Customers
Resources
analyst-report.svg

Analyst Reports

Navigating Key Metrics for Growth and Success

blog.svg

Blog

Source for Trends, Tips, and Timely Topics

docs.svg

Documentation

The Blueprint for Mastering Tools and Processes

sandbox.svg

Sandboxes

Explore interactive sandboxes for Avesha products

line
news.svg

News/Pubs

Bringing You the Top Stories as They Happen

videos.svg

Videos

Explore Our Library of Informative and Entertaining Clips

whitepapers.svg

Whitepapers

Exploring Critical Topics with Authoritative Research

roi.svg

ROI Calculator

Easily Track and Maximize Your Investment Returns

line
egs-marketing

Optimize Your AI with Elastic GPU Service (EGS)

Company
about-us.svg

About Us

Discover Our Mission and Core Values

careers.svg

Careers

Join Our Team and Shape the Future Together

events.svg

Events and Webinars

Connecting You to Trends, Tools, and Thought Leaders

support.svg

Support

Helping You Navigate Challenges with Ease

FAQ
role of application fabric
Raj Nair

Raj Nair

Founder & CEO

16 September, 2022,

4 min read

Copied

link

 

The need for an application fabric

The advent of the “cloud-native” age has enabled the creation of open-compute platforms that allows   
individual workloads[1] to be run in different locations based on properties that meet business objectives — lower cost, data governance, closer proximity to end users, resiliency or regulatory needs. However, there is a lack of tools ranging from simple connectivity to isolation. In this writeup, we examine the underlying issues and develop the key concepts behind an application fabric.

Service Meshes are not for all traffic

Existing tools such as service meshes or application gateways are built primarily for web interactions   
based on http. Yet, many workloads communicate with each other using non-http communications and creating side-cars specifically for this purpose impedes the fluidity needed to place workloads at different locations. This is where an application fabric comes in. It is a super-cluster abstraction that extends the familiar notion of a cluster, a flat network that enables seamless application communications, to one that transcends all network boundaries and works across the Internet.

Application fabric creates secure and seamless connectivity

In short, an application fabric solves the issue of workload migrations once and forever. A flat network is one in which there are no gateways or IP address overlaps[2] or translations to worry about. Traffic seamlessly flows from a pod in one cluster to a pod in another far away cluster. The “magic” of a seamless connectivity is created by an overlay that connects the two clusters and is created automatically at installation. Services in the remote cluster are discoverable just like other local services through a gateway pod. IP address overlaps are mitigated by utilizing a single non-overlapping address range (with its own DNS) that may be reused by multiple times in different application fabrics. This is possible because an application fabric is a unit of tenancy. All communication inside an application fabric is controlled by RBAC (Role-based access control) of the namespaces that were added to it.

Number of clusters increases compliance problems dramatically

Security is of course the next important aspect that needs to be addressed. Here again, available   
tools are based on application firewalls that impose a “S= 2(X.n)²” problem where X is the average number of workload pods in a cluster, n is the number of clusters that need to be connected and S is the number of security assertions that need to be created and approved by the compliance team — a lot of work. On the other hand, the application fabric solves this issue by using the overlay created from NIST-compliant automated VPN tunnels that need to be certified once and can be reused multiple times.

Secure application fabric for hybrid deployments

A hybrid deployment poses multiple challenges including connectivity and security that are solved by   
an application fabric. Typically, hybrid deployments are used to meet regulatory requirements for the financial entities such as banks and insurance companies. Data simply cannot leave the premises unencrypted at any point. The security model of the application fabric ensures that the mTLS (mutual TLS) association between pods is maintained across the overlay that is opaque to all entities along the way. This ensures high-integrity communication between workloads. Also, the isolation provided by the application fabric limits the blast radius of any workload that is compromised to the application fabric boundaries without infecting others. This is possible because an application fabric implements fabric-wide resource limits. In addition, the application fabric naturally creates a boundary to limit the noise when viewing or monitoring the status of the entire deployment of an application. This is extremely useful in troubleshooting problems and gauging the overall health of the deployment.

KubeSlice, the world’s first intelligent application fabric

Finally, we at Avesha are creating an intelligent and futuristic application fabric with all of the capabilities described above. We call it KubeSlice. The onboarding of an application onto an application fabric is achieved in 2 easy steps: (1) identifying the specific fabric via namespace membership (via the yaml file); and (2) redeploying the application pod. Everything else is automated and does not require any support from the IT/platform team.

Additional Resources:

Get Started with KubeSlice (Github)

Learn more about Avesha (Website)

Simplify your Hybrid/Multi-Cluster, Multi-Cloud Kubernetes deployments with KubeSlice (Blog)

[1] A workload is the term used to describe a microservice running in a pod in a cluster.

[2] IP address overlap is a major impediment in connecting clusters across regions or cloud providers   
because clusters typically use private IP addresses that are independently assigned by providers.

 

Related Articles

card image

Scaling RAG in Production with Elastic GPU Service (EGS)

card image

Optimizing GPU Allocation for Real-Time Inference with Avesha EGS

card image

#1 Myth or Mantra of spike scaling – "throw more resources at it."

card image

Do You Love Your Cloud Credits? Here's How You Can Get More…

card image

The APM Paradox: When Solution Becomes the Problem

card image

Migration should be 'gradual' and 'continuous'

card image

Hack your scaling and pay for a European Escape?

card image

Here Are 3 Ways You Can Slash Your Kubernetes Costs by 50%

card image

A completely new way for K8s Autoscaling: Why Predictive Pod Scaling with Smart Scaler and Karpenter is needed before plain VPA

Copyright © Avesha 2024. All rights reserved.

Terms and Conditions

Privacy Policy

twitter logo
linkedin logo
slack logo
youtube logo