parent
7eac5e150e
commit
ee50fa9bef
39
README.md
39
README.md
@ -7715,6 +7715,45 @@ It is a core component of the Anthos stack which provides platform, service and
|
||||
It follows common modern software development practices which makes cluster configuration, management and policy changes auditable, revertable, and versionable easily enforcing IT governance and unifying resource management in an organisation.
|
||||
</b></details>
|
||||
|
||||
<details>
|
||||
<summary>What is Anthos Service Mesh?</summary><br><b>
|
||||
|
||||
* It is a suite of tools that assist in monitoring and managing deployed services on Anthos of all shapes and sizes whether running in cloud, hybrid or multi-cloud environments. It leverages the APIs and core components from Istio, a highly comfigurable and open-source service mesh platform.
|
||||
</b></details>
|
||||
|
||||
<details>
|
||||
<summary>Describe the two main components of Anthos Service Mesh</summary><br><b>
|
||||
|
||||
1. Data plane - it consists of a set of distributed proxies that mediate all inbound and outbound network traffic between individual services which are configured using a centralised control plane and an open API
|
||||
2. Control plane - is a fully managed offering outside of Anthos GKE clusters to simplify management overhead and ensure highest possible availability.
|
||||
</b></details>
|
||||
|
||||
<details>
|
||||
<summary>What are the components of the managed control plane of Anthos Service Mesh?</summary><br><b>
|
||||
|
||||
1. Traffic Director - it is GCP's fully managed service mesh traffic control plane, responsible for translating Istio API objects into configuration information for the distributed proxies, as well as directing service mesh ingress and egress traffic
|
||||
2. Managed CA - is a centralised certificate authority responsible for providing SSL certificates to each of the distributed proxies, authentication information and distributing secrets
|
||||
3. Operations tooling - formerly stackdriver, provides a managed ingestion point for observability and telemetry, specifically monitoring, tracing and logging data generated by each of the proxies. This powers the observability dashboard for operators to visually inspect their services and service dependencies assisting in the implementation of SRE best practices for monitoring SLIs and establishing SLOs.
|
||||
</b></details>
|
||||
|
||||
<details>
|
||||
<summary>How does Anthos Service Mesh help?</summary><br><b>
|
||||
Tool and technology integration that makes up Anthos service mesh delivers signficant operational benefits to Anthos environments, with minimal additional overhead such as follows:
|
||||
|
||||
* Uniform observability - the data plane reports service to service communication back to the control plane generating a service dependency graph. Traffic inspection by the proxy inserts headers to facilitate distributed tracing, capturing and reporting service logs together with service-level metrics (i.e latency, errors, availability).
|
||||
* Operational agility - fine-grained controls for managing the flow of inter-mesh (north-south) and intra-mesh (east-west) traffic are provided.
|
||||
* Policy-driven security - policies can be enforced consistently across diverse protocols and runtimes as service communications are secured by default.
|
||||
</b></details>
|
||||
|
||||
<details>
|
||||
<summary>List possible use cases of traffic controls that can be implemented within Anthos Service Mesh</summary><br><b>
|
||||
|
||||
* Traffic splitting across differing service versions for canary or A/B testing
|
||||
* Circuit breaking to prevent cascading failures
|
||||
* Fault injection to help build resilient and fault-tolerant deployments
|
||||
* HTTP header-based traffic steering between individual services or versions
|
||||
</b></details>
|
||||
|
||||
## OpenStack
|
||||
|
||||
<details>
|
||||
|
Loading…
Reference in New Issue
Block a user