Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Istio and the Service Mesh Architecture

Istio and the Service Mesh Architecture

DevOps BKK 2018

Manatsawin Hanmongkolchai

September 08, 2018
Tweet

More Decks by Manatsawin Hanmongkolchai

Other Decks in Programming

Transcript

  1. Microservice monitoring The problem in microservice world • Service can

    be written in many languages. Not all tools support every languages
  2. How Istio sidecar work? 1. Init container to setup transparent

    proxy iptables rule (as root) 2. Envoy running alongside your app as the transparent proxy
  3. Service network monitoring Measured client side Request count Success rate

    Resp. time Speed (for TCP) Measured server side
  4. Distributed Tracing • All incoming/outgoing HTTP calls are traced to

    Jaeger • Needs to propagate OpenTracing headers from incoming call to outgoing call to track calls correctly
  5. What Istio can do for you • Traffic Management ◦

    Routing ▪ Traffic Shifting ▪ Mirror ◦ Fault Injection ◦ Circuit Breaker
  6. Routing • Kubernetes service operates in Layer 4 Cluster IP

    Backend Backend Backend Req Req Req Req Req Req
  7. Routing • Istio operate in layer 7 and can do

    per-call load balancing Envoy Req Req Req Req Req Req Backend Backend Backend
  8. Fault Injection Over time, we found that the failures of

    the global instance of Chubby consistently generated service outages.
  9. Fault Injection As it turns out, true global Chubby outages

    are so infrequent that service owners began to add dependencies to Chubby assuming that it would never go down.
  10. Fault Injection The solution to this Chubby scenario is interesting:

    SRE makes sure that global Chubby meets, but does not significantly exceed, its service level objective.
  11. Fault Injection In any given quarter, if a true failure

    has not dropped availability below the target, a controlled outage will be synthesized by intentionally taking down the system.
  12. Fault Injection • Slow down services ◦ Delay 80% of

    requests for 5 seconds • Make errors ◦ Return 500 error code for 80% of requests
  13. Circuit Breaker Remove a backend from service if it return

    too many errors in a row Frontend Backend Work Queue 503 Timeout F5
  14. Summary Istio provide visibility and configurability to your network. This

    is traditionally done by adding library, but in a microservice world you need a cross language solution
  15. The catch Here’s what we found while moving to Istio

    • While requiring zero code changes, your service must already be well behaved cloud application
  16. The catch • Do not connect directly to pod IP

    (eg. no service discovery - just use cluster IP and avoid headless service)
  17. The catch • Do not mix port type in the

    cluster (eg. don’t run HTTP server on port 6379 with another pod running TCP service at the same port)
  18. The catch • Set the Host header to the destination.

    Don’t connect to gateway and set Host header to cooking. ◦ This case is really hard to debug...
  19. The catch • External services (ie. outside Kubernetes) but in

    the capturing IP range must have ServiceEntry defined ◦ ServiceEntry is cluster-wide