TorBT - Torrents and Magnet Links Search Engine
Oreilly - Istio in Action
- Date: 2026-03-24
- Size: 1.7 GB
- Files: 87
File Name
Size
021. Chapter 4. Specifying Gateway resources.mp4
33 MB
002. Chapter 1. Introducing the Istio service mesh.mp4
27 MB
003. Chapter 1. Our cloud infrastructure is not reliable.mp4
18 MB
004. Chapter 1. Solving these challenges with application libraries.mp4
28 MB
005. Chapter 1. What’s a service mesh.mp4
28 MB
006. Chapter 1. How a service mesh relates to an enterprise service bus.mp4
25 MB
007. Chapter 1. Where Istio fits in distributed architectures.mp4
17 MB
008. Chapter 2. First steps with Istio.mp4
27 MB
009. Chapter 2. Getting to know the Istio control plane.mp4
20 MB
010. Chapter 2. Deploying your first application in the service mesh.mp4
15 MB
011. Chapter 2. Istio observability.mp4
19 MB
012. Chapter 2. Istio for resiliency.mp4
26 MB
013. Chapter 3. Istio’s data plane The Envoy proxy.mp4
22 MB
014. Chapter 3. Envoy’s core features, Part 1.mp4
19 MB
015. Chapter 3. Envoy’s core features, Part 2.mp4
18 MB
016. Chapter 3. Configuring Envoy.mp4
19 MB
017. Chapter 3. Envoy in action.mp4
13 MB
018. Chapter 3. Envoy request retries.mp4
16 MB
019. Part 2 Securing, observing, and controlling your service’s network traffic.mp4
4.9 MB
020. Chapter 4. Istio gateways Getting traffic into a cluster.mp4
21 MB
001. Part 1 Understanding Istio.mp4
3.4 MB
022. Chapter 4. Securing gateway traffic.mp4
19 MB
023. Chapter 4. HTTP redirect to HTTPS.mp4
18 MB
024. Chapter 4. Exposing TCP ports on an Istio gateway.mp4
14 MB
025. Chapter 4. Operational tips.mp4
22 MB
026. Chapter 5. Traffic control Fine-grained traffic routing.mp4
15 MB
027. Chapter 5. Routing requests with Istio.mp4
14 MB
028. Chapter 5. Traffic shifting.mp4
25 MB
029. Chapter 5. Reducing risk even further Traffic mirroring.mp4
25 MB
030. Chapter 6. Resilience Solving application networking challenges.mp4
24 MB
031. Chapter 6. Client-side load balancing.mp4
15 MB
032. Chapter 6. Testing various client-side load-balancing strategies.mp4
20 MB
033. Chapter 6. Locality-aware load balancing.mp4
29 MB
034. Chapter 6. Transparent timeouts and retries.mp4
22 MB
035. Chapter 6. Advanced retries.mp4
17 MB
036. Chapter 6. Guarding against slow services with connection-pool control.mp4
22 MB
037. Chapter 6. Guarding against unhealthy services with outlier detection.mp4
13 MB
038. Chapter 7. Observability Understanding the behavior of your services.mp4
26 MB
039. Chapter 7. Exploring Istio metrics.mp4
28 MB
040. Chapter 7. Scraping Istio metrics with Prometheus.mp4
15 MB
041. Chapter 7. Customizing Istio’s standard metrics.mp4
20 MB
042. Chapter 7. Creating new metrics.mp4
25 MB
043. Chapter 8. Observability Visualizing network behavior with Grafana, Jaeger, and Kiali.mp4
20 MB
044. Chapter 8. How does distributed tracing work.mp4
21 MB
045. Chapter 8. Viewing distributed tracing data.mp4
21 MB
046. Chapter 8. Visualization with Kiali.mp4
29 MB
047. Chapter 9. Securing microservice communication.mp4
22 MB
048. Chapter 9. Auto mTLS.mp4
14 MB
049. Chapter 9. Understanding Istio’s PeerAuthentication resource.mp4
14 MB
050. Chapter 9. Authorizing service-to-service traffic.mp4
20 MB
051. Chapter 9. Allowing requests originating from a single namespace.mp4
22 MB
052. Chapter 9. End-user authentication and authorization.mp4
27 MB
053. Chapter 9. Integrating with custom external authorization services.mp4
21 MB
054. Part 3 Istio day-2 operations.mp4
599 kB
055. Chapter 10. Troubleshooting the data plane.mp4
19 MB
056. Chapter 10. Discovering misconfigurations with Kiali.mp4
14 MB
057. Chapter 10. Querying proxy configurations using istioctl.mp4
22 MB
058. Chapter 10. Troubleshooting application issues.mp4
20 MB
059. Chapter 10. Inspect network traffic with ksniff.mp4
24 MB
060. Chapter 11. Performance-tuning the control plane.mp4
17 MB
061. Chapter 11. Monitoring the control plane.mp4
25 MB
062. Chapter 11. Tuning performance.mp4
27 MB
063. Chapter 11. Ignoring events Reducing the scope of discovery using discovery selectors.mp4
21 MB
064. Chapter 11. Event-batching and push-throttling properties.mp4
20 MB
065. Part 4 Istio in your organization.mp4
1.9 MB
066. Chapter 12. Scaling Istio in your organization.mp4
19 MB
067. Chapter 12. How workloads are discovered in multi-cluster deployments.mp4
20 MB
068. Chapter 12. Overview of a multi-cluster, multi-network, multi-control-plane service mesh.mp4
29 MB
069. Chapter 12. Enabling cross-cluster workload discovery.mp4
18 MB
070. Chapter 12. Setting up cross-cluster connectivity.mp4
16 MB
071. Chapter 12. Load-balancing across clusters.mp4
21 MB
072. Chapter 13. Incorporating virtual machine workloads into the mesh.mp4
16 MB
073. Chapter 13. Virtual machine high availability.mp4
24 MB
074. Chapter 13. Setting up the infrastructure.mp4
19 MB
075. Chapter 13. Representing a group of workloads with a WorkloadGroup.mp4
19 MB
076. Chapter 13. Routing traffic to cluster services.mp4
17 MB
077. Chapter 13. Demystifying the DNS proxy.mp4
25 MB
078. Chapter 14. Extending Istio on the request path.mp4
20 MB
079. Chapter 14. Configuring an Envoy filter with the EnvoyFilter resource.mp4
21 MB
080. Chapter 14. Rate-limiting requests with external call-out.mp4
17 MB
081. Chapter 14. Extending Istio’s data plane with Lua.mp4
16 MB
082. Chapter 14. Building a new Envoy filter with WebAssembly.mp4
20 MB
083. Appendix A. Customizing the Istio installation.mp4
27 MB
084. Appendix B. Istio’s sidecar and its injection options.mp4
20 MB
085. Appendix C. Istio security SPIFFE.mp4
26 MB
086. Appendix C. How Istio implements SPIFFE.mp4
21 MB
087. Appendix E. How the virtual machine is configured to join the mesh.mp4
8.3 MB