Open Service Mesh: a Service Mesh Implementation from Microsoft

Open Service Mesh: a Service Mesh Implementation from Microsoft

Microsoft has released open service mesh (OSM), an alpha service mesh implementation compliant with the SMI specification. OSM covers standard features of a service mesh like canary releases, secure communication, and application insights, similar to other service mesh implementations like Istio, Linkerd, or Consul. Additionally, the OSM team is in the process of donating the project to the CNCF.

Microsoft has released open service mesh (OSM), an alpha service mesh implementation compliant with the SMI specification. OSM covers standard features of a service mesh like canary releases, secure communication, and application insights, similar to other service mesh implementations like Istio, Linkerd, or Consul. Additionally, the OSM team is in the process of donating the project to the CNCF.

OSM is a new option in the service mesh space and other similar projects like Istio, Linkerd, Consul, or Kuma. OSM is a service mesh open-source project initiated by Microsoft. It's implementing the service mesh interface (SMI), a set of standard and portable APIs to deploy a service mesh in Kubernetes. When users configure a service mesh through SMI specification, they don't need to be specific about which service implementation they're running in the cluster.

Additionally, OSM comes with standard and basic service mesh features like canary releases, secure service communication, and application insights. In this alpha release, OSM comes with the ability to configure traffic shifting policies, secure communication within services through mTLS, grained access control policies, application metrics, external certificate managers, and inject the sidecar Envoy proxy automatically. Moreover, similar to other projects like Istio, OSM uses Envoy as a sidecar proxy for communicating with other services in the mesh. However, in the OSM project repository, they mention that any xDS (service discovery protocol) compatible reverse-proxy might be used or to use advanced Envoy features.

When a user creates a pod, OSM intercepts the API through a mutate webhook to inject the Envoy sidecar proxy, and an init container uses iptables to ensure that all the traffic flows through Envoy. OSM handles access control rules, routing policies, encrypts communication, and collects metrics that, by default, can be seen in Grafana and Zipkin. Users can find more details about each of the architecture components of OSM on the project's design page. But at a high level, the below image represents the OSM components and interactions:

service mesh microservices grafana open source cloud native computing foundation kubernetes microsoft envoy devops architecture & design development news

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

50+ Useful Kubernetes Tools for 2020 - Part 2

Our original Kubernetes tool list was so popular that we've curated another great list of tools to help you improve your functionality with the platform.

How native is React Native? | React Native vs Native App Development

Article covers: How native is react native?, React Native vs (Ionic, Cordova), Similarities and difference between React Native and Native App Development.

Best Cloud Computing (AWS) Development Company

Develop highly scalable apps on Amazon Cloud Services in India. Mobile App Development India Offers Amazon cloud web services (AWS) for app development, database storage solution, hosting solution etc.

The Service Mesh in the Microservices World - DZone Microservices

In this article, take a look at the service mesh in the microservices world. The software industry has come a long journey and throughout this journey, Software Architecture has evolved a lot. Starting with 1-tier (Single-node), 2-tier (Client/ Server), 3-tier, and Distributed are some of the Software Architectural patterns we saw in this journey.

AWS Distro for OpenTelemetry Available for Public Preview

OpenTelemetry is an observability framework - software and tools that assist in generating and capturing telemetry data from cloud-native software. It is a Cloud Native Computing Foundation (CNCF) Sandbox project with stakeholders from companies like AWS, Microsoft, Google, LightStep, New Relic, Red Hat, and Splunk – who collaborate on defining an open standard for the collection of distributed traces and metrics.