Istio is a long wild river: how to navigate it safelyhundreds of proxies running ● Proxies are OOM Killed every X minutes since they cannot handle the change frequency ● Proxies are heavily CPU throttling and consuming CPU without traffic ● Envoy configuration 39 Guardrails for Istio Stabilizing Istio ○ The service mesh is common to all users ○ Any change to it spreads across the whole mesh ■ Any misconfiguration spread too, be it intentional or not All HTTP requests are retried twice! The other even better surprise is: You cannot disable it or change it! 53 Istio default retry policy Adopting Istio So you’re stuck with adding a RetryPolicy for0 码力 | 69 页 | 1.58 MB | 1 年前3
Istio Security Assessmentagain with notes that it should be replaced by a DNS-based secure signing method. So the updated change log notes: “Despite the naming, in Istio 1.5 when controlPlaneSecurityEnabled is set to false, communication sha1.Sum(buf) if sha == h.latestSHA && h.list != nil { // the list hasn't changed since last time h.log.Infof("Fetched list is unchanged") h.resetPurgeTimer() return } • istio/istio/mixer/pkg/runtime/handler/signature bytes.TrimSpace(chunk) if len(chunk) == 0 { continue } r, err := ParseChunk(chunk) if err != nil { log.Errorf("Error processing %s[%d]: %v", path, i, err) continue } if r == nil { continue } resources0 码力 | 51 页 | 849.66 KB | 1 年前3
Envoy原理介绍及线上问题踩坑http_in spector http_connecti on_manager … router upstream conn pool codec codec metadata_ex change iptables http/1.x h2c cluster L7过滤 L4过滤 监听过滤 下游 连接 上游 连接 outbound • APP发出的请求被iptables拦截, on_manager … router upstream conn pool codec codec backend http/1.x h2c iptables metadata_ex change 监听过滤 L7过滤 L4过滤 下游 连接 上游 连接 cluster inbound • 目标POD收到从网络进入的流量,通过iptables拦截后判断为inbound并DNA 00 4000.00 6000.00 8000.00 10000.00 12000.00 14000.00 16000.00 1 2 3 4 5 6 7 8 9 10 QPS LOG(连接数)2 默认连接策略与增强连接策略平均 QPS对比 默认连接策略平均qps 增强连接策略平均qps 1.01 1.31 1.99 3.70 5.22 8.57 17.82 280 码力 | 30 页 | 2.67 MB | 1 年前3
Istio audit report - ADA Logics - 2023-01-30 - v1.036 37 38 39 40 41 42 43 44 45 46 47 48 49 50 import ( "bytes" "context" "crypto/tls" "fmt" "io" "log" "net/http" "os" "os/signal" "time" byteSize "github.com/inhies/go-bytesize" "istio.io/istio/pkg/backoff" if err = srv.ListenAndServe(); err != nil && err != http.ErrServerClosed { log.Fatalf("listen:%+s\n", err) } }() log.Printf("server started") d, err := time.ParseDuration("20s") if err != nil { fmt.Println("Fetching") f.Fetch(context.Background(), "http://localhost:6969", true) <-ctx.Done() log.Printf("server stopped") ctxShutDown, cancel := context.WithTimeout(context.Background(), 5*time0 码力 | 55 页 | 703.94 KB | 1 年前3
Using Istio to Build the Next 5G PlatformAspen Mesh. All rights reserved. ● Augment tracing to surface 5G specific tags ● Optimize HTTP/2 stream and connection settings ● Configure sidecar proxy concurrency Tuning Istio to Meet 5G Requirements0 码力 | 18 页 | 3.79 MB | 1 年前3
IstioCon 2021 Partner Packagesthe event organizer* on the event website. ● This PII is used to send attendees links to the live stream, communicate important event details and collect aggregate attendance data. ● This PII will not0 码力 | 23 页 | 3.18 MB | 1 年前3
全栈服务网格 - Aeraki 助你在
Istio 服务网格中管理任何七层流量#IstioCon MetaProtocol: 响应处理路径 处理流程: 1. Decoder 解析 Upstream 的响应,填充 Metadata 2. Router 根据 connection/stream 对应关系找到响应的 Downstream 连接 3. L7 filter 从 Metadata 获取所需的数据,进行响应方向的业务处理 4. L7 filter 将需要修改的数据放入 Mutation0 码力 | 29 页 | 2.11 MB | 1 年前3
How HP set up secure and
wise platform with Istioin a configurable set of formats #IstioCon Excellent Observability - Access logs Log Files Parse Istio-proxy Log • Each API Access Count • Each API Fail Rate • Each API Latency Easy to debug Easy report Easy to alert Elastalert #IstioCon Excellent Observability - Access logs Istio-proxy log showed in kibana after parse #IstioCon Excellent Observability - Access logs API Error In last0 码力 | 23 页 | 1.18 MB | 1 年前3
Service mesh security best practices: from implementation to verification manage source of truth for mesh policies. Audit log Cluster security Edge security Workload security Operation security 3. Monitor audit log. 3 Lifecycle of service mesh security and demo Lifecycle of service mesh security Edge Cluster Workload Operation GitOps Gatekeeper RBAC Audit log Metrics Security testing tools Security dashboard Prometheus Kiali Security Lifecycle Concepts0 码力 | 29 页 | 1.77 MB | 1 年前3
Preserve Original Source
Address within Istiosame client is forwarded to the same backend 2. Security Policy: set white/black list 3. Access log & Stats 4. Specific scenarios like SIP Trunking #IstioCon Common Ways to Preserve Original Src Addr0 码力 | 29 页 | 713.08 KB | 1 年前3
共 13 条
- 1
- 2













