Announcing Tetrate Agent Operations Director for GenAI Runtime Visibility and Governance

Learn more

Choosing the Right Istio Architecture: A Data-Driven Guide to Ambient, Sidecar, and Hybrid Deployment Models

Ambient, a new feature of Istio, introduces a sidecarless approach to traffic and security management in Kubernetes — but it's not a one-size-fits-all solution. In this blog, we explore real-world insights from Tetrate’s work with clients using Ambient and Waypoints, and how the Tetrate Istio Subscription (TIS) helps organizations assess, adopt, and optimize the right architecture for their needs.

Choosing%20the%20Right%20Istio%20Architecture:%20A%20Data-Driven%20Guide%20to%20Ambient,%20Sidecar,%20and%20Hybrid%20Deployment%20Models

Introduction

Ambient, a feature of Istio, offers a sidecarless approach to managing traffic and security in Kubernetes environments. While it’s often framed as lightweight, sidecarless approach, the reality is more nuanced. It introduces a different architectural model that may or may not align with your system’s needs. Whether it’s the right fit depends entirely on the specific problems you’re trying to solve. At Tetrate, we’ve supported customers through both sidecar and ambient journeys. In this blog, we’ll dive deeper into what we learned from client use cases particularly around Ambient with Waypoints, and how Tetrate Istio Subscription (TIS) — a suite of expert services — helps you evaluate and adopt the right architectural model to make the right choice.

Ambient Mode in Istio: What’s Promised—And What’s Not Being Said

Ambient Mode is a feature of Istio that promises to eliminate the need for a sidecar proxy on every pod. That’s technically true—but it’s not the full picture. To achieve the core capabilities that users expect from Istio (like mTLS, telemetry, and advanced traffic policy), Ambient requires two components:

  • ztunnel: A lightweight L4-only proxy runs as a DaemonSet on each node.
  • Waypoint Proxy: An optional L7 proxy that is deployed only where advanced traffic management or observability is needed.

Ambient is presented as simpler and cheaper, but it doesn’t eliminate operational complexity. It may reduce infrastructure overhead in some scenarios, but it trades one set of challenges for another, introducing a new architectural model with its own operational demands and cost. .

The Hidden Complexity of Waypoints

While Ambient simplifies the basic dataplane, the introduction of Waypoints for Layer 7 introduces critical considerations:

  • Server-Side Requirement Only: Waypoints are server-side only. If client-side L7 features are needed (like retries or header manipulation), they aren’t supported in Ambient mode. These must be implemented on the server-side Waypoint or shifted to the application.
  • Routing Configuration Complexity: Unlike sidecars where L7 is enabled/supported by default, Ambient mode requires services to be explicitly routed through Waypoints for L7 functionality. If the Waypoint is not properly attached and traffic not redirected, L7 features like AuthZ or routing policies will not be enforced. And also nuances such as If a policy with rules matching L7 attributes is targeted with a workload selector (rather than attached with a targetRef), such that it is enforced by a ztunnel, it will become a Deny-ALL at ztunnel.
  • Latency Considerations: Because Waypoints and application pods may run on different nodes, additional latency can be introduced due to cross-node network hops. This can be mitigated using Kubernetes scheduler affinities or anti-affinities.

Result: While the operational model of Ambient may appear simpler, these considerations mean that operational overhead can resurface, especially in larger, dynamic environments.

The Tradeoff: Loss of L7 Visibility Without Waypoints

One of the key “aha” moments for many customers is the realization that:

  • Without Waypoints, ztunnel provides only Layer 4 visibility (source/destination IPs, ports, SNI information).
  • HTTP-level metadata (paths, status codes, retries, route-level metrics) is invisible without a Waypoint.

This matters deeply for troubleshooting, advanced traffic policies, and regulatory compliance.

In contrast, Sidecar mode provides full Layer 7 visibility by default.

Deployment Comparison: Sidecar vs Ambient+Waypoint

AspectSidecarAmbient (with Waypoints)
Data Plane OverheadHigh (proxy per pod)Low (ztunnel per node, selective Waypoints)
Operational SimplicityTransparent traffic interceptionRequires explicit traffic redirection and Waypoint configuration
L7 ObservabilityAlways availableAvailable only via Waypoints
Performance OverheadHigher CPU/memory consumptionLower, unless frequent L7 crossings
Policy GranularityFine-grained (per pod)Coarser (namespace or service-level)
Multicluster SupportSupportedNot yet supported
Migration ComplexityN/ATricky; e.g., sidecar clients bypass Waypoints and AuthZ is skipped, Sidecar resource/api does not work, VirtualService support is alpha and HttpRoute(which is virtual service alternative in the k8s gateway apis) does not support subsets.
Management FlexibilityTIS-advised, flexible deploymentTIS centralized, requires good planning

Operational Realities: What Customers Learn Mid-Rollout

In a recent customer engagement, teams were surprised by the architectural nuances of ambient mode:

  • They assumed all L7 functionality would be automatic.
  • Once deployed, they realized client-side apps lacked L7 features unless routed through Waypoints.
  • Missing telemetry and observability without Waypoints created gaps in debugging and compliance.

