In the previous chapter, we went through how to configure the Ingress, Egress, and ServiceEntry components for interacting with the world outside of the Kubernetes cluster. We also went through how to encrypt requests between the microservices. So now we can deploy a secure application on Kubernetes with the ability and control to interact with the external network. In an ideal scenario, this setup should be sufficient to run a production application, but developers tend to forget the fallacies of distributed computing, ...
6. Service Resiliency
Get Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.