Saturday, 13 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Better application networking and security with CAKES
Cloud Computing

Better application networking and security with CAKES

Last updated: April 17, 2024 12:46 pm
Published April 17, 2024
Share
shutterstock 1104796700 layer cake with white and yellow frosting on a wooden table
SHARE

Trendy software program purposes are underpinned by a big and rising net of APIs, microservices, and cloud companies that should be extremely accessible, fault tolerant, and safe. The underlying networking know-how should help all of those necessities, in fact, but additionally explosive progress.

Sadly, the earlier era of applied sciences are too costly, brittle, and poorly built-in to adequately resolve this problem. Mixed with non-optimal organizational practices, regulatory compliance necessities, and the necessity to ship software program sooner, a brand new era of know-how is required to handle these API, networking, and safety challenges.

CAKES is an open-source software networking stack constructed to combine and higher resolve these challenges. This stack is meant to be coupled with trendy practices like GitOps, declarative configuration, and platform engineering. CAKES is constructed on the next open-source applied sciences:

  • C – CNI (container community interface) / Cilium, Calico
  • A – Ambient Mesh / Istio
  • Okay – Kubernetes
  • E – Envoy / API gateway
  • S – SPIFFE / SPIRE

On this article, we discover why we want CAKES and the way these applied sciences match collectively in a contemporary cloud atmosphere, with a deal with rushing up supply, decreasing prices, and enhancing compliance.

Why CAKES?

Present know-how and group buildings are impediments to fixing the issues that come up with the explosion in APIs, the necessity for iteration, and an elevated velocity of supply. Greatest-of-breed applied sciences that combine nicely with one another, which can be based mostly on trendy cloud rules, and which have been confirmed at scale are higher geared up to deal with the challenges we see.

Conway’s legislation strikes once more

A serious problem in enterprises immediately is maintaining with the networking wants of recent architectures whereas additionally retaining current know-how investments working easily. Giant organizations have a number of IT groups liable for these wants, however at instances, the knowledge sharing and communication between these groups is lower than superb. These liable for connectivity, safety, and compliance sometimes stay throughout networking operations, data safety, platform/cloud infrastructure, and/or API administration. These groups usually make selections in silos, which causes duplication and integration friction with different elements of the group. Oftentimes, “integration” between these groups is thru ticketing techniques.

For instance, a networking operations group usually oversees know-how for connectivity, DNS, subnets, micro-segmentation, load balancing, firewall home equipment, monitoring/alerting, and extra. An data safety group is often concerned in coverage for compliance and audit, managing net app firewalls (WAF), penetration testing, container scanning, deep packet inspection, and so forth. An API administration group takes care of onboarding, securing, cataloging, and publishing APIs.

If every of those groups independently picks the know-how for his or her silo, then integration and automation can be gradual, brittle, and costly. Modifications to coverage, routing, and safety will reveal cracks in compliance. Groups might change into confused about which know-how to make use of, as inevitably there can be overlap. Lead instances for modifications in help of app developer productiveness will get longer and longer. Briefly, Conway’s legislation, which states that an organizational system usually finish ups just like the communication construction of that group, rears its ugly head.

See also  Rethinking Physical Data Center Security in the Digital Age | DCN
cakes 01 Solo.io

Determine 1. Know-how silos result in fragmented know-how decisions, costly and brittle integrations, and overlap

Sub-optimal organizational practices

Conway’s legislation isn’t the one challenge right here. Organizational practices on this space could be sub-optimal. Implementations on a use-case-by-use-case foundation end in many remoted “community islands” inside a company as a result of that’s how issues “have at all times been accomplished.”

For instance, a brand new line of enterprise spins up, which can present companies to different elements of the enterprise and eat companies from different elements. The modus operandi is to create a brand new VPC (digital non-public cloud), set up new F5 load balancers, new Palo Alto firewalls, create a brand new group to configure and handle it, and so forth. Doing this use case by use case causes a proliferation of those community islands, that are tough to combine and handle.

As time goes on, every group solves challenges of their environments independently. Little by little, these community islands begin to transfer away from one another. For instance, we at Solo.io have labored with massive monetary establishments the place it’s widespread to search out dozens if not a whole bunch of those drifting community islands. Organizational safety and compliance necessities change into very tough to maintain constant and auditable in an atmosphere like that.

cakes 02 Solo.io

Determine 2. Present practices result in costly duplication and complexity.

