How to assess your architectural maturity for Cloud Native 2.0
The concept of cloud native was proposed in 2015 and has been popularized since then. The cloud native maturity varies with enterprises, which have different requirements and priorities during digital transformation. In the Cloud Native 2.0 age, more categories are available for assessing the cloud native maturity of enterprises. To preliminarily assess its cloud native maturity, Huawei Cloud adopts eight categories: service-orientation, scalability, serverless maturity, observability, security & trustworthiness, resilience, automation, and cloud-edge collaboration. Other organizations can also adopt the cloud native maturity assessment model of Huawei Cloud to assess their software systems and smoothen their cloud native journeys.
Cloud native maturity assessment model for enterprises
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
Category
HCNAM-L1(1 point)
HCNAM-L2(2 points)
HCNAM-L3(3 points)
HCNAM-L4(4 points)
HCNAM-L5(5 points)
Service-orientation
None (only monolithic applications)
Partially service-oriented
Cross-service data sharing
Fully service-oriented
Without a governance system
Fully service-oriented
With an embedded microservice governance platform
Fully service-oriented and grid-based services
Scalability
Manual scaling
(months/weeks)
Resource monitoring+manual scaling
(days)
Resource monitoring+Code implementation for VM-based automatic scaling (minutes)
Resource & Application monitoring+Code implementation for VM-based automatic scaling (minutes)
Resource & Application monitoring+Code implementation for container-based automatic scaling (seconds)
Serverless maturity
The application logic, underlying middleware, and databases use process resources and adopt the physical multi-tenant model.
Event-driven stateless computing
Databases, middleware, and file systems provide logical multi-tenant services.
Stateful services such as databases and big data are deployed in the serverless mode.
Stateful middleware/databases and stateless applications are deployed in the serverless mode from end to end.
Observability
None
Basic monitoring, alarm reporting, and log monitoring
E2E tracing, performance indicator reporting, and fault root cause locating at L2
Multi-dimensional analysis of O&M monitoring logs at L3 for minute-level data event monitoring
Data event monitoring within seconds and real-time monitoring for data insight
Security & Trustworthiness
Firewall+Traditional third-party security components
Software-based security and network functions, distributed and scalable architectures, and multi-tenant IAM
Tenant-level data security encryption and decryption, private data anonymization, and role-based access control (RBAC) of tenant resource groups
Security threat and situation awareness, automatic risk response, and instance-level fine-grained attribute-based access control (ABAC) of tenant resources
Secure multi-party computing based on zero trust, automated industry compliance assessment, and federated learning to integrate security features into the DevOps pipeline throughout the lifecycle
Resilience
No redundancy, traffic control, or DR
Local active/standby deployment, load balancing, HA redundancy
(RTO: 10 minutes)
Basic traffic control
Cross-region active/standby or all-active DR (50–100 km)
Enhanced traffic control (The peak traffic is 10 times the maximum traffic that can be handled.)
Local active/standby or all-active DR, cross-region cold standby DR (100–1000 km)
Scaling is performed first and then traffic control and backpressure are triggered. Circuit breaker, traffic control, and backpressure control are supported for microservices.
Serverless service distribution around the world without awareness of traffic switching
After the DR and traffic control fail, the system can be downgraded to ensure that the minimum function set can be continuously provided and that an escape mechanism is available.
Automation
None
A single-layer platform or service software product supports file-based semi-automatic CI/CD installation.
Container-based automatic CI/CD pipeline for each cloud service/microservice
Full-stack service applications based on final state and process-driven DSL automation, and automated provisioning of common services and cloud services on which the applications depend
AI-enabled optimization of system running parameters and fully automated fixing
Cloud-edge collaboration
None
The cloud resource pool is deployed at the site of the distributed CDN, and 10+ cloud services are deployed at the edge.
The cloud resource pool is deployed at the on-premise data center of the customer, and 40% of cloud services are deployed at the edge.
Cloud K8s containers use KubeEdge to remotely deploy containers on edge nodes and support certificate release and management at the edge.
Cross-cloud and cloud-edge collaboration and event-driven serverless development and orchestration
Intelligent routing of cloud service traffic worldwide
1) Service-orientation
Services/Microservices are the minimum running unit of service applications. Monolithic applications are decoupled and split as required by service functions and iteration periods. Multiple services/microservices are integrated and orchestrated as standard APIs. Services are integrated in event-driven mode to minimize interdependency. The SLA of services/microservices is constantly improved through measurable construction.
2) Scalability
Services/Microservices need to support the scale-in or out of resource load instances to dynamically adapt to service peak changes.
3) Observability
To prevent service interruption, any software or hardware error in the enterprise IT infrastructure and service applications must be quickly rectified. To this end, services and microservices must be comprehensively observable, including traditional logging, monitoring, alarm/event reporting, microservice-oriented E2E tracing, and service QoS/SLA measurement.
4) Resilience
Service applications should leverage the capabilities of microservice architectures to develop common features such as circuit breaker, traffic control, service degradation, automatic retry, and backpressure. In addition, high-availability DR and asynchronous features need to be developed for better reliability and robustness.
5) Security & Trustworthiness
Enterprises should use cloud security services to harden the security of applications, data, networks, and platforms during digital transformation. In addition, security and trustworthiness management should be implemented throughout the DevSecOps lifecycle, including the key milestones, so that enterprise applications can comply with national, regional, and industry cloud security standards, such as ISO27001, Payment Card Industry Data Security Standard (PCI DSS), and Classified Protection.
6) Automation
While large-granularity monolithic applications of an enterprise are decoupled and split into small-granularity services/microservices, their full-lifecycle management, including development, construction, test, deployment, upgrade, and scaling, should also be automated. Otherwise, the IT system may be complex and suffer from inefficient O&M. To address this challenge, service/microservice software that used to be installed using PM or VM packages is now encapsulated in containers. In addition, the Infrastructure as Code (IaC) for automatic orchestration and DSL cloud service orchestration and deployment scripts that are compatible with mainstream frameworks (Tosca/Terraform and CNCF OAM) are used. Automated CI/CD pipelines and O&M tools, such as GitHub and Jenkins, help streamline information breakpoints and process breakpoints between automatic O&M tools and cloud services at each layer. All these features help automate the entire process, including the input of original service requirements, development, deployment, verification, and roll-out of functions, and subsequent modification and change.
7) Cloud-edge collaboration
In addition to the conventional Internet services, emerging services such as low-latency interactive video livestreaming and AR/VR gaming are also being migrated to the cloud. As more industries accelerate their digital transformation, devices at industrial IoT production sites and IoT terminals in smart cities need to access cloud services at a lower latency. Generally, the latency should be less than 5 ms for industrial IoT, and less than 20 ms for AR/VR gaming. To shorten the latency of accessing cloud services, cloud applications must be deployed near data generating devices.
Data generated by tens of billions of connected IoT terminals around the world amounts to 50 trillion GB. Uploading such massive amounts of data to the cloud is costly. Before data is uploaded to the cloud, the data needs to be analyzed and filtered on the nearby edge node, and then the pre-processed data is uploaded to the cloud for less bandwidth consumption. The data processing and filtering of enterprises that require high security of their core or confidential businesses may be completed in on-premises data centers. This prevents the leakage of sensitive data and personal private information.
Cloud-edge collaboration requires that edge nodes be permanently connected to the cloud so that the cloud can manage the node operating. However, when edge nodes are disconnected from the cloud, they still need to control the Internet and terminals for a period of time, and should be capable of offline processing and self-recovery.
8) Serverless maturity
More cloud services instead of third-party services are used. This is crucial when an enterprise independently performs O&M on open source software. Application design should be based on the stateless mode and the stateful part is saved in cloud services. FaaS, containerized, and serverless cloud services should play a significant role in the organization.
Score and rate the cloud native maturity of an enterprise from the preceding eight categories.
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
Cloud native architecture maturity
Level 1 Entry-level
Level 2 Basic
Level 3 Standard
Level 4 Developing
Level 5 Mature
Score of each level
≤3
4–12
13–28
29–37
38-40