Solve difficult service-to-service communication challenges around security, observability, routing, and resilience with an Istio-based service mesh. Istio allows you to define these traffic policies as configuration and enforce them consistently without needing any service-code changes.
In Istio in Action you will learn:
Why and when to use a service mesh Envoys role in Istios service mesh Allowing North-South traffic into a mesh Fine-grained traffic routing Make your services robust to network failures Gain observability over your system with telemetry golden signals How Istio makes your services secure by default Integrate cloud-native applications with legacy workloads such as in VMs
Reduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, youll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic.
Foreword by Eric Brewer.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish application-level network policies. By separating communication from business logic, your services are easier to write, maintain, and modify.
About the book Istio in Action teaches you how to implement an Istio-based service mesh that can handle complex routing scenarios, traffic encryption, authorization, and other common network-related tasks. Youll start by defining a basic service mesh and exploring the data plane with Istios service proxy, Envoy. Then, youll dive into core topics like traffic routing and visualization and service-to-service authentication, as you expand your service mesh to workloads on multiple clusters and legacy VMs.
What\'s inside
Comprehensive coverage of Istio resources Practical examples to showcase service mesh capabilities Implementation of multi-cluster service meshes How to extend Istio with WebAssembly Traffic routing and observability VM integration into the mesh
About the reader For developers, architects, and operations engineers.
About the author Christian Posta is a well-known architect, speaker, and contributor. Rinor Maloku is an engineer at Solo.io working on application networking solutions.
Table of Contents PART 1 UNDERSTANDING ISTIO 1 Introducing the Istio service mesh 2 First steps with Istio 3 Istios data plane: The Envoy proxy PART 2 SECURING, OBSERVING, AND CONTROLLING YOUR SERVICES NETWORK TRAFFIC 4 Istio gateways: Getting traffic into a cluster 5 Traffic control: Fine-grained traffic routing 6 Resilience: Solving application networking challenges 7 Observability: Understanding the behavior of your services 8 Observability: Visualizing network behavior with Grafana, Jaeger, and Kiali 9 Securing microservice communication PART 3 ISTIO DAY-2 OPERATIONS 10 Troubleshooting the data plane 11 Performance-tuning the control plane PART 4 ISTIO IN YOUR ORGANIZATION 12 Scaling Istio in your organization 13 Incorporating virtual machine workloads into the mesh 14 Extending Istio on the request path
"Presents a clear-headed vision of how to achieve the goal of decoupling applications from infrastructure. I hope you'll enjoy this book as much as I have." From the Foreword by Eric Brewer, VP Infrastructure and Google Fellow
"I really enjoyed the gentle introduction to Istio. I can easily recommend this book to everyone starting development with Kubernetes." Christoph Schubert, SAP SE
"A comprehensive guide for building an in-depth understanding of the Istio service mesh." Fotis Stamatelopoulos, Upwork
"It felt like I was shadowing a highly skilled subject matter expert." Paolo Antinori, Red Hat
From the Author
Rinor (@rinormaloku) and I (@christianposta) have worked over the past 5+ years with users of the Istio community and customers of Solo.io adopting Istio and service mesh in production. This book represents the hard-learned experiences of using Istio in real environments and has something for all: beginner, intermediate, and advanced users of Istio. We cover basics of service mesh, how it enables safer/faster deployments by abstracting common application networking patterns into a sidecar. We also discuss security, metric collection, VM, multi-cluster and extensibility use cases with Istio and Envoy proxy.
About the Author
Christian Posta (@christianposta) is VP, Global Field CTO at Solo.io. He is the author of Istio in Action as well as many other books on cloud-native architecture and is well known in the cloud-native community for being a speaker, blogger ( and contributor to various open-source projects in the service mesh and cloud-native ecosystem (Istio, Kubernetes, et. al.). Christian has spent time at government, commercial enterprises as well as web-scale companies and now helps organizations create and deploy large-scale, cloud-native, resilient, distributed architectures. He enjoys mentoring, training and leading teams to be successful with distributed systems concepts, microservices, DevOps, and cloud-native application design.
Rinor Maloku (@rinormaloku) is an engineer at Solo.io, where he consults clients adopting application networking solutions, such as service meshes. Previously, he worked at Red Hat, where he built middleware software that enabled teams to ensure the high availability of their services. As a freelancer, he consulted multiple DAX 30 members in their endeavor to fully utilize the potential of cloud computing technologies.