Outdated networking assumptions and controls

Lastly, the assumptions we’ve made about perimeter community safety and the controls we use to implement safety coverage and community coverage are now not legitimate. We’ve historically assigned a number of belief to the community perimeter and “the place” companies are deployed inside community islands or community segments. The “perimeter” deteriorates as we punch extra holes within the firewall, use extra cloud companies, and deploy extra APIs and microservices on premises and in public clouds (or in a number of public clouds as demanded by laws). As soon as a malicious actor makes it previous the perimeter, they’ve lateral entry to different techniques and may get entry to delicate knowledge. Safety and compliance insurance policies are sometimes based mostly on IP addresses and community segments, that are ephemeral and could be reassigned. With fast modifications within the infrastructure, “coverage bit rot” occurs rapidly and unpredictably.

Coverage bit rot occurs once we intend to implement a coverage, however due to a change in advanced infrastructure and IP-based networking guidelines, the coverage turns into skewed or invalid. Let’s take a easy instance of service A working on VM 1 with IP tackle 10.0.1.1 and repair B working on VM 2 with IP tackle 10.0.1.2. We are able to write a coverage that claims “service A ought to be capable of speak to service B” and implement that as firewall guidelines permitting 10.0.1.1 to speak to 10.0.1.2.

cakes 03 Solo.io

Determine 3. Service A calling Service B on two totally different VMs with IP-based coverage.

Two easy issues may occur right here to rot our coverage. First, a brand new Service C might be deployed to VM 2. The outcome, which is probably not meant, is that now service A can name service C. Second, VM 2 may change into unhealthy and recycled with a brand new IP tackle. The previous IP tackle might be re-assigned to a VM 3 with Service D. Now service A can name service D however probably not service B.

See also  Can MariaDB’s enterprise business be saved?
cakes 04 Solo.io

Determine 4. Coverage bit rot can occur rapidly and go undetected when counting on ephemeral networking controls.

The earlier instance is for a quite simple use case, however for those who prolong this to a whole bunch of VMs with a whole bunch if not hundreds of advanced firewall guidelines, you’ll be able to see how modifications to environments like this will get skewed. When coverage bit rot occurs, it’s very obscure what the present coverage is until one thing breaks. However simply because site visitors isn’t breaking proper now doesn’t imply that the coverage posture hasn’t change into weak.

Conway’s legislation, advanced infrastructure, and outdated networking assumptions make for a expensive quagmire that slows the velocity of supply. Making modifications in these environments results in unpredictable safety and coverage impacts, makes auditing tough, and undermines trendy cloud practices and automation. For these causes, we want a contemporary, holistic method to software networking.

A greater method to software networking

Know-how alone gained’t resolve a few of the organizational challenges mentioned above. Extra lately, the practices which have fashioned round platform engineering seem to offer us a path ahead. Organizations that put money into platform engineering groups to automate and summary away the complexity round networking, safety, and compliance allow their software groups to go sooner.

Platform engineering groups tackle the heavy lifting round integration and honing in on the suitable consumer expertise for the group’s builders. By centralizing widespread practices, taking a holistic view of a company’s networking, and utilizing workflows based mostly on GitOps to drive supply, a platform engineering group can get the advantages of finest practices, reuse, and financial system of scale. This improves agility, reduces prices, and permits app groups to deal with delivering new worth to the enterprise.

cakes 05 Solo.io

Determine 5. A platform engineering group abstracts away infrastructure complexity and presents a developer expertise to software developer groups by way of an inside developer portal.

For a platform engineering group to achieve success, we have to give them instruments which can be higher geared up to stay on this trendy, cloud-native world. When enthusiastic about networking, safety, and compliance, we needs to be pondering by way of roles, obligations, and coverage that may be mapped on to the group.

We must always keep away from counting on “the place” issues are deployed, what IP addresses are getting used, and what micro-segmentation or firewall guidelines exist. We must always be capable of rapidly take a look at our “meant” posture and simply evaluate it to current deployment or coverage. This can make auditing easier and compliance simpler to make sure. How will we obtain it? We’d like three easy however highly effective foundational ideas in our instruments:

  • Declarative configuration
  • Workload id
  • Normal integration factors
See also  First practical application of viscous electron flow realizes terahertz photoconductivity in graphene

Declarative configuration

Intent and present state are sometimes muddied by complexities of a company’s infrastructure. Making an attempt to wade by way of hundreds of strains of firewall guidelines based mostly on IP addresses and community segmentation and perceive intent could be almost not possible. Declarative configuration codecs assist resolve this.

