Tech Talk: Developing APIs the Easy Way – Streamline your API process with an endpoint-focused approach on Dec 5 at 11 am EST! Register now

Blog

The latest posts and insights about Ambassador Labs - our products, our ecosystem, as well as voices from across our community.

Kubernetes Secrets

Kubernetes API Gateway

Unlocking the Secrets of Kubernetes Networking: A Practical Guide for Top-Level Engineers

In the modern cloud native ecosystem, Kubernetes is the go-to choice for container orchestration with its ability to easily manage and scale containerized applications. At its core, Kubernetes can be seen as a distributed system where independent nodes (containers) come together to present a unified, cohesive environment to users. However, one major issue that arises in such architectures is networking. How do ports get allocated? How do containers communicate with each other? How does the outside world communicate with the containers? These are some of the questions that need to be answered to understand networking in Kubernetes. Let’s break down the Kubernetes networking model and provide a comprehensive understanding of how networking works in Kubernetes. You will understand four major areas where issues arise in Kubernetes as it concerns networking and common strategies for addressing them. By the end of this article, you will have the necessary skills to troubleshoot networking issues in Kubernetes like a pro.

 Prince is a technical writer and DevOps engineer who believes in the power of showing up. He is passionate about helping others learn and grow through writing and coding.
March 26, 2024 | 14 min read

Article

The 8 Fallacies of Distributed Network Systems: a Comprehensive Guide

Imagine a popular e-commerce platform that relies on distributed network systems to handle thousands of transactions per second. Developers, in their pursuit of building a seamless user experience, make certain assumptions about the network infrastructure that powers their platform. However, these assumptions can prove detrimental to underlying network infrastructure if not carefully examined and accounted for. As the old saying goes when you assume you make an “*ss out of u and me,” and when that’s applied to the complex world of network technology–that mess gets even greater. These assumptions, known as the Fallacies of Distributed Network Systems, can lead to critical errors and vulnerabilities if not properly addressed. In this comprehensive guide, we will delve into each of these fallacies, exploring their effects and providing practical solutions to mitigate their impact.

March 22, 2024 | 12 min read

API Gateway

Zero Trust and API Security: Implementing Robust Authentication with Edge Stack

Zero Trust generated huge momentum in 2023. Okta’s The State of Zero Trust Security 2023 states that 61% of organizations are already implementing Zero Trust, with another 35% planning to soon. 2023, Gartner’s Strategic Roadmap for Zero Trust Security Program Implementation report was published, detailing how to define your roadmap to Zero Trust. It might come as a surprise to learn that Zero Trust was first described 30 years ago this April in 1994. Why has it taken so long to gain traction? It comes down to the technology not being in place. But in 2024, with Kubernetes and solutions such as Edge Stack API Gateway, service meshes, mTLS, and other advanced security technologies, organizations now have the tools they need to effectively implement Zero Trust architectures and secure their APIs dynamically and scalable. A vital component of that is robust authentication. If you can’t determine who your users are, you can’t then use that information throughout your infrastructure to control access. Let’s see how you can implement authentication with Edge Stack API Gateway as the start of a Zero Trust framework.

March 19, 2024 | 9 min read

Kubernetes API Gateway

Best Practices for Configuring Rate Limits to Prevent DDoS

In February 2018, GitHub was hit by a massive Distributed Denial of Service (DDoS) attack launched to take the site offline. The DDoS attack flooded the site with 126,900 packets per millisecond, sending over 125 GB of data to the website per second. It worked—but only just. The site was offline for only 20 minutes before mitigation defenses to prevent DDoS kicked in to limit the attack. At the heart of these would have been rate limiting, reducing the requests that users can make in a given time frame. This simple yet highly effective strategy to prevent DDoS attacks should be one of the initial security measures you implement when deploying a service. Here, we want to take you through how to think strategically about rate limiting and how you can implement best practices when configuring your Kubernetes API gateway.

March 14, 2024 | 10 min read
1...1617
18
1920...45