Course Outline

Introduction to Envoy Proxy

  • Role of Envoy in modern infrastructures for government
  • Comparison of Envoy Proxy with NGINX, HAProxy, and Traefik
  • Adoption in Istio, Consul, and cloud-native platforms for government

Envoy Architecture and Features

  • Listeners, clusters, and endpoints for efficient data flow management
  • Filter chains and extensibility to support diverse requirements
  • xDS APIs for dynamic configuration and adaptability

Installing and Running Envoy

  • Standalone installation for government systems
  • Running Envoy in Docker and Kubernetes environments for government
  • Basic configuration walkthrough to ensure proper setup

Traffic Management with Envoy

  • Load balancing strategies to optimize performance
  • Retries, circuit breaking, and failover mechanisms for reliability
  • Advanced routing rules and header-based routing for precise control

Security and Zero Trust with Envoy

  • TLS and mutual TLS (mTLS) setup for secure communications
  • Authentication and authorization filters to enhance security
  • Implementing Zero Trust networking principles with Envoy

Observability and Monitoring

  • Access logs and metrics for comprehensive monitoring
  • Tracing with Jaeger and Zipkin to track requests
  • Integrating Envoy with Prometheus and Grafana for robust observability

Extending Envoy

  • Introduction to WASM filters for enhanced functionality
  • Custom extensions for Envoy to meet specific needs
  • Best practices for maintainability and scalability

Envoy in a Service Mesh

  • Using Envoy as a sidecar proxy for microservices communication
  • Envoy's role in Istio and Consul service meshes for government
  • Case study: Envoy as a universal data plane for seamless integration

Troubleshooting and Best Practices

  • Debugging configuration issues to ensure smooth operation
  • Health checks and resilience testing for reliability
  • Operational guidelines for production environments in government

Summary and Next Steps

Requirements

  • A foundational knowledge of microservices development and networking for government projects.
  • Experience with the Linux command line environment.
  • Familiarity with container technologies and orchestration tools, such as Kubernetes, is advantageous.

Audience

  • Developers
  • Cloud Architects
  • DevOps Engineers
  • Network Engineers
  • System Administrators
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories