Date: August 27, 2020
Time: 16:00 UTC / 12:00 PM EDT
Abstract: Moving common network functionality such as client load-balancing and circuit-breaking into out-of-process proxies has kickstarted the technology we call Service Mesh, with Istio as its most popular incarnation. With the introduction of WASM support, you can now extend its functionality by writing custom Filters for Istio's proxy, Envoy, in any language that supports WASM. Let's take a closer look at developing, building, and deploying WASM Filters using the example of an OpenID Connect Filter that adds Keycloak Authentication functionality to any service in your Mesh - no code changes required.
Speakers: Daniel Grimm
Daniel is a Software Engineer at Red Hat, working on OpenShift Service Mesh and Istio. In the past, he has designed and implemented various distributed systems ranging from distributed monolithic applications running on VMs to 'pure' micro-service infrastructures on Kubernetes. Nowadays he is working on moving common parts of those distributed systems into the lower level of the Service Mesh, making sure engineers do not have to reinvent the wheel every time they build new applications. He is an Istio maintainer, most active in the Environments workgroup.