Discover Better Value Faster
  • Home
    • CloudNow
    • Blog
  • App Development & Modernization
  • Agile & DevOps
  • Cloud
  • Digital Transformation
  • Data & Analytics
No Result
View All Result
  • Home
    • CloudNow
    • Blog
  • App Development & Modernization
  • Agile & DevOps
  • Cloud
  • Digital Transformation
  • Data & Analytics
No Result
View All Result
Discover Better Value Faster
No Result
View All Result
Home Application Development & Modernization

Moving from monolith to microservices? Take a leaf out of the Strangler Fig Approach

SatyaDev Addeppally by SatyaDev Addeppally
4 years ago
in Application Development & Modernization, Microservices
Reading Time: 2 minutes
​​Moving from monolith to microservices?

​​Moving from monolith to microservices?

0
SHARES
826
VIEWS
Share on FacebookShare on TwitterShare on WhatsappShare on LinkedIn

There are a number of ways to modernize an application from a monolithic architecture to microservices. One method that stands out for ensuring a smooth and stable transition is called the Strangler Fig approach.

British software developer and author, Martin Fowler, came up with the metaphor of ‘strangler fig’ trees to illustrate this journey between architectures. What a strangler fig does is to envelope and gradually strangle the host tree on which it grows, until the original tree dies and only the strangler fig remains. 

Related articles

Service Mesh: The best way to Encrypt East-West traffic in Kubernetes

How does a No-Code App Builder help enterprises?

In the world of app redevelopment, the metaphor stands for incremental migration. Fowler believes that app development into a monolith and then cutting it back into microservices is actually even better than developing head-on into microservices. He also says that almost all cases of a system built as a microservice system from scratch ended up in serious trouble. 

In his opinion, the Strangler Fig Application is an effective migration technique as it allows for migrating a legacy system incrementally by replacing existing functionalities with new applications and services in a phased manner.

A hasty overhaul of an old system can be disastrous, while a gradual migration reduces the risk of major failures. And once all the monolithic functions are transformed to the new microservice application, the monolith can simply be retired.

So, what are the advantages of the Strangler Fig approach?

  • It allows you to pause or stop the migration in the middle of the process if needed, while continuing to use whatever has already been redeveloped. Every step is incremental and reversible.
  • This approach delivers reduced risk. Shorter and more frequent release cycles would mean more time for testing and therefore fewer rollbacks. Also, there are continuous value launches. However, this may not be suitable for smaller systems with low complexity and size as it involves high effort and commitment.
  • The process keeps clients in the loop. When running two separate versions of an application, clients must be kept informed of where each feature is located. The Strangler Fig approach overcomes this challenge as it works by creating a routing façade that intercepts requests going to the legacy system and routes them either to the legacy application or new application. The interface continues even while the technology migration is in progress.

How does the Strangler Fig approach work?

Step 1:

Identify the element that you want to migrate.

Step 2: 

Analyze the current legacy application to split your application based on functional transactions by accounting for code complexity. Perform analysis for security threats in the new architecture.

Step 3: 

Implement elements in a new microservice.

Step 4: 

Create the proxy or alternate routing façade between the legacy app and user; when the component is ready, link it to the proxy and serve traffic to the page, slowly increasing the amount of traffic going to the new page.

Step 5: 

Incrementally reroute calls from monolith to new microservice.

Step 6: 

Test new functionality comprehensively.

Step 7: 

Finally, eliminate the legacy module.

Step 8: 

Keep repeating steps 1-4 until the entire functionality is handled by the new stack.

Note: 

The legacy and new functionality/module/application need to run in parallel; eliminate the legacy app ONLY after testing is complete.

As monolithic systems become too large to deal with, many enterprises are drawn to breaking them down into microservices, certainly a worthwhile journey. At CloudNow we’ve learned to deploy this migration process seamlessly. So, if you are looking for assistance in this direction, do contact us.

