We are thrilled to announce the availability of Calico Enterprise 3.5, which delivers deep observability across the entire Kubernetes stack, from application to networking layers (L3–L7). This release also includes data plane support for Windows and eBPF, in addition to the standard Linux data plane. These new capabilities are designed to automate, simplify and accelerate Kubernetes adoption and deployment. Here are highlights from the release…
The majority of operational problems inherent to deploying microservices in a distributed architecture are linked to two areas: security and observability. At the application level, the need to understand all aspects associated with service-to-service communication within the cluster becomes paramount. DevOps teams often struggle with these questions: Where is monitoring needed? How can I understand the impact of issues and effectively troubleshoot? How can I effectively protect application-level data?
If observability and security are your primary drivers for considering a service mesh, Calico provides L3–L7 observability and security without the additional overhead associated with a service mesh. Calico integrates Envoy at the node level to provide deep observability of microservices at the application level. Since HTTP is one of the most popular protocols for microservices communication, this integration gives operators access to new network flow logs for application-level traffic that include valuable metadata and metrics for analysis and troubleshooting. When combined with high-performance, data-in-transit encryption using WireGuard, this gives DevOps teams service mesh observability and security benefits, without the need to deploy a service mesh along with all of its operational complexity and performance penalties.
While development teams and service owners typically understand the microservices they are deploying, it’s often difficult to get a complete, shared view of dependencies and how all the services are communicating with each other across a cluster. Limited observability in a dynamic, distributed environment like Kubernetes makes it extremely difficult to troubleshoot and resolve end-to-end connectivity issues that impact application deployment. And downtime is expensive!
The Dynamic Service Graph available in Calico provides visibility across the stack from network to application layer (L3–L7) and provides the most accurate view of how services are operating in your Kubernetes cluster. It can generate a detailed visualization of the cluster environment that enables anyone to easily understand how microservices are behaving and interacting with each other at runtime, simplifying the debugging process. The graph provides DevOps, SREs and service owners with a point-to-point, topographical representation of traffic within a cluster that shows how workloads are communicating within the cluster, and across which namespaces.
Along with this information, the Dynamic Service Graph provides metadata on ports, protocols, how security policies are being evaluated, and other details that help Kubernetes teams understand how end-to-end communication is occurring. Performance hotspots are automatically identified and highlighted, and alerts are provided in the context of the graph. This feature also includes advanced capabilities to filter resources, save views, and troubleshoot DNS issues. The unique perspective provided by the Dynamic Service Graph’s expansive topographic view enables software engineers to quickly identify the source of a problem at the application, process, and socket levels as well as through an automated packet capture function.
Packet capture (PCAP) is a valuable technique for debugging microservices and application interaction in day-to-day operations and incident response. But generating PCAP files to diagnose connectivity issues in Kubernetes clusters can be a frustrating exercise in a dynamic environment where hundreds, possibly thousands of pods are continually being created and destroyed.
The Calico packet capture feature automates and simplifies this cumbersome process by providing a Kubernetes-native way to capture packets from your deployments, and significantly reduces the time and effort it takes for operators to get the network diagnostics they need to troubleshoot a connectivity issue. Packet capture generates PCAP files on the nodes associated with pods targeted for packet capture, and automatically manages the data retention and collection of generated files in a secure way.
Utilizing the same label-based selectors that are used for security policies, packet capture can identify single or multiple workload endpoints for capturing live traffic. In addition, role-based access control (RBAC) can be enabled with packet capture, in which case user permissions are enforced using the standard Kubernetes RBAC, based on Role and RoleBindings within a namespace.
Packet capture is an ideal solution for shift-left, self-service environments where DevOps and service owners desire greater autonomy, but require some guardrails.
While it’s an essential part of Kubernetes, DNS is also a common source of outages and issues in Kubernetes clusters. Debugging and troubleshooting DNS issues in Kubernetes environments is not a trivial task given the limited amount of information Kubernetes provides for DNS queries.
Calico’s DNS Dashboard helps Kubernetes teams more quickly confirm or eliminate DNS as the root cause of microservice and application connectivity issues. The DNS Dashboard enables you to:
Since all query data is logged, security teams can apply Global Alerts in Calico to define alerts that are automatically triggered based on certain criteria using the logged data. Security teams can then answer the following questions:
By eliminating a lot of the manual, time-consuming introspection typically required, the dashboard accelerates troubleshooting and problem resolution in Kubernetes environments. No other vendor offers this automated capability.
Calico Enterprise adds support for an extended Berkeley Packet Filter (eBPF) data plane, which delivers highly performant networking, and serves as a replacement for kube-proxy to reduce resource consumption within a cluster. Calico was designed from the ground up with a fully pluggable data plane architecture, which initially supported standard Linux. As the Kubernetes footprint expands, there has been demand for a data plane that can deliver improved throughput and performance compared to the standard Linux data plane.
When compared with the standard Linux data plane (based on iptables), the eBPF data plane:
Along with these improvements, the eBPF data plane eliminates SNAT, maintains source IP preservation using DSR, and delivers exceptional performance benefits. Calico is the only solution that offers a pluggable data plane supporting standard Linux, eBPF for modern Linux kernels, and Windows, thus future-proofing your investment in these platforms. And speaking of Windows…
Most enterprises have a Windows footprint, and Windows workloads are increasingly being modernized and migrated to containers and orchestrated with Kubernetes. Over the past year, we have seen an increasing demand for support for Windows nodes from enterprise users who want to deploy a single solution for Kubernetes security and observability that works across both Linux and Windows workloads. This has been driven by the need to move existing applications written in .NET/C# into a customer’s CaaS platform.
Tigera has collaborated with Microsoft and our joint customers to bring open-source Calico to the Windows platform. Now this feature is available for Calico Enterprise users as well, enabling deployment of a single, proven solution for Kubernetes security and observability across your choice of Windows, Linux, and mixed-node environments.
Calico Enterprise for Windows is an entirely new commercial offering that extends many of the features and capabilities of Calico Enterprise, such as policy tiers, metrics, and flow logs, to workloads that require a Windows data plane. Calico Enterprise for Windows enables all Azure customers who are interested in Windows to extend this simple yet powerful Kubernetes security and observability model to their clusters. We are also making Calico Enterprise for Windows available on other major public cloud platforms.
To read more about Calico Enterprise 3.5, see the official press release here. If video is more your style, watch this interview with TFiR where Tigera’s VP Product Management, Amit Gupta, provides details.
Ready to get started? Try a free 14-day trial.
Get updates on blog posts, new releases and more!