You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@apisix.apache.org by GitBox <gi...@apache.org> on 2021/11/03 05:43:22 UTC

[GitHub] [apisix-website] yzeng25 commented on a change in pull request #702: docs: add Airwallex usercase

yzeng25 commented on a change in pull request #702:
URL: https://github.com/apache/apisix-website/pull/702#discussion_r741630683



##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)

Review comment:
       ```suggestion
   ![Airwallex Business Process](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)

Review comment:
       
   ```suggestion
   ![Airwallex Business](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
+
+The data flow of multinational corporations is reflected in a variety of interactions between different regions. In the absence of data sovereignty claims, the data can be stored in Europe and then Synchronize to any data center in Asia or the world. When you make a subsequent data service request, you only need to encapsulate the business into a service.
+
+But in the current era of emphasis on data sovereignty, the above approach will not work. Because the flow of a lot of data is beginning to be controlled, the previous architecture cannot be used. Domestic data can only be processed locally, not transnational requests. So when we store user data in the user's home scope that is, the "closed alone" architecture in the following figure), problems begin to emerge.
+
+![单独部署](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)
+
+First of all, it is impossible to make the service completely stateless in this case, and most of the scenarios are not that simple in real business. Because the completion of the business, it is bound to involve the interaction between multiple clusters.
+
+![多集群交互](https://static.apiseven.com/202108/1635907812257-962b1247-f5ca-448f-904d-fd47c3ea4586.png)
+
+Therefore, in the aspect of data storage, the first problem to be solved is the region / region identification configuration at the data entrance. Just like Amazon, e-books purchased in the United States cannot be downloaded to their own Kindle using their national accounts. Because the data between countries (regions) is completely isolated. As long as users click on Amazon China, it means that all your requests will not step out of the Chinese data center.
+
+Amazon's mode of operation actually allows users to decide where to store their personal data, but the resulting problem is that in the case of single-person and multi-regional accounts, it is very inconvenient for individual users to manage and Synchronize.
+
+Therefore, for business processing in multi-regions and multi-scenarios, we should also need a "sharp weapon" to dynamically allocate and determine the direction of the follow-up data.
+
+## Building Apache APISIX Intelligent routing Gateway
+
+Therefore, based on the above business scenarios, we decided to adopt the "intelligent routing" mode, through the gateway to determine the foothold and direction of different types of data requests.
+
+![智能路由模式](https://static.apiseven.com/202108/1635907812259-59637175-4beb-4e1e-a813-bb7c40a5acf9.png)
+
+The above figure is the architecture diagram in "intelligent routing" mode. The gateway is mainly divided into two layers, the first layer is responsible for routing requests, according to the conditions to determine which data center the request should reach, and the second layer gateway is for traffic forwarding. Therefore, the main problem solved by the gateway in this mode is to assign a "destination" to each request, and then carry out subsequent traffic forwarding and business processing.
+
+Currently, in our business scenarios, traffic information is mainly divided into two categories:
+
+Unidentified request:
+
+- Registration: the information is incomplete when a user registers for the first time, and he / she does not know which data center the user's registration data is in.
+- static resources: for example, HTML, CSS, etc., you do not need to know the identity of the user.
+
+Known identity request:
+
+- Login: the user logs in, indicating that the registration process has been completed, and the location of the data center is known at this time.
+- password reset: you can check where the data is through user name, mobile phone number, mailbox, city and other information, and then distribute subsequent requests
+- Business operations in complex scenarios
+
+In the deployment at the gateway level, we use [Apache APISIX](https://github.com/apache/apisix). Next, we will briefly introduce how to deal with dynamic, multi-data center routing scenarios based on Apache APISIX's API gateway.
+
+### Scenario 1: login and password reset
+
+We can get the user name and password when the user logs in, but the password cannot be used as identification information, and it is not allowed to be passed casually. Therefore, it can only be queried according to the user name to determine which region the user belongs to. Business is the need to design a global Synchronize data storage.
+
+![登陆模式](https://static.apiseven.com/202108/1635907812260-69fbda9e-56cc-443d-8ea7-a1f10dba041e.png)

Review comment:
       ```suggestion
   ![Log-in Mode](https://static.apiseven.com/202108/1635907812260-69fbda9e-56cc-443d-8ea7-a1f10dba041e.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
+
