Describes how to configure Istio to perform TLS origination for traffic to external services.| Istio
Describes how to configure Istio to route traffic from services in the mesh to external services.| Istio
This task shows you how to configure Envoy proxies to print access logs to their standard output.| Istio
It is a very common misconception that egress policies in Istio can be used for security purposes. This is not true. Despite repeatedly explaining this (and documenting it), I still often see people that do not believe it, and that they can just add one more check to lock things down. In this post, I will show a variety of ways to bypass any possible check, and prove that these policies cannot be used as secure policies.| blog.howardjohn.info
Deploys a sample application composed of four separate microservices used to demonstrate various Istio features.| Istio