Главная
Study mode:
on
1
Introduction
2
Microservices benefits challenges
3
Distributed architecture
4
Example application
5
Microservices based architecture
6
Traditional approaches
7
Microservices architecture
8
Container assertion
9
Service Mesh
10
Capabilities
11
Kubernetes Terminology
12
Sidecar
13
Firewall
14
Control Plane
15
Respect to Connect
16
Security
17
observability
18
sto
19
teo
20
Lab
21
Workshop Overview
22
Key Ally
23
Openshift
24
Cube CDN
25
CubeCTL
26
Generating Loads
27
namespace
28
ID
29
Proxy Sidecar
30
Distributed Tracing
31
Certificate Acceptance
32
Lab Environment
33
Service Mesh Routing
34
Recommendation Routing
35
Most important thing
Description:
Explore microservices security challenges and solutions in this hands-on tutorial from linux.conf.au 2020. Learn about Istio's architecture for addressing security needs in distributed systems, including traffic encryption, access control, and auditing. Gain practical experience with custom policy enforcement, service traffic encryption using mutual TLS, and mitigating threats against data, endpoints, and communications. Suitable for those with intermediate understanding of container technology and microservices architecture. Bring a device with a modern browser to access cloud-based labs and discover how to implement robust security measures for your microservices deployments.

Macro Security for Your Microservices

linux.conf.au
Add to list
0:00 / 0:00