rinormaloku.com Open in urlscan Pro
13.95.82.181  Public Scan

Submitted URL: http://rinormaloku.com/
Effective URL: https://rinormaloku.com/
Submission: On May 12 via api from GB — Scanned from NL

Form analysis 1 forms found in the DOM

GET https://rinormaloku.com/

<form role="search" method="get" class="search-form" action="https://rinormaloku.com/"> <label for="search-form-627cf2a419ba5"> <span class="screen-reader-text">Search for: '</span> </label> <input type="search" id="search-form-627cf2a419ba5"
    class="search-field" placeholder="Search" name="s"> <button type="submit" class="search-submit" disabled=""> <i class="icon-search"></i> <span class="screen-reader-text"> Search </span> </button></form>

Text Content

Skip to content


RINOR MALOKU

Master one tool at a time…

Menu Close
 * Home
 * About me

You can also find me on



Read More
By : rinormaloku July 5, 2020July 6, 2020


PARALLEL-FLOWING AND THE SHRINKING FLOW ZONE

Let’s explore how being in the “Zone” or being in “Flow” ain’t static and
changes throughout your career. Prerequisite to getting into Flow Short feedback
loops sets Software Engineering apart from every other profession. Just take a
second and think about it. A Cellular Bioengineer applies a substance to a set
of cells and has

Read More
By : rinormaloku February 11, 2019February 11, 2019


ROUTING WITH THE ENVOY PROXY IN UNDER 10 MINUTES

Learn the elements of the Envoy Proxy by getting a microservice application up
and running and configuring the routes to every service, in less than 10
minutes.

By : rinormaloku January 21, 2019


AUTHENTICATION IN ISTIO

This entry is part 10 of 12 in the series Istio around everything else

I would have never believed that I would be excited about Authentication and
Authorization. What on the technological spectrum could Istio possibly do to
make me excited about these dreadful topics, and more importantly why should it
excite you as well? Because, Istio takes these responsibilities from our
services and offloads them to the Envoy

Read More
By : rinormaloku January 21, 2019February 14, 2019


AUTHORIZATION IN ISTIO

This entry is part 11 of 12 in the series Istio around everything else

Authorization with Auth0 Authentication enables us to know who a user is, but we
need the authorization to know what they can access. Istio provides the tools
for this as well! As an example, we’ll create two groups of users (shown in
figure 24): Users: with access to only the SA-WebApp and SA-Frontend service.
Moderators:

Read More
By : rinormaloku January 8, 2019January 8, 2019


ISTIO SERIES SUMMARY

This entry is part 12 of 12 in the series Istio around everything else

Tap yourself on the back, you are amazing for sticking with this it definitely
wasn’t easy, there were bumps along the way and it wasn’t as smooth as I
presented. But now you mastered this amazing technology! Istio? Let’s call it
Beast-io!! Because it’s such a BEAST! It provided us with: Observability over
our services

Read More
By : rinormaloku January 7, 2019January 7, 2019


TIMEOUTS, RETRIES AND CIRCUITBREAKERS WITH ISTIO

This entry is part 9 of 12 in the series Istio around everything else

It’s not always that the code is buggy. In the list of “The 8 fallacies of
distributed computing” the first fallacy is that “The network is reliable”. The
network is definitely NOT reliable, and that is why we need Timeouts and
Retries. For demonstration purposes, we will continue to use the buggy version
of sa-logic, where

Read More
By : rinormaloku January 7, 2019January 8, 2019


CANARY DEPLOYMENTS WITH ISTIO

This entry is part 8 of 12 in the series Istio around everything else

Canary Deployment is the process of rolling out a new version of an application
to a small set of users, as a step to verify the absence of issues, and then
with a higher assurance of quality release to the wider audience. Let’s continue
with the same buggy subset of sa-logic to demonstrate canary deployments,

Read More
By : rinormaloku January 7, 2019January 7, 2019


SHADOWING – VIRTUALSERVICES IN PRACTICE

This entry is part 7 of 12 in the series Istio around everything else

Shadowing or Mirroring is used when we want to test a change in production but
not affect end-users, so we mirror the requests into a second instance that has
the change and evaluate it. To phrase it simpler it’s when one of your
colleagues picks the most critical issue and makes a Big ball of

Read More
By : rinormaloku January 7, 2019January 7, 2019


A/B TESTING – DESTINATIONRULES IN PRACTICE

This entry is part 6 of 12 in the series Istio around everything else

Traffic Management Using the Envoy’s Istio provides a host of new capabilities
to your cluster enabling: Dynamic request routing: Canary deployments, A/B
testing, Load balancing: Simple and Consistent Hash balancing Failure Recovery:
timeouts, retries, circuit breakers. Fault Injection: delays, abort requests
etc. In this series, we will showcase these capabilities in our application and
get

Read More
By : rinormaloku January 5, 2019January 5, 2019


ISTIO OUT OF THE BOX: KIALI, GRAFANA & JAEGER

This entry is part 5 of 12 in the series Istio around everything else

Istio features out of the box By intercepting all network communication Istio is
fed with metrics and data that can be used to gain observability of the whole
application. Kiali, an open source project uses this data to provide the answer
to the question: What microservices are part of my Istio service mesh and how

Read More
By : rinormaloku January 5, 2019January 5, 2019


ISTIO IN PRACTICE – ROUTING WITH VIRTUALSERVICE

This entry is part 4 of 12 in the series Istio around everything else

The VirtualService resource The VirtualService instructs the Ingress Gateway how
to route the requests that were allowed into the cluster. For our application
requests coming through the http-gateway must be routed to the sa-frontend,
sa-web-app and sa-feedback services (shown in figure 1). Let’s break down the
requests that should be routed to SA-Frontend: Exact path

Read More
By : rinormaloku January 5, 2019January 5, 2019


ISTIO IN PRACTICE – INGRESS GATEWAY

This entry is part 3 of 12 in the series Istio around everything else

Intro to Ingress Gateway A best practice for allowing traffic into your cluster
is through Istio’s Ingress Gateway which positions itself at the edge of the
cluster and on incoming traffic enables Istio’s features like routing, security,
monitoring. During Istio’s installation, the Ingress Gateway component and a
service that exposes it externally were installed into

Read More

PAGE NAVIGATION

Prev
 * 1
 * 2
 * 3

Next
Search for: ' Search
All Stories30Azure4Envoy1Istio12Kubernetes19Thoughts1