Announcing Built On Envoy: Making Envoy Extensions Accessible to Everyone

Learn more

Scaling Across Clusters: How Ambient Supports Multi-Cluster Mesh in Istio

In this post, we explore how Istio’s ambient mode introduces architectural changes for multi-cluster service mesh, simplifying mesh expansion and onboarding while supporting hybrid deployment models.

Scaling%20Across%20Clusters%3A%20How%20Ambient%20Supports%20Multi-Cluster%20Mesh%20in%20Istio

In our previous blog, we introduced how Istio’s ambient mode offers a more infrastructure-oriented approach to observability. In this follow-up, we focus on another area where ambient introduces architectural change: multi-cluster service mesh.

Istio has long supported multi-cluster topologies, but operationalizing them can be complex—especially at scale. As organizations expand across regions, clouds, or teams, managing multiple clusters often involves coordination around control planes, sidecars, service discovery, and trust domains.

Ambient mode introduces a different approach to multi-cluster mesh by shifting core data plane functionality—like encryption, routing, and telemetry—from sidecars in each pod to shared infrastructure components that operate at the node or namespace level.

This post outlines how ambient works in multi-cluster environments, where it may offer benefits, and how it fits into a broader hybrid Istio strategy.

Multi-Cluster Mesh with Sidecars: Tradeoffs to Consider

In a traditional Istio deployment, each pod includes a sidecar proxy that handles service communication, security, telemetry, and routing. When multiple clusters are involved, this model typically includes:

  • Managing sidecar injection across clusters
  • Synchronizing or federating control planes
  • Maintaining trust domains and certificates
  • Configuring service discovery between clusters

This approach provides fine-grained visibility, Layer 7 control, and per-pod enforcement—but may also introduce operational complexity, particularly as the number of clusters increases or the environment includes heterogeneous infrastructure (e.g., Kubernetes and VMs).

How Ambient Mode Approaches Multi-Cluster

Ambient mode introduces shared infrastructure components that decouple mesh functionality from individual workloads:

  • zTunnel (Layer 4): Enables mutual TLS and identity-based communication between workloads
  • Waypoint Proxy (optional, Layer 7): Handles traffic routing and policy enforcement at the namespace level

This shift introduces several design implications for multi-cluster mesh:

Lower Friction for Mesh Expansion

Ambient mode can make it easier to extend the mesh to new clusters or workloads by removing the need for sidecar injection and per-pod modifications. This helps reduce configuration overhead during onboarding.

Easier Incremental Onboarding

Compared to sidecar mode, ambient can make it easier to bring new clusters or workloads into the mesh. Since there’s no need for per-pod injection, teams can onboard services gradually—by namespace, team, or application—without major workload changes. This may help reduce some of the operational tradeoffs noted earlier.

Supports Common Multi-Cluster Topologies

Like sidecar mode, ambient can be used with shared, replicated, or independent control planes. Its infrastructure-level design may reduce the coordination required between clusters in some topologies.

Simplified Trust Configuration

By centralizing identity in the zTunnel, ambient mode can reduce the complexity of setting up trust between clusters—especially in environments with multiple trust domains.

Sidecars and Ambient: Complementary Approaches

It’s important to clarify that ambient mode and sidecars are not designed to run together in the same cluster today—each cluster is configured as either ambient or sidecar-based. However, at the mesh level, organizations can adopt a hybrid model by running some clusters in ambient mode and others with sidecars, depending on the needs of their workloads.

In many cases, a hybrid deployment model may be appropriate. Ambient can be used for services or clusters where operational simplicity is prioritized, while sidecars can remain in place where more advanced mesh capabilities are needed.

Where Ambient May Fit in a Multi-Cluster Strategy

Some environments where ambient mode may be considered include:

  • Internal-facing or less critical workloads, where baseline encryption and discovery are sufficient
  • Environments with dynamic clusters, such as ephemeral or CI/CD clusters
  • Teams or services new to the mesh, where sidecar injection may be a longer-term goal
  • VM-heavy clusters, where sidecar deployment may be more operationally challenging

This flexibility allows platform teams to consider ambient as an option when designing mesh expansion across multiple clusters.

Designing for Optionality

Ambient mode introduces new architectural choices for service mesh, especially in multi-cluster environments. Rather than a full replacement for sidecars, ambient offers an additional deployment option—one that may align with specific performance, operational, or scaling goals.

A hybrid model enables organizations to apply the level of mesh capability that fits their services—balancing depth with manageability, and aligning mesh adoption with the realities of distributed systems.

What’s Next

If you’re evaluating service mesh across multiple clusters, ambient may offer a way to adjust the operational model to better fit your architecture and team structure.

In our next post, we’ll explore how ambient mode handles waypoint configurations and upgrades.

Ready to Assess Your Istio Strategy?

Try the advisor now! Get personalized recommendations for your environment:

Start Your Assessment Now →   |   Contact Us to Get Started →

Product background Product background for tablets
Building AI agents

Agent Router Enterprise provides managed LLM & MCP Gateways plus AI Guardrails in your dedicated instance. Graduate agents from prototype to production with consistent model access, governed tool use, and runtime supervision — built on Envoy AI Gateway by its creators.

  • LLM Gateway – Unified model catalog with automatic fallback across providers
  • MCP Gateway – Curated tool access with per-profile authentication and filtering
  • AI Guardrails – Enforce policies, prevent data loss, and supervise agent behavior
  • Learn more
    Replacing NGINX Ingress

    Tetrate Enterprise Gateway for Envoy (TEG) is the enterprise-ready replacement for NGINX Ingress Controller. Built on Envoy Gateway and the Kubernetes Gateway API, TEG delivers advanced traffic management, security, and observability without vendor lock-in.

  • 100% upstream Envoy Gateway – CVE-protected builds
  • Kubernetes Gateway API native – Modern, portable, and extensible ingress
  • Enterprise-grade support – 24/7 production support from Envoy experts
  • Learn more
    Decorative CTA background pattern background background
    Tetrate logo in the CTA section Tetrate logo in the CTA section for mobile

    Ready to enhance your
    network

    with more
    intelligence?