Skip to content

Comments

review interlock#3

Open
trapier wants to merge 3 commits intosans-interlockfrom
with-interlock
Open

review interlock#3
trapier wants to merge 3 commits intosans-interlockfrom
with-interlock

Conversation

@trapier
Copy link
Owner

@trapier trapier commented Oct 7, 2019

No description provided.


- Full integration with Docker (Swarm, Services, Secrets, Configs)
- Enhanced configuration (context roots, TLS, zero downtime deploy, rollback)
- Support for external load balancers (nginx, haproxy, F5, etc) via extensions
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Support for external load balancers (nginx, haproxy, F5, etc) via extensions
- Support for external load balancers (NGINX, HAProxy, F5, etc) via extensions \*
  • capitalization
  • caveat NGINX is the only implemented extension

keywords: routing, UCP, interlock, load balancing
---

Application-layer (Layer 7) routing is the application routing and load balancing (ingress routing) system included with Docker Enterprise for Swarm orchestration. Interlock architecture takes advantage of the underlying Swarm components to provide scalable Layer 7 routing and Layer 4 VIP mode functionality.
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Application-layer (Layer 7) routing is the application routing and load balancing (ingress routing) system included with Docker Enterprise for Swarm orchestration. Interlock architecture takes advantage of the underlying Swarm components to provide scalable Layer 7 routing and Layer 4 VIP mode functionality.
Layer 7 routing is the ingress application routing and load balancing system included with Docker Enterprise for Swarm orchestration. Interlock architecture takes advantage of the underlying Swarm to provide scalable layer 7 routing for Swarm services.
  • remove parenthetical stutters
  • take the application-layer marbles out of your mouth
  • remove reference to layer 4. this is about layer 7, right?
  • tolower Layer for consistency with subsequent use

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please dear deity introduce interlock before you start talking about its architecture.

traffic to your Kubernetes applications, check
[layer 7 routing with Kubernetes.](../kubernetes/layer-7-routing.md)

Interlock uses the Docker Remote API to automatically configure extensions such as NGINX or HAProxy for application traffic. Interlock is designed for:
Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Interlock uses the Docker Remote API to automatically configure extensions such as NGINX or HAProxy for application traffic. Interlock is designed for:
Interlock uses the Docker Remote API to automatically configure NGINX for application traffic. Interlock is designed for:
  • remove reference to HAproxy.


Interlock uses the Docker Remote API to automatically configure extensions such as NGINX or HAProxy for application traffic. Interlock is designed for:

- Full integration with Docker (Swarm, Services, Secrets, Configs)
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Full integration with Docker (Swarm, Services, Secrets, Configs)
- Full integration with Docker Swarm (Services, Networks, Secrets, Configs)
  • scope Docker to Swarm
  • note integration with networks

- Full integration with Docker (Swarm, Services, Secrets, Configs)
- Enhanced configuration (context roots, TLS, zero downtime deploy, rollback)
- Support for external load balancers (nginx, haproxy, F5, etc) via extensions
- Least privilege for extensions (no Docker API access)
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Least privilege for extensions (no Docker API access)
- Least privilege for extensions (no Docker API access)
\* NGINX is currently the only released and supported extension.
  • add caveat on supported extensions


![swarm routing mess](../images/interlock-overview-1.svg)

For example, a WordPress service is listening on port 8000 of the routing mesh. Even though the service is running on a single node, users can access WordPress using the domain name or IP of any of the nodes that are part of the swarm.
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
For example, a WordPress service is listening on port 8000 of the routing mesh. Even though the service is running on a single node, users can access WordPress using the domain name or IP of any of the nodes that are part of the swarm.
For example, a WordPress service is published to port 8000 of the ingress routing mesh. Even though the service is only running on a single node, users can access WordPress by connecting the to domain name or IP of any node in the cluster on port 8000.
  • ingress routing mesh
  • fix capitalization of swarm by not using it
  • use the word port multiple times to subtly indicate routing mesh is layer 4.

Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Explicitly reference layer 4 for extension by layer 7 in the next paragraph?


For example, a WordPress service is listening on port 8000 of the routing mesh. Even though the service is running on a single node, users can access WordPress using the domain name or IP of any of the nodes that are part of the swarm.

UCP extends this one step further with layer 7 layer routing (also known as application layer 7), allowing users to access Docker services using domain names instead of IP addresses. This functionality is made available through the Interlock component.
Copy link
Owner Author

@trapier trapier Oct 7, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
UCP extends this one step further with layer 7 layer routing (also known as application layer 7), allowing users to access Docker services using domain names instead of IP addresses. This functionality is made available through the Interlock component.
UCP extends this one step further with layer 7 layer routing, allowing users to access Docker services using domain names instead of port numbers. This functionality is made available through the Interlock component.
  • drop the parenthetical
  • correct the contrast reference to port number (i.e. layer 4)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant