Nov 30, 2023 Introducing Istio Advisor Plus GPT We’re thrilled to introduce Istio Advisor Plus GPT, shedding light on its capabilities, usage, and exciting possibilities Read more
Oct 25, 2023 Simplify Kubernetes Security with the Service Mesh Cloud-native applications have transformed the way we build, deploy and manage software. Kubernetes, with its powerful orchestration capabilities, has Read more
Oct 24, 2023 Istio and Envoy Contributions from the Data Last year, we published our first analysis of the GitHub-derived contribution data published by CNCF for service mesh-related open source projects. We Read more
Oct 19, 2023 NIST SP 800-207A Explained: A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments New Guidance for Federal Agencies Achieving a Zero Trust architecture (ZTA) is a key goal for many enterprises and government agencies today. In fact, Read more
Oct 19, 2023 What’s New in Istio 1.19: Gateway API and Beyond Istio 1.20 signifies a notable advancement in the capabilities of the Istio service mesh, offering a better experience for operators and developers. T Read more
Oct 12, 2023 Tetrate Istio Subscription: The Only Fully Open Source Istio and Envoy Distro for Enterprise Production We are thrilled to announce the general availability of Tetrate Istio Subscription (TIS) – the only 100% upstream Istio and Envoy Distro that is enter Read more
Oct 10, 2023 Tetrate Istio Distro Security Bulletin: Envoy HTTP/2 “Rapid Reset” Vulnerability This is an ongoing series of Istio and Envoy security updates from Tetrate. Subscribe to our newsletter to get notified as we release each bulletin. O Read more
Oct 5, 2023 Cloud Native Service Gateway Is Here: Introducing Tetrate Enterprise Envoy Gateway Today we are excited to announce that Tetrate Enterprise Envoy Gateway (TEG), the enterprise-ready distribution of Envoy Gateway is now available Read more
Oct 3, 2023 Leveraging EnvoyPatchPolicy to Extend the Capabilities of Envoy Gateway Envoy Gateway offers a rich set of functionalities built on top of Envoy Proxy. However, there may be instances where you need to leverage Envoy Proxy Read more