{"version":"1.0","provider_name":"DevSecOps School","provider_url":"http:\/\/devsecopsschool.com\/blog","author_name":"devsecopsschool","author_url":"http:\/\/devsecopsschool.com\/blog\/author\/snehablog\/","title":"Master Envoy &amp; Istio: Become a Service Mesh Expert - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Jpkgwdf3vN\"><a href=\"http:\/\/devsecopsschool.com\/blog\/master-envoy-istio-become-a-service-mesh-expert\/\">Master Envoy &amp; Istio: Become a Service Mesh Expert<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/devsecopsschool.com\/blog\/master-envoy-istio-become-a-service-mesh-expert\/embed\/#?secret=Jpkgwdf3vN\" width=\"600\" height=\"338\" title=\"&#8220;Master Envoy &amp; Istio: Become a Service Mesh Expert&#8221; &#8212; DevSecOps School\" data-secret=\"Jpkgwdf3vN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"If you work with modern, cloud-native applications, you&#8217;ve felt the shift. We&#8217;ve moved from monolithic architectures to distributed microservices, and with this power comes a new set of challenges. How do you manage the intricate web of communication between services? How do you secure every connection? How do you even see what\u2019s going on? The ... Read more"}