-
Service detection findings are generated for every DNS name that maps to an IP. As a result, a single exposure on a single asset is "double-counted" if it has multiple DNS names pointing to it.
Ad…
-
This sentence
> When you use this workflow, the ASP.NET Core Identity middleware is not needed, because all user information storage and authentication is handled by the Identity service.
It's har…
-
User Story
=======
There are multiple ways to set up microservices:
- Have a public facing API Gateway responsible for authentication, that then acts as a proxy for internal microservices, or which…
-
### Describe the feature
Provide CDK example of building an App Mesh on microservices running on ECS Fargate.
### Use Case
The example can accelerate adoption of App Mesh if there are CDK examples …
-
## Description
The Service Registry design pattern is a central service registry that maintains a database of available services. It acts as a lookup mechanism, allowing services to register themselve…
-
Hi team,
First of all thanks for the great tool! 😃 Currently I'm configuring and testing it against [Apache ServiceComb Service Center](https://github.com/apache/servicecomb-service-center). I've n…
-
Could you provide an example of how to use Ingress + Cloudflare tunnel?
I guess it is possible to avoid using the Cloud Provider Load Balancer solution if all traffic goes through Cloudflare Tunnel…
-
### What version of Bun is running?
1.0.0+822a00c4d508b54f650933a73ca5f4a3af9a7983
### What platform is your computer?
Linux 6.4.13-200.fc38.x86_64 x86_64 unknown
### What steps can reprod…
-
https://istio.io/latest/docs/examples/microservices-istio/
Mariam - per our discussion if you have bandwidth to help with this.
cc @ericvn @frankbu @sdake
-
This page could benefit from some examples on using the created type based on the Enumeration class. Demonstrating why/how ID and name are related and used, etc.
Also recommend using the more co…