Tetrate Enterprise Gateway for Envoy—the cloud-native service gateway—has reached 1.0!

Learn more › close
Tetrate Enterprise ready service mesh
Home

|

Learning Center

Learning Center

Service Mesh Tools

API Gateway (1)

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

Envoy Gateway (3)

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

What Is Envoy Gateway?

Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…

Read more

What Is The Kubernetes Gateway API?

Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…

Read more

Envoy Proxy (1)

Envoy Proxy

Overview Envoy is a high-performance, open-source proxy server designed for cloud-native applications. It is often used in conjunction with service mesh platforms like Istio to provide advanced traffic management, load…

Read more

FIPS (3)

FIPS FedRAMP

FIPS (Federal Information Processing Standards) and FedRAMP (Federal Risk and Authorization Management Program) are two distinct but related sets of standards and regulations established by the U.S. government to ensure…

Read more

Istio FIPS

Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…

Read more

What Is FIPS?

The Federal Information Processing Standard (FIPS) is a set of standards for information processing systems that all U.S. federal agencies, contractors, and vendors must adhere to. FIPS standards cover a…

Read more

Istio Service Mesh (1)

Istio FIPS

Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…

Read more

Kubernetes (2)

Kubernetes Security Best Practices

Kubernetes has become a core component of modern application deployment by delivering flexibility, scalability, and efficiency for managing containerized applications. This article delves into Kubernetes security best practices to guide…

Read more

What Does Kubernetes Do?

Containerization Kubernetes has become essential to modern application deployments by providing flexibility, scalability, and efficiency when managing containerized applications. Containerization is a popular method for packaging applications for deployment. Software…

Read more

Kubernetes Gateway API (3)

What Is an API Gateway?

Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…

Read more

What Is Envoy Gateway?

Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…

Read more

What Is The Kubernetes Gateway API?

Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…

Read more

Mutual TLS (mTLS) (1)

What Is mTLS?

Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…

Read more

Observability (1)

What Is Observability?

Overview Observability refers to the ability to gain insight into the internal state of a system by observing its external behavior. In other words, it’s the ability to understand what’s…

Read more

Platform Team (1)

What Is a Platform Team?

Overview A platform team is responsible for creating and maintaining the underlying platform that supports the development, deployment and operations of software applications. The platform team provides critical infrastructure, tools…

Read more

Wasm (1)

What Is Wasm?

WebAssembly (abbreviated as Wasm) is a low-level bytecode format designed as a portable target for the compilation of high-level languages like C, C++, and Rust, enabling deployment on the web…

Read more

Zero Trust (4)

NIST Zero Trust Architecture

NIST Zero Trust Architecture refers to cybersecurity policies and best practices developed by the National Institute of Standards and Technology (NIST). In the Special Publication 800-207 and 800-207A series, NIST…

Read more

What Is mTLS?

Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…

Read more

What Is Zero Trust Security?

Overview Zero Trust Security—sometimes called Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA)—is an information security model that requires strict identity verification for all users, devices, and applications…

Read more

Zero Trust Architecture

Don’t trust. Verify. That’s the philosophy behind Zero Trust Architecture (ZTA). Legacy network security architecture is no longer sufficient when it comes to ensuring the highest levels of cybersecurity and…

Read more

Other resources