Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Online Meetup #3 - Solo.io, Tidepool, Weaveworks, Buoyant

Solo.io
November 01, 2019

Online Meetup #3 - Solo.io, Tidepool, Weaveworks, Buoyant

Featuring an end user presentation from Tidepool.org speaking about their journey to move from custom built infrastructure to open source. Following that talk we will hold a panel discussion with guests from Weaveworks and Buoyant.

Featured Speakers:
- Derrick Burns from Tidepool
- Thomas Rampelberg from Buoyant
- Stefan Prodan from Weaveworks
- Rick Ducott from Solo.io

Watch the replay https://youtu.be/JcZonIt--2o

https://www.solo.io
https://buoyant.io/
https://tidepool.org
https://www.weave.works/

Solo.io

November 01, 2019
Tweet

More Decks by Solo.io

Other Decks in Programming

Transcript

  1. 1 | Copyright © 2019 1 | Copyright © 2019

    Online Meetup Oct 31, 2019
  2. 2 | Copyright © 2019 Welcome Betty Junod Derrick Burns

    Stefan Prodan Rick Ducott Thomas Rampelberg Introduction Tidepool Case Study Q&A and Panel Discussion
  3. 3 | Copyright © 2019 3 | Copyright © 2019

    Backend Modernization with Open Source at Tidepool.org Derrick Burns, Cloud Architect
  4. Tidepool is a nonprofit organization dedicated to making diabetes data

    more accessible, actionable, and meaningful for people with diabetes, their care teams, and researchers.
  5. Solid Infrastructure is ___, if it ___ Secure Protects user

    data from unauthorized access Scalable Supports any increase in demand without slow down Highly Available Works when you use it Auditable Tells you who did what and when Observable Provides insight into what is happening now Agile Lets you try out changes to your applications easily and quickly Responsive Responds to your requests without noticeable delay
  6. Our Legacy Infrastructure Works At ~20K MAU Secure Inter-service communication

    is encrypted with a single, shared, multi-year-old secret. Scalable Compute scaling is manual and infrequent. Highly Available Single points of failure. Auditable Log messages are inconsistent and don’t enable auditing. Observable Service metrics are largely unavailable. Agile Cycle time for changes is days/weeks, not seconds/minutes. Responsive Response times often >500ms. goal < 200 ms
  7. So What’s Changed? Our Anticipated Needs • Present ◦ Our

    current demand is current small: <20K monthly active users (MAU). ◦ We are largely reactive: our customers report problems to us. Support bears the brunt. • Future ◦ Tidepool Loop will bring increased demand on our backend. ◦ Moreover, to meet our mission, we need to increase MAU by orders of magnitude! ◦ If you are going to scale, our infrastructure must be ready. ◦ We need to be proactive. ▪ Our customers cannot be relied upon to report failures to us. ▪ We have the opportunity and the obligation to show users what a reliable service looks like. • The bar is moving higher!
  8. Our Legacy Infrastructure At >200K MAU Secure Inter-service communication is

    encrypted with a single, shared, multi-year-old secret. Scalable Compute scaling is manual and infrequent. Highly Available Single points of failure. Auditable Log messages are inconsistent and don’t enable auditing. Observable Service metrics are largely unavailable. Agile Cycle time for changes is days/weeks, not seconds/minutes. Responsive Response times often >500ms. goal < 200 ms
  9. CNCF* Tools Help Make Infrastructure ... Secure Linkerd* encrypts data

    in flight for HIPAA compliance. Scalable K8s* allocates more CPU/Network bandwidth on demand. Highly Available K8s* deploys replicas of pods for redundancy. Auditable Jaeger* traces execution paths. Observable Prometheus* collects metrics. Grafana* visualizes them. Agile Flux* deploys new versions of software as it becomes available. Flagger deploys new software progressively. Gloo/Envoy* routes traffic and supports retries and timeouts. Responsive K8s* allocates service replicas on demand.
  10. Status: New Tools Deployed! Secure Linkerd service mesh is deployed.

    Scalable K8s cluster-autoscaling is deployed. Highly Available K8s multiple service replicas are deployed. Auditable Jaeger is coming soon. Logs are aggregated to SumoLogic. Observable Prometheus is coming soon. Grafana is coming soon. Fluxcloud is deployed. Agile Flux and Gloo/Envoy are deployed. Tilt is deployed. Flagger is coming soon. Spotlight documentation w/ auto-generated bindings coming soon. Responsive K8s horizontal pod autoscaling is deployed.
  11. Status: Benefits Realized To Date Secure TLS certs are auto-renewed.

    Secrets are encrypted. Scalable CPU and Networking is auto-scaled on demand. Highly Available Each service can be replicated by simple setting a number. Auditable Logs are aggregated and persisted. Access logs are collected. Observable Deployment notifications are auto-published to slack. Agile Cycle time to deploy to AWS: 10-30 min. => 1-3 min. Cycle time to deploy locally: 1-3 min. => 2-5 seconds. Responsive New replicas are auto-deployed under load.
  12. Status: Unresolved Legacy Issues Secure Scalable • Services not designed

    for concurrency (e.g. message-api) • Sloooooow database queries Highly Available Auditable • Inconsistent logging • Excessive logging Observable • Per service metrics are unavailable • Execution traces are unavailable Agile • Need automated testing for progressive deployment of backend. Responsive • Sloooooow database queries
  13. 15 | Copyright © 2019 15 | Copyright © 2019

    Questions, Answers and Discussion
  14. 16 | Copyright © 2019 SOLO.IO solo.io/gloo link.medium.com/qDUTbgu810 TIDEPOOL tidepool.org

    github.com/tidepool-org BUOYANT buoyant.io bit.ly/KubeCon2019-Buoyant WEAVEWORKS flagger.app fluxcd.io