Get in Touch

Course Outline

Introduction to Envoy Proxy

  • The role of Envoy in modern infrastructures.
  • Comparison of Envoy Proxy with NGINX, HAProxy, and Traefik.
  • Adoption of Envoy in Istio, Consul, and cloud-native platforms.

Envoy Architecture and Features

  • Listeners, clusters, and endpoints.
  • Filter chains and extensibility.
  • xDS APIs for dynamic configuration.

Installing and Running Envoy

  • Standalone installation procedures.
  • Running Envoy in Docker and Kubernetes.
  • A walkthrough of basic configuration.

Traffic Management with Envoy

  • Load balancing strategies.
  • Retries, circuit breaking, and failover mechanisms.
  • Advanced routing rules and header-based routing.

Security and Zero Trust with Envoy

  • Setting up TLS and mutual TLS (mTLS).
  • Authentication and authorization filters.
  • Implementing Zero Trust networking.

Observability and Monitoring

  • Access logs and metrics.
  • Tracing with Jaeger and Zipkin.
  • Integrating Envoy with Prometheus and Grafana.

Extending Envoy

  • Introduction to WASM filters.
  • Custom extensions for Envoy.
  • Best practices for maintainability.

Envoy in a Service Mesh

  • Using Envoy as a sidecar proxy.
  • Envoy in Istio and Consul service meshes.
  • Case study: Envoy as a universal data plane.

Troubleshooting and Best Practices

  • Debugging configuration issues.
  • Health checks and resilience testing.
  • Operational guidelines for production.

Summary and Next Steps

Requirements

  • A foundational understanding of microservices development and networking.
  • Experience using the Linux command line.
  • Familiarity with containers and orchestration tools such as Kubernetes is advantageous.

Target Audience

  • Developers
  • Cloud architects
  • DevOps engineers
  • Network engineers
  • System administrators
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories