Summary
In this chapter, we read about various troubleshooting techniques as well as best practices for configuring and operating istio. By now, you should have a good understanding of various ports exposed by istio and how they can help diagnose any errors in the mesh. You also read about debugs and access logs produced by Envoy and istiod and how they can help you pinpoint the root cause of errors. istio provides various tools in its diagnostic toolkit that are very helpful for troubleshooting and analyzing issues and errors in the Service Mesh.
Security is of utmost importance when running the Service Mesh, which is why we discussed various attack vectors for the control and data planes. You should now have a good understanding of the list of controls you can put in place to secure the Service Mesh. Finally, we read about how to automate best practices using OPA Gatekeeper to catch most, if not all, non-compliant configurations. You learned how to set up OPA Gatekeeper, how to...