mramshaw / Microservices

Some thoughts on Microservices

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Microservices

Some thoughts on Microservices

Background

In the software world, the first gradual step towards microservices seems to be introducing CI (Continuous Integration). This is probably a software engineering "best practice" aimed at catching build-breaking issues as early as possible (it's pretty much a rite of passage for newer team members to "break the build" - any developer who commits a lot of code will probably break the build sooner or later).

The reason why this is a big deal is that any build-breaking issues delay the overall release - EVERYONE is blocked until the build is fixed (which is why advance warning of these issues is so important - and also why Microservices are so critical for larger codebases {more on this further down}). Anyone who has ever worked at a start-up where funding depended on meeting release targets will know how critical it is to be able to release in a timely fashion.

Once CI is nailed down, the next step is generally some form of automated integration and/or security testing followed by CD (Continuous Delivery or Continuous Deployment) - usually aimed towards a staging area (in the case of Continuous Delivery the actual roll-out to production probably will still happen according to a release cycle at this point - generally because it requires full documentation, while in the case of Continuous Deployment the roll-out will be to production but possibly feature-flagged).

[Continuous Deployment means what it says, in that code is continuously deployed to production. But perhaps Continuous Delivery might more correctly be called Continuously Deployable, in that it is not continuously deployed to production (generally this requires a human decision) but could be.]

Contents

The monolith

The software is now what is known as a monolith or BBoM (Big Ball of Mud). Which is probably fine for smaller codebases or where the developers are well-integrated and experienced. Teams (if they exist at all at this point) are usually vertically-oriented around core competencies (web, front-end, middleware, database, back-end, etc). There are tactics and strategies for advancing to the next step (if needed).

The next step is essentially cross-cutting - meaning it may well involve some reorganization (sometimes called "The Inverse Conway Manoeuvre") but will definitely introduce increased complexity. The usual approach is to pick a non-critical service to be used as a pilot project - and to tread very carefully. The terminology is helpful here - this is referred to as "strangling out a microservice". Signs that this may be necessary are when a development team is too large for the codebase (i.e. developers start stepping all over each other's code changes) or else there is a desire to be able to release different parts of the codebase independently of each other (for example, different Docker or rkt images). The front (customer-facing) end generally changes a lot faster (for cosmetic reasons) than the back-end, which might be a viable reason for separating these into two deliverables. [The eventual goal is to partition the system a lot more finely than this, but this is just a broad example of how different functional areas mutate at different speeds.]

Coupling and Cohesion are issues here - the acid test for a Microservice is that it can be released on its own. If a new Docker image requires another Docker image (or - worse - multiple Docker images) to also be released at the same time, this is an indication of tight coupling. While this is very probably a good start in terms of migrating to the cloud, the eventual goal should be to have independent microservices.

The reorganization (if it occurs at all) will generally be towards something like product teams (perhaps with product managers) and may involve slicing up the vertically-oriented core competency teams into horizontally-oriented product teams (like Amazon's so-called "two-pizza teams"). The general guideline is that each team should control the entire pipeline from the software to the customer.

Slicing and dicing

How the slicing and dicing occurs is tricky. Eric Evans's Domain-Driven Design (the so-called "Blue Book"; its subtitle is "Tackling Complexity in the Heart of Software") offers some guidelines on where to draw the boundaries between these "bounded contexts" (which is one of the trickiest problems around).

Here are some further thoughts from Eric Evans, discussing Domain-Driven Design at 10 Years:

The bounded context is a concept which in more traditional architectures, there weren't very good ways to implement that concept - you know, to really establish the boundary - so it seems to me that microservices has delivered us a practical and popular way of defining - and sticking to - those boundaries. And that's a big deal. And the emphasis on, you know, the micro: someone once asked me, what's the difference between microservices and the old SOA services? And I said: Well, I think part of it is the micro. These services are ... smaller. That's just a convention, of course, but it's an important convention: The idea that a very small piece of software could be very isolated, and uh, you know, do a narrow thing.

The point is that the software should be partitioned based upon business (rather than technical) needs.