Previous Post

Why you need to future proof your enterprise with hybrid cloud computing

Next Post

I know what a Tax Audit is, but a tech audit?! Don’t panic… just read

SatyaDev Addeppally

SatyaDev Addeppally

Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning & managing multifaceted projects & complex dependencies; chronicled success with 22 years of extensive experience including international experience.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Next Post
I know what a Tax Audit is, but a tech audit?! Don’t panic… just read

I know what a Tax Audit is, but a tech audit?! Don’t panic… just read

The next big disruptive event could be around the corner. Is your cloud-based business continuity plan in place?

The next big disruptive event could be around the corner. Is your cloud-based business continuity plan in place?

You can reduce your technical debt with application modernization. But is it easy?

You can reduce your technical debt with application modernization. But is it easy?

Related Posts

Service Mesh: The best way to Encrypt East-West traffic in Kubernetes

Service Mesh: The best way to Encrypt East-West traffic in Kubernetes

by Abdul Rahman
3 years ago
Reading Time: 3 minutes

With their ability to simplify application processes and speed up development cycles, scale up efficiently, and provide enterprises with customizable software, organizations are increasingly migrating to...

How does a No-Code App Builder help enterprises?

How does a No-Code App Builder help enterprises?

by Baskar RV
3 years ago
Reading Time: 2 minutes

If you’re developing a minor application for internal use, or bootstrapping your small outward-facing app, chances are that the costs and timelines quoted by full-stack developers...

Kubernetes 101: Introduction, Glossary, and Benefits

Kubernetes 101: Introduction, Glossary, and Benefits

by Sridhar T
3 years ago
Reading Time: 3 minutes

With the widespread use of containerization, Kubernetes, an open-source container-centric management software, has seen a surge in popularity. Originally developed at Google and released as an...

What is a Service Mesh, and why do you need one?

What is a Service Mesh, and why do you need one?

by SatyaDev Addeppally
3 years ago
Reading Time: 3 minutes

Imagine a situation where you have to test a new version of your application in a microservices architecture, using canary deployment, or where you have to...

What is the difference between LMSs in a B2B and B2C context?

What is the difference between LMSs in a B2B and B2C context?

by Hareesh M
3 years ago
Reading Time: 3 minutes

With the pandemic pushing people and students to work and learn from home, the global learning management system (LMS) market size has seen tremendous growth. In...

Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the
latest news and updates from our team.

Polls

Thanks for reading.
On which of the following topics would you like to see more content from CloudNow in the future?

View Results

Loading ... Loading ...
  • Polls Archive

Recommended Post

Think Cloud; Think Google Cloud Platform
Cloud

Think Cloud; Think Google Cloud Platform

6 years ago
Mastering Cloud Cost Optimization: How Managed Services Unlock Efficiency and Savings
Others

Mastering Cloud Cost Optimization: How Managed Services Unlock Efficiency and Savings

2 years ago
6 Best Practices to Secure CI/CD Pipelines Without Slowing Down Development
Agile & DevOps

6 Best Practices to Secure CI/CD Pipelines Without Slowing Down Development

3 months ago
Google Workspace

Don’t Settle! 7 value-adds you should expect from top Google Workspace Partners in India

12 months ago

Solutions

  • Cloud Advisory
  • Migration & Deployment
  • Application Development & Modernization
  • DevOps
  • Testing as a Service
  • Managed Services
  • Data & Analytics
  • API Ecosystem
  • User Lifecycle Management

Industries

  • Financial Services Industry
  • Retail Industry
  • Healthcare Industry
  • Manufacturing Industry

Resources

  • Banking
  • Capital Markets
  • High Growth
  • Blogs

Company

  • Our Story
  • Why CloudNow
  • Partners
  • Careers
  • Contact Us

Contact

  • USA : +1 803 746 7178
  • IND : 044-24619130
  • info@cloudnowtech.com

© 2023 CloudNowTech

  • About
  • Privacy Policy
  • Contact
No Result
View All Result
  • All Blogs
  • Application Development & Modernization
  • Agile & DevOps
  • Cloud
  • Digital Transformation
  • Data & Analytics
  • Quality Assurance

© 2023 CloudNowTech

Subscribe To Our Newsletter

Join our mailing list to receive the
latest news and updates from our team.

Thank You

Thank you for reaching out. We have received your inquiry.
One of our team members will get in touch with you shortly.

Contact Us
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?