+The data flow of multinational corporations is reflected in a variety of interactions between different regions. In the absence of data sovereignty claims, the data can be stored in Europe and then Synchronize to any data center in Asia or the world. When you make a subsequent data service request, you only need to encapsulate the business into a service.
+
+But in the current era of emphasis on data sovereignty, the above approach will not work. Because the flow of a lot of data is beginning to be controlled, the previous architecture cannot be used. Domestic data can only be processed locally, not transnational requests. So when we store user data in the user's home scope that is, the "closed alone" architecture in the following figure), problems begin to emerge.
+
+![单独部署](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)
+
+First of all, it is impossible to make the service completely stateless in this case, and most of the scenarios are not that simple in real business. Because the completion of the business, it is bound to involve the interaction between multiple clusters.
+
+![多集群交互](https://static.apiseven.com/202108/1635907812257-962b1247-f5ca-448f-904d-fd47c3ea4586.png)

Review comment:
       ```suggestion
   ![Multi-cluster Interaction](https://static.apiseven.com/202108/1635907812257-962b1247-f5ca-448f-904d-fd47c3ea4586.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
+
+The data flow of multinational corporations is reflected in a variety of interactions between different regions. In the absence of data sovereignty claims, the data can be stored in Europe and then Synchronize to any data center in Asia or the world. When you make a subsequent data service request, you only need to encapsulate the business into a service.
+
+But in the current era of emphasis on data sovereignty, the above approach will not work. Because the flow of a lot of data is beginning to be controlled, the previous architecture cannot be used. Domestic data can only be processed locally, not transnational requests. So when we store user data in the user's home scope that is, the "closed alone" architecture in the following figure), problems begin to emerge.
+
+![单独部署](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)

Review comment:
       ```suggestion
   ![Single Deployment](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.

Review comment:
       ```suggestion
   description: This article will bring you about how Airwallex uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
+
+The data flow of multinational corporations is reflected in a variety of interactions between different regions. In the absence of data sovereignty claims, the data can be stored in Europe and then Synchronize to any data center in Asia or the world. When you make a subsequent data service request, you only need to encapsulate the business into a service.
+
+But in the current era of emphasis on data sovereignty, the above approach will not work. Because the flow of a lot of data is beginning to be controlled, the previous architecture cannot be used. Domestic data can only be processed locally, not transnational requests. So when we store user data in the user's home scope that is, the "closed alone" architecture in the following figure), problems begin to emerge.
+
+![单独部署](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)
+
+First of all, it is impossible to make the service completely stateless in this case, and most of the scenarios are not that simple in real business. Because the completion of the business, it is bound to involve the interaction between multiple clusters.
+
+![多集群交互](https://static.apiseven.com/202108/1635907812257-962b1247-f5ca-448f-904d-fd47c3ea4586.png)
+
+Therefore, in the aspect of data storage, the first problem to be solved is the region / region identification configuration at the data entrance. Just like Amazon, e-books purchased in the United States cannot be downloaded to their own Kindle using their national accounts. Because the data between countries (regions) is completely isolated. As long as users click on Amazon China, it means that all your requests will not step out of the Chinese data center.
+
+Amazon's mode of operation actually allows users to decide where to store their personal data, but the resulting problem is that in the case of single-person and multi-regional accounts, it is very inconvenient for individual users to manage and Synchronize.
+
+Therefore, for business processing in multi-regions and multi-scenarios, we should also need a "sharp weapon" to dynamically allocate and determine the direction of the follow-up data.
+
+## Building Apache APISIX Intelligent routing Gateway
+
+Therefore, based on the above business scenarios, we decided to adopt the "intelligent routing" mode, through the gateway to determine the foothold and direction of different types of data requests.
+
+![智能路由模式](https://static.apiseven.com/202108/1635907812259-59637175-4beb-4e1e-a813-bb7c40a5acf9.png)

Review comment:
       ```suggestion
   ![Smart Routing Mode](https://static.apiseven.com/202108/1635907812259-59637175-4beb-4e1e-a813-bb7c40a5acf9.png)
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.

Review comment:
       ```suggestion
   > This article will bring you about how Airwallex uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
   ```

