The Case for Microservices Sprawl at Sea

Microservices Sprawl at Sea

Why would anyone want to talk about microservices when they can talk about cruise ships? Taking a cruise is a popular life event for hundreds of thousands of vacationers every year. The image of a huge ship, filled with activities, endless buffets, and an ever-changing view is enticing and far removed, it seems, from the world of IT.

But the trip cannot happen if the data isn’t there.

Cruise ship guests expect to be well looked after. They pay to get away from it all, and they rightfully expect every aspect of the trip, from check-in to check-out, including luggage, restaurant reservations, excursions, and activities, to be seamless and memorable. A typical large cruise ship today carries between 2,000, and 4,000 guests, with the newest models offering capacity for over 5,000. The logistics of getting everything right for each guest, cross-matched against crew, supplies, itineraries, and weather, make the hidden IT effort behind each voyage huge on a logarithmic scale.

In addition to the IT horsepower required, cruise ships face unique challenges of space and distance. There is very little room available on board for an IT department, and communicating with a home base must rely on remote technologies like satellite, radio, and phone, rather than cable.

As the ships have become larger and more luxurious, their IT systems have had to evolve as well, and inevitably they have started to move towards microservices to help manage the myriad small actions required to keep customers satisfied and safe.

In an article entitled Royal Caribbean Delivers Real-time Microservices to the Open Seas with DC/OS, writer Laura Kelso delivers a fascinating summary of the processes that have been put in place by Royal Caribbean International Cruise Lines to break apart a monolithic process and replace it with resilient microservices based middleware, intended to ensure a better, more efficient and more cost-effective approach to delivering a successful cruise.

The article is a promotional piece from Mesosphere, the vendor chosen to provide the new system, but it describes a real-world situation that is easy to visualize anywhere.

At the core of Royal Caribbean’s technology stack is its legacy reservation system. Any future solution needs to be able to extract data from the legacy system to enable modern, mobile experiences for passengers….by creating a reliable, mobile experience — whether at the port or on the ship — Royal Caribbean stands to unlock new revenue streams by delivering timely, in-context offers to a new generation of passengers who expect to be able to check on-board activities, make restaurant and event reservations, and complete purchases from their mobile device.”

But What About the Sprawl?

So the Royal Caribbean post is a great case study, and its practicality can be translated to any company or organization that is investigating how to break down a legacy system into something more modular and containerized. The microservices proposition of being able to fix, upgrade, or replace any component without bringing the whole show to a stop is highly attractive.

But the question remains, how does a company manage the inevitable sprawl that comes from decomposition on this level?

Experts warn that if the transition is not done in totality, that is to say, integrating end-to-end management in league with the deployment of code, then much of the subsequent activity will revolve around troubleshooting issues rather than speeding up processes.

This, then, could be considered one of the main pitfalls of microservices: inadequate oversight, or maybe inadequate oversight planning.

As new and existing applications get containerized, most companies’ IT monitoring tools do not currently provide sufficient visibility over each piece. Anything less than 100 percent monitoring of each and every microservices component is a recipe for tremendous backlog and delay, as teams spend time trying to isolate errors rather than pushing the enterprise forwards.

End-to-end means sharing metrics as they relate to a specific container as well as to the whole environment. As Saba Anees writes in, “While performance attributes of a specific container might be interesting, that information only becomes truly useful when it can be compared to everything else that is happening across the IT environment.”

It comes down to reinventing a DevOps culture in which developers and management stay the course across the entire lifecycle, rather than focusing on their own individual pieces out of context. This in turn requires a revised approach to process management, so that software development allows for reviews of failures, and provides alternate, parallel development paths. There should also be sufficient metrics to provide a clear and detailed picture of every component, incident, and outcome.

Can You Herd 3,000 Cats?

The inevitable expansion or sprawl that will occur as each stand-alone, self-contained microservice enters the spaces once held by a legacy SOA platform demands a new understanding and practical management approach. As JP Morgenthal writes in Microservices Journal, “A microservice follows specific tenets of design. One of these tenets is smart endpoints and dumb pipes… for me, it’s clearly a rebellion against SOA strategies.” He continues, “Microservices architectures by nature focus less on tooling (they’re polyglots by design) and more on the contextual bindings to business domains… [they] deliver smaller, more well-focused entities representing subsets of the business domain.

Contextual binding. As the collection of dedicated microservices expands into the thousands, IT management must remain aware that as independent and expendable as each microservice may be to the overall operations of a system, it is still their collective presence and communications ability that keeps the entire ship afloat and on course. And that requires a new level of ongoing vigilance.”

By Steve Prentice

Series sponsored by Sumo Logic.

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website


Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has ...
State of the Cloud Report In 2017

State of the Cloud Report In 2017

Cloud Report 2017 As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the ...
The Paradigm Shift In Enterprise IT Operations Management

The Paradigm Shift In Enterprise IT Operations Management

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology ...
IT Service Management Strategy

Automation and the IT Service Management Strategy

IT Service Management Strategy It’s true. The full potential of automation cannot be fully realized until it is informed and ...
Key Cloud Office Trends For 2016

Key Cloud Office Trends For 2016

Cloud Office Trends The mass migration to the cloud is well under way and will only accelerate. Two giants continue ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...


Rackspace Extends Managed Security to Google Cloud Platform

Rackspace Extends Managed Security to Google Cloud Platform

SAN ANTONIO, March 21, 2018 (GLOBE NEWSWIRE) -- Rackspace® announced today that Managed Security and Compliance Assistance for Google Cloud Platform (GCP) is now available for preview to new and existing customers that use Rackspace Managed Services for GCP ...
Google classroom

Helping G Suite customers stay secure with new proactive phishing protections and management controls

Security tools are only effective at stopping threats if they are deployed and managed at scale, but getting everyone in your organization to adopt these tools ultimately hinges on how easy they are to use ...
Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018

Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018

By 2021, Regulatory Compliance Will Become the Prime Influencer for IoT Security Uptake Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations ...
BMW raises R&D spending for electric, autonomous cars

BMW raises R&D spending for electric, autonomous cars

Munich (Reuters) - German carmaker BMW (BMWG.DE) will increase research and development (R&D) spending to an all-time high of up to 7 billion euros ($8.6 billion) this year as part of efforts to bring 25 ...
Providers Benchmark Report: Cloud Spectator Releases Annual Top 10 Cloud IaaS

Providers Benchmark Report: Cloud Spectator Releases Annual Top 10 Cloud IaaS

Significant differences persist with price-performance across Public Clouds BOSTON, MA, March 20, 2018 — Cloud Spectator, the industry’s leading benchmarking and cloud consulting firm, today released its 2018 Top 10 Cloud IaaS Price-Performance Benchmark Report ...
Where's Zuck? Facebook CEO silent as data harvesting scandal unfolds

Where’s Zuck? Facebook CEO silent as data harvesting scandal unfolds

Amid calls for investigation and a #DeleteFacebook campaign, company releases an official statement but its figurehead keeps quiet The chief executive of Facebook, Mark Zuckerberg, has remained silent over the more than 48 hours since ...