Chapter 3. Adoption and Evolutionary Architectures
What are practical steps to adopt a service mesh in my enterprise?
As organizations adopt service mesh architectures, they often do so in a piecemeal fashion, starting at the intersection of the most valuable (to them) feature and the lowest risk deployment.
Piecemeal Adoption
Desperate to gain an understanding of what’s going on in their distributed infrastructure, many organizations seek to benefit from auto-instrumented observability first, taking baby steps in their path to a full service mesh after initial success and operational comfort have been achieved. Financial organizations might seek improved security with strong identity (per service certificates) and strong encryption (mTLS) between each service. Others begin with an ingress proxy as their entry to a service mesh deployment.
Consider an organization that has a thousand existing services running on virtual machines (VMs) external to the service mesh that have little to no service-to-service traffic. Nearly all of the traffic flows from the client to the service and back to the client. This organization can deploy a service mesh ingress (e.g., Istio Gateway) and begin gaining granular traffic control (e.g., path rewrites) and detailed service monitoring without immediately deploying a thousand sidecars.
Figure 3-1. Simple service mesh deployment primarily using ingress ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access