Skip to main content
Yet another useless blog_
  • What's New
    • What's new in OpenShift, 4.20 Edition
  • Compliance
    • oc compliance command line plugin
    • Compliance Operator
  • GitOps Episodes
    • Introducing the GitOps Approach
    • GitOps - Choosing the right Git repository structure
    • Setup OpenShift GitOps/Argo CD
    • Configure App-of-Apps
    • Setup & Configure Compliance Operator using GitOps
    • Setup & Configure Advanced Cluster Security using GitOps
    • Configure Buckets in MinIO using GitOps
    • Installing OpenShift Logging using GitOps
    • Multiple Sources for Applications in Argo CD
    • Update Cluster Version using GitOps approach
    • Managing Certificates using GitOps approach
    • Using Kustomize to post render a Helm Chart
    • Using ApplicationSet with Matrix Generator and define individual Namespaces
    • Reusable Argo CD Application Helm Template
  • OpenShift
    • A second look into the Kubernetes Gateway API on OpenShift
    • A first look into the Kubernetes Gateway API on OpenShift
    • Cert-Manager Policy Approver in OpenShift
    • Single log out from Keycloak and OpenShift
    • Step by Step - Using Keycloak Authentication in OpenShift
    • Introducing AdminNetworkPolicies
    • OpenShift Data Foundation - Noobaa Bucket Data Retention (Lifecycle)
    • Running Falco on OpenShift 4.12
    • Quay Deployment and Configuration using GitOps
    • Setting up Falco on OpenShift 4.12
    • How to force a MachineConfig rollout
    • Operator installation with Argo CD
    • SSL Certificate Management for OpenShift on AWS
    • Using ServerSideApply with ArgoCD
    • Secrets Management - Vault on OpenShift
    • Overview of Red Hat's Multi Cloud Gateway (Noobaa)
    • Secure your secrets with Sealed Secrets
    • Understanding RWO block device handling in OpenShift
    • Writing Operator using Ansible
    • Thanos Querier vs Thanos Querier
    • GitOps - Argo CD
    • OpenShift Pipelines - Tekton Introduction
    • Helpful oc / kubectl commands
  • OpenShift Day-2
    • etcd
      • Automated ETCD Backup
    • Labels & Environments
      • Working with Environments
    • Observability
      • The Hitchhiker's Guide to Observability Introduction - Part 1
      • The Hitchhiker's Guide to Observability - Grafana Tempo - Part 2
      • The Hitchhiker's Guide to Observability - Central Collector - Part 3
      • The Hitchhiker's Guide to Observability - Example Applications - Part 4
      • The Hitchhiker's Guide to Observability - Understanding Traces - Part 5
      • The Hitchhiker's Guide to Observability - Adding A New Tenant - Part 6
      • The Hitchhiker's Guide to Observability - Here Comes Grafana - Part 7
      • The Hitchhiker's Guide to Observability - Limit Read Access to Traces - Part 8
    • Pod Placement
      • Introduction
      • NodeSelector
      • Pod Affinity/Anti-Affinity
      • Node Affinity
      • Taints and Tolerations
      • Topology Spread Constraints
      • Using Descheduler
  • Secure Supply Chain
    • Introduction to a Secure Supply Chain
    • Step 1 - Listen to Events
    • Step 2 - Pipelines
    • Step 3 - SonarQube
    • Step 4 - Verify Git Commit
    • Step 5 - Build and Sign Image
    • Step 6 - Scanning with ACS
    • Step 7 - Generating a SBOM
    • Step 8 - Updating Kubernetes Manifests
    • Step 9 - Linting Kubernetes Manifests
    • Step 10 - The Example Application
    • Step 11 - ACS Deployment Check
    • Step 12 - Verify TLog Signature
    • Step 13 - Bring it to Production
  • General
    • Basic usage of git
    • Red Hat Satellite Cheat Sheet
  • Ansible
    • Ansible Style Guide
    • Automation Controller and LDAP Authentication
    • Ansible Tower and downloading collections
    • Ansible - Azure Resource Manager Example
    • DO410 Ansible and Ansible Tower training notes
  • Service Mesh
    • Enable Automatic Route Creation
    • Authorization (RBAC)
    • Deploy Example Bookinfo Application
    • Service Mesh 1.1 released
    • Authentication JWT
    • Mutual TLS Authentication
    • Fault Injection
    • Limit Egress/External Traffic
    • Advanced Routing Example
    • Routing Example
    • Ingress with custom domain
    • Ingress Traffic
    • Deploy Microservices
    • Installation
  • Advanced Cluster Security
    • Advanced Cluster Security - Authentication
  • Azure
    • Stumbling into Azure Part II: Setting up a private ARO cluster
    • Stumbling into Azure Part I: Building a site-to-site VPN tunnel for testing
  • Java
    • Adventures in Java Land: JPA disconnected entities
  • Quay
    • Red Hat Quay Registry - Integrate Keycloak
    • Stumbling into Quay: Upgrading from 3.3 to 3.4 with the quay-operator
    • Red Hat Quay Registry - Overview and Installation
  • Helm Repository
  • Legal Disclosure
  • RSS Feeds

Saved Articles 0

No saved articles yet.

