In this tutorial, you will learn how to secure a micro-service application with Aporeto. We'll use a slightly modified version of Google’s Hipster Shop as our micro-service application. The following diagram illustrates its architecture.
Once you complete Setting up your cluster and Deploy the hipster shop application, you can complete any one of sections I-IV. However, we recommend completing these sections in sequence. Doing so will show how you can develop your network policies in a development environment and move them to your production environment, matching the lifecycle progression of a micro-services application.
As you move through the sections of this tutorial, the requirements increase.
Sections III and IV require
Section IV requires a second Kubernetes cluster.