{"id":579,"date":"2023-03-21T14:44:17","date_gmt":"2023-03-21T14:44:17","guid":{"rendered":"https:\/\/imesh.ai\/blog\/?p=579"},"modified":"2023-09-05T05:48:44","modified_gmt":"2023-09-05T05:48:44","slug":"what-is-istio-ambient-mesh","status":"publish","type":"post","link":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/","title":{"rendered":"What is Istio Ambient Mesh"},"content":{"rendered":"<p><\/p>\n\n\n<h2 class=\"wp-block-heading\">What is Istio ambient service mesh<\/h2>\n<p>\n\n\n\n<\/p>\n<p>Istio, an open source and widely used service mesh,\u00a0 is used to manage network and security for cloud-native applications. In Sept, 2022, Istio project released- <a href=\"https:\/\/istio.io\/latest\/blog\/2022\/introducing-ambient-mesh\/\">Ambient mesh<\/a>&#8211; a modified and sidecar less data plane for Istio developed for enterprises that want to deploy <a href=\"https:\/\/imesh.ai\/blog\/what-is-mtls-and-how-to-implement-it-with-istio\/\">mTLS<\/a> and other security features first, and seek to deploy an advanced network later.\u00a0<\/p>\n<p>\n\n\n\n<\/p>\n<h2 class=\"wp-block-heading\">Istio ambient mesh architecture<\/h2>\n<p>\n\n\n<p><\/p>\n<p><a href=\"https:\/\/imesh.ai\/blog\/what-is-istio\/\">Istio service mesh<\/a> is the powerful software to enable zero trust by enabling authentication, authorization, and audit using mTLS and identity controls. Platform teams, cloud architects of large organizations have implemented security using Istio. To implement security, Istio involves the following components- a certificate authority (CA) for key management, API to distribute Authn\/Authz policies to proxies, Policy Enforcement Points (PEPs) implemented using sidecars (Envoy proxies), and extensions to manage telemetry.<\/p>\n<p>Although achieving <a href=\"https:\/\/imesh.ai\/blog\/zero-trust-network-for-microservices-with-istio\/\">zero trust<\/a> using Istio is straightforward,&nbsp; the sidecar implementation (refer the image below) of Istio is usually very computationally expensive and hard to maintain; so the project has released a new version called Istio \u2018ambient\u2019 mesh.&nbsp;<\/p>\n<p><\/p>\n\n\n<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/Istio-control-plane-architecture-for-zero-trust.png\" alt=\"Istio control plane architecture for zero trust\" \/><\/figure>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Istio \u2018ambient\u2019 mesh provides a light-weight data plane that does not require sidecar injection with any microservices. Ambient mesh has distinguished layers in the data plane- <strong><em>secure overlay layer<\/em><\/strong> and <strong><em>L7 processing layer <\/em><\/strong>which are designed to implement Istio sequentially in a phase-wise manner and tackle security concerns first.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul>\n\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Secure overlay layer<\/strong> (also known as <strong>zero-trust tunnel or ztunnel<\/strong>)is a L4 processing layer designed to implement TCP routing and handle zero trust security for traffic such as <a href=\"https:\/\/imesh.ai\/blog\/what-is-mtls-and-how-to-implement-it-with-istio\/\">mTLS<\/a>, Authentication and Authorization policies.\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n\n<\/p>\n<p>\n\n<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>L7 processing layer<\/strong> (also known as <strong>waypoint proxy<\/strong>) is designed to handle complex traffic management functionalities such as HTTP routing, circuit breaking, chaos engineering, reties, timeouts, rate limiting, etc, and handle granular Authn\/Authz policy implementation.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n\n<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h3 class=\"wp-block-heading\">Ztunnel for secure connection and authentication of services<\/h3>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p><a href=\"https:\/\/github.com\/istio\/ztunnel\/\">Ztunnel <\/a>is an agent, primarily a rust-based proxy, whose responsibility is to securely connect and authenticate elements within the mesh. One can deploy ztunnel as a DaemonSet workload resource on a Kubernetes cluster. Ztunnel is a dedicated L4 technology and is deployed per node in a cluster. The idea is ztunnel will be shared among all the workloads in a node it is deployed to. The ztunnel leverages leverages Kubernetes CNI to establish connections between workloads, secure communication using mTLS, collect HTTP metrics, access logs, etc.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>And all the ztunnels are connected with each other using HTTP protocol (refer the image below). If Service A wants to pass data to another Service C in another node, then the ztunnel of node-1 will send HTTP connection requests (over mTLS) to the ztunnel of node-2. Once a TCP connection is established between the ztunnel, the data packets can be transported securely to Service C. Such connections between ztunnel is referred as HBONE (HTTP-Based Overlay Network Environment).<\/p>\n<p>\n\n\n<p><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone  wp-image-722\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-300x144.png\" alt=\"Implementation of ztunnel\" width=\"773\" height=\"371\" srcset=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-300x144.png 300w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-1024x493.png 1024w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-768x370.png 768w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-400x193.png 400w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-800x385.png 800w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3-1160x558.png 1160w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/image-3.png 1415w\" sizes=\"(max-width: 773px) 100vw, 773px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig: Implementation of ztunnel<\/strong><\/p>\n<p><\/p>\n<p>There three important benefits of using ztunnel or a node-level proxy:<\/p>\n<ol>\n<li>Phase-1 implementation of secured communication (using mTLS) for all your microservices will be fast.