12 min read

When an application starts to become popular, usually it’s time to rejoice, however that depends on how the exact shape of that trend and how prepared you are for it. Sometimes, it’s just a matter of getting a more powerful server, and cloud providers such as Azure have made that incredibly easy, and you can set autoscale to beef up your server when it’s needed. However, at a certain point that hits a limit, and you need to start scaling horizontally. In this post, I’ll discuss some concepts used by some of the largest applications on the planet, which are needed to create an application with high security, availability and

Gossip Protocols

Gossip protocols, also known as infection or epidemic protocols, are a category of protocols used for peer-to-peer communication that provide additional information about the network which they know about and accept but aren’t the authoritative source of. Some distributed systems use peer-to-peer gossip to ensure that information is efficiently disseminated to all members of a group. A really good use-case for this is network discovery and state maintenance in a very large network, where direct chatter between all nodes would waste a lot of bandwidth, and especially useful when some nodes don’t have a direct path to communicate.

Network Discovery

A few years ago I came across a problem, where I wanted to be able to join a node to a large network, but didn’t want the overhead manually reconfiguring servers to know about each other. The goal was for a node to fully join the network with as little information as possible. I came up with the following:

New server posts it’s topology, containing just itself, to any one node in the existing network that it knows about. To start the cluster, this means that one server just posts itself to another server. The topology it posts includes its address, the current time, and any capabilities it wishes to advertise.

Every X seconds, or on a change in state, each server posts its current topology along with the current time to all the nodes it knows about.

The current time, with the assumption that network communication in both directions takes the same amount of time, and assuming all servers are time-synced, allows us to efficiently determine latency between nodes.

Under this design, servers still know about each other even if they can’t reach each other, and know expected latency if they use intermediary servers to relay messages. This allows them to build a network diagram like those used in lower levels of the OSI Network Model, but while maintaining additional application-layer state such as current capabilities.

Nearest neighbor gossip or delegation

A simple yet powerful optimization of the above is to use neighbors to disseminate information. Instead of sending your information to every node, sending to the nodes with the lowest latency, or to random nodes on each update and trusting that they’ll do the same on their part quickly disseminates information in the network, while using only a tiny fraction of the typical exponential scale, it would normally use.

Scalable Weakly-consistent Infection-style Process Group Membership Protocol (SWIM)

SWIM is another example of a really great protocol used in many systems today including Hashicorp Consul. SWIM has a few additional optimizations which make it really good for large networks. For example, it relies on UDP and chooses a random node in the network to ping. If the ping is unsuccessful, it picks another random node and asks it to ping the target node. If unsuccessful, it broadcasts a message in the network that it suspects the target node to be down. This suspicion mechanism leads to very few false positives under production scenarios, and a better overall state accounting, especially since UDP packets can be lost along the way.

http://www.cs.cornell.edu/info/projects/spinglass/public_pdfs/swim.pdf

Infrastructure-As-Code

In a world where new technologies are invented, fulfill their purpose, and were sunset in the time it took me to write this post, it’s hard to ever come up with a comprehensive list of tools for this, and that list wouldn’t be of too much value, because it all depends on what the right fit is. The concept, however, is that the state of the infrastructure is declaratively described in versioned code, and automation is responsible for reshaping the infrastructure to meet specifications. This basically flips documentation around, and we have the documentation of the network both describe and dictate the state instead of just an accounting of the last observed state or a stale representation of a previously designed state.

Check out the my previous post where I go in depth on tools to achieve this.

Authentication, Authorization and Access Control

Authentication is the verification that a person or entity proves they are who they say they are.

The process of Authentication, however, is a lot more complicated than the concept. We need to make sure that the user is who they say they are, using as much information as we have available, but at the same time, we have to not overwhelm the user and be mindful of the sensitivity of the data this authentication assertion will be used for.

Typical authentication factors include username and password, a code sent to their phone using SMS or an automated voice call, pre-allowed IP address, Google Authenticator TOTP (RFC 6238) / HOTP (RFC 4226) tokens, FIDO U2F usb keys such as YubiKey. However, authentication techniques can go a lot further, leveraging browser fingerprinting, where a hash is generated by the browser based on characteristics of the browser (resolution, active plugins, features, etc), and user behavior fingerprinting such as keyboard dynamics and mouse dynamics, where the speed and timing between key presses or arcs and angles formed by moving the cursor generate an identifiable pattern for the user.

