Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Stefana Muller, Karthick Viswanathan

Related Topics: Microservices Expo, @CloudExpo, @DevOpsSummit

Microservices Expo: Blog Feed Post

Microservices, Service Registries, and Architectural Debt | @DevOpsSummit #DevOps #Microservices

Microservices is not just a style of application development, it’s a set of design principles

Microservices is not just a style of application development, it’s a set of design principles guiding how applications are composed (or decomposed, as the case may be) with a resulting architectural shift as supporting components are added to the mix. Much in the same way SOA brought us UDDI registries and gateways, microservices is bringing service registries.

Service registries, for the uninitiated, are kind of like the internal DNS of a microservices environment. They’re needed to manage the rapid association and disassociation with IP addresses of the containers in which the microservices are typically (but not always) hosted. The average lifespan of a container is measured in minutes or hours, perhaps a day or two, but rarely weeks, months, and probably never years. That means a state of nearly constant change with respect to the infrastructure supporting those services, like the network and app services.

The service registry is responsible for managing that change; it’s where IP addresses and service instances are matched up and handed out to clients (in a client-side architectural pattern) or load balancers (in a server-side architectural pattern). It’s maintained through automation; manual methods of managing the change would simply be too slow and expensive in an environment where new mappings might occur by the minute, hour, or even on a daily basis.

It is here that we return to the imperative that is managing architectural debt. While you can’t eliminate it any more than you can eliminate the technical debt incurred by choices at the code layer, you can manage and try to minimize it. Careful attention to how these new, supporting components are selected and implemented is critical to that endeavor. Each option (client-side, server-side) brings with it a certain amount of architectural debt that will need to be paid in the future.

Introduction of an external service registry necessarily introduces a dependency that cannot be ignored. With a client-side registry, the client is tightly coupled to the registry. Code in the app is required to maintain that dependency and thus impacts the overall development lifecycle. With both patterns, the application will not be able to function without the service registry. This is because without it there’s no way to properly direct the client to an instance of the microservice for processing. Like DNS, the service registry is the glue that loosely binds clients and the “app”.

Thus additional precautions may be required to ensure availability of the service registry, such as the deployment of a high availability (HA) architecture. Because an HA architecture relies on redundancy, this means there must be at least two service registry instances running. This can further complicate the server-side architecture because both instances must be updated whenever an instance is launched or terminated.architectural debt service registries

This is architectural debt, in which choices made require specific architectures that must be maintained over time and incur operational overhead, and is often difficult to change in the future.  This is increasingly true as app-centric (affine) services like load balancing migrate into the application architecture rather than simply co-existing “nearby” in the network. As these critical services (scale is inarguably critical today) are integrated into operational systems that are code-driven, automated, and orchestrated they become as vulnerable to incurring debt as any other code-bound counterpart. Simply shifting from an external server-side service registry to the use of the load balancer’s innate ability to act as a service registry requires payment of the architectural debt incurred from the original decision and further, in an automated, software-driven environment, also requires payment of the technical debt you incurred to integrate with the external service registry. .

It’s important to remember that microservices impacts not just development, but deployment, too, and the architectures required to support delivering their services to the users (people, things, and apps). This is not as simple a change as migrating from Apache to IIS (or vice versa). It’s a disruptive change to the architecture, and that will necessitate a certain amount of architectural debt stemming from the choices you make early on in the adoption cycle.

Architectural debt can be minimized, but not mitigated entirely. Therefore it’s important to start evaluating options now, before hasty decisions are made that will later be regretted or cause unforeseen costs or complications.

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

Microservices Articles
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relational Database Service (RDS) and ElastiCache through RIs will optimize performance. Learn how you can purchase and apply the right Reserved Instances for optimum utilization and increased ROI.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...