Not rendering correctly? View this email as a web page here.

This week: A special message from Magalix CEO and Founder Mohamed Ahmed. Istio and Service Mesh.

Hey there,

This week we continue our series on Service Mesh, by diving in to Istio.

Also, we have a special message from our CEO and Founder, Mohamed Ahmed this week. Check it out here.

We also had about another dozen applicants to our Write for Cloud-Native program. We're super excited to help you all share your knowledge with our 40,000 blog readers each month. Our first Write for Cloud Native applicant article will be published and shared with you next week. Thanks for reading, as always!

Write For Cloud-Native on the Magalix Blog

 
 
 
 

getting started with istio

Getting Started With Istio: Overview And Installation

In a previous article, we discussed the concept of Service Meshes. We explained the need for a service mesh in a microservices environment and we also scratched the surface by building a simple lab where we used Envoy, the de facto sidecar proxy. In this article, we get to know one of the most popular service-meshes out there: Istio. Let’s start by installing the framework on your existing Kubernetes cluster.

 

What is a service mesh?-3

What Is A Service Mesh?

In order to understand how, or why, a tool or technology has come into existence, you can start by taking a look at the origins of the problem it tries to solve, and what the world would potentially look like without this new technology. Microservices have been around for some time -- it’s an architecture that aims at breaking large monolithic applications into small units that communicate with each other through HTTP protocol. It’s also a model created to solve the issues of scalability and availability.


 

From the K8s Community


Catch Emerging Security Risks Earlier by Leveraging Kubernetes Audit Logs

The complex and dynamic communication between the applications’ components, as well as the automated Kubernetes orchestration activities, makes it difficult to understand the structure of each application and differentiate between normal behavior and malicious behavior from the observed network activity. The ephemeral nature of pods, which may exist only for moments to perform an activity before they are disposed of, makes this task even more difficult. A pod that was vulnerable may be gone by the time security teams are investigating a breach, or resume normal operation as the attacker pauses its abuse or pivots or escalates the attack to another Kubernetes resource.

Read More....


An Introduction to Kubernetes Network Policies for Security People

Many organizations are currently adopting Kubernetes to run their applications. This is happening to such an extent that some people are referring to Kubernetes as the new data-center operating system. Consequently, organizations are starting to treat Kubernetes (often abbreviated as k8s) as a mission-critical platform that requires mature business processes including network security.

Read More...


5 ways to lose data on Kubernetes—and how to avoid them

If your critical databases and stateful applications are migrating to Kubernetes, the sorrows of accidental data loss aren't far behind. And data is the lifeblood of modern applications.

Read More....


Primer: A Developers Guide to Deploying to Kubernetes

Kubernetes was founded to help developers ship and scale their applications. We know things aren’t done until they’re delivered. So to help you get there, here is a quick 411 on what developers need to know to deploy their applications to Kubernetes.

Read More....


If there is something you want us to include in a newsletter please send it to weekly@magalix.com


Ready to understand more about your K8s clusters? Check us out at the Azure and GCP Marketplaces below.

AzureGCP marketplace

Find us on GitHub github_PNG58