Video description
Solve difficult service-to-service communication challenges around security, observability, routing, and resilience with an Istio-based service mesh. Istio allows you to define these traffic policies as configuration and enforce them consistently without needing any service-code changes.In Istio in Action you will learn:
- Why and when to use a service mesh
- Envoy’s role in Istio’s service mesh
- Allowing “North-South” traffic into a mesh
- Fine-grained traffic routing
- Make your services robust to network failures
- Gain observability over your system with telemetry “golden signals”
- How Istio makes your services secure by default
- Integrate cloud-native applications with legacy workloads such as in VMs
Reduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, you’ll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic.
About the Technology
Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish application-level network policies. By separating communication from business logic, your services are easier to write, maintain, and modify.
About the Book
Istio in Action teaches you how to implement an Istio-based service mesh that can handle complex routing scenarios, traffic encryption, authorization, and other common network-related tasks. You’ll start by defining a basic service mesh and exploring the data plane with Istio’s service proxy, Envoy. Then, you’ll dive into core topics like traffic routing and visualization and service-to-service authentication, as you expand your service mesh to workloads on multiple clusters and legacy VMs.
What's Inside
- Comprehensive coverage of Istio resources
- Practical examples to showcase service mesh capabilities
- Implementation of multi-cluster service meshes
- How to extend Istio with WebAssembly
- Traffic routing and observability
- VM integration into the mesh
About the Reader
For developers, architects, and operations engineers.
About the Authors
Christian Posta is a well-known architect, speaker, and contributor. Rinor Maloku is an engineer at Solo.io working on application networking solutions.
Quotes
Presents a clear-headed vision of how to achieve the goal of decoupling applications from infrastructure. I hope you’ll enjoy this book as much as I have.
- From the Foreword by Eric Brewer, VP Infrastructure and Google Fellow
I really enjoyed the gentle introduction to Istio. I can easily recommend this book to everyone starting development with Kubernetes.
- Christoph Schubert, SAP SE
A comprehensive guide for building an in-depth understanding of the Istio service mesh.
- Fotis Stamatelopoulos, Upwork
It felt like I was shadowing a highly skilled subject matter expert.
- Paolo Antinori, Red Hat
Table of contents
- Part 1 Understanding Istio
- Chapter 1. Introducing the Istio service mesh
- Chapter 1. Our cloud infrastructure is not reliable
- Chapter 1. Solving these challenges with application libraries
- Chapter 1. What’s a service mesh?
- Chapter 1. How a service mesh relates to an enterprise service bus
- Chapter 1. Where Istio fits in distributed architectures
- Chapter 2. First steps with Istio
- Chapter 2. Getting to know the Istio control plane
- Chapter 2. Deploying your first application in the service mesh
- Chapter 2. Istio observability
- Chapter 2. Istio for resiliency
- Chapter 3. Istio’s data plane: The Envoy proxy
- Chapter 3. Envoy’s core features, Part 1
- Chapter 3. Envoy’s core features, Part 2
- Chapter 3. Configuring Envoy
- Chapter 3. Envoy in action
- Chapter 3. Envoy request retries
- Part 2 Securing, observing, and controlling your service’s network traffic
- Chapter 4. Istio gateways: Getting traffic into a cluster
- Chapter 4. Specifying Gateway resources
- Chapter 4. Securing gateway traffic
- Chapter 4. HTTP redirect to HTTPS
- Chapter 4. Exposing TCP ports on an Istio gateway
- Chapter 4. Operational tips
- Chapter 5. Traffic control: Fine-grained traffic routing
- Chapter 5. Routing requests with Istio
- Chapter 5. Traffic shifting
- Chapter 5. Reducing risk even further: Traffic mirroring
- Chapter 6. Resilience: Solving application networking challenges
- Chapter 6. Client-side load balancing
- Chapter 6. Testing various client-side load-balancing strategies
- Chapter 6. Locality-aware load balancing
- Chapter 6. Transparent timeouts and retries
- Chapter 6. Advanced retries
- Chapter 6. Guarding against slow services with connection-pool control
- Chapter 6. Guarding against unhealthy services with outlier detection
- Chapter 7. Observability: Understanding the behavior of your services
- Chapter 7. Exploring Istio metrics
- Chapter 7. Scraping Istio metrics with Prometheus
- Chapter 7. Customizing Istio’s standard metrics
- Chapter 7. Creating new metrics
- Chapter 8. Observability: Visualizing network behavior with Grafana, Jaeger, and Kiali
- Chapter 8. How does distributed tracing work?
