Announcing TEG 1.2—Enterprise support and FedRAMP-ready FIPS builds for Envoy Gateway 1.2

Learn more › close
Tetrate Enterprise ready service mesh
Home

|

Learning Center

Learning Center

Service Mesh Tools

API Gateway (1)

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

Envoy Gateway (6)

How To Secure Kubernetes

Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…

Read more

Kubernetes Ingress Security Best Practices

Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…

Read more

What Is a Kubernetes Ingress Gateway?

A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…

Read more

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

What Is Envoy Gateway?

Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…

Read more

What Is the Kubernetes Gateway API?

Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…

Read more

Envoy Proxy (2)

Envoy Proxy

What does Envoy mean? Envoy is a high-performance, open-source proxy server designed for cloud-native applications. It is often used in conjunction with service mesh platforms like Istio to provide advanced…

Read more

How To Secure Kubernetes

Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…

Read more

FIPS (3)

FIPS FedRAMP

FIPS (Federal Information Processing Standards) and FedRAMP (Federal Risk and Authorization Management Program) are two distinct but related sets of standards and regulations established by the U.S. government to ensure…

Read more

Istio FIPS

Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…

Read more

What Is FIPS?

The Federal Information Processing Standard (FIPS) is a set of standards for information processing systems that all U.S. federal agencies, contractors, and vendors must adhere to. FIPS standards cover a…

Read more

Istio Service Mesh (1)

Istio FIPS

Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…

Read more

Kubernetes (6)

How To Secure Kubernetes

Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…

Read more

Kubernetes Security Best Practices

Kubernetes has become a core component of modern application deployment by delivering flexibility, scalability, and efficiency for managing containerized applications. This article delves into Kubernetes security best practices to guide…

Read more

Kubernetes Traffic Routing and Control

Kubernetes is the go-to choice for deploying containerized applications, but managing traffic within and between services is crucial for optimal performance. Kubernetes traffic routing encompasses how requests move between different…

Read more

NGINX as a Kubernetes Ingress Controller

Background NGINX is a high-performance web server, reverse proxy server, and load balancer. Developed by Igor Sysoev and first released in 2004, NGINX is known for its efficiency in handling…

Read more

What Does Kubernetes Do?

Containerization Kubernetes has become essential to modern application deployments by providing flexibility, scalability, and efficiency when managing containerized applications. Containerization is a popular method for packaging applications for deployment. Software…

Read more

What Is a Kubernetes Ingress Gateway?

A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…

Read more

Kubernetes Gateway API (4)

What Is a Kubernetes Ingress Gateway?

A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…

Read more

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

What Is Envoy Gateway?

Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…

Read more

What Is the Kubernetes Gateway API?

Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…

Read more

Kubernetes Ingress (1)

NGINX as a Kubernetes Ingress Controller

Background NGINX is a high-performance web server, reverse proxy server, and load balancer. Developed by Igor Sysoev and first released in 2004, NGINX is known for its efficiency in handling…

Read more

Mutual TLS (mTLS) (3)

How To Secure Kubernetes

Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…

Read more

Kubernetes Ingress Security Best Practices

Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…

Read more

What Is mTLS?

Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…

Read more

Observability (1)

What Is Observability?

Overview Observability refers to the ability to gain insight into the internal state of a system by observing its external behavior. In other words, it’s the ability to understand what’s…

Read more

Platform Team (1)

What Is a Platform Team?

Overview A platform team is responsible for creating and maintaining the underlying platform that supports the development, deployment and operations of software applications. The platform team provides critical infrastructure, tools…

Read more

Wasm (1)

What Is Wasm?

WebAssembly (abbreviated as Wasm) is a low-level bytecode format designed as a portable target for the compilation of high-level languages like C, C++, and Rust, enabling deployment on the web…

Read more

Zero Trust (5)

Kubernetes Ingress Security Best Practices

Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…

Read more

NIST Zero Trust Architecture

NIST Zero Trust Architecture refers to cybersecurity policies and best practices developed by the National Institute of Standards and Technology (NIST). In the Special Publication 800-207 and 800-207A series, NIST…

Read more

What Is mTLS?

Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…

Read more

What Is Zero Trust Security?

Overview Zero Trust Security—sometimes called Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA)—is an information security model that requires strict identity verification for all users, devices, and applications…

Read more

Zero Trust Architecture

Don’t trust. Verify. That’s the philosophy behind Zero Trust Architecture (ZTA). Legacy network security architecture is no longer sufficient when it comes to ensuring the highest levels of cybersecurity and…

Read more

Other resources