Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Connecting and Migrating Applications with Consul Service Mesh

Luke Kysow
November 18, 2019

Connecting and Migrating Applications with Consul Service Mesh

Presented at ServiceMeshCon during KubeCon 2019.
GitHub: https://github.com/lkysow/servicemeshcon-demo
Video: https://www.youtube.com/watch?v=v-ZYkGYi3jQ

Abstract:
Without question, systems are moving to a highly decoupled distributed approach running on modern schedulers like Kubernetes. There are two challenges which practitioners are often faced with while on this journey. How do you migrate legacy applications safely and without interruption to the new world? Once you have migrated, how do you ensure the connectivity and security of applications, potentially running in multiple Kubernetes clusters?
This talk takes a demo driven approach to how the service mesh can solve both of these problems. You will learn how Consul Service Mesh can help to seamlessly and safely migrate an application from Virtual Machines to Kubernetes. Also, how Consul Service Mesh can help connect and secure heterogeneous applications running in multiple Kubernetes clusters.

Luke Kysow

November 18, 2019
Tweet

More Decks by Luke Kysow

Other Decks in Programming

Transcript

  1. Connecting and Migrating Applications with Consul Service Mesh Luke Kysow

    @lkysow Consul Engineer at HashiCorp Copyright © 2019 HashiCorp
  2. Secure By Default All traffic is mTLS encrypted / SPIFFE

    identity Multi Platform Connect Kube clusters, VMs, bare metal Layer 7 Traffic Management Control traffic via config Consul Service Mesh
  3. Service Migration Step 1 - Deploy to Kubernetes VMs <San

    Diego> AKS <Los Angeles> NFL chargers chargers
  4. VMs <San Diego> AKS <Los Angeles> NFL chargers chargers Service

    Migration Step 2 - Test that routing works $ curl -H \ "X-datacenter: kubernetes"
  5. VMs <San Diego> AKS <Los Angeles> NFL chargers chargers Service

    Migration Step 3 - Split traffic 50% 50%
  6. VMs <San Diego> AKS <Los Angeles> NFL chargers chargers Service

    Migration Step 4 - Fully switch over 0% 100%
  7. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway
  8. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway sidecar sidecar
  9. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway $ curl \ localhost:1234
  10. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway
  11. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway
  12. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway
  13. Architecture VMs <San Diego> AKS <Los Angeles> chargers NFL Consul

    Server Consul Server Federation Mesh Gateway Mesh Gateway
  14. ?

  15. Installation $ helm install --name consul Observability Integration with Prometheus,

    Datadog, etc. Intentions $ consul intention create -allow nfl chargers External Certificate Authorities E.g. HashiCorp Vault, AWS PCA Not Covered