How can we capture the incoming requests to replay them in a shadow production environment or in a test environment?
How can we investigate request failures like 5XX in the production environment?
We had the Envoy Proxy in front of our micro-services that was doing traffic routing, requests introspection, rate-limiting, circuit breaking and much more. You can read more about this architecture here.
We leveraged the same Envoy Proxy to capture all the traffic hitting our micro-services to solve these problems and it helped us support many other use cases. Keep reading to discover more.
The Envoy Proxy provides the AccessLog Filter, which allows us to select the request and response headers to log them to the output devices like stdout or file log. Also, it allows us to send these access log messages to the configured service using protobuf over the gRPC. Known as the envoy.http_grpc_access_log configuration. …
We wanted to break our Monolith service into multiple micro-services for better maintainability, flexibility, and to minimize the risk of deployments. Here is how we achieved our goal.
Micro-services architecture has gained popularity in recent times as more and more organizations embrace Micro-services architecture over the monolithic services. At the same time, more and more organizations are heading towards a more lean and agile system development and architecture. They expect the architecture to be scalable as per the demand, is easy to maintain, and is secure from internal and external threats.
What Were The Challenges?
We had one monolithic application serving APIs for Jet.com’s Web, iOS, and Android clients. Still, we wanted to have a unique and flexible solution that may make big solutions easier to implement, increase productivity, and which is great for distributed teams. The same monolith was responsible for authentication and authorization. One of the problems was how each of these micro-services would perform authorization seamlessly. And, How to handle spray attacks, rate-limiting, and any future Auth changes and deployments to all the micro-services. …