##########
File path: website/blog/2021/11/03/airwallex-usercase.md
##########
@@ -0,0 +1,125 @@
+---
+title: "How Apache APISIX protects Airwallex data sovereignty through the gateway layer"
+author: "Yang Li"
+keywords: 
+- Apache APISIX
+- Airwallex
+- Data Sovereignty
+- Data
+description: This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+tags: [User Case]
+---
+
+> This article will bring you about how Airwallex air cloud sink uses Apache APISIX for gateway layer deployment to strengthen the construction of data sovereignty.
+
+<!--truncate-->
+
+## Why deal with data sovereignty?
+
+[Airwallex](https://www.airwallex.com) is a global financial technology company that helps global users with payment services and cross-border payment scenarios. A global financial infrastructure platform has been built, and the payment network has covered more than 50 currencies in more than 130 countries and regions around the world, providing enterprises with digital financial technology products.
+
+![空中云汇业务](https://static.apiseven.com/202108/1635907812263-929d9f89-2bee-403e-9641-2e18b077e1b3.png)
+
+Under the demand of global service content, the risk of data sovereignty must be considered in the conduct of the company's business.
+
+### What is data sovereignty?
+
+Data sovereignty refers to the national sovereignty in cyberspace, which reflects the status of the state as the subject of controlling data rights. Before describing the importance of data sovereignty, let's give a few examples.
+
+GDPR (General Data Protection Regulation) is a regulatory document formulated by the European Union, which is aimed at the privacy and protection of personal data. One of the most basic requirements in GDPR is that all user data collection activities need to be approved by the user, while ensuring that the user can clear personal data on their own.
+
+Therefore, if the Airwallex sink wants to transfer European data to other regions, it must ensure that the requirements of third-party countries on data sovereignty meet the requirements of the European Union on data sovereignty.
+With regard to the need for data to comply with local laws, there are indeed a lot of concerns in multinational operations.
+
+For example, the American Patriot Act requires all data stored in the United States, or data stored by American companies, to be regulated in the United States, and the US Department of Justice and CIA can require companies to provide data.
+
+After 9 / 11, 2013, the Justice Department asked Microsoft to provide some of the email information it stored on its servers in Ireland, when Microsoft rejected the request on the grounds that it would violate EU regulatory requirements. Then the U.S. Department of Justice took Microsoft to court, but Microsoft won in the end. Later, in order to avoid the risk of the opposite of data sovereignty, many American companies put their data centers directly to Europe, thinking that it would be safe. But in some recent cases, judges have ruled that the United States still has the authority to ask for data from American companies in Europe.
+
+Judging from the above events, data sovereignty has indeed brought great challenges to Airwallex's global business, and how to properly handle the issue of data sovereignty in the business has become particularly important.
+
+### Current situation of transnational business data transmission
+
+Because the business involves transnational attributes, some problems will be encountered in the technical processing.
+
+![业务流程](https://static.apiseven.com/202108/1635907812252-3d427136-b986-4ac5-a853-d9bbbb4439d3.png)
+
+The data flow of multinational corporations is reflected in a variety of interactions between different regions. In the absence of data sovereignty claims, the data can be stored in Europe and then Synchronize to any data center in Asia or the world. When you make a subsequent data service request, you only need to encapsulate the business into a service.
+
+But in the current era of emphasis on data sovereignty, the above approach will not work. Because the flow of a lot of data is beginning to be controlled, the previous architecture cannot be used. Domestic data can only be processed locally, not transnational requests. So when we store user data in the user's home scope that is, the "closed alone" architecture in the following figure), problems begin to emerge.
+
+![单独部署](https://static.apiseven.com/202108/1635907812255-73d11508-d9ec-4ac6-b0a0-5913a1acb2c8.png)
+
+First of all, it is impossible to make the service completely stateless in this case, and most of the scenarios are not that simple in real business. Because the completion of the business, it is bound to involve the interaction between multiple clusters.
+
+![多集群交互](https://static.apiseven.com/202108/1635907812257-962b1247-f5ca-448f-904d-fd47c3ea4586.png)
