As outlined in a previous article on security challenges for microservices, DevOps are getting more widely distributed, spread thin, and forced to plan for higher levels of interactivity as well as evolving national security “backdoor” measures. Microservices, born from a still-emerging DevOps laboratory environment, can be deployed anywhere: on-prem, in the public cloud, or a hybrid implementation.
We are excited to announce the release of a new open source project, Kuma – a modern, universal control plane for service mesh! Kuma is based on Envoy, a powerful proxy designed for cloud native applications. Envoy has become the de-facto industry sidecar proxy, with service mesh becoming an important implementation in the cloud native ecosystem as monitoring, security and reliability become increasingly important for microservice applications at scale.
In my experience as a digital consultant for Google Cloud’s Apigee team, I’ve found that when a technology gets classified as “middleware,” it’s often encumbered with a scarlet letter of sorts. Business leaders find it unexciting — so much so that they often resign it to the purview of technology professionals and don’t spare a second thinking about it.
With the 1.3 release, Kong is now able to natively manage and proxy gRPC services. In this blog post, we’ll explain what gRPC is and how to manage your gRPC services with Kong.
Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.