rinormaloku.com
Open in
urlscan Pro
13.95.82.181
Public Scan
Submitted URL: http://rinormaloku.com/
Effective URL: https://rinormaloku.com/
Submission: On May 12 via api from GB — Scanned from NL
Effective URL: https://rinormaloku.com/
Submission: On May 12 via api from GB — Scanned from NL
Form analysis
1 forms found in the DOMGET https://rinormaloku.com/
<form role="search" method="get" class="search-form" action="https://rinormaloku.com/"> <label for="search-form-627cf2a419ba5"> <span class="screen-reader-text">Search for: '</span> </label> <input type="search" id="search-form-627cf2a419ba5"
class="search-field" placeholder="Search" name="s"> <button type="submit" class="search-submit" disabled=""> <i class="icon-search"></i> <span class="screen-reader-text"> Search </span> </button></form>
Text Content
Skip to content RINOR MALOKU Master one tool at a time… Menu Close * Home * About me You can also find me on Read More By : rinormaloku July 5, 2020July 6, 2020 PARALLEL-FLOWING AND THE SHRINKING FLOW ZONE Let’s explore how being in the “Zone” or being in “Flow” ain’t static and changes throughout your career. Prerequisite to getting into Flow Short feedback loops sets Software Engineering apart from every other profession. Just take a second and think about it. A Cellular Bioengineer applies a substance to a set of cells and has Read More By : rinormaloku February 11, 2019February 11, 2019 ROUTING WITH THE ENVOY PROXY IN UNDER 10 MINUTES Learn the elements of the Envoy Proxy by getting a microservice application up and running and configuring the routes to every service, in less than 10 minutes. By : rinormaloku January 21, 2019 AUTHENTICATION IN ISTIO This entry is part 10 of 12 in the series Istio around everything else I would have never believed that I would be excited about Authentication and Authorization. What on the technological spectrum could Istio possibly do to make me excited about these dreadful topics, and more importantly why should it excite you as well? Because, Istio takes these responsibilities from our services and offloads them to the Envoy Read More By : rinormaloku January 21, 2019February 14, 2019 AUTHORIZATION IN ISTIO This entry is part 11 of 12 in the series Istio around everything else Authorization with Auth0 Authentication enables us to know who a user is, but we need the authorization to know what they can access. Istio provides the tools for this as well! As an example, we’ll create two groups of users (shown in figure 24): Users: with access to only the SA-WebApp and SA-Frontend service. Moderators: Read More By : rinormaloku January 8, 2019January 8, 2019 ISTIO SERIES SUMMARY This entry is part 12 of 12 in the series Istio around everything else Tap yourself on the back, you are amazing for sticking with this it definitely wasn’t easy, there were bumps along the way and it wasn’t as smooth as I presented. But now you mastered this amazing technology! Istio? Let’s call it Beast-io!! Because it’s such a BEAST! It provided us with: Observability over our services Read More By : rinormaloku January 7, 2019January 7, 2019 TIMEOUTS, RETRIES AND CIRCUITBREAKERS WITH ISTIO This entry is part 9 of 12 in the series Istio around everything else It’s not always that the code is buggy. In the list of “The 8 fallacies of distributed computing” the first fallacy is that “The network is reliable”. The network is definitely NOT reliable, and that is why we need Timeouts and Retries. For demonstration purposes, we will continue to use the buggy version of sa-logic, where Read More By : rinormaloku January 7, 2019January 8, 2019 CANARY DEPLOYMENTS WITH ISTIO This entry is part 8 of 12 in the series Istio around everything else Canary Deployment is the process of rolling out a new version of an application to a small set of users, as a step to verify the absence of issues, and then with a higher assurance of quality release to the wider audience. Let’s continue with the same buggy subset of sa-logic to demonstrate canary deployments, Read More By : rinormaloku January 7, 2019January 7, 2019 SHADOWING – VIRTUALSERVICES IN PRACTICE This entry is part 7 of 12 in the series Istio around everything else Shadowing or Mirroring is used when we want to test a change in production but not affect end-users, so we mirror the requests into a second instance that has the change and evaluate it. To phrase it simpler it’s when one of your colleagues picks the most critical issue and makes a Big ball of Read More By : rinormaloku January 7, 2019January 7, 2019 A/B TESTING – DESTINATIONRULES IN PRACTICE This entry is part 6 of 12 in the series Istio around everything else Traffic Management Using the Envoy’s Istio provides a host of new capabilities to your cluster enabling: Dynamic request routing: Canary deployments, A/B testing, Load balancing: Simple and Consistent Hash balancing Failure Recovery: timeouts, retries, circuit breakers. Fault Injection: delays, abort requests etc. In this series, we will showcase these capabilities in our application and get Read More By : rinormaloku January 5, 2019January 5, 2019 ISTIO OUT OF THE BOX: KIALI, GRAFANA & JAEGER This entry is part 5 of 12 in the series Istio around everything else Istio features out of the box By intercepting all network communication Istio is fed with metrics and data that can be used to gain observability of the whole application. Kiali, an open source project uses this data to provide the answer to the question: What microservices are part of my Istio service mesh and how Read More By : rinormaloku January 5, 2019January 5, 2019 ISTIO IN PRACTICE – ROUTING WITH VIRTUALSERVICE This entry is part 4 of 12 in the series Istio around everything else The VirtualService resource The VirtualService instructs the Ingress Gateway how to route the requests that were allowed into the cluster. For our application requests coming through the http-gateway must be routed to the sa-frontend, sa-web-app and sa-feedback services (shown in figure 1). Let’s break down the requests that should be routed to SA-Frontend: Exact path Read More By : rinormaloku January 5, 2019January 5, 2019 ISTIO IN PRACTICE – INGRESS GATEWAY This entry is part 3 of 12 in the series Istio around everything else Intro to Ingress Gateway A best practice for allowing traffic into your cluster is through Istio’s Ingress Gateway which positions itself at the edge of the cluster and on incoming traffic enables Istio’s features like routing, security, monitoring. During Istio’s installation, the Ingress Gateway component and a service that exposes it externally were installed into Read More PAGE NAVIGATION Prev * 1 * 2 * 3 Next Search for: ' Search All Stories30Azure4Envoy1Istio12Kubernetes19Thoughts1