+
+Therefore, in the aspect of data storage, the first problem to be solved is the region / region identification configuration at the data entrance. Just like Amazon, e-books purchased in the United States cannot be downloaded to their own Kindle using their national accounts. Because the data between countries (regions) is completely isolated. As long as users click on Amazon China, it means that all your requests will not step out of the Chinese data center.
+
+Amazon's mode of operation actually allows users to decide where to store their personal data, but the resulting problem is that in the case of single-person and multi-regional accounts, it is very inconvenient for individual users to manage and Synchronize.
+
+Therefore, for business processing in multi-regions and multi-scenarios, we should also need a "sharp weapon" to dynamically allocate and determine the direction of the follow-up data.
+
+## Building Apache APISIX Intelligent routing Gateway
+
+Therefore, based on the above business scenarios, we decided to adopt the "intelligent routing" mode, through the gateway to determine the foothold and direction of different types of data requests.
+
+![智能路由模式](https://static.apiseven.com/202108/1635907812259-59637175-4beb-4e1e-a813-bb7c40a5acf9.png)
+
+The above figure is the architecture diagram in "intelligent routing" mode. The gateway is mainly divided into two layers, the first layer is responsible for routing requests, according to the conditions to determine which data center the request should reach, and the second layer gateway is for traffic forwarding. Therefore, the main problem solved by the gateway in this mode is to assign a "destination" to each request, and then carry out subsequent traffic forwarding and business processing.
+
+Currently, in our business scenarios, traffic information is mainly divided into two categories:
+
+Unidentified request:
+
+- Registration: the information is incomplete when a user registers for the first time, and he / she does not know which data center the user's registration data is in.
+- static resources: for example, HTML, CSS, etc., you do not need to know the identity of the user.
+
+Known identity request:
+
+- Login: the user logs in, indicating that the registration process has been completed, and the location of the data center is known at this time.
+- password reset: you can check where the data is through user name, mobile phone number, mailbox, city and other information, and then distribute subsequent requests
+- Business operations in complex scenarios
+
+In the deployment at the gateway level, we use [Apache APISIX](https://github.com/apache/apisix). Next, we will briefly introduce how to deal with dynamic, multi-data center routing scenarios based on Apache APISIX's API gateway.
+
+### Scenario 1: login and password reset
+
+We can get the user name and password when the user logs in, but the password cannot be used as identification information, and it is not allowed to be passed casually. Therefore, it can only be queried according to the user name to determine which region the user belongs to. Business is the need to design a global Synchronize data storage.
+
+![登陆模式](https://static.apiseven.com/202108/1635907812260-69fbda9e-56cc-443d-8ea7-a1f10dba041e.png)
+
+In this case, we have carried out the data storage architecture shown above, which can ensure the globalization of data Synchronize. For example, when a user registers an account in China, we convert the relevant data into Kafka message, through CDC (Change Data Capture) and receive local messages through a special listener, and then make further conversion. For example: excluding user name, Email and other personal information, these information can not be stored across borders.
+
+In the process of converting (Transformer), salt or hash encryption can be carried out, and finally, the relevant business requests can be processed at the gateway layer, that is, data area allocation and subsequent traffic forwarding. Realize the business processing based on the Apache APISIX gateway level.
+
+### Scenario 2: business operations in complex scenarios
+
+The business operation is that when I manipulate a piece of data, how should I decide where the data is going to be executed. Conventional business operations, such as a user querying his own account information or history, are generally divided into two modes.
+
+![业务操作模式](https://static.apiseven.com/202108/1635907812247-123eca67-5039-487c-9d02-f3881e16c411.png)

Review comment:
       ```suggestion
   ![Business Operation Mode](https://static.apiseven.com/202108/1635907812247-123eca67-5039-487c-9d02-f3881e16c411.png)
   ```




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@apisix.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org