The latest release of Kubernetes, version 1.26, has introduced several new autoscaling capabilities that allow users to scale their workloads based on custom metrics, multiple metrics, and a range of APIs. These features offer increased flexibility and options for scaling in Kubernetes environments. However, the KEDA project still provides additional features, such as the ability to scale “from zero” and “to zero,” which can be useful for certain types of workloads. In this article, we will explore the new autoscaling capabilities in Kubernetes 1.26 and how they compare to the features offered by KEDA.
Introduction Grafana Alerting capabilities continue to improve in each new release the GrafanaLabs team does. Especially with the changes done in Grafana 8 and Grafana 9, many questions have been raised regarding its usage, the capabilities supported, and the comparison with other alternatives. We want to start setting the context about Grafana Alerting based on […]
An Istio ServiceEntry is an object within the Istio service mesh that allows you to extend the mesh to external endpoints or internal services that are not part of the platform’s service registry. ServiceEntries allow you to specify details such as hostname, port, and protocol for the external service, as well as the resolution mode to use when accessing it. You can use ServiceEntries to apply Istio features such as load balancing, protocol switching, and authentication to external services. You can also view ServiceEntries in the Kiali graphical representation of the service mesh. ServiceEntries are useful in a variety of scenarios, including when you want to connect to external services or when you have multiple clusters and need to extend the mesh across them.
Could you also give me a good title for the article focus on SEO?
“Understanding Istio ServiceEntry: How to Extend Your Service Mesh to External Endpoints”
This title clearly conveys the topic of the article and includes relevant keywords such as “Istio ServiceEntry” and “extend service mesh.” It also suggests that the reader will gain an understanding of how to use ServiceEntries, which may be of particular interest to those looking for information on this topic.
Looking to secure the communication between services in your Kubernetes cluster with Istio? In this article, we’ll provide a step-by-step guide on how to establish a Transport Layer Security (TLS) connection with Istio. We’ll cover how to expose TLS on the Istio ingress gateway, consume SSL from Istio, and enforce mutual TLS (mTLS) between different services in the cluster. By following the instructions in this guide, you can ensure secure communication and protect your applications from cyber threats. With Istio, you can easily centralize and externalize security aspects, allowing your applications to focus on their business logic and reducing the workload on your development team.
Looking to improve the observability and management of your Istio service mesh? Kiali is here to help. As an open-source project developed by Red Hat, Kiali provides a graphical representation of your mesh, displaying the relationships between service mesh components and key metrics like request and error rates. It also includes tools for monitoring the health of your mesh and troubleshooting issues with service communication. In addition to its observability features, Kiali offers a traffic management module and a configuration management module to help you manage your mesh. Learn how to install and use Kiali to maximize the performance of your service mesh.
Helm Templates in Files such as ConfigMaps Content or Secrets Content. How to use variables inside files with some basic Helm functions
Nomad is the Hashicorp alternative to the typical pattern of using a Kubernetes-based platform as the only way to orchestrate your workloads efficiently. Nomad is a project started in 2019, but it is getting much more relevant nowadays after 95 releases, and the current version of this article is 1.4.1, as you can see in […]
DevOps vs DevSecOps: Fundamentals about DevSecOps understanding what it is, why it is crucial and how different is vs DevOps
Scan Docker images or, to be more honest, scan your container images is becoming one of the everyday tasks to be done as part of the development of your application. The change of pace of how easily the new vulnerabilities arise, the explosion of dependencies that each of the container images has, and the number […]
Helm Dependency is a critical part of understanding how Helm works as it is the way to establish relationships between different helm packages. We have talked a lot here about what Helm is, and some topics around that, and we even provided some tricks if you create your charts. So, as commented, Helm Chart is […]