Blog
Subscribe to our blog
Network Cost Comparison Between Istio Sidecar and Ambient Modes
In the evolving landscape of service mesh architectures, understanding the network costs associated with different deployment modes is crucial for optimizing performance and resource efficiency. This blog post will compare…
Read More arrow_forwardIntroducing Tetrate Config Analyzer (TCA)
As Istio’s adoption continues to grow, managing and maintaining service mesh configurations becomes increasingly critical. Whether you’re deploying in production or experimenting in a development environment, having accurate configurations is…
Read More arrow_forwardBeyond Gateway API: Introducing Envoy Gateway’s Gateway API Extensions
Background The Kubernetes Gateway API—the next generation of Kubernetes ingress—is a more expressive and extensible alternative to the traditional Ingress API. One of the advantages offered by the Gateway API…
Read More arrow_forwardEnvoy Gateway Release 1.2 Highlights
In the Envoy Gateway 1.2 release, you will find enhancements in security, traffic management, observability, and operations. Get in touch with us to learn more about how you can leverage…
Read More arrow_forwardGet Ready for Production with Envoy Gateway
Ready to take your Envoy Gateway setup into production? This article provides a list of items, organized by common operational concerns, that can help you validate your production readiness. Environment…
Read More arrow_forwardMigrating from AWS App Mesh to Istio: A Comprehensive Guide
With AWS announcing the deprecation of AWS App Mesh effective September 30, 2026, many organizations are evaluating alternatives to continue their service mesh journey. If you are one of those…
Read More arrow_forwardEnvoy CVE security fixes for GetEnvoy
The Envoy security team today [announced] the availability of Envoy 1.9.1 to address two high-risk vulnerabilities related to header values and HTTP URL paths. We also released the GetEnvoy build of Envoy 1.9.1 and…
Read More arrow_forwardMulti-Cluster PKI + Istio Recipe: Practical Example for a Trusted and Scalable PKI for Your Service Mesh
Authors: Cristofer TenEyck Senior Solution Engineer a Keyfactor and Jimmy Song Developer Advocate at Tetrate Introduction In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is…
Read More arrow_forwardMany apps in one Kubernetes Cluster? Consider a dedicated Gateway per app
Managing ingress traffic configurations in Kubernetes can be challenging, especially when each application has different requirements. If you’re using a single shared Gateway across all your namespaces, you may be…
Read More arrow_forward