Check out my previous article on the subject for more authentication ideas

OAuth2 / OpenID Connect and SAML 2.0

Authorization is the verification or assertion that the currently authenticated identity has access to a resource.

Authentication is really hard, and there are a lot of ways it can go wrong. So we want to make sure it’s done right, but that can be prohibitively expensive if we need to redo it for each application. Luckily, new protocols now allow us to do authentication in a single place and leverage all those controls from any number of applications quite simply. Protocols such as OAuth2 / OpenID Connect, and SAML 2 allow us to federate the authorization of an application to be performed by another system. Under these protocols, the user is redirected to another system which performs all the necessary authentication and authorization, and provides the user with a token they can present to us as proof that they have been verified and are who they say they are.

System for Cross-Identity Management (SCIM)

A typical problem we have with distributed systems using OAuth 2, OpenID Connect, SAML, and others is that information those systems store about the users change. In the United States for example, a user’s email address might change if they get married and change their last name. This can result into issues in cross-system consistency if email address was used to map the user between systems. SCIM solves this by allowing applications to subscribe to changes in the data source. They will get a JSON POST with any a description of changes to a resource for resources matching the query they subscribed to.

Vectors of Trust

We can have requirements that extend beyond the typical allow/deny models and authorize based on dynamic context and strength of the identity of the user. Let’s say the requirement calls for the user coming in from a location they normally log in from, otherwise, they need to MFA, and we need to have a high degree of certainty that this account belongs to a real human being (ex: we need to have a driver’s license on file for them).

The system can determine that it needs the user to go back to the authorization server and come back with more info; so it challenges the info needed. Using IETF’s Vectors of Trust OpenID Connect extension (RFC 8485), we can forward the user to get another access token and communicate additional vector combinations the user must meet. Vectors, in this case, could be authentication strength (password challenge, MFA) and identity strength (verified points of identity such as passport, driver license or W3C Decentralized Identifiers / DIDs), known user location (location services, IP address), and/or device security/compliance (firewall on, recent malware scan). The authentication server can prompt the user for any additional information it needs, or involve other services in the verification.

RFC 8485 – Vectors of Trust

Internet Engineering Task Force (IETF) J. Richer, Ed. Request for Comments: 8485 Bespoke Engineering Category: Standards Track L. Johansson ISSN: 2070-1721 Swedish University Network October 2018 Vectors of Trust Abstract This document defines a mechanism for describing and signaling several aspects of a digital identity transaction and its participants.

BeyondAuth Access Control

Access control consists of the checks performed on each request in order to allow or deny access to a resource. In the case of JWT tokens, we need to verify that we trust the issuer of the token, that the token is signed with a trusted key published in the JWKs of the authorization server, that the token is within its validity period, the necessary scopes are contained in it, and that the necessary authentication level was performed. Sensitive resources might require that MFA had to be performed.

In addition to the integrity and validity of the JWT token, we need to make sure it wasn’t intercepted, and we have extension protocols such as OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens (RFC 8705) to help ensure the token wasn’t stolen.

We now know who the user is and that their token wasn’t stolen. Once this is all taken care of, we get to the actual checks to make sure the user should indeed have access to the resource aka the user meets the necessary criteria. This could be coarse-grained such as the user being in a particular role, fine-grained such as an Access Control List, context-based determined by the action they are performing, time-based, and could leverage more modern requirements of access such as recent-behavior based.

Some examples of requirements:

  • Time-based: Access to the resource is only allowed between 9 AM-5 PM ET.
  • Header Analysis/Fingerprint: Header order and user-agent string can be compared with known browser behaviors.
  • Population Behavior: Similar authorization sequences/patterns performed by users over time grouped into populations. Neo4J, NSA’s lemongraph come to mind and DarkTrace comes to mind.
  • Open Support Ticket: There’s an open ticket in the helpdesk, assigned to the user for working on this server/data from external integration.
  • Member of a Group / Role: The user belongs to a group/role.
  • Current Location: The user’s IP or reported device location places them inside a corporate office.
  • Current Device: They are accessing the resource from a known, clean device as reported by an inventory and security assertion service like OpSwat MetaAccess.
  • JWT Scope: A specific scope is present in the JWT token.
  • Username: The requirement lists that only a specific user can access this.
  • Authorization Sequence: The request passed through your firewall, then reverse proxy gateway and both reported that they let you through.
  • Remote Authorization: Authorization decision pauses the request while something prompts you on your phone to allow the request.
  • Time of Day: You’re typically active during this time.
  • XACML Json Profile 3.0 v1.1: Custom policy defined in XACML.

