Automatically a warning to older blog posts about them being potentially out of date. (#5134)

This commit is contained in:
Martin Taillefer 2019-10-15 10:02:20 -07:00 committed by GitHub
parent d5482da0aa
commit 612d10c921
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
40 changed files with 73 additions and 7 deletions

View File

@ -148,12 +148,13 @@ A few front-matter fields are specific to section pages (i.e. for files names `_
There are a few more front matter fields available specifically for blog posts:
|Field | Description
|---------------|------------
|`publishdate` | Date of the post's original publication
|`last_update` | Date when the post last received a major revision
|`attribution` | Optional name of the post's author
|`twitter` | Optional Twitter handle of the post's author
|Field | Description
|----------------|------------
|`publishdate` | Date of the post's original publication
|`last_update` | Date when the post last received a major revision
|`attribution` | Optional name of the post's author
|`twitter` | Optional Twitter handle of the post's author
|`target_release`| Release this blog is written with in mind (this is normally the current major Istio release at the time the blog is authored or updated)
## Adding images

View File

@ -7,6 +7,7 @@ attribution: The Istio Team
aliases:
- /blog/0.1-auth.html
- /blog/istio-auth-for-microservices.html
target_release: 0.1
---
Conventional network security approaches fail to address security threats to distributed applications deployed in dynamic production environments. Today, we describe how Istio Auth enables enterprises to transform their security posture from just protecting the edge to consistently securing all inter-service communications deep within their applications. With Istio Auth, developers and operators can protect services with sensitive data against unauthorized insider access and they can achieve this without any changes to the application code!

View File

@ -7,6 +7,7 @@ attribution: Frank Budinsky
keywords: [traffic-management,canary]
aliases:
- /blog/canary-deployments-using-istio.html
target_release: 0.7
---
{{< tip >}}

View File

@ -6,6 +6,7 @@ subtitle:
attribution: Spike Curtis
aliases:
- /blog/using-network-policy-in-concert-with-istio.html
target_release: 0.1
---
The use of Network Policy to secure applications running on Kubernetes is a now a widely accepted industry best practice. Given that Istio also supports policy, we want to spend some time explaining how Istio policy and Kubernetes Network Policy interact and support each other to deliver your application securely.

View File

@ -7,6 +7,7 @@ attribution: Martin Taillefer
keywords: [adapters,mixer,policies,telemetry]
aliases:
- /blog/mixer-adapter-model.html
target_release: 0.2
---
Istio 0.2 introduced a new Mixer adapter model which is intended to increase Mixers flexibility to address a varied set of infrastructure backends. This post intends to put the adapter model in context and explain how it works.

View File

@ -8,6 +8,7 @@ keywords: [adapters,mixer,policies,telemetry,availability,latency]
aliases:
- /blog/posts/2017/mixer-spof-myth.html
- /blog/mixer-spof-myth.html
target_release: 0.3
---
As [Mixer](/docs/reference/config/policy-and-telemetry/) is in the request path, it is natural to question how it impacts

View File

@ -6,6 +6,7 @@ last_update: 2019-01-16
subtitle: Ingress AWS Network Load Balancer
attribution: Julien SENON
keywords: [ingress,traffic-management,aws]
target_release: 1.0
---
{{< tip >}}

View File

@ -5,6 +5,7 @@ publishdate: 2018-07-30
subtitle:
attribution: Dinesh Subhraveti (AppOrbit and Columbia University)
keywords: [appswitch,performance]
target_release: 1.0
---
{{< quote >}}

View File

@ -6,6 +6,7 @@ last_update: 2019-04-11
subtitle: Mesh-external service entries for egress HTTPS traffic
attribution: Vadim Eisenberg
keywords: [traffic-management,egress,https]
target_release: 1.1
---
In many cases, not all the parts of a microservices-based application reside in a _service mesh_. Sometimes, the

View File

@ -6,6 +6,7 @@ last_update: 2019-04-18
subtitle: Istio Egress Control Options for MongoDB traffic
attribution: Vadim Eisenberg
keywords: [traffic-management,egress,tcp,mongo]
target_release: 1.1
---
In the [Consuming External TCP Services](/blog/2018/egress-tcp/) blog post, I described how external services