- Chapter 8. Viewing distributed tracing data
- Chapter 8. Visualization with Kiali
- Chapter 9. Securing microservice communication
- Chapter 9. Auto mTLS
- Chapter 9. Understanding Istio’s PeerAuthentication resource
- Chapter 9. Authorizing service-to-service traffic
- Chapter 9. Allowing requests originating from a single namespace
- Chapter 9. End-user authentication and authorization
- Chapter 9. Integrating with custom external authorization services
- Part 3 Istio day-2 operations
- Chapter 10. Troubleshooting the data plane
- Chapter 10. Discovering misconfigurations with Kiali
- Chapter 10. Querying proxy configurations using istioctl
- Chapter 10. Troubleshooting application issues
- Chapter 10. Inspect network traffic with ksniff
- Chapter 11. Performance-tuning the control plane
- Chapter 11. Monitoring the control plane
- Chapter 11. Tuning performance
- Chapter 11. Ignoring events: Reducing the scope of discovery using discovery selectors
- Chapter 11. Event-batching and push-throttling properties
- Part 4 Istio in your organization
- Chapter 12. Scaling Istio in your organization
- Chapter 12. How workloads are discovered in multi-cluster deployments
- Chapter 12. Overview of a multi-cluster, multi-network, multi-control-plane service mesh
- Chapter 12. Enabling cross-cluster workload discovery
- Chapter 12. Setting up cross-cluster connectivity
- Chapter 12. Load-balancing across clusters
- Chapter 13. Incorporating virtual machine workloads into the mesh
- Chapter 13. Virtual machine high availability
- Chapter 13. Setting up the infrastructure
- Chapter 13. Representing a group of workloads with a WorkloadGroup
- Chapter 13. Routing traffic to cluster services
- Chapter 13. Demystifying the DNS proxy
- Chapter 14. Extending Istio on the request path
- Chapter 14. Configuring an Envoy filter with the EnvoyFilter resource
- Chapter 14. Rate-limiting requests with external call-out
- Chapter 14. Extending Istio’s data plane with Lua
- Chapter 14. Building a new Envoy filter with WebAssembly
- Appendix A. Customizing the Istio installation
- Appendix B. Istio’s sidecar and its injection options
- Appendix C. Istio security: SPIFFE
- Appendix C. How Istio implements SPIFFE
- Appendix E. How the virtual machine is configured to join the mesh
Product information
- Title: Istio in Action, Video Edition
- Author(s):
- Release date: April 2022
- Publisher(s): Manning Publications
- ISBN: None
You might also like
video
Elasticsearch 8 and the Elastic Stack: In-Depth and Hands-On
Learn all the latest techniques to search, analyze, and visualize big data with Elasticsearch, Kibana, Logstash, …
video
SSL Complete Guide 2021: HTTP to HTTPS
Configure Cloudflare, Free Let's Encrypt SSL/TLS certificate, NGINX, and Apache web servers, create CSR SSL requests …
video
AWS Certified Solutions Architect Associate (SAA-C03)
8+ Hours of Video Instruction Get intensive, hands-on AWS training with Chad Smith in this 2 …
video
ChatGPT: Possibilities and Pitfalls
Sponsored by deepset Reaching a million users in less than a week, ChatGPT has ignited discussions …