Tetrate Service Bridge (TSB) brings enterprise grade Istio to Amazon EKS and EKS-D
Istio, Tetrate, Tetrate Service Bridge

Tetrate expands AWS partnership to bring enterprise grade Istio for EKS and EKS Distro

Tetrate’s partnership with AWS, with today’s announcement of Amazon EKS Distro (EKS-D), provides their joint customers with unified application connectivity and security across workloads, on-premises and on AWS cloud. EKS-D was unveiled at re:Invent 2020 as a Kubernetes offering that can run on-premises, in data centers owned or operated by customers. There are several benefits to EKS-D that we believe will be useful for customers in accelerating, streamlining, and unifying the efforts needed to modernize their applications and cloud migration. 

Read More
cloud computing
Istio, Service Mesh, Tetrate

How to Integrate Virtual Machines into Istio Service Mesh

Istio is a popular service mesh to connect, secure, control, and observe services. When it was first introduced as open source in 2017, Kubernetes was winning the container orchestration battle and Istio answered the needs of organizations moving to microservices. Although Istio claims to support heterogeneous environments such as Nomad, Consul, Eureka, Cloud Foundry, Mesos, etc., in reality, it has always worked best with Kubernetes — on which its service discovery is based.

Read More
App security
Security, Tetrate

Creating a Security Barrier for Web Applications

Software engineers working on a product that highly values security, whether they’re working on frontend, backend, or security features in particular, need to ensure that their web applications aren’t vulnerable to attack. 

Tetrate is a service mesh company, providing infrastructure for enterprise customers, including financial institutions and federal agencies handling highly sensitive data. We are sharing our recent efforts in securing the UI for our product, Tetrate Service Bridge, which was aided in part by some pointers from penetration testing conducted by a large financial institution. This article walks you through that experience that may help others who are building a secure UI.

Read More