Performance tuning and best practices in a Knative based, large-scale serverless platform with IstioCloud, which based on these Opensource technologies. Before he was architect for Cloud Foundry on Kubernetes in IBM Cloud. #IstioCon ● Knative and Istio ● How Istio is leveraged in a Knative based platform is the default networking layer solution of Knative. It is leveraged for Net-istio is A Knative ingress controller for Istio. Knative is an open source project which provides a set of components (Serving (Serving and Eventing) that introduce event-driven and serverless capabilities for Kubernetes clusters for deploying, running, and managing serverless, cloud- native applications. It provides benefits:0 码力 | 23 页 | 2.51 MB | 1 年前3
Apache APISlX from Gateway to Full Traffic Proxy with Istio
Full Traffic Proxy with Istio Jintao Zhang API7.ai #IstioCon About Me ● Apache APISIX PMC ● Kubernetes Ingress NGINX maintainer ● Microsoft MVP ● zhangjintao@apache.org ● https://github.com/tao12345666333 L4/L7 Gateway(weibo、WPS) ● Microservices API Gateway(iQIYI) ● Kubernetes Ingress controller(UPYUN) ● https://github.com/apache/apisix-ingress-controller/ #IstioCon Why use Apache APISIX as the data plane0 码力 | 15 页 | 1.29 MB | 6 月前0.03
Is Your Virtual Machine Really Ready-to-go with Istio?mesh ○ Istio control plane services (Pilot, Mixer, CA) accessible from the VMs ○ (optional) Kubernetes DNS server accessible from the VMs ● Onboard steps ○ Setup Internal Load Balancers (ILBs) for Cluster IP resolved 4. Traffic intercepted by the sidecar proxy 5. xDS ■ Traffic forwarded to ingress in the mesh ● Traffic flow (Container -> VM) 1. Manual registration istioctl -n onprem register representation for the workloads themselves #IstioCon V1.6-1.8 Better VM Workload Abstraction Item Kubernetes Virtual Machine Basic schedule unit Pod WorkloadEntry Component Deployment WorkloadGroup Service0 码力 | 50 页 | 2.19 MB | 1 年前3
Service mesh security best practices: from implementation to verification Compromise Control Plane Service mesh security architecture Cluster Workload Edge Operations Ingress Policies Egress Policies WAF / IDS Firewall User AuthN/Z Data Loss Prevention Certificate Operation security Mesh security Edge Security Cluster security Service Proxy Ingress 1. Define ingress security policies to control accesses to services. Deploy web application firewall to security best practices Cluster security Access control Service Proxy Ingress Token exchange 1. Istio authentication and authorization policies for every service: mTLS to0 码力 | 29 页 | 1.77 MB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using IstioServer NLB Controllers Istiod Network Load Balancer (NLB) Network Load Balancer (NLB) Ingress Gateway Ingress Gateway Pods Request Traffic Response Traffic Specs synced from Federated Access Access Point L4 Configuration L7 Route Configuration watch Client Traffic tunneled to Ingress Gateways One Istio Deployment per workload K8s cluster #IstioCon Step 3: Evolve into AZ architecture Re-deployed Istio to AZ cluster ○ In Primary-Remote configuration within an AZ AZ AZ Cluster Ingress Gateways API Server Istiod East-West Gateway watch API Server Pods, Services Workload0 码力 | 22 页 | 505.96 KB | 1 年前3
Using Istio to Build the Next 5G PlatformNamespace SMF SQL DB AMF App B AMF App A SMF Frontend SMF Ingress Gateway Redis DB SMF App X AMF Identity SMF Identity SMF Identity 10 ©2021 Aspen Namespace AMF Namespace SMF SQL DB AMF App B AMF App A SMF Frontend SMF Ingress Gateway Redis DB SMF App X https://aspenmesh.io/how-to-capture-packets-that-dont-exist/0 码力 | 18 页 | 3.79 MB | 1 年前3
DBeaver Lite User Guide v24.2.eaMaster password Security in DBeaver PRO SSH configuration SSL configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings if your connection requires encryption. configure SSL Kubernetes Configure Kubernetes settings if your database is hosted within a Kubernetes cluster. Setting Description Connection Assign a specific Page 105 of 1010. Setting up Kubernetes Kubectl settings Testing port forwarding In some scenarios, you may need to interact with databases that are part of a Kubernetes cluster. DBeaver offers a way0 码力 | 1010 页 | 79.48 MB | 1 年前3
DBeaver Ultimate User Guide v24.2.eaMaster password Security in DBeaver PRO SSH configuration SSL configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings if your connection requires encryption. configure SSL Kubernetes Configure Kubernetes settings if your database is hosted within a Kubernetes cluster. Setting Description Connection Assign a specific Page 108 of 1171. Setting up Kubernetes Kubectl settings Testing port forwarding In some scenarios, you may need to interact with databases that are part of a Kubernetes cluster. DBeaver offers a way0 码力 | 1171 页 | 94.65 MB | 1 年前3
DBeaver User Guide v24.2.eaConfigure connection Network configuration settings DBeaver User Guide 24.2.ea. Page 3 of 1171. Kubernetes configuration AWS SSM configuration Shell commands Changing current user password Authentication if your connection requires encryption. configure SSL Kubernetes Configure Kubernetes settings if your database is hosted within a Kubernetes cluster. Setting Description Assign a specific name to Enterprise Ultimate Team Setting up Kubernetes Kubectl settings Testing port forwarding In some scenarios, you may need to interact with databases that are part of a Kubernetes cluster. DBeaver offers a way0 码力 | 1171 页 | 94.79 MB | 1 年前3
Istio 2021 Roadmap A heartwarming work of staggering predictabilityio/latest/blog/2020/tradewinds-2020/ #IstioCon Other improvement areas ● Native Kubernetes API integration ○ Kubernetes Service APIs ○ Kubernetes Multi-cluster APIs ● Adopt & drive innovation in Envoy community0 码力 | 17 页 | 633.89 KB | 1 年前3
共 14 条
- 1
- 2













