Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering ISTIO - Service Mesh Architecture Training by Mr. Vimal Daga
Kubernetes
Introduction to Kubernetes (57:56)
Lab setup (21:20)
Minikube setup document
Creating pod (27:29)
YAML language (16:55)
Launching first pod from YAML file (45:20)
Elastic Cluster Setup
Basic Videos
Launching instance on AWS cloud (17:31)
Connecting instance with Putty (18:39)
Linux basic command (44:14)
EKS Training Sessions
Session 1- 18th March - Adoption of EKS | Managed Service | Integration with AWS Services | Containerization vs. Traditional Deployment | Kubernetes and Container Orchestration (269:55)
Session 1 - Summary
ISTIO Service Mesh
Session 1: Overview of Microservices | traffic management | deployment strategies | Canary deployment | traffic flow | Kiali | distributed tracing | Service Discovery | Service Mesh | Challenge solved by service mesh | Proxy | envoy | Architecture | Istio-Control Tower | Multicontainer | Sidecar (183:31)
Session 1 - Summary
Session 2 - 9th April - Overview of Kubernetes | visibility and observability | INIT container | Envoy proxy | Pilot | Citadel | Galley | ISTIO Architecture | control plane | data plane | Istiod | Add-ons | Installation of Istio | Example of microservices using service mesh (174:04)
Session 2 - Summary
Session 3 - 15th April - Kubernetes Cluster | ISTIO code |pods | containers | Kubctl | CRD.yml | metadata | Kiali | AWS EKS | load balancer | istio proxy | port | traffic| service graph | bottleneck issue | microservice | URL | service graph | Circuit Breaker | http | (130:01)
Session 3 - Summary
Session 4 - 16th April - Revision Session (74:12)
Session 5 - 23rd April - Istio)Service mesh | Side Car(Proxy) | Jaeger | Traffic flow | Use case | LaodBalancer | Traffic Management | ELB | Virtual Services | Destination Rules | Kubernetes deployment | Pod | kiali | label | microservice | graph | ISTIO configuration | (154:42)
Session 5 - Summary
Session 6 - 29th April - Kubernetes cluster | AWS EKS | public key | EKS cluster | nodes| Path-based routing | Ingress traffic | Ingress resource | Ingress controller | ALB Ingress Controller |load balancer | IAM policy | OIDC | local machine | eks-charts | external traffic | DNS (175:32)
Session 6 Summary
Session 7 - 30th April - EKS | CRDs | Ingress rules | ALB | Path types | Exact | Prefix | Host-based Ingress | HTTP | traffic | HTTPS | SSL | Registered Domains | ARN | AWS Certificate Manager |“Route53” | (133:17)
Session 7 - Summary
Session 8 - 13th May - kubectl | services and pods | Bookinfo services | Round Robin algorithm | versioned app graph | Kiali | version labels | Virtual Services | Destination Rules | Weighted routing | load balanced | YAML code | Matching routing | HTTP | Request Method | reviews | (158:11)
Session 8 - Summary
Session 9 - 21st May - CRD | labels | canary deployment | Kiali service | Ingress Controller |Kubectl apply -f | notepad myd.yml | loadBalancer | nodeport | Gateway | kiali | 20001 port | Graph | webserver | proxy | Gateway file | kubernetes | virtual services | (142:27)
Session 9 - Summary
Session 10 - 27th May'23 - fault tolerant and resilient to failures | chaos engineering | production environment | testing environment | Chaos testing | Chaos Monkey | Gremlin | Chaos Gorilla | Chaos Kong | Latency Monkey | Fault injection | loadbalancer | Bookinfo | Abort fault |Delay fault | (133:24)
Session 10 - Summary
Session 11 - 18th June - ISTIO Security | Access Security | Authentication | Request authentication| Peer authentication | IAM | MTLS | IKE | SSH | envoyproxy | Peer Authentication CRD | Setup ISTIO | Kubernetes Cluster (121:32)
Session 11 - Summary
Session 12 - 25th June-pair authenticator app|open ID concept |user|how to authentication end user to front user (139:34)
Extra Session
Package Manager - Helm (Chart) (121:18)
Kafka
Session 1 - 28th May'23-Apache kafka| Kafka brokers| ZooKeeper connections|Kafka command-line tools|microservices architectures|ETL operations|Kafka clusters (323:54)
Session 1- Summary
Teach online with
Session 11 - 18th June - ISTIO Security | Access Security | Authentication | Request authentication| Peer authentication | IAM | MTLS | IKE | SSH | envoyproxy | Peer Authentication CRD | Setup ISTIO | Kubernetes Cluster
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock