service-mesh-expert
Design Service Mesh Architectures with Istio and Linkerd
Microservices need secure, observable communication without complexity. This skill provides expert guidance on Istio and Linkerd deployments with zero-trust networking and traffic management.
Télécharger le ZIP du skill
Importer dans Claude
Allez dans Paramètres → Capacités → Skills → Importer un skill
Activez et commencez Ă utiliser
Tester
Utilisation de "service-mesh-expert". Request for mTLS configuration
Résultat attendu:
Step-by-step PeerAuthentication and DestinationRule configurations to enforce strict mTLS cluster-wide, starting with permissive mode migration path and verification commands to confirm encryption.
Utilisation de "service-mesh-expert". Debug service connectivity issue
Résultat attendu:
Systematic troubleshooting checklist including sidecar injection verification, VirtualService routing analysis, authorization policy conflicts, and istioctl debug commands with expected outputs.
Audit de sécurité
SûrStatic analysis flagged 4 patterns that are all false positives. Line 22 uses Markdown backticks for documentation reference, not shell execution. Lines 3, 46, and 60 contain no cryptographic code - they reference mTLS conceptually in documentation. This is a markdown-only skill with no executable code, external commands, or security risks.
Score de qualité
Ce que vous pouvez construire
Kubernetes Platform Engineer
Deploy Istio service mesh with mTLS enforcement and traffic policies for a production microservices platform handling high-availability requirements.
DevOps Team Lead
Implement canary deployments with traffic splitting and automated rollback using Istio VirtualService and DestinationRule configurations.
Security Architect
Design zero-trust network architecture with service-to-service authentication using mTLS and AuthorizationPolicy enforcement across all namespaces.
Essayez ces prompts
Help me set up Istio service mesh on my Kubernetes cluster. I have 3 namespaces (dev, staging, prod) and need basic mTLS between services. What are the installation steps and initial configuration?
I need to route 90% of traffic to version-1 and 10% to version-2 of my payment service. Create the Istio VirtualService and DestinationRule YAML configurations with explanation.
Design a circuit breaker configuration for my order service that handles upstream failures gracefully. Include connection pool settings, outlier detection, and retry policies with Istio.
Plan a multi-cluster Istio mesh across AWS EKS and GCP GKE. Include requirements for cross-cluster service discovery, certificate management, and traffic federation between the two meshes.
Bonnes pratiques
- Start with PERMISSIVE mTLS mode and gradually migrate to STRICT after verifying all services communicate correctly
- Implement circuit breakers and retry policies before production deployment, not after failures occur
- Use namespace-level policy isolation to apply different security and traffic rules per environment
Éviter
- Enabling strict mTLS cluster-wide without testing in permissive mode first - causes immediate service disruptions
- Skipping circuit breaker configuration assuming services are reliable - cascading failures will occur under load
- Over-provisioning sidecar resources without monitoring actual CPU and memory usage - increases costs unnecessarily