Useful Links
Computer Science
Cloud Computing
Cloud Native Development
1. Foundations of Cloud Native
2. Microservices Architecture
3. Containerization
4. Container Orchestration with Kubernetes
5. DevOps and Automation
6. Cloud Native Observability
7. Advanced Cloud Native Concepts
8. Cloud Native Platforms and Ecosystem
9. Cloud Native Development Practices
Advanced Cloud Native Concepts
Service Mesh
Service Mesh Architecture
Data Plane
Control Plane
Service Mesh Interface (SMI)
Key Features
Traffic Management
Load Balancing
Traffic Shaping
Circuit Breaking
Retry Logic
Security
Mutual TLS (mTLS)
Identity and Access Control
Policy Enforcement
Observability
Distributed Tracing Integration
Metrics Collection
Access Logging
Sidecar Proxy Pattern
Proxy Injection
Traffic Interception
Service Discovery
Popular Implementations
Istio
Architecture Components
Traffic Management
Security Features
Observability
Linkerd
Lightweight Architecture
Automatic mTLS
Traffic Splitting
Consul Connect
Service Discovery Integration
Intention-Based Security
Service Mesh Adoption
Migration Strategies
Performance Considerations
Operational Complexity
Serverless Computing
Serverless Principles
Event-Driven Architecture
Stateless Execution
Automatic Scaling
Pay-per-Use
Functions as a Service (FaaS)
Function Lifecycle
Cold Starts
Warm Starts
Function Packaging
Event Sources
HTTP Triggers
Message Queues
Database Events
File System Events
Serverless Platforms
AWS Lambda
Azure Functions
Google Cloud Functions
Knative
Benefits and Limitations
Cost Efficiency
Scalability
Vendor Lock-in
Performance Constraints
Serverless Patterns
Function Composition
Event Sourcing
CQRS
Saga Pattern
Cloud Native Security
Security Model
The 4Cs of Cloud Native Security
Cloud Security
Cluster Security
Container Security
Code Security
Shared Responsibility Model
Defense in Depth
Cloud Security
Identity and Access Management (IAM)
Network Security
Data Encryption
Compliance and Governance
Cluster Security
RBAC (Role-Based Access Control)
Network Segmentation
Pod Security Standards
Admission Controllers
Container Security
Image Security
Vulnerability Scanning
Image Signing
Trusted Registries
Runtime Security
Runtime Protection
Behavioral Analysis
Intrusion Detection
Code Security
Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Dependency Management
Software Composition Analysis (SCA)
Supply Chain Security
Software Bill of Materials (SBOM)
Provenance Tracking
Artifact Signing
Trusted Registries
Secrets Management
Secret Storage Solutions
Access Control for Secrets
Secret Rotation
Encryption at Rest
Network Security
Network Policies
Service Mesh Security
Zero Trust Networking
Micro-segmentation
Security Monitoring
Security Information and Event Management (SIEM)
Threat Detection
Incident Response
Forensics
Chaos Engineering
Chaos Engineering Principles
Hypothesis-Driven Experiments
Controlled Fault Injection
Blast Radius Limitation
Automation and Continuous Testing
Experiment Design
Steady State Definition
Hypothesis Formation
Variable Identification
Metrics Selection
Fault Injection Techniques
Network Failures
Resource Exhaustion
Service Failures
Infrastructure Failures
Chaos Engineering Tools
Chaos Monkey
Gremlin
Litmus
Chaos Toolkit
Building Resilient Systems
Learning from Failures
Improving System Design
Incident Response Preparation
Cultural Change
Chaos Engineering in Practice
Game Days
Disaster Recovery Testing
Performance Testing
Security Testing
Previous
6. Cloud Native Observability
Go to top
Next
8. Cloud Native Platforms and Ecosystem