A poetic recollection of how India and Australia’s riveting rivalry has unfolded since Ricky Ponting and co last conquered the Indian Subcontinent
In many ways, Cricket has been a funny game
Playing home and away, teams are never the same
When India plays Australia, neither is a great host
When they visit the other, the record is nothing to boast
For the Aussies, 2004 was a landmark year
Finally, they conquered India, their Final Frontier
It was the end of so many years of hurt and pain
But the wait would be long before they would win again
Istio is a powerful tool to enforce secure communication but the path from development to production is not as simple as it sounds.
The article has been co-authored by Saurabh Shekhar
There are multiple resources on the subject, you may explore the internet for the same or find a relevant article of mine here.
The summary is to use a combination of PeerAuthentication and Destination rules to configure and enforce mTLS on both the sender side as well as receiver side However, it may not always be as simple as that.
Most of the references and examples in the Istio…
Using the power of mTLS to secure services with minimal application intervention
Istio is a service mesh used to manage microservices on Kubernetes. It is used to connect, control, secure, and observe microservices at scale. It consists of two major components:
You can find details on how to set up Istio here. It is suggested that the reader also checks the compatibility matrix to ensure your Istio and Kubernetes (and correspondingly the istioctl and kubectl) versions are compatible.
Before diving in further, let us have a quick look at the architecture of Istio:
For a new learner, Kubernetes (commonly referred to as K8s) can be a steep learning curve. This article covers a brief conceptual overview to kickstart your journey
A Kubernetes cluster has two components:
A homogenous set of physical resources that provide the underlying resources for the cluster. …