View File

@ -5,6 +5,7 @@ publishdate: 2018-06-22
last_update: 2019-03-04
attribution: Vadim Eisenberg and Ronen Schaffer (IBM)
keywords: [egress,traffic-management,access-control,monitoring]
target_release: 1.1
---
While Istio's main focus is management of traffic between microservices inside a service mesh, Istio can also manage

View File

@ -8,6 +8,7 @@ attribution: Vadim Eisenberg
aliases:
- /docs/tasks/traffic-management/egress-tcp/
keywords: [traffic-management,egress,tcp]
target_release: 1.0
---
{{< tip >}}

View File

@ -4,6 +4,7 @@ description: How to export Istio Access Logs to different sinks like BigQuery, G
publishdate: 2018-07-09
subtitle:
attribution: Nupur Garg and Douglas Reid
target_release: 0.8
---
This post shows how to direct Istio logs to [Stackdriver](https://cloud.google.com/stackdriver/)

View File

@ -4,6 +4,7 @@ description: How HP is building its next-generation footwear personalization pla
subtitle: How HP is building its next-generation footwear personalization platform on Istio
publishdate: 2018-07-31
attribution: Steven Ceuppens, Chief Software Architect @ HP FitStation, Open Source Advocate & Contributor
target_release: 1.0
---
The FitStation team at HP strongly believes in the future of Kubernetes, BPF and service-mesh as the next standards in cloud infrastructure. We are also very happy to see Istio coming to its official Istio 1.0 release -- thanks to the joint collaboration that started at Google, IBM and Lyft beginning in May 2017.

View File

@ -6,6 +6,7 @@ subtitle:
attribution: Sandeep Parikh
twitter: crcsmnky
keywords: [traffic-management,gateway]
target_release: 1.0
---
Traffic management is one of the critical benefits provided by Istio. At the heart of Istios traffic management is the ability to decouple traffic flow and infrastructure scaling. This lets you control your traffic in ways that arent possible without a service mesh like Istio.

View File

@ -5,6 +5,7 @@ publishdate: 2018-07-20
subtitle:
attribution: Limin Wang
keywords: [authorization,rbac,security]
target_release: 0.8
---
Micro-segmentation is a security technique that creates secure zones in cloud deployments and allows organizations to

View File

@ -4,6 +4,7 @@ subtitle:
description: Istio hosting an all day Twitch stream to celebrate the 1.0 release.
publishdate: 2018-08-03
attribution: Spencer Krum, IBM
target_release: 1.0
---
To celebrate the 1.0 release and to promote the software to a wider audience, the Istio community is hosting an all day live stream on Twitch on August 17th.

View File

@ -5,6 +5,7 @@ publishdate: 2018-04-19
subtitle: Using multiple Istio control planes and RBAC to create multi-tenancy
attribution: John Joyce and Rich Curran
keywords: [tenancy]
target_release: 0.7
---
Multi-tenancy is commonly used in many environments across many different applications,

View File

@ -5,6 +5,7 @@ publishdate: 2018-02-08
subtitle: Routing rules for HTTP traffic
attribution: Christian Posta
keywords: [traffic-management,mirroring]
target_release: 0.5
---
Trying to enumerate all the possible combinations of test cases for testing services in non-production/test environments can be daunting. In some cases, you'll find that all of the effort that goes into cataloging these use cases doesn't match up to real production use cases. Ideally, we could use live production use cases and traffic to help illuminate all of the feature areas of the service under test that we might miss in more contrived testing environments.

View File

@ -5,6 +5,7 @@ publishdate: 2018-04-25
subtitle:
attribution: Frank Budinsky (IBM) and Shriram Rajagopalan (VMware)
keywords: [traffic-management]
target_release: 0.7
---
Up until now, Istio has provided a simple API for traffic management using four configuration resources:

View File

@ -5,6 +5,7 @@ description: Using Istio to secure multi-cloud Kubernetes applications with zero
publishdate: 2019-09-18
attribution: Anton Aleksandrov (IBM)
keywords: [security,oidc,jwt,policies]
target_release: 1.3
---
If you are running your containerized applications on Kubernetes, you can benefit from using the App Identity and Access Adapter for an abstracted level of security with zero code changes or redeploys.

