Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering Service Mesh
  • Table Of Contents Toc
Mastering Service Mesh

Mastering Service Mesh

By : Anjali Khatri, Khatri
4.4 (5)
close
close
Mastering Service Mesh

Mastering Service Mesh

4.4 (5)
By: Anjali Khatri, Khatri

Overview of this book

Although microservices-based applications support DevOps and continuous delivery, they can also add to the complexity of testing and observability. The implementation of a service mesh architecture, however, allows you to secure, manage, and scale your microservices more efficiently. With the help of practical examples, this book demonstrates how to install, configure, and deploy an efficient service mesh for microservices in a Kubernetes environment. You'll get started with a hands-on introduction to the concepts of cloud-native application management and service mesh architecture, before learning how to build your own Kubernetes environment. While exploring later chapters, you'll get to grips with the three major service mesh providers: Istio, Linkerd, and Consul. You'll be able to identify their specific functionalities, from traffic management, security, and certificate authority through to sidecar injections and observability. By the end of this book, you will have developed the skills you need to effectively manage modern microservices-based applications.
Table of Contents (31 chapters)
close
close
1
Section 1: Cloud-Native Application Management
4
Section 2: Architecture
8
Section 3: Building a Kubernetes Environment
10
Section 4: Learning about Istio through Examples
18
Section 5: Learning about Linkerd through Examples
24
Section 6: Learning about Consul through Examples

Enabling Istio Policy Controls

In a traditional environment, a centralized proxy receives all traffic, and that traffic is routed to the services that do the actual work. As workloads grow, scalability issues can arise. However, Istio solves this and other similar problems with the use of a lean and thin proxy, which we will learn about in this chapter. We will discuss in detail the enablement of policies related to rate limits, service denials, and the enforcement of quotas without having to change any application source code.

By the end of this chapter, you will learn how to enable network-based policies for resource quotas and quota limits, as well as learning about how quota rules are assigned to a demo microservice. Besides this, we will set up a white/blacklist of services (based on IP) within the demo application for service denials.

In a nutshell, we will cover the following...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Mastering Service Mesh
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon