Benefits

High Reliability

Optimized Performance

Enhanced Capability

Centralized Management

Service Integration

Perfect Ecosystem
Scenarios
Release Publishing
Multi-Level Observation
Distributed High-Available Architecture
Secure Isolation

Utilizing Cloud Mesh’s north-south and east-west traffic control features eliminates the requirement for service transformation awareness. This allows seamless control over online and offline publishing at both the service and API levels. Additionally, functionalities such as version definition/canary release, feature-based routing, and load balancing policies can be effortlessly managed, enhancing the efficiency and control over update deployments.

The non-disruptive collection of metric, trace, and access log telemetry data for application communication facilitates the development of multi-tiered observation capabilities. These capabilities encompass real-time monitoring of application communication performance, comprehensive tracking of full-link calls and traces, analysis of link behavior, examination of downstream traffic access, tracing of proxy forwarding and access actions, and quantification of application communication performance and effectiveness.

Cloud Mesh enhances the availability of application communication and architecture by employing mechanisms like retry, timeout, connection pool management, health checks, and rate limiting. These mechanisms ensure and regulate communication fault tolerance among applications. In a distributed application deployment scenario, whether it’s intra-city active-active or two-city three-center setups, Cloud Mesh enables automatic failover and controlled distributed multi-cluster traffic scheduling through region/fault-aware scheduling capabilities. Additionally, it provides flexible three-level disaster recovery management (DNS, Ingress, and Service).

In a containerized dynamic IP environment, a service-oriented authentication and authorization mechanism enables manageable service authentication and access control. Mesh offers JWT request-based authentication, automatic mTLS for zero-trust networking, and access permission restriction based on identities and traffic attributes.