Secure and Connect your Microservice using one step

Secure and Connect Microservices using One Command

allows you to configure any security policy for a service at Kubernetes Ingress in One Step


Services running in Kubernetes are not accessible on a public or private cloud. This is how Kubernetes is designed considering service security in mind.

Securely allowing access to a service outside the cluster requires some understanding of how networking is setup and the different requirements driving the networking choices.

We briefly start by exploring what is expected from a Kubernetes cluster when it comes to service isolation, service scaling, and service delivery. Once the high-level requirements are laid out, it is easier to understand the significance of different constructs and abstractions.

We conclude by contrasting the advantages of using and…


Open Source Metrics Stack

Metrics are a critical aspect of any system to understand its health and operational state. Design of any system requires collection, storage and reporting of metrics to provide a pulse of the system.

Data is stored over a series of time intervals and needs an efficient database to store and retrieve this data.

is one such time series database that can serve that need.

While data is stored in a time series database, an standard system to scrape such metrics and store it in the database has emerged in form of . When a data…


Services running in Kubernetes are not accessible on a public or private cloud. This is how Kubernetes is designed considering service security in mind.

Securely allowing access to a service outside the cluster requires some understanding of how networking is setup and the different requirements driving the networking choices.

We briefly start by exploring what is expected from a Kubernetes cluster when it comes to service isolation, service scaling, and service delivery. Once the high-level requirements are laid out, it is easier to understand the significance of different constructs and abstractions.

We conclude by contrasting the advantages of using an…


Radically simplify operations by plugging your API Gateway into OpenAPI Spec

Image by from

OpenAPI Spec — The blueprint for your API

Enterprises today use an API first approach towards application development and sharing data. This API based approach is used under several scenarios like — breaking up a monolith into micro-services, adopting cloud and adopting kubernetes.

APIs are also a popular choice to adopt Service Oriented Architectural approach. API also form a key tenant to support data sharing and logic reuse. An API in an application can be compared to a function in the imperative programming paradigm.

Open API spec is a key mechanism for stake holders to creating and…


Enroute Universal API Gateway Plugs into OpenAPI Spec

Open API Spec — an API-first approach

Enterprises today use an API first approach towards application development and sharing data. This API based approach is used under several scenarios like — breaking up a monolith into micro-services, adopting cloud and adopting Kubernetes.

APIs are also a popular choice to adopt Service Oriented Architectural approach. API also form a key tenant to support data sharing and logic reuse. An API in an application can be compared to a function in the imperative programming paradigm.

Open API spec is a key mechanism for stake holders to creating and delivering API. Often times the spec forms the blue-print for defining…


Why every APIs need a clock

When Van Jacobson couldn’t upload documents in 1985, he found that the network throughput had stalled to 1 bit per second.

The clock would help slow down the startup process. That’s how came about along with other .

TCP bit throttling needed a clock. Are APIs any different? Can your APIs get congested too?

It’s like the 1980s again

When nodes retried sending packets, they ended up sending more bits on the network. Retries were choking the pipe. The solution was to protect the shared…


Introduction

With the advent of cloud and micro-services, proxies have taken up different roles. They are used at the edge or the perimeter for all incoming traffic. The perimeter was the point of running the proxy, providing network services for the application, and managing it.

The perimeter proxy provided function for the application(s) running behind it. These included TLS termination, load balancing, API gateway functions, and security. As the monolithic application got broken into microservices, so did the network function. …


Introduction

Technology has become the lifeblood of businesses today. A lot of business rely on technology to achieve or improve their business objectives.

Technology today is so integral to a business that there is a cost to not evaluating and adopting the current trends. Good investments in technology translate into business savings and agility — both of them extremely critical in today’s ultra-competitive environment.

Lets attempt to understand it using a couple of small case studies (a 10-min crash course on how technology impacts both the top-line and bottom-line for a business)

Left Inc. vs Up Inc.

Imagine I drive for a ride hailing company. Say…


Service mesh has become a popular way to deploy, manage and deliver micro-services. The variety of options out there to realize the service mesh shows its popularity. Initiatives like the Service Mesh Interface are an attempt at standardizing the mesh interface. With Google offering istio to define and provide service mesh, a group of other companies including Microsoft have started this initiative to standardize the service mesh.

The visibility and benefits provided by a service mesh are only limited to the micro-services environment. …

getenroute.io/yastack.io

EnRoute One-Step Ingress / YAStack: Envoy on FreeBSD TCP/IP on DPDK

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store