Blog
Subscribe to our blog
Envoy CVE security fixes for GetEnvoy
The Envoy security team today [announced] the availability of Envoy 1.9.1 to address two high-risk vulnerabilities related to header values and HTTP URL paths. We also released the GetEnvoy build of Envoy 1.9.1 and…
Read More arrow_forwardMulti-Cluster PKI + Istio Recipe: Practical Example for a Trusted and Scalable PKI for Your Service Mesh
Authors: Cristofer TenEyck Senior Solution Engineer a Keyfactor and Jimmy Song Developer Advocate at Tetrate Introduction In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is…
Read More arrow_forwardMany apps in one Kubernetes Cluster? Consider a dedicated Gateway per app
Managing ingress traffic configurations in Kubernetes can be challenging, especially when each application has different requirements. If you’re using a single shared Gateway across all your namespaces, you may be…
Read More arrow_forwardLean but full of features: Leverage a Shared Gateway for Your Kubernetes Cluster
Are you struggling to manage all ingress traffic configurations for your Kubernetes cluster? If you still use Kubernetes ingress, you are missing out on flexibility and features. With a Kubernetes…
Read More arrow_forwardUnlock the Power of Edge Platform Clusters for Your Cloud Architecture
This blog post is the first in a series of how to leverage Envoy Gateway in cloud architecture. Subscribe to our blog to stay up to date. Have you heard…
Read More arrow_forwardWhich Data Plane Should I Use—Sidecar, Ambient, Cilium, or gRPC?
Four Main Service Mesh Deployment Models This article provides a comprehensive analysis of the four primary service mesh data plane deployment models: Sidecar, Ambient, Cilium mesh, and gRPC. We explore…
Read More arrow_forwardIstio Configuration Security: How to Avoid Misconfigurations
Istio is a powerful service mesh solution that provides Zero Trust security, observability, and advanced traffic management without requiring code modifications. However, misconfigurations often lead to unexpected behavior. This article…
Read More arrow_forwardKubeCon China 2024 Recap: The Frontiers of Cloud Native Technology
This year’s KubeCon China marked its first-ever occurrence in Hong Kong, spanning three days. As a participant and a panel moderator, I will share in this article the highlights of…
Read More arrow_forwardCan Rate Limiting Help Control Compute Costs?
It’s an exhilarating feeling. Your application or platform is really popular, and the traffic is pouring in. Then reality hits as you see the cloud computing bill. Your services have…
Read More arrow_forward