Click the "Save" button on any article to bookmark it for later.

    • Home
    • About Us
      Thomas Jungbauer Toni Schmidbauer Legal Disclosure
    • Categories
    • Tags
    • History
    • Helm Charts

     navi

    navigation YAUB Yet Another Useless Blog > Categories > Service Mesh

    Service Mesh

    Service Mesh OpenShift

    Enable Automatic Route Creation

    May 13, 2020 - Thomas Jungbauer Thomas Jungbauer - 2 min

    Red Hat Service Mesh 1.1 allows you to enable a "Automatic Route Creation" which will take care about the routes for a specific Gateway. Instead of defining * for hosts, a list of domains can be defined. The Istio OpenShift Routing (ior) synchronizes the routes and creates them inside the Istio namespace. If a Gateway is deleted, the routes will also be removed again.

    This new features makes the manual creation of the route obsolete, as it was explained here: Openshift 4 and Service Mesh 4 - Ingress with custom domain

    Read More ...
    Service Mesh OpenShift

    Authorization (RBAC)

    May 12, 2020 - Thomas Jungbauer Thomas Jungbauer - 4 min

    Per default all requests inside a Service Mesh are allowed, which can be a problem security-wise. To solve this, authorization, which verifies if the user is allowed to perform a certain action, is required. Istio’s authorization provides access control on mesh-level, namespace-level and workload-level.

    Read More ...
    Service Mesh OpenShift

    Deploy Example Bookinfo Application

    April 30, 2020 - Thomas Jungbauer Thomas Jungbauer - 2 min

    To test a second application, a bookinfo application shall be deployed as an example.

    The following section finds it’s origin at:

    • Istio - Bookinfo Application

    • OpenShift 4 - Example Application

    Read More ...
    Service Mesh OpenShift

    Service Mesh 1.1 released

    April 10, 2020 - Thomas Jungbauer Thomas Jungbauer - 1 min

    April 10th 2020 Red Hat released Service Mesh version 1.1 which supports the following versions:

    • Istio - 1.4.6

    • Kiali - 1.12.7

    • Jaeger - 1.17.1

    Read More ...
    Service Mesh OpenShift

    Authentication JWT

    April 9, 2020 - Thomas Jungbauer Thomas Jungbauer - 2 min

    Welcome to tutorial 10 of OpenShift 4 and Service Mesh, where we will discuss authentication with JWT. JSON Web Token (JWT) is an open standard that allows to transmit information between two parties securely as a JSON object. It is an authentication token, which is verified and signed and therefore trusted. The signing can be achieved by using a secret or a public/private key pair.

    Service Mesh can be used to configure a policy which enables JWT for your services.

    Read More ...
    Service Mesh OpenShift

    Mutual TLS Authentication

    April 8, 2020 - Thomas Jungbauer Thomas Jungbauer - 5 min

    When more and more microservices are involved in an application, more and more traffic is sent on the network. It should be considered to secure this traffic, to prevent the possibility to inject malicious packets. Mutual TLS/mTLS authentication or two-way authentication offers a way to encrypt service traffic with certificates.

    With Red Hat OpenShift Service Mesh, Mutual TLS can be used without the microservice knowing that it is happening. The TLS is managed completely by the Service Mesh Operator between two Envoy proxies using a defined mTLS policy.

    Read More ...
    Service Mesh OpenShift

    Fault Injection

    April 7, 2020 - Thomas Jungbauer Thomas Jungbauer - 4 min

    Tutorial 8 of OpenShift 4 and Service Mesh tries to cover Fault Injection by using Chaos testing method to verify if your application is running. This is done by adding the property HTTPFaultInjection to the VirtualService. The settings for this property can be for example: delay, to delay the access or abort, to completely abort the connection.

    "Adopting microservices often means more dependencies, and more services you might not control. It also means more requests on the network, increasing the possibility for errors. For these reasons, it’s important to test your services’ behavior when upstream dependencies fail." [1]

    Read More ...
    Service Mesh OpenShift

    Limit Egress/External Traffic

    April 6, 2020 - Thomas Jungbauer Thomas Jungbauer - 6 min

    Sometimes services are only available from outside the OpenShift cluster (like external API) which must be reached. Part 7 of OpenShift 4 and Service Mesh takes care and explains how to control the egress or external traffic. All operations have been successdully tested on OpenShift 4.3.

    Read More ...
    • 1
    • 2
    • »
    • » »

    Copyright © 2020 - 2025 Toni Schmidbauer & Thomas Jungbauer

    ← Previous
    Use arrow keys to navigate
    Next →
    ←
    →