BookShared
  • MEMBER AREA    
  • Istio in Action

    (By Christian E. Posta)

    Book Cover Watermark PDF Icon Read Ebook
    ×
    Size 29 MB (29,088 KB)
    Format PDF
    Downloaded 696 times
    Last checked 16 Hour ago!
    Author Christian E. Posta
    “Book Descriptions: Solve difficult service-to-service communication challenges around security, observability, routing, and resilience with an Istio-based service mesh. Istio allows you to define these traffic policies as configuration and enforce them consistently without needing any service-code changes.

    In Istio in Action you will

    Why and when to use a service mesh
    Envoy's role in Istio's service mesh
    Allowing "North-South" traffic into a mesh
    Fine-grained traffic routing
    Make your services robust to network failures
    Gain observability over your system with telemetry "golden signals"
    How Istio makes your services secure by default
    Integrate cloud-native applications with legacy workloads such as in VMs

    Reduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, you'll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic.

    Foreword by Eric Brewer.

    About the technology
    Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish application-level network policies. By separating communication from business logic, your services are easier to write, maintain, and modify.

    About the book
    Istio in Action teaches you how to implement an Istio-based service mesh that can handle complex routing scenarios, traffic encryption, authorization, and other common network-related tasks. You'll start by defining a basic service mesh and exploring the data plane with Istio’s service proxy, Envoy. Then, you'll dive into core topics like traffic routing and visualization and service-to-service authentication, as you expand your service mesh to workloads on multiple clusters and legacy VMs.

    What's inside

    Comprehensive coverage of Istio resources
    Practical examples to showcase service mesh capabilities
    Implementation of multi-cluster service meshes
    How to extend Istio with WebAssembly
    Traffic routing and observability
    VM integration into the mesh

    About the reader
    For developers, architects, and operations engineers.

    About the author
    Christian Posta is a well-known architect, speaker, and contributor. Rinor Maloku is an engineer at Solo.io working on application networking solutions.

    ToC
    PART 1 UNDERSTANDING ISTIO
    1 Introducing the Istio service mesh
    2 First steps with Istio
    3 Istio's data The Envoy proxy
    PART 2 SECURING, OBSERVING, AND CONTROLLING YOUR SERVICE’S NETWORK TRAFFIC
    4 Istio Getting traffic into a cluster
    5 Traffic Fine-grained traffic routing
    6 Solving application networking challenges”

    Google Drive Logo DRIVE
    Book 1

    Modern Software Engineering: Doing What Works to Build Better Software Faster

    ★★★★★

    David Farley

    Book 1

    Zero to One: Notes on Startups, or How to Build the Future

    ★★★★★

    Peter Thiel

    Book 1

    Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures

    ★★★★★

    Neal Ford

    Book 1

    100 Go Mistakes and How to Avoid Them

    ★★★★★

    Teiva Harsanyi

    Book 1

    Caliban’s War (The Expanse, #2)

    ★★★★★

    James S.A. Corey

    Book 1

    Abaddon’s Gate (The Expanse, #3)

    ★★★★★

    James S.A. Corey

    Book 1

    Killing Moon (Harry Hole, #13)

    ★★★★★

    Jo Nesbø

    Book 1

    Team Topologies: Organizing Business and Technology Teams for Fast Flow

    ★★★★★

    Matthew Skelton

    Book 1

    Cibola Burn (The Expanse, #4)

    ★★★★★

    James S.A. Corey

    Book 1

    Accelerate: Building and Scaling High Performing Technology Organizations

    ★★★★★

    Nicole Forsgren

    Book 1

    Nemesis Games (The Expanse, #5)

    ★★★★★

    James S.A. Corey

    Book 1

    Serious Cryptography: A Practical Introduction to Modern Encryption

    ★★★★★

    Jean-Philippe Aumasson

    Book 1

    Thinking In Systems: A Primer

    ★★★★★

    Donella H. Meadows

    Book 1

    Never Split the Difference: Negotiating as if Your Life Depended on It

    ★★★★★

    Chris Voss