Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore microservices security challenges and solutions in this hands-on tutorial from linux.conf.au 2020. Learn about Istio's architecture for addressing security needs in distributed systems, including traffic encryption, access control, and auditing. Gain practical experience with custom policy enforcement, service traffic encryption using mutual TLS, and mitigating threats against data, endpoints, and communications. Suitable for those with intermediate understanding of container technology and microservices architecture. Bring a device with a modern browser to access cloud-based labs and discover how to implement robust security measures for your microservices deployments.
Syllabus
Introduction
Microservices benefits challenges
Distributed architecture
Example application
Microservices based architecture
Traditional approaches
Microservices architecture
Container assertion
Service Mesh
Capabilities
Kubernetes Terminology
Sidecar
Firewall
Control Plane
Respect to Connect
Security
observability
sto
teo
Lab
Workshop Overview
Key Ally
Openshift
Cube CDN
CubeCTL
Generating Loads
namespace
ID
Proxy Sidecar
Distributed Tracing
Certificate Acceptance
Lab Environment
Service Mesh Routing
Recommendation Routing
Most important thing
Taught by
linux.conf.au