Challenge
Like most companies, 100% of their current stack is existing code. That sounds obvious, but the reality is they already have a deep stack of functioning code and released products running on more than 100 core services. This makes addressing new challenges, requirements, or regulations a risky and time-consuming process. They wanted to easily add new functionality, new security features, and the ability to experiment with new tools without throwing out the code base and starting from scratch. This means that they needed to determine a non-intrusive way to add these new features without compromising the status quo or disrupting the company’s momentum.
Solution
Vonage decided the best solution is to utilize a sidecar pattern that can work across all solutions regardless of programming language, deployment pattern, or technical capabilities. This meant they needed to investigate how quickly this solution would be implemented, how it would handle different aspects of the lifecycle, and finally, how robust and extensible it would be.
Dapr proved to be a phenomenal fit for both new systems and existing stacks; whether its written in Java, Dotnet, Golang or Javascript and running on metal, VMs, Nomad or Kubernetes they were able to standardize tracing, AuthNZ and resilient service-to-service communication. Vonage brought legacy systems with unique authentication mechanisms to more modern and secure patterns using OIDC without needing to rewrite the entire stack. They're able to intercept the calls, manage the authentication and authorization, and then translate the call to the legacy requirement, all using modern, audited, and declarative mechanisms.
Vonage are continually adding more features to all our stacks and solutions by utilizing the power of Dapr’s implementation and architecture.
Impact
Vonage can now quickly secure and modernize stacks and respond to regulatory and compliance requirements. They're also able to extend COTS products to our standards and requirements allowing them to use the latest and greatest tools without sacrificing any security or controls.
View the full case study on the CNCF website