backgroundFinally, we are entering the service mesh series that everyone is interested in. We have already explained:
Basically, it is enough for us to develop a normal-scale web application; however, in enterprises, there are often complex application call relationships, and requests between applications also need to be managed, such as common current limiting, degradation, tracing, monitoring, load balancing and other functions. Before we used Kubernetes, these problems were often solved by microservice frameworks, such as Dubbo and SpringCloud, which had corresponding functions. But when we use Kubernetes, these things should be handed over to a dedicated cloud-native component to solve, which is Istio, which we will talk about this time. It is the most widely used service mesh solution. picture The official explanation of Istio is relatively concise, and the specific functional points are just mentioned:
picture Combined with the official architecture diagram, we can see that Istio is divided into the control plane and the data plane. The control plane can be understood as the management function of Istio itself:
The data plane can be simply understood as our business application represented by Envoy. All traffic in and out of our application will pass through the Envoy proxy. Therefore, it can realize functions such as load balancing, fuse protection, authentication and authorization, etc. InstallFirst install the Istio command line tool
Linux uses: Mac can use brew: For other environments, you can download Istio and configure environment variables: We can then install the control plane using the install command.
picture This profile has the following different values. For demonstration purposes, we will use demo. picture use We then label the namespace so that the Istio control plane knows which namespace’s Pod will automatically have the sidecar injected. Here we enable automatic injection of sidecar for the default namespace, and then deploy the deployment-istio.yaml we used earlier. At this point, you will see that each Pod has two containers (one of which is the istio-proxy sidecar), which is the code used in the previous gRPC load balancing test. picture We still conduct the load balancing test and the results are the same, which shows that Istio works. When we look at the sidecar log again, we can see the traffic we just sent and received: SummarizeThe content of this issue is relatively simple and is mainly related to installation and configuration. The next issue will update how to configure timeout, current limiting and other functions of internal service calls. In fact, most of the current operations are more O&M-oriented. Even subsequent functions such as timeout configuration only require writing YAML resources. However, when used in production, we will provide developers with a visual management console page, allowing them to flexibly configure these functions that originally needed to be configured in YAML. picture In fact, all major cloud platform vendors provide similar capabilities, such as Alibaba Cloud's EDAS. All source code of this article can be accessed here: https://github.com/crossoverJie/k8s-combat |
<<: Introduction to Socks5 Proxy Protocol
>>: Content Delivery Network (CDN) System Design
The intelligentization of weak-current electricit...
1. What is TCP/IP? Transmission Control Protocol/...
edgeNAT has launched this year's National Day...
There is no shortage of newcomers in the network ...
5G (or 5th generation mobile networks) deployment...
Introduction to Commonly Used Built-in Packages i...
Krypt is a foreign hosting company founded in 199...
[51CTO.com Quick Translation] There has been a lo...
Did you know that every negative review you recei...
There was a problem with the telecom broadband at...
The TCP protocol needs three handshakes to establ...
If we choose the most used function of mobile pho...
Suddenly, as if overnight, a spring breeze came, ...
AT&T said it tested 400 Gbps Ethernet (400GbE...
What to do on the weekend? The weather is so cold...