Performance tuning and best practices in a Knative based, large-scale serverless platform with Istiois the default networking layer solution of Knative. It is leveraged for Net-istio is A Knative ingress controller for Istio. Knative is an open source project which provides a set of components (Serving leveraged in a Knative based platform - Istio as an Ingress Gateway • By default, Knative does not enable service mesh, it uses Istio as an Ingress Gateway. • Enable Secret Discovery Service (SDS) to monitor and mount secrets under istio-system to ingress gateway which contains credentials for https support of multi tenants. • Knative has knative-ingress-gateway for external access and knative-local-gateway0 码力 | 23 页 | 2.51 MB | 1 年前3
Service mesh security best practices: from implementation to verification Compromise Control Plane Service mesh security architecture Cluster Workload Edge Operations Ingress Policies Egress Policies WAF / IDS Firewall User AuthN/Z Data Loss Prevention Certificate Operation security Mesh security Edge Security Cluster security Service Proxy Ingress 1. Define ingress security policies to control accesses to services. Deploy web application firewall to security best practices Cluster security Access control Service Proxy Ingress Token exchange 1. Istio authentication and authorization policies for every service: mTLS to0 码力 | 29 页 | 1.77 MB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using IstioServer NLB Controllers Istiod Network Load Balancer (NLB) Network Load Balancer (NLB) Ingress Gateway Ingress Gateway Pods Request Traffic Response Traffic Specs synced from Federated Access Access Point L4 Configuration L7 Route Configuration watch Client Traffic tunneled to Ingress Gateways One Istio Deployment per workload K8s cluster #IstioCon Step 3: Evolve into AZ architecture Re-deployed Istio to AZ cluster ○ In Primary-Remote configuration within an AZ AZ AZ Cluster Ingress Gateways API Server Istiod East-West Gateway watch API Server Pods, Services Workload0 码力 | 22 页 | 505.96 KB | 1 年前3
Apache APISlX from Gateway to Full Traffic Proxy with Istio
Traffic Proxy with Istio Jintao Zhang API7.ai #IstioCon About Me ● Apache APISIX PMC ● Kubernetes Ingress NGINX maintainer ● Microsoft MVP ● zhangjintao@apache.org ● https://github.com/tao12345666333 Gateway(weibo、WPS) ● Microservices API Gateway(iQIYI) ● Kubernetes Ingress controller(UPYUN) ● https://github.com/apache/apisix-ingress-controller/ #IstioCon Why use Apache APISIX as the data plane for0 码力 | 15 页 | 1.29 MB | 6 月前0.03
Using Istio to Build the Next 5G PlatformNamespace SMF SQL DB AMF App B AMF App A SMF Frontend SMF Ingress Gateway Redis DB SMF App X AMF Identity SMF Identity SMF Identity 10 ©2021 Aspen Namespace AMF Namespace SMF SQL DB AMF App B AMF App A SMF Frontend SMF Ingress Gateway Redis DB SMF App X https://aspenmesh.io/how-to-capture-packets-that-dont-exist/0 码力 | 18 页 | 3.79 MB | 1 年前3
Is Your Virtual Machine Really Ready-to-go with Istio?Cluster IP resolved 4. Traffic intercepted by the sidecar proxy 5. xDS ■ Traffic forwarded to ingress in the mesh ● Traffic flow (Container -> VM) 1. Manual registration istioctl -n onprem register0 码力 | 50 页 | 2.19 MB | 1 年前3
共 6 条
- 1













