SLIDE 1 Service Mess to Service Mesh
- Observe. Control. Secure.
Rob Richardson
Technical Evangelist, MemSQL
Kavya Pearlman
Cybersecurity Strategist, Wallarm
SLIDE 2 Service Mesh - An Analogy
https://www.shutterstock.com/image-photo/ca r-technology-autonomous-self-driving-concep t-732826498
SLIDE 3 Service Mesh - An Analogy
https://www.shutterstock.com/image-photo/ca r-technology-autonomous-self-driving-concep t-732826498
SLIDE 4 Introducing Rob...
Rob Richardson
- Tech Evangelist for MemSQL
- Microsoft MVP
- Leads the Southeast Valley .NET User Group
- AZGiveCamp Organizer
Personal interests
Coding, Teaching, and Travel
SLIDE 5 Introducing Kavya...
Kavya Pearlman
- Well known as the “Cyber Guardian”
- Cybersecurity Strategist at Wallarm
- An Award-winning Cybersecurity Professional
- Founder and CEO of XR Safety Initiative
- Former Information Security Director Linden Lab
- Former Facebook Third Party Security Risk Advisor
Personal interests
Travel, Gaming, Virtual Worlds
SLIDE 6 Agenda
Let's Talk about Service Mesh!
- The Service Mesh
- From Monolithic to Microservices
- The Challenge with API Gateways
- Deep Dive into Service Mesh
- a. Istio
- b. Linkerd
- Demo
- Service Mesh Best Practices
SLIDE 7 Service Mesh
A Service Mesh manages the network traffic between services in a graceful and scalable way. Service Mesh IS the answer to: “How do I observe, control, or secure communication between microservices?”
SLIDE 8 CONTROL access policies OBSERVE monitor network SECURE mutual TLS
Service Mesh
SLIDE 9 From Monolithic to Microservices
Data Layer Business Logic User Interface MICROSERVICE User Interface MICROSERVICE MICROSERVICE
DATA SOURCE DATA SOURCE DATA SOURCE MONOLITH APPLICATION DB
SLIDE 10 From North-South to East-West
○ Container to Clients
○ Between Containers
SLIDE 11 The Challenge with API Gateways
MICROSERVICE
USER INTERFACE
MICROSERVICE MICROSERVICE DATA SOURCE DATA SOURCE DATA SOURCE
API GATEWAY
SLIDE 12 Service Mesh: How does it work?
SLIDE 13 Service Mesh
CONTROL access policies OBSERVE monitor network SECURE mutual TLS
SLIDE 14 SERVICE HEALTH LOGGING NETWORK TOPOLOGY
More than just a proxy
SLIDE 15 A/B TESTING BETA CHANNEL CIRCUIT BREAKER
More than just a proxy
SLIDE 16 More than just a proxy
SLIDE 17 Prevent Unexpected Traffic Patterns
MICROSERVICE
USER INTERFACE
MICROSERVICE MICROSERVICE DATA SOURCE DATA SOURCE DATA SOURCE
SLIDE 18 Methodology: Linkerd focuses on simple setup and critical features Add 3rd party components to get additional features
SLIDE 19 Methodology: A kitchen sink of features to enable / disable Istio combines third-party components
- Envoy Proxy
- Metrics to Grafana
- Prometheus dashboard
- Jaeger tracing dashboard
Istio
SLIDE 20 Demo
Service Mesh
SLIDE 21 INTELLIGENT ROUTING NETWORK TOPOLOGY DIAGRAM MONITORING, LOGGING, SERVICE HEALTH
In a Nutshell
SLIDE 22 “
Service Mesh
“
“If it doesn’t have a control plane, it ain’t a Service Mesh.”
SLIDE 23 Service Mesh Implementation Cost
+
SLIDE 24 Observe
transparency
Control
enhanced resilience to network disruption
Secure
abstraction without code changes
Benefits of Service Mesh
SLIDE 25 Use Service Mesh if:
Running highly sensitive workloads (PKI, PCI) Running untrusted workloads Running multi-tenant workloads Need A/B routing or beta channel Need security in depth
SLIDE 26 @KavyaPearlman wallarm.com
Kavya Pearlman
@rob_rich robrich.org
Rob Richardson