PromptsVault AI is thinking...
Searching the best prompts from our community
Searching the best prompts from our community
Prompts matching the #service-mesh tag
Deploy Istio service mesh on Kubernetes. Features: 1. Automatic sidecar injection for traffic management. 2. Mutual TLS for service-to-service encryption. 3. Traffic routing (canary deployments, A/B testing). 4. Circuit breaking and retry policies. 5. Distributed tracing with Jaeger. 6. Service-level metrics and dashboards. 7. Ingress gateway for external traffic. Configure virtual services and destination rules. Use Kiali for visualization. Include performance impact analysis and troubleshooting guide.
Deploy and manage microservices communication using Istio service mesh for traffic management, security, and observability. Istio architecture: 1. Data plane: Envoy proxy sidecars, automatic injection, traffic interception. 2. Control plane: Pilot (traffic management), Citadel (security), Galley (configuration). 3. Ingress/egress gateways: external traffic management, TLS termination, rate limiting. Traffic management: 1. Virtual services: request routing, traffic splitting (10% canary, 90% stable), fault injection. 2. Destination rules: load balancing (round robin, least connection), circuit breaker configuration. 3. Gateways: external traffic entry points, protocol configuration, host-based routing. Security features: 1. mTLS: automatic mutual TLS between services, certificate management, encryption at service level. 2. Authorization policies: RBAC for service-to-service communication, JWT validation. 3. Security policies: network policies, ingress/egress controls, threat detection. Observability: 1. Distributed tracing: Jaeger integration, request flow visualization, latency analysis. 2. Metrics collection: Prometheus integration, service-level indicators, golden signals. 3. Access logging: comprehensive request logging, audit trails, compliance support. Performance optimization: 1. Sidecar configuration: resource limits (CPU: 100m, Memory: 128Mi), proxy protocols. 2. Traffic policies: timeout configuration (30s), retry policies (3 attempts), connection pooling. Canary deployments: 1. Traffic splitting: gradual rollout (5% → 10% → 50% → 100%), automated rollback. 2. Success criteria: error rate <0.1%, latency increase <10%, business metrics validation.