Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Envoy Proxy
- The role of Envoy in modern infrastructures
- Comparing Envoy Proxy with NGINX, HAProxy, and Traefik
- Its adoption in Istio, Consul, and cloud-native platforms
Envoy Architecture and Features
- Listeners, clusters, and endpoints
- Filter chains and extensibility
- xDS APIs for dynamic configuration
Installing and Running Envoy
- Standalone installation
- Running Envoy in Docker and Kubernetes
- Basic configuration walkthrough
Traffic Management with Envoy
- Load balancing strategies
- Retries, circuit breaking, and failover
- Advanced routing rules and header-based routing
Security and Zero Trust with Envoy
- Setting up TLS and mutual TLS (mTLS)
- Authentication and authorization filters
- Implementing Zero Trust networking
Observability and Monitoring
- Access logs and metrics
- Tracing with Jaeger and Zipkin
- Integrating Envoy with Prometheus and Grafana
Extending Envoy
- Introduction to WASM filters
- Developing custom extensions for Envoy
- Best practices for maintainability
Envoy in a Service Mesh
- Utilizing Envoy as a sidecar proxy
- Envoy in Istio and Consul service meshes
- Case study: Envoy as a universal data plane
Troubleshooting and Best Practices
- Debugging configuration issues
- Health checks and resilience testing
- Operational guidelines for production environments
Summary and Next Steps
Requirements
- A foundational understanding of microservices development and networking.
- Proficiency with the Linux command line.
- Familiarity with containers and orchestration tools like Kubernetes is advantageous.
Audience
- Developers
- Cloud architects
- DevOps engineers
- Network engineers
- System administrators
14 Hours