View File

@ -5,6 +5,7 @@ publishdate: 2019-01-14
subtitle:
attribution: Dinesh Subhraveti (AppOrbit and Columbia University)
keywords: [appswitch,performance]
target_release: 1.0
---
We are going through an interesting cycle of application decomposition and recomposition. While the microservice paradigm is driving monolithic applications to be broken into separate individual services, the service mesh approach is helping them to be connected back together into well-structured applications. As such, microservices are logically separate but not independent. They are usually closely interdependent and taking them apart introduces many new concerns such as need for mutual authentication between services. Istio directly addresses most of those issues.

View File

@ -5,6 +5,7 @@ subtitle: Custom ingress gateway
publishdate: 2019-01-10
keywords: [ingress,traffic-management]
attribution: Julien Senon
target_release: 1.0
---
This post provides instructions to manually create a custom ingress [gateway](/docs/reference/config/networking/v1alpha3/gateway/) with automatic provisioning of certificates based on cert-manager.

View File

@ -6,7 +6,7 @@ subtitle:
attribution: Manish Chugtu
twitter: chugtum
keywords: [kubernetes,sidecar-injection, traffic-management]
target_release: 1.0
---
A simple overview of an Istio service-mesh architecture always starts with describing the control-plane and data-plane.

View File

@ -5,6 +5,7 @@ publishdate: 2019-01-31
subtitle: An Istio Egress Gateway performance assessment
attribution: Jose Nativio, IBM
keywords: [performance,traffic-management,egress,mongo]
target_release: 1.0
---
The main objective of this investigation was to determine the impact on performance and resource utilization when an egress gateway is added in the service mesh to access an external service (MongoDB, in this case). The steps to configure an egress gateway for an external MongoDB are described in the blog [Consuming External MongoDB Services](/blog/2018/egress-mongo/).

View File

@ -5,6 +5,7 @@ description: Attacks involving egress traffic and requirements for egress traffi
publishdate: 2019-05-22
attribution: Vadim Eisenberg (IBM)
keywords: [traffic-management,egress,security]
target_release: 1.1
---
This is part 1 in a new series about secure control of egress traffic in Istio that I am going to publish.

View File

@ -5,6 +5,7 @@ description: Use Istio Egress Traffic Control to prevent attacks involving egres
publishdate: 2019-07-10
attribution: Vadim Eisenberg (IBM)
keywords: [traffic-management,egress,security,gateway,tls]
target_release: 1.2
---
Welcome to part 2 in our new series about secure control of egress traffic in Istio.

View File

@ -5,6 +5,7 @@ description: Comparison of alternative solutions to control egress traffic inclu
publishdate: 2019-07-22
attribution: Vadim Eisenberg (IBM)
keywords: [traffic-management,egress,security,gateway,tls]
target_release: 1.2
---
Welcome to part 3 in our series about secure control of egress traffic in Istio.

View File

@ -4,6 +4,7 @@ description: "The design principles behind Istio's APIs and how those APIs are e
publishdate: 2019-08-05
attribution: Louis Ryan (Google), Sandeep Parikh (Google)
keywords: [apis,composability,evolution]
target_release: 1.2
---
One of Istios main goals has always been, and continues to be, enabling teams to develop abstractions that work best for their specific organization and workloads. Istio provides robust and powerful building blocks for service-to-service networking. Since [Istio 0.1](/news/2017/announcing-0.1), the Istio team has been learning from production users about how they map their own architectures, workloads, and constraints to Istios capabilities, and weve been evolving Istios APIs to make them work better for you.

View File

@ -5,7 +5,9 @@ description: Deploy environments that require isolation into separate meshes and
publishdate: 2019-10-02
attribution: Vadim Eisenberg (IBM)
keywords: [traffic-management,multicluster,security,gateway,tls]
target_release: 1.3
---
Various compliance standards require protection of sensitive data environments. Some of the important standards and the
types of sensitive data they protect appear in the following table:

View File

@ -5,6 +5,7 @@ publishdate: 2019-03-19
subtitle: An overview of Istio 1.1 performance improvements
attribution: Surya V Duggirala (IBM), Mandar Jog (Google), Jose Nativio (IBM)
keywords: [performance,scalability,scale,benchmarks]
target_release: 1.1
---
Hyper-scale, microservice-based cloud environments have been exciting to build but challenging to manage. Along came Kubernetes (container orchestration) in 2014, followed by Istio (container service management) in 2017. Both open-source projects enable developers to scale container-based applications without spending too much time on administration tasks.