ops-ai/BeyondAuth

Distributed extensible authorization model based on standard protocols, with centralized authorization policies and the ability to define authorization capabilities that can be validated locally or delegated out; with the option to request more identity context using Vectors of Trust; where authorization decisions are published to a blockchain-based audit log which can be analyzed by the owner of the data it’s protecting.

Anycast Protocol

We’re used to IP addresses pointing to a specific location, but when we need to scale an application to serve the entire planet, we run into many bottlenecks. These could include server processing power, which we solve with load balancers, or network latency problems, which we can solve with geo-dns records, where we serve the user an IP to a different database depending on their location. However, we these still suffer from local outage issues, and it takes time to propagate DNS to redirect the user to a new datacenter if a datacenter goes down.

Anycast solves these issues and more quite neatly for us.

The internet typically works in a Unicast mode, where one IP is associated with one location. Send a packet to that IP, and a server on the other end gets it.

In a broadcast system, typically seen in local LANs, we can send a message that gets received by every member of the network. This is chatty however, so it can’t be used on the internet.

Multicast allows multiple subscribers to the same one IP address. When a packet is sent to that IP, then every member that’s a part of the multicast group receives it.

In contrast, Anycast works more on the network discovery side of things. When a router hears of a new IP address, it adds it to its routing table and knows the next hop to send any packets to. When you advertise the same set of IP addresses from multiple datacenters, packets destined for that IP address will be received by one-and-only-one member/datacenter. If a particular datacenter goes down, then the packet will automatically be routed to another datacenter that’s up simply as a side effect based on the properties of how routing works.

Cloudflare architecture and how BPF eats the world

Recently at I gave a short talk titled “Linux at Cloudflare”. The talk ended up being mostly about BPF. It seems, no matter the question – BPF is the answer. Here is a transcript of a slightly adjusted version of that talk.

Microservices

Historically, we’ve developed applications using a monolithic approach, where all the components of the application run in the same process and share memory space. We used patterns such as service-oriented architecture to organize components inside the monolith, but the entire application was typically versioned together and deployed as a unit.

That pattern is inefficient passed a certain complexity, since it would require significant testing and coordination of many teams in order to update a single component.

Microservices, and better yet protocol-aware microservices prescribe an architecture in which each component is its own application, with its own versioning, which can be scaled up and down independently of other components. Communication between microservices is done using standard protocols such as REST or gRPC, treating each other as if they were 3rd party services. This architecture allows the teams working on each, to develop at their own pace, release when they’re ready, and hotfix quickly because testing can be performed much more efficiently.

What are microservices?

Microservices – also known as the microservice architecture – is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities. The microservice architecture enables the continuous delivery/deployment of large, complex applications. It also enables an organization to evolve its technology stack.

Health Checks

Health check endpoints on an application, allow the instance to diagnose itself and determine if it’s healthy. It can report its health in several ways and with varying degrees of details. When I first started using them, I thought great, have a /health endpoint that outputs json, and create a central health page that pulls data form all our microservices and displays the health of each. This worked great until we scaled to multi-server setups behind ngix and multi-datacenter setups on top of those, using anycast. Adding Puppet also meant some things could just fix themselves, so I don’t want to be woken up at night if the problem just fixes itself. But now checking the health of each instance meant we would have to expose each instance of the service somehow to the central health dashboard, which is problematic and just really complex.

The solution called for things like Consul to use the health endpoint to determine if it should route traffic to it, and kubernetes to use it to know if it should kill the pod and spin up one or more new ones. The in-application health checks instead would now publish their health status directly into our logging pipeline, which ends up eventually in elasticsearch. Now we can use the data from there to report if we need, but more importantly we can have planet-wide encompassing watchers (alerts) that check for the minimum/maximum number of services running out of the number of locations we need them in. If something goes wrong and doesn’t just fix itself, we are alerted on Slack and can jump in to fix it.

