The Art of Scaling Containers: Discovery

F5 Ecosystem | December 28, 2017

Scaling containers is more than just slapping a proxy in front of a service and walking away. There’s more to scale than just distribution, and in the fast-paced world of containers there are five distinct capabilities required to ensure scale: retries, circuit breakers, discovery, distribution, and monitoring.

In this post on the art of scaling containers, we’ll dig into discovery.

Discovery

Traditional models of scale are relatively fixed in configuration. Load balancing proxies use an algorithm to select a resource from a fairly static pool of resources. While selection of the resource (distribution) is a real-time event and may include consideration of just-in-time variables like load and response times, the overall environment is not. Operators add and remove resources based on enterprise-defined processes that govern the increase or decrease of capacity.

Modern models of scale are volatile and dynamic by nature. The premise of scale in modern systems is based on “auto” everything. Auto-scale, a concept made concrete by cloud, forces the notion of expanding and contracting pools of resources based on demand.But this is only a half-step from traditional models. There still exists the notion of a “core” pool of resources from which a load balancing algorithm makes a selection. That pool may be expanded or contracted dynamically, but is still constrained by the fairly traditional model in which it operates.

Containers – and in particular container orchestration environments – break out of that mold completely. The concept of an endpoint (the ingress) is one of the few ‘fixed’ elements in container-based scale, with everything else from routing rules to the resources that make up its supporting pool considered highly variable. Theoretically, containers may live only seconds. In practical application, however, they generally tend to live for days. Compared to traditional models where resources lived for months (and sometimes years), this lifespan puts pressure on operators that cannot be borne without automation.

Discovery is therefore a critical component for scaling containers. Load balancing proxies must be able to select a resource from a pool of resources that may or may not be the same as it was a minute ago. Most container orchestration environments, then, include a ‘registry’ of resources that aids proxies in the real-time discovery of resources to ensure scale.

This process requires proxies not only to be integrated into the container orchestration ecosystem, but to speak the lingua franca of these environments: declarative configuration files (resource files) and meta-data are used within container orchestration environments to allow proxies to identify the resources attached to the services they are scaling. This allows proxies to automatically adjust their “pools” of resources in real-time, and avoid the embarrassment of selecting a resource that is already regrettably been shut down.

Without discovery, there is no efficient way for a load balancing proxy to scale applications and services in a container environment. No operator could keep pace with the changes in such an environment using manual methods of configuration. Merely keeping track of what resources are active – and attached to any given service – would consume most of their time, leaving little time to actual make the changes required.

Discovery provides the means by which components in a container orchestration environment can operate in real-time, and enables load balancing proxies to scale apps and services by ensuring they have the information they need to select resources on-demand.

Share
Tags: 2017

About the Author

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us