Get in Touch

Course Outline

Introduction to Envoy Proxy

  • The role of Envoy in modern infrastructures.
  • Comparing Envoy Proxy with NGINX, HAProxy, and Traefik.
  • Adoption of Envoy in Istio, Consul, and cloud-native platforms.

Envoy Architecture and Features

  • Listeners, clusters, and endpoints.
  • Filter chains and extensibility options.
  • xDS APIs for dynamic configuration.

Installing and Running Envoy

  • Standalone installation process.
  • Deploying Envoy in Docker and Kubernetes.
  • A walkthrough of basic configuration.

Traffic Management with Envoy

  • Load balancing strategies.
  • Retries, circuit breaking, and failover mechanisms.
  • Advanced routing rules and header-based routing.

Security and Zero Trust with Envoy

  • Setting up TLS and mutual TLS (mTLS).
  • Authentication and authorization filters.
  • Implementing Zero Trust networking.

Observability and Monitoring

  • Access logs and metrics.
  • Tracing with Jaeger and Zipkin.
  • Integrating Envoy with Prometheus and Grafana.

Extending Envoy

  • Introduction to WASM filters.
  • Creating custom extensions for Envoy.
  • Best practices for maintainability.

Envoy in a Service Mesh

  • Utilizing Envoy as a sidecar proxy.
  • Deploying Envoy within Istio and Consul service meshes.
  • Case study: Envoy as a universal data plane.

Troubleshooting and Best Practices

  • Debugging configuration issues.
  • Conducting health checks and resilience testing.
  • Operational guidelines for production environments.

Summary and Next Steps

Requirements

  • A foundational understanding of microservices development and networking.
  • Experience with the Linux command line.
  • Familiarity with containers and orchestration tools, such as Kubernetes, is advantageous.

Audience

  • Developers
  • Cloud architects
  • DevOps engineers
  • Network engineers
  • System administrators
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories