What Exactly Does a Service Mesh Do? | Scott Lowe from Kong
About This Episode In this Kongcast episode, Scott Lowe, principal field engineer at Kong, takes us back to basics by answering what a service mesh does and when to use…
About This Episode In this Kongcast episode, Scott Lowe, principal field engineer at Kong, takes us back to basics by answering what a service mesh does and when to use…
Devoteam nexDigital is a leading IT consulting company specializing in the modernization and transformation of Information Systems. In this session, Yohann AGOSTINI, CTO at Devoteam nexDigital, will discuss how their customer, a major French insurance company, has redefined and evolved its legacy Enterprise Service Bus (ESB) integration architecture to a modern-day microservices and service mesh-based architecture. This session explores the benefits of adopting service mesh technology to handle the complex connectivity, security and reliability challenges between services deployed across VM-based and Kubernetes infrastructures.
API management gives your organization a fantastic toolbox that enables digital transformation. In order to properly utilize these tools and gain the value a service mesh provides, it is important to define a proper governance framework and define your organization’s rules regarding:
– Roles and responsibilities for development and a development portal
– Service mesh vs. event mesh
– API patterns and policies
– Naming standards and metadata for applications and APIs
– API lifecycles
– Service mesh vs. integration platform
– Monitoring, KPIs and distribution of this information
During this session, we will go through the framework and show an example of how this adds value to your organization’s use of Kong.
Observability is catching on these days as the de-facto way to provide visibility into essential aspects of systems. It would be unwise for you not to leverage it with Kuma…
It wasn’t that long ago that coarse-grained access control lists (ACL) rules on a network firewall were enough to satisfy security requirements. As application architectures have become more distributed —…
Have you ever found yourself in a situation when all your services are running in Kubernetes, and now you need to expose them to the outside world securely and reliably?…