You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/ROOT/pages/02-architecture.adoc
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,8 @@ In modern application architectures based on containers and Kubernetes, develope
11
11
12
12
This leads to a situation where a microservice must not only handle its business logic but also embed capabilities like traffic management, resilience, and telemetry—all of which add complexity and dilute the agility that microservices architectures are meant to provide.
13
13
14
+
image::overhead-01.png[width=75%]
15
+
14
16
Now imagine having to custom-build and manage this operational overhead for every single microservice in an application, especially when these services are written in various programming languages and frameworks. The lack of standardization across the stack results in:
15
17
16
18
- **Inconsistent Security Policies**: Different teams may implement varying levels of security depending on their tools and knowledge, leading to vulnerabilities.
@@ -29,6 +31,18 @@ OpenShift Service Mesh addresses these challenges by providing a platform-native
29
31
- **Enhance Reliability and Resilience**: Features like automatic retries, circuit breakers, and failover mechanisms ensure high availability even under challenging network conditions.
30
32
- **Support Kubernetes-Native Standards**: OpenShift Service Mesh 3's support for the Kubernetes Gateway API allows for modern, scalable management of ingress and egress traffic across clusters.
31
33
34
+
With few or no service code changes.
35
+
36
+
OpenShift Service Mesh uses a proxy to intercept all your network traffic, allowing a broad set of application-aware features based on configuration you set.
37
+
38
+
image::ossm-01.png[width=50%]
39
+
40
+
The control plane takes your desired configuration, and its view of the services, and dynamically programs the proxy servers, updating them as the rules or the environment changes.
41
+
42
+
image::ossm-02.png[width=75%]
43
+
44
+
The data plane is the communication between services.
0 commit comments