No Image

Advanced Kubernetes Deployment Strategies

2022-03-25 KENNETH 0

Advanced Kubernetes Deployment Strategies This blog is the fifth in our five‑part series about Kubernetes networking for Microservices March 2022: Program overview: Microservices March 2022: Kubernetes Networking Unit 1: Architecting Kubernetes Clusters for High‑Traffic Websites Unit 2: Exposing APIs in Kubernetes Unit 3: Microservices Security Pattern in Kubernetes Unit 4: Advanced Kubernetes Deployment Strategies (this post) Once you get Kubernetes into production, you have to keep it there! In Unit 4, we address how Kubernetes networking can increase uptime and improve customer experiences. Three activities guide you progressively from a high‑level overview to practical application. We suggest you complete all three to get the best experience. Step 1: Watch the Livestream (1 Hour) Step 2: Deepen Your Knowledge (1–2 Hours) Step 3: Get Hands‑On (1 Hour) Step 1: Watch the Livestream (1 Hour) Each Microservices March livestream provides a high‑level overview of [ more… ]

NGINX Tutorial: Improve Uptime and Resilience with a Canary Deployment 

2022-03-24 KENNETH 0

NGINX Tutorial: Improve Uptime and Resilience with a Canary Deployment  Note: This tutorial is part of Microservices March 2022: Kubernetes Networking. Reduce Kubernetes Latency with Autoscaling Protect Kubernetes APIs with Rate Limiting Protect Kubernetes Apps from SQL Injection Improve Uptime and Resilience with a Canary Deployment (this post) Your organization is successfully delivering apps in Kubernetes and now the team is ready to roll out v2 of a backend service. But there are valid concerns about traffic interruptions (a.k.a. downtime) and the possibility that v2 might be unstable. As the Kubernetes engineer, you need to find a way to ensure v2 can be tested and rolled out with little to no impact on customers. You decide to implement a gradual, controlled migration using the traffic splitting technique “canary deployment” because it provides a safe and agile way to test the [ more… ]

NGINX Tutorial: Protect Kubernetes Apps from SQL Injection

2022-03-23 KENNETH 0

NGINX Tutorial: Protect Kubernetes Apps from SQL Injection Note: This tutorial is part of Microservices March 2022: Kubernetes Networking. Reduce Kubernetes Latency with Autoscaling Protect Kubernetes APIs with Rate Limiting Protect Kubernetes Apps from SQL Injection (this post) Improve Uptime and Resilience with a Canary Deployment (coming soon) You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They’re about to launch their first online store, but before launch they’ve asked a security expert to pen test the site before it goes public. Unfortunately, the security expert found a problem! The online store is vulnerable to SQL injection. The security expert was able to exploit the site to obtain sensitive information from your database, including usernames and passwords. Your team has come to you – the Kubernetes engineer – to save the day. [ more… ]

NGINX Tutorial: Protect Kubernetes APIs with Rate Limiting

2022-03-22 KENNETH 0

NGINX Tutorial: Protect Kubernetes APIs with Rate Limiting Note: This tutorial is part of Microservices March 2022: Kubernetes Networking. Reduce Kubernetes Latency with Autoscaling Protect Kubernetes APIs with Rate Limiting (this post) Protect Kubernetes Apps from SQL Injection (coming soon) Improve Uptime and Resilience with a Canary Deployment (coming soon) Your organization just launched its first app and API in Kubernetes. You’ve been told to expect high traffic volumes (and already implemented autoscaling to ensure NGINX Ingress Controller can quickly route the traffic), but there are concerns that the API may be targeted by a malicious attack. If the API receives a high volume of HTTP requests – a possibility with brute‑force password guessing or DDoS attacks – then both the API and app could be overwhelmed and might even crash. But you’re in luck! The traffic control technique “rate limiting” is [ more… ]

No Image

Microservices Security Pattern in Kubernetes

2022-03-18 KENNETH 0

Microservices Security Pattern in Kubernetes This blog is the fourth in our five‑part series about Kubernetes networking for Microservices March 2022: Program overview: Microservices March 2022: Kubernetes Networking Unit 1: Architecting Kubernetes Clusters for High‑Traffic Websites Unit 2: Exposing APIs in Kubernetes Unit 3: Microservices Security Pattern in Kubernetes (this post) Unit 4: Advanced Kubernetes Deployment Strategies (coming soon) Mastering your north‑south traffic is just the beginning…once your services start communicating within the cluster – a.k.a. east‑west traffic – you have a whole new set of problems! Unit 3 answers the question How do I secure my APIs and apps to be production‑ready? Three activities guide you progressively from a high‑level overview to practical application. We suggest you complete all three to get the best experience. Step 1: Watch the Livestream (1 Hour) Step 2: Deepen Your Knowledge (1–2 Hours) Step 3: Get [ more… ]