containers} Container Container Container Manager {Manage Containers, allocate blocks, certificates, datanodes} Storage Container Manager {Manage Containers, allocate blocks, certificates, datanodes} HA Raft Ring HA Raft Ring Immutable0 码力 | 78 页 | 6.87 MB | 1 年前3
共 10 条
- 1