As a substitute of hundreds of crucial steps to realize a desired posture, declarative configuration permits us to very clearly state what the intent or the tip state of the system needs to be. We are able to take a look at the stay state of a system and evaluate it with its meant state far more simply with declarative configuration than making an attempt to reverse engineer by way of advanced steps and guidelines. If the infrastructure modifications we will “recompile” the declarative coverage to this new goal, which permits for agility.

cakes 06 Solo.io

Determine 6. Declare what, not how.

Writing community coverage as declarative configuration shouldn’t be sufficient, nonetheless. We’ve seen massive organizations construct good declarative configuration fashions, however the complexity of their infrastructure nonetheless results in advanced guidelines and brittle automation. Declarative configuration needs to be written by way of sturdy workload id that’s tied to companies mapped to group construction. This workload id is impartial of the infrastructure, IP addresses, or micro-segmentation. Workload id helps cut back coverage bit rot, reduces configuration drift, and makes it simpler to cause in regards to the meant state of the system and the precise state.

Workload id

Earlier strategies of constructing coverage based mostly on “the place” workloads are deployed are too prone to “coverage bit rot.” Constructs like IP addresses and community segments will not be sturdy, that’s, they’re ephemeral and could be modified, reassigned, or will not be even related. Modifications to those constructs can nullify meant coverage. We have to establish workloads based mostly on what they’re, how they map throughout the organizational construction, and achieve this independently of the place they’re deployed. This decoupling permits meant coverage to withstand drift when the infrastructure modifications, is deployed over hybrid environments, or experiences faults/failures.

cakes 07 Solo.io

Determine 7. Robust workload id needs to be assigned to workloads at startup. Insurance policies needs to be written by way of sturdy id no matter the place workloads are deployed.

With a extra sturdy workload id, we will write authentication and authorization insurance policies with declarative configuration which can be simpler to audit and that map clearly to compliance necessities. A high-level compliance requirement comparable to “take a look at and developer environments can’t work together with manufacturing environments or knowledge” turns into simpler to implement. With workload id, we all know which workloads belong to which environments as a result of it’s encoded of their workload id.

Most organizations have already got current investments in id and entry administration techniques, so the final piece of the puzzle right here is the necessity for traditional integration factors.

Normal integration factors

An enormous ache level in current networking and safety implementations is the costly integrations between techniques that weren’t meant to work nicely collectively or that expose proprietary integration factors. A few of these integrations are closely UI-based, that are tough to automate. Any system constructed on declarative configuration and robust workload id may even have to combine with different layers within the stack or supporting know-how.

Source link

Contents
Why CAKES?A greater method to software networking
TAGGED: application, CAKES, networking, security
Share This Article
Twitter Email Copy Link Print
Previous Article broadcom-logo Broadcom changes VMware pricing amid customer backlash and EU questioning
Next Article Chinese flag in front of building Who Will Replace Intel and AMD in China’s Networks? | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Blockrise Raises €2M in Seed Funding

Blockrise, a Rotterdam, The Netherlands-based regulated crypto asset administration startup, raised €2M in seed funding.…

May 24, 2025

Ofqual poll highlights the value of cybersecurity in schools

A brand new Ofqual ballot has highlighted the significance of cybersecurity in colleges after it…

October 1, 2024

OV Loop Acquires Skipti

OV Loop, a Boston, UK-based firm constructing an app commerce community, acquired Skipti, a transportation…

July 22, 2024

Supermicro unveils new portfolio to enhance edge computing environments with AI offerings

Supermicro, an IT resolution producer of AI, cloud, storage, and 5G/edge, is increasing its portfolio…

February 22, 2024

OpenAI Eyeing More Data Centers in Texas, Other States

(Bloomberg) – The Stargate three way partnership from OpenAI, SoftBank Group Corp., and Oracle Corp.…

February 6, 2025

You Might Also Like

atNorth's Iceland data centre epitomises circular economy
Cloud Computing

atNorth’s Iceland data centre epitomises circular economy

By saad
How cloud infrastructure shapes the modern Diablo experience 
Cloud Computing

How cloud infrastructure shapes the modern Diablo experience 

By saad
IBM moves to buy Confluent in an $11 billion cloud and AI deal
Cloud Computing

IBM moves to buy Confluent in an $11 billion cloud and AI deal

By saad
Security Industry Association launches data centre advisory board
Global Market

Security Industry Association launches data centre advisory board

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.