|
|
|||
|
||||
OverviewBuild and run a production SPIRE control plane with confidence, high availability, and clear runbooks. Identity at scale breaks when credentials drift, bundles go stale, or rollouts cut traffic. Teams need concrete patterns that work on real clusters and real Linux hosts, not theory. This book shows operators how to install, secure, scale, federate, and recover SPIRE with repeatable steps. Every chapter maps platform knobs to outcomes, so you can ship changes without outages and prove what happened during incidents. Design trust domains and name SPIFFE IDs that scale across teams and environments Choose between x509 svids and jwt svids, set lifetimes, rotation behavior, and validation paths Expose the Workload API safely with least privilege sockets on Kubernetes and Linux Install hardened Helm deployments, set values that matter, and wire the SPIFFE CSI driver Run bare metal installs with systemd, secure directories and sockets, and lock down units Author identities with the SPIRE Controller Manager, CRDs, and ID templates Publish bundle endpoints with https web or https spiffe profiles, set exact server options Operate Postgres as the datastore, align schema and migrations, tune libpq and pgbouncer Build backup strategy with PITR and WAL, rehearse restores, validate cutover without drift Cluster servers on a shared SQL datastore, place L4 load balancers, and protect quorum Plan capacity for issuance throughput and cache sizing, set practical rate limits Define readiness and liveness probes that reflect real signing availability Drill failures, switch Postgres leaders safely, and recover servers step by step Federate trust domains with bilateral or hierarchical models, pick the right one for your topology Publish OIDC discovery and JWKS with stable caching, front with DNS and CDNs correctly Integrate external consumers, AWS IAM with jwt svids, Vault JWT or OIDC auth, and Kubernetes API server Manage keys with memory, disk, or cloud KMS, and wire UpstreamAuthority for Vault, AWS PCA, GCP CAS, or EJBCA Run rollover drills, propagate new intermediates, and confirm client validation Ship telemetry to Prometheus or StatsD, label scrape targets, and trace incident timelines Monitor bundle freshness, OIDC endpoints, and control planes under stress Use service meshes and proxies, Istio and Envoy SDS, HAProxy and NGINX mTLS, and L7 gateways for HTTP 2 and gRPC Execute disaster recovery, datastore loss restore from backups, trust domain rollover after CA loss, region failover with DNS and JWKS cache survival Apply change control with preflight checks and exit criteria, run zero downtime upgrades for servers, agents, charts, and datastore migrations Use operator runbooks, failure signatures with one command repro, and direct fixes This edition includes practical add ons, a hardening checklist, preflight and postflight procedures, operator runbooks with real failure signatures, and a consistent change plan and rollout pattern that reduces risk. This is a code heavy guide, it includes working YAML, HCL, JSON, Bash, Systemd Unit, and SQL examples that you can adapt to live clusters and hosts. Get the guide operators use to keep identity stable in production, grab your copy today. Full Product DetailsAuthor: Hosea LevitonPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.80cm , Height: 1.50cm , Length: 25.40cm Weight: 0.481kg ISBN: 9798272041708Pages: 274 Publication Date: 28 October 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||