The Trials and Success of Adopting Envoy at Tinder

The Trials and Success of Adopting Envoy at Tinder

CNCF [Cloud Native Computing Foundation] via YouTube Direct link

Mapping The Attackers

13 of 17

13 of 17

Mapping The Attackers

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Trials and Success of Adopting Envoy at Tinder

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Overview
  3. 3 Why Envoy?
  4. 4 Downsides of k8s Native Networking envoycon
  5. 5 Move to Envoy Based Mesh Network envoycon
  6. 6 Migration Hurdles
  7. 7 Before and After Mesh
  8. 8 Network Tuning
  9. 9 Observability Improvements
  10. 10 Gotchas: Timeouts and Retries
  11. 11 Gotchas: Container lifecycle
  12. 12 Global Rate Limiting
  13. 13 Mapping The Attackers
  14. 14 Configuration
  15. 15 EDS Control Plane
  16. 16 Firemesh
  17. 17 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.