Conway's Law

Conway's Law is worth a look at this point:

http://en.wikipedia.org/wiki/Conway%27s_law

For more on the implications of Conway's Law for software architecture as well as team structure at Avvo, Spotify, Adobe, and Microsoft (and also the myth of the "full-stack developer"), the following podcast may be of interest:

http://www.se-radio.net/2018/07/se-radio-episode-331-kevin-goldsmith-on-architecture-and-organizational-design/

One conclusion of interest is that trying to subvert Conway's Law can give rise to dysfunctional organizations - where there is a clear software architecture, having an org chart that matches that structure can serve to clarify and delineate code (and bug) responsibilities.

The rewards of Microservices

For those who arrive at the Microservices stage, the business rewards are supposed to be huge; each microservice can be rapidly iterated (speed of iteration is often cited as a competitive business advantage) and each microservice can be independently tested (each bounded context is also a failure boundary). Each microservice team is free to innovate, also to use whichever language or stack they feel best suits their needs (subject to management approval of course) and the overall communications overhead is reduced as each team has its own internal scope - so that communication is simply needed to coordinate teams. The disadvantages are that the 'core competency' teams may have been broken up and the release process may have gotten more difficult (scripting and automation are generally used extensively to mitigate this last issue).

The problem with microservices is that bugs generally show up at higher levels, which can be problematic. So integration testing gets harder and more complicated (bulkheads and circuit-breakers may be of use here).

DevOps

[Originally called NoOps (as in, no Operations) - which turned out to be wildly over-optimistic.]

The general "fullstack" Kool-aid is that developers should do their own testing and releasing:

“You build it, you run it.” - Werner Vogels, Amazon CTO

However, the issue of the increased complexity of integration testing of microservices may well argue for the continued existence of QA/Testing/Security/Release teams. On the plus side, problems in production can be quickly rolled back small-scale; a more granular release means finer control over the actual components. This makes for a much more "agile" experience.

Release agility

This new agility manifests in partial or rolling deployments such as canary deployments, blue-green deployments, red-black deployments, A/B deployments and the like. The key value of these is that performance impacts can be evaluated in production and - if necessary - tuned or rolled-back. [A traditional approach has been a phased regional deployment - which assumes that all regions have equivalent performance characteristics. As this is usually not the case, being able to monitor trial deployments of microservices represents an attractive proposition.]

Partial or rolling deployments are really a feature of component-based services - and are not specific to microservices. But, as discussed earlier, microservices probably represent the desired end-goal of component-based services.

Containerization technologies such as Docker and rkt are a huge boon for deployments. Whereas the deployment unit was previously only built when the product was deemed 'ready to ship' (generally towards the end of the development cycle), the fungible unit of containerization is the image - which is usually built by the developer. This image is passed along through subsequent stages, but as an immutable unit it has usually been very heavily tested by deployment time. This means deployment is no longer an afterthought of the development cycle, it is now an integral part - at every stage.

One particularly attractive feature of this approach is that it is possible to make micro-releases - as in release individual changes (which could be either bug fixes or requested new features) instead of a bundle of them - making it much easier to evaluate impact. Obviously the smaller the change to production, the easier it is to debug or diagnose. Conversely, larger change bundles may be much harder to evaluate or triage.

Testing

In terms of testing, there are two types of errors: Type I is when the change is not implemented correctly and Type II represents an unintended breakage - meaning that something that wasn't supposed to be affected actually was affected. Either of these errors may be a result of differences between the production and development environments so being able to test in production (as in a canary deployment) can obviously be helpful. Type I (which is usually less common) is normally caught by unit testing (as in TDD or Test-Driven Development) whereas Type II is normally caught by integration testing or QA (Quality Assurance). Testing for Type II errors is also known as Regression testing while testing for Type I errors is sometimes referred to as Non-Regression testing.

The general point is that all of these testing efforts are reduced by smaller deployments (it may be necessary to release deployments more frequently to compensate for their smaller size and scope).

Security Testing

[Sometimes called DevSecOps.]

One of the advantages of a continuous build or CI/CD pipeline is that security can be added to this pipeline, both in terms of vulnerability scanning (Snyk) as well as application security tests (probably best built into the regular tests).