<\/li>\n<li>Simple authentication and authorization policies can be defined at node-level.<\/li>\n<li>Maintenance such as version upgrades or CVE patching to node-level proxy will be easier and faster.<\/li>\n<\/ol>\n\n\n<\/p>\n<p>Whenever teams have implemented phase-1: Security of services, they can implement phase-2: Network management of microservices. In the phase-2 they can create sophisticated traffic and security policies by using L7 proxy or waypoint proxy.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n<!-- Ad space powered by WP AdCenter v2.5.7 - https:\/\/wpadcenter.com\/ --><div class=\"wpadcenter-ad-container\" ><div id=\"wpadcenter-ad-1460\" class=\" ad-placement  wpadcenter-alignnone alignnone\"><div class=\"wpadcenter-ad-inner\" ><a id=\"wpadcenter_ad\" data-value=1460 data-placement=\"\" href=\"https:\/\/imesh.ai\/zero-trust-network-with-istio.html\" target=\"_self\" class=\"wpadcenter-ad-inner__item\" ><img decoding=\"async\" width=\"641\" height=\"124\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/07\/zero-trust-network-architecture.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"zero trust network architecture\" srcset=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/07\/zero-trust-network-architecture.png 641w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/07\/zero-trust-network-architecture-300x58.png 300w, https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/07\/zero-trust-network-architecture-400x77.png 400w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/a><\/div><\/div><\/div>\n\n\n\n<\/p>\n<h3 class=\"wp-block-heading\">Waypoint proxy for network management and telemetry<\/h3>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Waypoint proxies are basically Envoy proxies, used to implement L7 traffic management capabilities in Istio ambient mesh. Based on the header and credentials, the proxy is capable of applying advanced networking policies such as- circuit breaking, traffic shaping and splitting, retries, fault injection, etc. Waypoint proxy also helps in achieving granular authorization policies for Role-based access control (RBAC) or Attribute-based access control (ABAC).\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Waypoint\u00a0 or L7 proxy is deployed into a cluster per identity\/workload type. If there are 5 services in a cluster, you can deploy 5 waypoint proxies to handle communication at application level for each service. One can scale up the proxies as per the load. Coming to the deployment of the waypoint proxy (which is essentially an Envoy proxy) is not installed as a sidecar fashion- deployed to each pod of a service. Envoy was installed as a container in each of the pods of a service. And in case of breach of an app (essentially a pod), all the sensitive information such as token, keys, etc could be stolen from the proxy. However, in case of waypoint proxy, deployed at only service level, breach of an application cannot imply the access to secrets in the proxy.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/Waypoint-proxy-for-network-management.png\" alt=\"Waypoint proxy for network management\" \/><\/figure>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>In the above diagram, waypoint proxies are deployed per service and can be seen as individual gateways or policy enforcement points (PEPs) per service. Note: One can configure Ambient mesh to have multiple services configured to a single waypoint proxy, but to contain security blast radius and improve lifecycle management operations the ideal way of mapping the proxy to service is 1:1.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h3 class=\"wp-block-heading\">Istio control plane for managing and observing the network security\u00a0<\/h3>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Implementation of enterprise-wide security from central control plane<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>The data plane can be handled from the Istio central plane to push the define and declare security and network policies for each node and each workload through ztunnel and waypoint proxy. Istio is capable of integrating with 3rd party authentication standards such as Okta, LDAP, SAML, SSO providers, etc.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/Integrations-using-Istio-service-mesh.png\" alt=\"Integrations using Istio service mesh\" \/><\/figure>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Istio control plane also allows the ability to create granular access controls, RBAC and multi-tenancy policies for all the inbound traffic (through waypoint proxies).\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Securing traffic at the edge with whitelisting<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Security policies can be implemented at the edge and to the ingress traffic. Large enterprises can use the Istio control plane to whitelist IPs for using certain services. This is very useful while implementing network access controls, or remote access enablement, or beta testing (allowing a limited set of testers or beta-customers to use your services and provide feedback).