With the popularity of service mesh at an all time high, it is important to think about how it might affect your current architecture. You might think you have to completely rework your environment, that it might not be “mesh ready.” But in fact you can integrate a service mesh into your current stack and make it work for your organization.
Istio is a popular service mesh to connect, secure, control, and observe services. When it was first introduced as open source in 2017, Kubernetes was winning the container orchestration battle and Istio answered the needs of organizations moving to microservices. Although Istio claims to support heterogeneous environments such as Nomad, Consul, Eureka, Cloud Foundry, Mesos, etc., in reality, it has always worked best with Kubernetes — on which its service discovery is based.
KubeCon North America will be held virtually this Nov. 17-20 along with the CNCF’s co-located ServiceMeshCon North America running Nov. 17 from 7 to 3 PST. Tetrate is excited to sponsor KubeCon this year & while we miss the chance to hang out IRL, we’re really looking forward to chatting with you at our booth, and our sponsor Slack channel!
Tetrate’s Zack Butcher’s recent AMA with the United States Air Force Chief Software Officer, Nicolas Chaillan highlighted some significant achievements as a result of the Department of Defense’s move to Open source technology and DevSecOps. Platform One is a group of Air Force software developers that build and secure technology tools used across the DoD, as part of the Enterprise DevSecOps Initiative. Tetrate is a partner DoD is working with, on their journey to modernization.
Software engineers working on a product that highly values security, whether they’re working on frontend, backend, or security features in particular, need to ensure that their web applications aren’t vulnerable to attack.
Tetrate is a service mesh company, providing infrastructure for enterprise customers, including financial institutions and federal agencies handling highly sensitive data. We are sharing our recent efforts in securing the UI for our product, Tetrate Service Bridge, which was aided in part by some pointers from penetration testing conducted by a large financial institution. This article walks you through that experience that may help others who are building a secure UI.
Apache SkyWalking, the observability platform, and open-source application performance monitor (APM) project, today announced the general availability of its 8.2 release. The release extends Apache SkyWalking’s functionalities and monitoring boundary to the browser side.
The 3rd annual Envoy-Con, a practitioner-driven community conference organized by the Linux Foundation, was held virtually today and attended by a few hundred developers and end users who have adopted Envoy, the edge and service proxy. Envoy is a widely adopted open source project that can be used in various deployment scenarios, including as a load balancer and as a service mesh data plane.
Envoy Proxy has announced the release of 1.16 for general availability. The updates include the new support for ARM64 architecture, an update that has been a lot of work in the making with strong collaboration between ARM and the Envoy community.
Security remains one of the primary drivers behind service mesh adoption today. In this virtual webinar to be held Oct. 21 at 11 a.m. (PDT), U.S. Air Force CSO Nicolas M. Chaillan will join Tetrate’s Zack Butcher to discuss “DevSecOps and IT Innovation with the Department of Defense.”
New tooling is now available to make it easier for developers to create custom extensions for the Envoy proxy.
In this interview (also available as a Make it Mesh podcast), Tetrate Engineer Yaroslav Skopets, an Envoy contributor and GetEnvoy maintainer, explains how WebAssembly (Wasm) makes Envoy extensibility more accessible, and how developers can quickly get started with Tetrate’s open source GetEnvoy extensibility toolkit.