View File

@ -5,6 +5,7 @@ description: Demonstrates a Mixer out-of-process adapter which implements the Kn
publishdate: 2019-09-18
attribution: Idan Zach (IBM)
keywords: [mixer,adapter,knative,scale-from-zero]
target_release: 1.3
---
This post demonstrates how you can use [Mixer](/faq/mixer/) to push application logic

View File

@ -4,6 +4,7 @@ description: "How can you use Istio to monitor blocked and passthrough external
publishdate: 2019-09-28
attribution: Neeraj Poddar (Aspen Mesh)
keywords: [monitoring,blackhole,passthrough]
target_release: 1.3
---
Understanding, controlling and securing your external service access is one

View File

@ -5,6 +5,7 @@ publishdate: 2019-02-07
subtitle:
attribution: Frank Budinsky (IBM)
keywords: [traffic-management,multicluster]
target_release: 1.0
---
If you've spent any time looking at Istio, you've probably noticed that it includes a lot of features that

View File

@ -6,6 +6,7 @@ last_update: 2019-09-05
subtitle:
attribution: Megan O'Keefe (Google), John Howard (Google), Mandar Jog (Google)
keywords: [performance,scalability,scale,benchmarks]
target_release: 1.2
---
Service meshes add a lot of functionality to application deployments, including [traffic policies](/docs/concepts/what-is-istio/#traffic-management), [observability](/docs/concepts/what-is-istio/#observability), and [secure communication](/docs/concepts/what-is-istio/#security). But adding a service mesh to your environment comes at a cost, whether that's time (added latency) or resources (CPU cycles). To make an informed decision on whether a service mesh is right for your use case, it's important to evaluate how your application performs when deployed with a service mesh.

View File

@ -4,6 +4,7 @@ description: Learn how to extend the lifetime of Istio self-signed root certific
publishdate: 2019-06-07
attribution: Oliver Liu
keywords: [security, PKI, certificate, Citadel]
target_release: 1.1
---
Istio self-signed certificates have historically had a 1 year default lifetime.

View File

@ -5,6 +5,7 @@ publishdate: 2019-02-05
last_update: 2019-09-27
attribution: Rigs Caballero, Google
keywords: [community,blog,contribution,guide,guideline,event]
target_release: 1.3
---
Welcome to the Istio blog!

View File

@ -4,6 +4,7 @@ description: Taking advantage of Kubernetes trustworthy JWTs to issue certificat
publishdate: 2019-09-10
attribution: Phillip Quy Le (Google)
keywords: [security, PKI, certificate, nodeagent, sds]
target_release: 1.2
---
In Istio 1.3, we are taking advantage of improvements in Kubernetes to issue certificates for workload instances more securely.

View File

@ -204,3 +204,6 @@ other = "Description"
[analysis_level]
other = "Level"
[target_release]
other = "This blog post was written a while ago and assumed Istio %v. Be aware that there have been many improvements to Isito since then and so some of this content may now be outdated."

View File

@ -111,3 +111,28 @@
</div>
</nav>
{{ end }}
{{ if .Page.Params.target_release }}
{{ $page_parts := split .Page.Params.target_release "." }}
{{ $page_version := int (index $page_parts 0) }}
{{ $page_revision := int (index $page_parts 1) }}
{{ $page_normalized_version := add (add (mul $page_version 1000000) (mul $page_revision 1000)) 0 }}
{{ $site_parts := split .Site.Data.args.version "." }}
{{ $site_version := int (index $site_parts 0) }}
{{ $site_revision := int (index $site_parts 1) }}
{{ $site_normalized_version := add (add (mul $site_version 1000000) (mul $site_revision 1000)) 0 }}
{{ if gt $site_normalized_version $page_normalized_version }}
<div>
<aside class="callout warning">
<div class="type">
{{- partial "large_icon.html" "callout-warning" -}}
</div>
<div class="content">
{{ printf (i18n "target_release") .Page.Params.target_release }}
</div>
</aside>
</div>
{{ end }}
{{ end }}