Health checks in ASP.NET Core

ASP.NET Core offers Health Checks Middleware and libraries for reporting the health of app infrastructure components. Health checks are exposed by an app as HTTP endpoints. Health check endpoints can be configured for a variety of real-time monitoring scenarios: Health probes can be used by container orchestrators and load balancers to check an app’s status.

Xabaril/AspNetCore.Diagnostics.HealthChecks

This repository offers a wide collection of ASP.NET Core Health Check packages for widely used services and platforms. ASP.NET Core versions supported: 2.2, 3.0 and 3.1 HealthChecks packages include health checks for: Sql Server MySql Oracle Sqlite RavenDB Postgres EventStore RabbitMQ IbmMQ Elasticsearch CosmosDb Solr Redis SendGrid System: Disk Storage,

Logging Pipeline

Logging locally to a file is safe for the most part (baring running out of disk or writing so many logs that you bottleneck the drive), but having logs just locally available on the server means that no one is looking at them, and when you have a lot of servers, you need them in one place.

Sending logs from the application onto a service buss or database solves the later problem, but now you have the risk of losing logs if the database or buss is down, or network communication problems. Some solutions exist, we can queue them in memory or into a file until the service is available again, but now we put them into a queue locally in order to put them into a queue on the network, not ideal still, but getting there.

We’re also sending logs from multiple datacenters, and for many reasons, communication between multiple geographically distributed locations can go down for a while.

Logs also come in a variety of formats; even applications written by the same one software engineer can vary based on specific use-cases, but logs are more useful if they are consistent.

Elasticsearch, Logstash and Beats

Each application writes application logs to text files, and you set up a log rotation schedule that gives enough time to account for worst-case scenarios where stuff is down for a long time, but not too long as to fill up the drive.

Beats are lightweight log shippers usually written in Go, which are installed on each VM or container.

Filebeat basically does a tail -f on a file and pipes the output to the nearest Logstash. If logstash is down, it just waits and retries occasionally. It supports a lot of different formats out-of-the-box.

Auditbeat collects top network talkers stats and any authentication or security syslogs or windows event logs.

Metricbeat monitors system (OS stuff, memory, disk space, cpu), and can connect to other services like Redis and Kafka and collect metrics from there.

Winlogbeat and Syslogbeat collect system logs

Packetbeat on your DNS server

All the above send their logs to Logstash in this scenario, and there is a Logstash is deployed in the every datacenter close to the applications. Logstash is an ETL tool, it receives entries, can parse with patterns or regex, rename fields, and enrich data (turn an IP into GeoIP info, turn a username into info about the user, a user-agent string into browser details), standardize date formats, and once it’s done massaging the data, it writes it into Elasticsearch.

The 2 parts described of elasticsearch can further be split up into log collection using a Logstash in each datacenter putting logs into Kafka, and then back into a central Logstash setup that does the final processing and writes into the Elasticsearch cluster.

Elasticsearch is a NoSQL document store, which stores data into Lucene indices, and has features like encryption at rest, sharding and replication built-in. A good setup for this type of scale is Hot-Warm architecture. Having the fastest servers (Hot) do the ingesting of the data and housing the most recent data (a week or a month), and once that time elapsed, the data gets moved to the larger but slower Warm servers.

Scaling Elasticsearch, Kibana, Beats, and Logstash

I and my colleagues here at Elastic support customers large and small, from Fortune 500 companies to startups. They have a wide range of use cases; the size of their Elastic Stack deployments vary greatly too. In this post, we will focus on scaling the Elastic Stack to collect logs and metrics data and visualize them in Kibana.

Live Documentation

Swagger / OpenAPI

OpenAPI Specification

Version 3.0.3 The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here.

Redoc

ReDoc Interactive Demo

ReDoc Interactive Demo. OpenAPI/Swagger-generated API Reference Documentation

Examples dynamically loaded from unit tests that run every time the application changes.

Swagger files from multiple services can be loaded at runtime and glued together, and then Redoc extensions can be used to filter and sort data to make the documentation always up-to-date.

Was this post helpful?