Istio is a long wild river: how to navigate it safely100MB Pod App container Container requests 23 Define HPA target for multi-containers pods Stabilizing Istio CPU: 1 Pod App container Container requests HPA configuration (70% CPU) metrics: multi-containers pods Stabilizing Istio CPU: 1 Pod App container Sidecar container CPU: 100m Container requests HPA configuration (70% CPU) metrics: - type: Resource resource: name: cpu target: type: Utilization averageUtilization: 70 The HPA takes the average of all containers CPU requests values. 25 Define HPA target for multi-containers pods Stabilizing Istio CPU: 1 Pod App container0 码力 | 69 页 | 1.58 MB | 1 年前3
Istio Security Assessmentattacker that is able to create an Istio VirtualService within a Kubernetes cluster can hi- jack the requests of any other namespace’s Istio Gateways if their VirtualService was initially created before other Impact An attacker that is able to create an Istio Gateway within a Kubernetes cluster can intercept requests for any other namespace’s services by using a more specific hostname or if their Gateway was initially Istio uses a single ingress gateway, istio-ingressgateway, in the istio-sys tem namespace to handle requests for all namespaces. As a result of this, it is possible for Gateways in different namespaces to0 码力 | 51 页 | 849.66 KB | 1 年前3
Istio audit report - ADA Logics - 2023-01-30 - v1.0was reported by the auditing team to the Istio maintainers, because Istio does not cap the size of requests made on an h2c connection, which could lead to a denial of service scenario if a large request was the Istio team, Istio maintainer John Howard assessed Golangs recommended solution for capping H2c requests which is: “The first request on an h2c connection is read entirely into memory before the Handler security in the mesh. Istio's security components are especially exposed, as they handle and validate requests from unauthenticated sources. These components need to be robust enough to defend against a series0 码力 | 55 页 | 703.94 KB | 1 年前3
Leveraging Istio for Creating API Tests - Low Effort API Testing for Microservicesapply -f) Capture traces for E2E test requests Create tests & mocks for all services Configure system under test Forward egress requests to mock services | CONFIDENTIAL 10 Capture request and response data for every API request in a trace From this data, we can: • Drive test requests to any of the endpoints • Create precise mocks for any of the endpoints | CONFIDENTIAL Mesh Dynamics Services | CONFIDENTIAL 14 Configure mocks with Istio virtual service Route requests to mock svc with a virtual service - match: - uri: prefix: /reviews rewrite: 0 码力 | 21 页 | 1.09 MB | 1 年前3
Local Istio Development+ No envoy dependency + Complete control over requests - Very different from production environment - May be challenging to reproduce Istio requests #IstioCon Thank you! For more information: ●0 码力 | 16 页 | 424.31 KB | 1 年前3
Observability and Istio Telemetryadaptor• Service. Represent a set/group of workloads to provide the same behaviors for incoming requests. You can define the service name when you are using instrument agents or SDKs. Or SkyWalking uses actually a real process in OS. • Endpoint. It is a path in the certain service for incoming requests, such as HTTP URI path or gRPC service class + method signature. Core ConceptsIstio telemetry0 码力 | 21 页 | 5.29 MB | 6 月前3
5 tips for your first
Istio.io Contributionhesitate to ask a question or send a PR.” https://github.com/istio/istio/wiki/Reviewing-Pull-Requests #IstioCon Learn Istio is a complex project, and Istio.io is the perfect place to start committing0 码力 | 14 页 | 717.74 KB | 1 年前3
Moving large scale consumer
e-commerce Infrastructure to
Mesh#IstioCon About Carousell ● C2C Marketplace in SEA ● Over 4 million monthly active users ● User requests over 10 billion per month ● Internet egress bandwidth over 100 TB/month ● Internal egress bandwidth0 码力 | 14 页 | 1.76 MB | 1 年前3
How HP set up secure and
wise platform with Istiothe client side and server side’s “envoy proxies” verify each other’s identities before sending requests. • If the verification is successful, then the client-side proxy encrypts the traffic, and sends0 码力 | 23 页 | 1.18 MB | 1 年前3
共 9 条
- 1
相关搜索词













