{"id":3428,"date":"2022-05-31T10:52:35","date_gmt":"2022-05-31T05:22:35","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=3428"},"modified":"2022-05-31T10:58:43","modified_gmt":"2022-05-31T05:28:43","slug":"what-is-service-mesh-why-you-need-one","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/","title":{"rendered":"What is a Service Mesh, and why do you need one?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Imagine a situation where you have to test a new version of your application in a microservices architecture, using <\/span><a href=\"https:\/\/stackify.com\/canary-deployments\/\"><span style=\"font-weight: 400;\">canary deployment<\/span><\/a><span style=\"font-weight: 400;\">, or where you have to secure traffic between two services or have to set up a failover strategy in case one of the services is unresponsive. In these circumstances, the traditional network layer of most container orchestration engines is woefully unequipped. Wherever the network layer of these engines has to be augmented, tools such as Service Meshes come into the picture.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What is a service mesh?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/en.m.wikipedia.org\/wiki\/Service_mesh\"><span style=\"font-weight: 400;\">service mesh<\/span><\/a><span style=\"font-weight: 400;\"> is a \u201cdedicated infrastructure layer for facilitating service-to-service communications between <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Service-oriented_architecture\"><span style=\"font-weight: 400;\">services<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Microservices\"><span style=\"font-weight: 400;\">microservices<\/span><\/a><span style=\"font-weight: 400;\">, using a <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Proxy_pattern\"><span style=\"font-weight: 400;\">proxy<\/span><\/a><span style=\"font-weight: 400;\">.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let us look more closely at this definition to understand it better.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cA service mesh is a dedicated infrastructure layer\u2026\u201d &#8211; A service mesh is dedicated, which means that unlike built-in network layers which only support core orchestration functionality with basic features, its main purpose is selective and focused. What is its purpose?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201c\u2026for facilitating service-to-service communications between services or microservices\u201d. This is fairly self explanatory. But how does it do this?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201c\u2026using a proxy.\u201d A proxy is an entity that handles a specific task on behalf of another. In our case, it refers to the data plane of the service that proxies call to and from the service itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having understood what a service mesh is, let\u2019s delve more deeply into why we need it.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Why do we need it?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">From the previous section, we understand that service mesh is an infrastructure layer that primarily caters to the microservice architecture pattern, though it is not restricted to that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the most common problems faced in microservice networks are:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It\u2019s difficult to manage the vast number of microservices, their versions and so on, in and across environments.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The complicated and large networks provide a larger attack vector for cybersecurity threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There is a lack of fine-grained control over inter-service networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It\u2019s challenging to manage complicated firewall rules and port mappings.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">As more people adopt microservices, the above problems are only compounded. This is where the service mesh steps in, to solve these problems.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Features of a service mesh<\/span><\/h3>\n<ol>\n<li><b> Service discovery<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Using a container management framework, service discovery maintains a list of instances that are ready to be discovered by other services. This helps create and maintain a topological map of the network in real-time. Enabling segregation of services into categories leads to better organization and management. Other important features related to service discovery include health checks, load balancing and failover implementation. By keeping track of healthy instances and recording the unhealthy ones, we can configure service meshes to re-route requests to healthy instances of the same application.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Zero Trust Security Model<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">With growing adoption of tools such as Kubernetes, Nomad and others, manual configuration of networks is no longer possible. This complexity is increased especially in Kubernetes and public cloud infrastructure, where IP addresses and DNS names change unpredictably. Service mesh allows for the encryption of communication between services using mTLS and also the verification of identity. The service mesh components use proxies to control communication between local service instances and other services in the network. They also ensure that the TLS connections are verified and encrypted.<\/span><\/p>\n<ol start=\"3\">\n<li><b> Fine-grained network control<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Proxies attached to services allow us to control traffic and enforce security, but they also allow us to define policies that allow more control over which service is allowed to communicate to whom. This can be done through a simple allow\/deny policy. This simplifies the problem mentioned above, regarding complex firewall rules and IP address management.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Comparison between some popular service meshes in the market<\/span><\/h3>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><b>Istio<\/b><\/td>\n<td><b>LinkerD<\/b><\/td>\n<td><b>Consul<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Supported workloads<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Kubernetes and VMs<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Kubernetes only<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Kubernetes and VMs<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Single point of failure<\/b><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No, but managing the High Availability version is complex<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Sidecar proxy<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Per node agent<\/b><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>mTLS<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Certificate management<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Authentication and Authorization<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Communication protocols supported<\/b><\/td>\n<td><span style=\"font-weight: 400;\">HTTP\/1.x, HTTP\/2, gRPC, TCP\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">HTTP\/1.x, HTTP\/2, gRPC, TCP\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">HTTP\/1.x, HTTP\/2, gRPC, TCP\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Blue Green Deployments (Canary deployments)<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Circuit breaking<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Rate Limiting<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Fault injection<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Monitoring<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Prometheus<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Prometheus<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Prometheus<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Multi cluster<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Complexity<\/b><\/td>\n<td><span style=\"font-weight: 400;\">High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Low<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Medium<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i><span style=\"font-weight: 400;\">When you\u2019re working with microservices architecture and technologies like Kubernetes, it\u2019s important to use all the tools at your disposal to <a href=\"https:\/\/www.cloudnowtech.com\/application-development-services.html\">simplify the process<\/a>. A service mesh is an important part of this process.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a situation where you have to test a new version of your application in a microservices architecture, using canary deployment, or where you have to secure traffic between two services or have to set up a failover strategy in case one of the services is unresponsive. In these circumstances, the traditional network layer of [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[277,51],"tags":[195,342],"class_list":["post-3428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-development-modernization","category-microservices","tag-kubernetes","tag-service-mesh"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Service Mesh, and why do you need one? - Discover Better Value Faster<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Service Mesh, and why do you need one? - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"Imagine a situation where you have to test a new version of your application in a microservices architecture, using canary deployment, or where you have to secure traffic between two services or have to set up a failover strategy in case one of the services is unresponsive. In these circumstances, the traditional network layer of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-31T05:22:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-31T05:28:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760,\"caption\":\"What is a Service Mesh, and why do you need one?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/\",\"name\":\"What is a Service Mesh, and why do you need one? - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#primaryimage\"},\"datePublished\":\"2022-05-31T05:22:35+00:00\",\"dateModified\":\"2022-05-31T05:28:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Service Mesh, and why do you need one?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Service Mesh, and why do you need one? - Discover Better Value Faster","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/","og_locale":"en_US","og_type":"article","og_title":"What is a Service Mesh, and why do you need one? - Discover Better Value Faster","og_description":"Imagine a situation where you have to test a new version of your application in a microservices architecture, using canary deployment, or where you have to secure traffic between two services or have to set up a failover strategy in case one of the services is unresponsive. In these circumstances, the traditional network layer of [&hellip;]","og_url":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/","og_site_name":"Discover Better Value Faster","article_published_time":"2022-05-31T05:22:35+00:00","article_modified_time":"2022-05-31T05:28:43+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1","width":1140,"height":760,"caption":"What is a Service Mesh, and why do you need one?"},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/","name":"What is a Service Mesh, and why do you need one? - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#primaryimage"},"datePublished":"2022-05-31T05:22:35+00:00","dateModified":"2022-05-31T05:28:43+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/what-is-service-mesh-why-you-need-one\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Service Mesh, and why do you need one?"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2022\/05\/Blog-103.png?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=3428"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3428\/revisions"}],"predecessor-version":[{"id":3432,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3428\/revisions\/3432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/3429"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=3428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=3428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=3428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}