You can edit almost every page by Creating an account. Otherwise, see the FAQ.

Edge stack

From EverybodyWiki Bios & Wiki

Script error: No such module "AfC submission catcheck".

An edge stack is the set of proxies that manage application traffic entering a network[1]. Each proxy in the edge stack has a specific purpose such as authentication, caching, or load balancing. The proxies communicate with each other through a common network protocol such as TCP or HTTP[2].

History[edit]

Client applications such as web browsers and mobile applications send requests over the Internet to a cloud application[3]. These requests need to be secured, transformed, and analyzed. While the functionality for doing this could occur in the cloud application, traffic can also be intercepted before it arrives at the cloud application.[4]

The Edge Stack pattern enables the deployment of specialized software and hardware to manage traffic. Examples include:

Architecture[edit]

Each proxy in an edge stack is connected via network protocols.[6] Common protocols include Layer 4 protocols such as TCP, as well as Layer 7 protocols such as HTTP, gRPC, and WebSockets[7]. The most popular of the Layer 7 proxies are Envoy, HAProxy and NGINX.[8]

The relative simplicity of connecting additional proxies via network protocols can lead to unintended consequences. As additional proxies are added, latency for end users can increase.[9] In addition, different groups within an organization may manage or control different parts of the edge stack, leading to cognitive dissonance and friction in deploying new applications that are exposed to end users.

Cloud-native applications[edit]

Cloud-centric applications have increased the complexity of the edge stack. In traditional monolithic applications, the edge may consist of a single load balancer or Application Delivery Controller. As cloud applications have grown in sophistication, adding additional proxies to manage edge traffic has grown in popularity.[10]

See also[edit]

References[edit]

  1. Coyle, Stephanie. "Getting Edgy: What's in an Edge Stack?". Get Ambassador. Datawire. Retrieved 11 May 2020.
  2. Bryant, Daniel. "Envoy and the Programmable Edge: Edge Proxies and the Developer Experience". The New Stack. The New Stack. Retrieved 11 May 2020.
  3. "HTTP Requests". CodeAcademy. Codecademy. Retrieved 11 May 2020.
  4. Moyle, Ed. "The pros and cons of proxy-based security in the cloud". Search Cloud Security. Tech Target. Retrieved 11 May 2020.
  5. "User Authentication with Identity-Aware Proxy". CodeLabs. Google, Inc. Retrieved 11 May 2020.
  6. Coyle, Stephanie. "Getting Edgy: What's in an Edge Stack?". Get Ambassador. Datawire. Retrieved 11 May 2020.
  7. Esposito, Tom. "Load Balancing Layer 4 and Layer 7". Free Load Balancer. KEMP Technologies,Inc. Retrieved 10 December 2019.
  8. "Benchmarking Envoy Proxy, HAProxy, and NGINX Performance on Kubernetes". Get Ambassador. Datawire. Retrieved 11 December 2019.
  9. "Multiple Active Proxy Support". Redis Labs Blog. Redis Labs. Retrieved 11 December 2019.
  10. T., Prabu. "Collaborative Multi-Tenant Cloud Computing Based on Multiple Proxies for Secure Network Enforcement". Tech Republic. CBS Interactive. Retrieved 11 December 2019.



This article "Edge stack" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Edge stack. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.