Introducing Istio Service Mesh for Microservices: Build and Deploy Resilient, Fault-Tolerant Cloud Native Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Istio is the implementation of a service mesh that improves application resilience as you connect, manage, and secure microservices. In the course of reading this second edition, you will focus on several key microservices capabilities that Istio provides on Kubernetes and OpenShift. This book explains how to: * Build more dependable software and deliver it faster than before. * Create powerful and resilient cloud native applications. * Improve traffic control, service resiliency, testing, observability, and the security of microservices.

Author(s): Burr Sutter, Christian Posta
Edition: 2
Publisher: O'Reilly Media
Year: 2019

Language: English
Pages: 85

Copyright
Table of Contents
Chapter 1. Introduction
The Challenge of Going Faster
Meet Istio
Understanding Istio Components
Data Plane
Control Plane
Chapter 2. Installation and Getting Started
Command-Line Tools Installation
Kubernetes/OpenShift Installation
Istio Installation
Installing Istio Command-Line Tooling
Example Java Microservices Installation
Navigating the Code Base
Building and Deploying the Customer Service
Building and Deploying the Preference Service
Building and Deploying the Recommendation Service
Chapter 3. Traffic Control
Smarter Canaries
Traffic Routing
Routing to Specific Versions of a Deployment
Routing Based on Headers
Dark Launch
Egress
Chapter 4. Service Resiliency
Load Balancing
Timeout
Retry
Circuit Breaker
Pool Ejection
Combination: Circuit Breaker + Pool Ejection + Retry
Chapter 5. Chaos Testing
HTTP Errors
Delays
Chapter 6. Observability
Tracing
Metrics
Service Graph
Chapter 7. Security
mutual Transport Layer Security (mTLS)
Access Control with Mixer Policy
Role-Based Access Control (RBAC)
Conclusion
About the Authors