Service Mess to Service Mesh Observe. Control. Secure. Rob - - PowerPoint PPT Presentation

service mess to service mesh
SMART_READER_LITE
LIVE PREVIEW

Service Mess to Service Mesh Observe. Control. Secure. Rob - - PowerPoint PPT Presentation

Service Mess to Service Mesh Observe. Control. Secure. Rob Richardson Technical Evangelist, MemSQL Kavya Pearlman Cybersecurity Strategist, Wallarm https://www.shutterstock.com/image-photo/ca r-technology-autonomous-self-driving-concep


slide-1
SLIDE 1

Service Mess to Service Mesh

  • Observe. Control. Secure.
Rob Richardson Technical Evangelist, MemSQL Kavya Pearlman Cybersecurity Strategist, Wallarm
slide-2
SLIDE 2 Service Mesh - An Analogy https://www.shutterstock.com/image-photo/ca r-technology-autonomous-self-driving-concep t-732826498
slide-3
SLIDE 3 Service Mesh - An Analogy https://www.shutterstock.com/image-photo/ca r-technology-autonomous-self-driving-concep t-732826498
slide-4
SLIDE 4 Introducing Rob... Rob Richardson
  • Tech Evangelist for MemSQL
  • Microsoft MVP
  • Leads the Southeast Valley .NET User Group
  • AZGiveCamp Organizer
Personal interests Coding, Teaching, and Travel
slide-5
SLIDE 5 Introducing Kavya... Kavya Pearlman
  • Well known as the “Cyber Guardian”
  • Cybersecurity Strategist at Wallarm
  • An Award-winning Cybersecurity Professional
  • Founder and CEO of XR Safety Initiative
  • Former Information Security Director Linden Lab
  • Former Facebook Third Party Security Risk Advisor
Personal interests Travel, Gaming, Virtual Worlds
slide-6
SLIDE 6 Agenda Let's Talk about Service Mesh!
  • The Service Mesh
  • From Monolithic to Microservices
  • The Challenge with API Gateways
  • Deep Dive into Service Mesh
  • a. Istio
  • b. Linkerd
  • Demo
  • Service Mesh Best Practices
slide-7
SLIDE 7 Service Mesh A Service Mesh manages the network traffic between services in a graceful and scalable way. Service Mesh IS the answer to: “How do I observe, control, or secure communication between microservices?”
slide-8
SLIDE 8 CONTROL access policies OBSERVE monitor network SECURE mutual TLS Service Mesh
slide-9
SLIDE 9 From Monolithic to Microservices Data Layer Business Logic User Interface MICROSERVICE User Interface MICROSERVICE MICROSERVICE DATA SOURCE DATA SOURCE DATA SOURCE MONOLITH APPLICATION DB
slide-10
SLIDE 10 From North-South to East-West
  • North-South
○ Container to Clients
  • East-West
○ Between Containers
slide-11
SLIDE 11 The Challenge with API Gateways MICROSERVICE USER INTERFACE MICROSERVICE MICROSERVICE DATA SOURCE DATA SOURCE DATA SOURCE API GATEWAY
slide-12
SLIDE 12 Service Mesh: How does it work?
slide-13
SLIDE 13 Service Mesh CONTROL access policies OBSERVE monitor network SECURE mutual TLS
slide-14
SLIDE 14 SERVICE HEALTH LOGGING NETWORK TOPOLOGY More than just a proxy
slide-15
SLIDE 15 A/B TESTING BETA CHANNEL CIRCUIT BREAKER More than just a proxy
slide-16
SLIDE 16 More than just a proxy
slide-17
SLIDE 17 Prevent Unexpected Traffic Patterns MICROSERVICE USER INTERFACE MICROSERVICE MICROSERVICE DATA SOURCE DATA SOURCE DATA SOURCE
slide-18
SLIDE 18 Methodology: Linkerd focuses on simple setup and critical features Add 3rd party components to get additional features
  • Linkerd
slide-19
SLIDE 19 Methodology: A kitchen sink of features to enable / disable Istio combines third-party components
  • Envoy Proxy
  • Metrics to Grafana
  • Prometheus dashboard
  • Jaeger tracing dashboard
Istio
slide-20
SLIDE 20 Demo

Service Mesh

slide-21
SLIDE 21 INTELLIGENT ROUTING NETWORK TOPOLOGY DIAGRAM MONITORING, LOGGING, SERVICE HEALTH In a Nutshell
slide-22
SLIDE 22

Service Mesh

“If it doesn’t have a control plane, it ain’t a Service Mesh.”

  • Zach Butcher
slide-23
SLIDE 23 Service Mesh Implementation Cost

+

slide-24
SLIDE 24 Observe transparency
  • f communication
Control enhanced resilience to network disruption Secure abstraction without code changes Benefits of Service Mesh
slide-25
SLIDE 25 Use Service Mesh if: Running highly sensitive workloads (PKI, PCI) Running untrusted workloads Running multi-tenant workloads Need A/B routing or beta channel Need security in depth
slide-26
SLIDE 26 @KavyaPearlman wallarm.com Kavya Pearlman @rob_rich robrich.org Rob Richardson