service-mesh-integrator

Service Mesh Integrator

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "service-mesh-integrator" with this command: npx skills add dexploarer/hyper-forge/dexploarer-hyper-forge-service-mesh-integrator

Service Mesh Integrator

Configure enterprise service mesh for secure, observable microservices communication.

When to Use

  • Setting up Istio, Linkerd, or Consul service mesh

  • Implementing mTLS between services

  • Configuring traffic routing and load balancing

  • Setting up canary deployments

  • Implementing circuit breakers and retries

  • Configuring observability (metrics, tracing, logging)

Istio Configuration

Install Istio

apiVersion: install.istio.io/v1alpha1 kind: IstioOperator metadata: name: istio-control-plane spec: profile: production components: pilot: k8s: resources: requests: cpu: 500m memory: 2Gi ingressGateways: - name: istio-ingressgateway enabled: true k8s: replicas: 3


Virtual Service for traffic routing

apiVersion: networking.istio.io/v1beta1 kind: VirtualService metadata: name: user-service spec: hosts: - user-service http: - match: - headers: version: exact: v2 route: - destination: host: user-service subset: v2 weight: 100 - route: - destination: host: user-service subset: v1 weight: 90 - destination: host: user-service subset: v2 weight: 10


Destination Rule

apiVersion: networking.istio.io/v1beta1 kind: DestinationRule metadata: name: user-service spec: host: user-service trafficPolicy: tls: mode: ISTIO_MUTUAL connectionPool: tcp: maxConnections: 100 http: http1MaxPendingRequests: 50 http2MaxRequests: 100 outlierDetection: consecutive5xxErrors: 5 interval: 30s baseEjectionTime: 30s subsets: - name: v1 labels: version: v1 - name: v2 labels: version: v2 trafficPolicy: loadBalancer: simple: ROUND_ROBIN

mTLS Configuration

Enable mTLS globally

apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: default namespace: istio-system spec: mtls: mode: STRICT


Authorization policy

apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: user-service-authz spec: selector: matchLabels: app: user-service rules: - from: - source: principals: - cluster.local/ns/default/sa/order-service to: - operation: methods: ["GET", "POST"] paths: ["/api/v1/users/*"]

Best Practices

  • ✅ Enable mTLS for all service-to-service communication

  • ✅ Use traffic splitting for canary deployments

  • ✅ Configure circuit breakers and retries

  • ✅ Implement rate limiting per service

  • ✅ Use observability features (tracing, metrics)

  • ✅ Regular security policy audits

Related Skills

  • microservices-orchestrator

  • distributed-tracing-setup

  • sla-monitor-generator

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

threejs-scene-builder

No summary provided by upstream source.

Repository SourceNeeds Review
General

react-component-generator

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-documentation-generator

No summary provided by upstream source.

Repository SourceNeeds Review