Why you should use a service mesh with microservices

2022-05-29 00:07:08 By : Mr. lee Mr

Microservices and distributed applications require instantaneous network communications and complex orchestrations to ensure high performance and fast scalability. The levels of intricacy require full management automation, since the complexity surpasses the abilities of IT administrators to define controls manually, such as load balancing, routing rules, service discovery and authentication.

A service mesh provides platform-level automation and ensures communication between containerized application infrastructures. Service mesh tools ease operational management and handle the east-to-west traffic of remote procedure calls, which originate within the data center and travel between services.

In contrast, an API gateway facilitates external north-south interactions and handles external communications that enter an endpoint or service within the data center. Through its flexible release process, a service mesh enables organizations to run microservices at scale and ensures high availability, resiliency and secure communications.

Let's explore the benefits and advantages of a service mesh approach, examine use cases and consider possible limitations.

Organizations that deploy large-scale applications composed of microservices use service mesh to handle requests and scale services instantly. Dynamic service discovery enables that expansion and requires both a container orchestration system -- such as Kubernetes -- and API-driven network proxies to route traffic.

Sidecar proxies function within the service mesh data plane and enable fast information exchanges between microservices. The data plane is involved with every packet and request in the system and enables observability, health checks, routing and load balancing.

Management processes on the network control plane coordinate proxy behavior through APIs. These sophisticated routing capabilities are a critical aspect of distributed application performance and seamless data transfers. Human operators use APIs to manage traffic control, network resiliency, security and authentication.

The ride-hailing company Lyft is an example of the potential in a service mesh approach. In 2016, the company teamed up with IBM and Google to create Istio and moved its monolithic applications to service-oriented architecture. As a Kubernetes-native mesh, Istio manages service traffic flow, enforces access policies and aggregates telemetry data in the form of metrics, logs and traces.

Key elements within the Istio service mesh include Envoy, a high-performance proxy for inbound and outbound traffic, along with the Jaeger UI for visualizing traces and debugging. Components of Istio and service mesh technology date back to the early 2000s when Google first introduced gRPC (remote procedure call), Google Frontend and Global Software Load Balancer, in addition to fabric utilities from Netflix and Twitter.

An organization with an established CI/CD pipeline and DevOps processes can use a service mesh to programmatically deploy applications and infrastructures, improve code management and, by extension, upgrade network and security policies.

Organizations with large applications composed of many microservices can benefit from a service mesh approach. For example, businesses in healthcare and financial services can deploy a service mesh to consistently enforce and enhance security and compliance policies. In addition to encrypting traffic, adding zero-trust networks and authenticating identity effectively, organizations can use a service mesh to respond to customer demands and competitive threats quickly.

Consistent application performance is critical for every organization. A high-functioning service mesh improves observability through traces and metrics that IT teams can use to identify root cause failures and ensure application resiliency. In addition to managing the communications layer, an effective service mesh supports advanced security features.

The clear advantages and key benefits to service mesh deployments enable companies to do the following:

As microservices become more widespread, dynamic service discovery offsets communication failures and helps enforce network policies. However, the added operational complexity can create observability deficits. For example, the possibility for latencies, while often minuscule, result from the extra service hops required when services communicate.

Organizations must spend considerable time and effort to isolate performance malfunctions and perform manual code changes for services they interact with. Diminished end-to-end visibility also results when a company does not own the code for a particular service and lacks key performance information and indicators.

The rise in microservices adoptions and cloud-native applications means service mesh technology is rapidly becoming a foundational element. And, while operations teams are responsible for service mesh deployments, they must work closely with development teams to configure service mesh properties. The next stage is the possibility of service meshes becoming available in modern PaaS offerings.

Part of: Evaluating service mesh

The open source vs. proprietary service mesh debate has a lot of gray area, and the best fit for an org might fall into that spectrum. Here's what to consider before you decide.

As microservices applications grow more popular, IT teams need to enable reliable networking between them for proper communication. That's where service mesh comes in.

Service mesh adoption is a long process that starts with careful evaluation of the technology and its deployment models. And that requires the involvement of both IT ops and dev teams.

Kubernetes is an industry must-have, but still lacks in certain areas -- that's where service mesh comes in. Discover four service mesh tools to use with your Kubernetes platform.

Still on the fence about service mesh? See how it supports a microservices architecture and application deployments, along with the other benefits it brings to an organization.

Reliability testing can play an integral role in software development. Here are some methods and tools to incorporate into your ...

Microsoft Dev Box offers developers a range of tools to increase productivity, but old habits tend to die hard.

GitHub math support in Markdown took eight years to arrive. Had the feature been released in 2014, a wider audience might have ...

There are various authentication methods for REST APIs, ranging from basic credentials and token encryption to complex, ...

While development teams should carefully weigh the tradeoffs between cloud-native and cloud-agnostic architectures, they don't ...

The REST paradigm can be a natural fit for microservices architectures, but it also presents potential challenges for development...

To successfully use AWS Organizations, admins must grasp key concepts related to organizational units, service control policies, ...

Terraform benefits include scalability, repeatable infrastructure and cost efficiency. Follow this step-by-step tutorial to learn...

Experts at the MIT Sloan CIO Symposium described the advantages that justify the high cost of moving to the cloud while ...

Think you're ready for the AWS Certified Solutions Architect certification exam? Test your knowledge with these 12 questions, and...

Amazon said its van monitoring system is designed solely for driver safety. But many industry experts have concerns regarding the...

Amazon would like to strengthen its global footprint, but the e-commerce giant faces roadblocks and challenges today that did not...

What's the difference between Agile and Scrum? What are their similarities? Learn how to compare and contrast these two popular ...

Don't bury the lead. Grab your audience's attention early. Be graceful when others disagree. These and other tips will help you ...

When an exception occurs in your Java code, you can log it or you can rethrow it -- but don't do both. Here's why you must avoid ...

As part of the deal, Broadcom Software Group will rebrand and operate as VMware, combining its existing infrastructure and ...

At Red Hat's 2022 Red Hat Summit, the organization announced changes to edge strategy, Linux admin skill gaps and hardware and ...

Designing an efficient data center is no small feat. Review data center facility and infrastructure components and different ...

TechTarget hosts its Best of VMworld Awards to recognize outstanding products that help organizations create infrastructure that ...

Consider sizing, security and hardware, as well as developing technologies such as hyper-convergence, hybrid cloud and containers...

The latest news and analysis from the conference.

All Rights Reserved, Copyright 2016 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info