These discoveries often happen mid-rollout—costing teams valuable time and creating avoidable rework. The lesson: adopting ambient mode effectively requires thoughtful planning around namespace design, Waypoint placement, and service policy needs.

How Istio Ambient Assessment Advisor Helps

The Istio Ambient Assessment Advisor is a cluster-level assessment tool designed to help you make informed architectural decisions as you evaluate ambient mesh adoption. It analyzes your backend’s infrastructure characteristics, traffic patterns, and security requirements to determine the right deployment mode mix.

Here’s how it helps:

  • Deployment Fit Analysis: Understand what percentage of your backend is best suited for ambient with ztunnel, ambient with Waypoints, or traditional sidecar mode—based on your constraints.
  • Cost and Resource Planning: Estimate infrastructure savings tied to each deployment mode, helping prioritize rollout strategies in resource-constrained environments.
  • Migration Strategy Development: Get a clear, staged plan for how to implement a hybrid mesh, starting with the workloads most ready for ambient.

The Assessment Advisor is designed to give platform teams clarity and confidence—not just about what’s possible with ambient, but what’s appropriate given their actual architecture.

Two Example Scenarios

The right mode depends on your backend architecture, security needs, and application patterns—not hype or cost-savings alone. Below are two example outcomes from our assessment tool, told as real-world-style stories to help you visualize the value:

Scenario 1: Ambient-Forward Retail Platform

A fast-growing online retail platform is struggling with the cost and complexity of managing hundreds of microservices across multiple Kubernetes clusters. Their engineering team wants to adopt service mesh for mTLS and baseline security, but they also need to keep infrastructure lean to meet strict cost controls during peak seasons.

Their services primarily use L4 communication, and their security requirements are standard—not heavily regulated. After running the Ambient Mode Assessment Advisor, they find that only 29% of their services require sidecar mode for advanced traffic control and observability. The remaining 71% can safely run using ambient mode with Waypoints, delivering significant savings in CPU, memory, and operational effort.

This lets them roll out service mesh with confidence—achieving strong security and policy coverage where needed, while saving on infrastructure where L7 features aren’t necessary.

Scenario 2: Sidecar-Preferred Healthcare Environment

A large healthcare organization is expanding its digital front door and backend services to improve patient care and reduce data silos. However, they operate under HIPAA and other regulatory frameworks that require deep observability, auditability, and strict traffic control at the application layer.

The platform team runs the Ambient Mode Assessment Advisor and discovers that 53% of their services require sidecar mode to meet compliance and policy enforcement requirements. While 47% of the services can operate in ambient mode with Waypoints, the majority of traffic—especially between regulated workloads—requires the full L7 visibility and per-pod enforcement that sidecars provide.

They choose a hybrid approach: keep sidecars for regulated services and adopt ambient mode for lighter, non-sensitive internal communication. This strikes the right balance between control and efficiency.

These examples show how the same mesh technology can adapt to very different environments.

Conclusion

Ambient mesh offers compelling benefits—particularly in resource efficiency, onboarding simplicity, and scaling environments that don’t require deep L7 capabilities. But these benefits come with tradeoffs that must be mapped against your actual requirements.

The key insight: ambient mode is not a binary switch—it’s a spectrum. Your security posture, traffic patterns, compliance mandates, and operational readiness should drive where and how you deploy ambient, sidecar, or hybrid configurations.

With Tetrate Istio Subscription, you don’t need to make those decisions alone. Our Assessment Advisor provides a backend-level breakdown of which clusters and service categories are best suited for ambient, Waypoints, or sidecars—and why. TIS then helps your teams translate that insight into a rollout plan that is secure, scalable, and built to last.

Find your optimal blend of ambient and sidecar with the Istio Ambient Assessment Advisor, and let Tetrate guide your successful implementation—on your terms.

Product background Product background for tablets
New to service mesh?

Get up to speed with free online courses at Tetrate Academy and quickly learn Istio and Envoy.

Learn more
Using Kubernetes?

Tetrate Enterprise Gateway for Envoy (TEG) is the easiest way to get started with Envoy Gateway for production use cases. Get the power of Envoy Proxy in an easy-to-consume package managed via the Kubernetes Gateway API.

Learn more
Getting started with Istio?

Tetrate Istio Subscription (TIS) is the most reliable path to production, providing a complete solution for running Istio and Envoy securely in mission-critical environments. It includes:

  • Tetrate Istio Distro – A 100% upstream distribution of Istio and Envoy.
  • Compliance-ready – FIPS-verified and FedRAMP-ready for high-security needs.
  • Enterprise-grade support – The ONLY enterprise support for 100% upstream Istio, ensuring no vendor lock-in.
  • Learn more
    Need global visibility for Istio?

    TIS+ is a hosted Day 2 operations solution for Istio designed to streamline workflows for platform and support teams. It offers:

  • A global service dashboard
  • Multi-cluster visibility
  • Service topology visualization
  • Workspace-based access control
  • Learn more
    Decorative CTA background pattern background background
    Tetrate logo in the CTA section Tetrate logo in the CTA section for mobile

    Ready to enhance your
    network

    with more
    intelligence?