Service Mesh


How to Automate Service Mesh Observability With Kuma

The more services you have running across different clouds and Kubernetes clusters, the harder it is to ensure that you have a central place to collect service mesh observability metrics. That’s one of the reasons we created Kuma, an open source control plane for service mesh. In this tutorial, I’ll show you how to set up and leverage the Traffic Metrics and Traffic Trace policies that Kuma provides out of the box. If you haven’t already, install Kuma and connect a service.


Power Your Consul Service Mesh with HAProxy

Many of you use HashiCorp Consul for service discovery. It makes connecting one backend application or service to another easy: Your Consul servers store a catalog of addresses to all of your services; when an application within the network wants to discover where a service is listening, it asks Consul, which gives it the address.


CNCF Tools Series: Linkerd - Service Mesh for Kubernetes

In the past few years, several organizations have started to adopt a microservice architecture. This architecture type creates a large complex application out of a collection of services that are loosely coupled, easy to maintain, and independently deployable. Very often, a microservice architecture is managed using Kubernetes, an open-source orchestration platform that manages your containerized services.


Istio monitoring with Elastic Observability

Istio is an open source service mesh that can be used by developers and operators to successfully control, secure, and connect services together in the world of distributed microservices. While Istio is a powerful tool for teams, it's also important for administrators to have full visibility into its health. In this blog post, we'll take a look at monitoring Istio and its microservices with Elastic Observability. As the Istio docs mention.


Implementing Zero-Trust Service Mesh Security

Imagine you’re going through immigration at the airport. The immigration officer says, “I don’t need your passport because I trust that you are who you claim to be.” Wait, what? That would never happen, right? That’s because trust is exploitable. Sooner or later, somebody will try to lie about who they are, and thus a criminal could enter the country. That’s why countries must enforce some form of identity, like a passport, to certify travelers are who they claim.


Implementing Distributed Tracing with Istio and Envoy

In the past few years, several organizations made the jump from monoliths to microservices architecture. This architectural pattern breaks down a large complex application into a collection of smaller loosely coupled services that are easy to maintain, scale, and deploy independently. However, the downside of modern microservices architecture is the inherent complexity of service-to-service discovery and communications.


Datadog NPM now supports Istio networking

Istio is an open source service mesh that provides an abstraction layer for network traffic between applications, so you can run canary deployments, implement circuit breakers, and otherwise manage the architecture of your network using high-level configuration files. As service meshes become increasingly popular among containerized environments, dev and ops teams need to ensure that Istio is healthy, performant, and routing traffic as intended to keep their network infrastructure running smoothly.