\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/Ambient-Mesh-architechture.jpg\" alt=\"Ambient Mesh architechture\" \/><\/figure>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Automated certificate management with Istio agents<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Security managers or platform engineers can provision stronger identities to every workload with X.509 certificate. The Istio control plane acts as the certificate authority and issues certificates to the Istio agents (running alongside each proxy). The control plane automates the key and the certificate management at scale with the help of the Istio agents. The idea is whenever a Kubernetes workload would start, Envoy proxy would seek the certificate and key from Istio agent in the same container. Istio agent will be responsible for monitoring the expiration of the certificate and accordingly, would rotate with the new certificate from the control plane. Note that the root certificate can be kept in Vault rather than stored in the same local PC.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Enabling WAF for Multicloud apps with Istio<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Cloud providers such as firewalls to protect web-applications from common exploits at edge. A few common ones are <a href=\"https:\/\/aws.amazon.com\/waf\/\">AWS WAF<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-in\/products\/web-application-firewall\">Azure WAF<\/a> and <a href=\"https:\/\/cloud.google.com\/armor\/\">Google Cloud Armor<\/a> to provide defense against SQL injection, DDOS attacks, and cross-site scripting (XSS), at the edge. All the firewall can be applied in front of Istio ingress gateway before traffic enters the mesh.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Data loss prevention using Istio network policies<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>You can avoid any sensitive information such as username, tokens, and financial transaction data that are not logged or leaked using Istio network policy rules. The data loss prevention (DLP) rules can be defined in HTTP listeners or virtual service objects of Istio. The DLP rules can be applied to mask access logs, or any output data with potentially sensitive information.<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<h4 class=\"wp-block-heading\">Gain multicluster visibility\u00a0<\/h4>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Similarly Istio allows security managers to monitor and measure the integrity and security posture of all microservices. Istio generates runtime telemetry to help network administrators, SREs and DevOps to constantly track the behavior and performance of services across the organizations. The control plane emits metrics, traffic flows and service dependencies (using Kiali), which is essential to understand and react to security incidents.\u00a0\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n\n\n<\/p>\n<p>Another noteworthy point is that the Istio \u2018ambient\u2019 mode will have sidecar patterns as well. In case you want to have implemented the Istio \u2018sidecar\u2019 pattern and now want to implement the ambient mesh, the control plane will support both the versions. This is the best case for organizations who want to gain multicluster and multilcoud visibility in a single plane.\u00a0\u00a0<\/p>\n<p>\n\n\n<h2>Conclusion<\/h2>\n\n\n<\/p>\n<p>Istio is used to manage a network connection and communication among microservices spread across Kubernetes clusters. It is used to ensure a secure network with verification of services and users in each transaction. You can attain 360 degree\u00a0 visibility for faster reaction in case of security breaches, and have a fault tolerant system for more resilience.\u00a0<\/p>\n<p>\n\n\n<p><\/p>\n<p>The new sidecare-less dataplane of Istio \u2018ambient\u2019 mode makes it a more compelling, hassle-free and computation inexpensive option to implement a service mesh. Even though Istio \u2018ambient\u2019 mesh is in beta now, it is expected to be production ready by the end of this year.&nbsp;<br>IMESH helps enterprises to implement and adopt Istio enterprise-wide without any operational hassle. If you are interested, <a href=\"https:\/\/imesh.ai\/istio-enterprise-consulting.html\">book an Istio consultation demo<\/a> today or contact <a href=\"https:\/\/imesh.ai\/talk-to-an-istio-expert.html\">an Istio expert today<\/a>.<\/p>\n<p><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>What is Istio ambient service mesh Istio, an open source and widely<span class=\"excerpt-more\"><\/span><\/p>\n","protected":false},"author":4,"featured_media":639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63,36,39],"tags":[53,104,69,105],"class_list":["post-579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ambient-mesh","category-security","category-zero-trust","tag-istio","tag-istio-ambient-mesh","tag-security","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Istio ambient mesh | why it&#039;s necessary for microservices?<\/title>\n<meta name=\"description\" content=\"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Istio ambient mesh | why it&#039;s necessary for microservices?\" \/>\n<meta property=\"og:description\" content=\"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\" \/>\n<meta property=\"og:site_name\" content=\"IMESH\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-21T14:44:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-05T05:48:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Debasree Panda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Debasree Panda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\"},\"author\":{\"name\":\"Debasree Panda\",\"@id\":\"https:\/\/imesh.ai\/blog\/#\/schema\/person\/b881b4a1c269b625dc91af0896f8036f\"},\"headline\":\"What is Istio Ambient Mesh\",\"datePublished\":\"2023-03-21T14:44:17+00:00\",\"dateModified\":\"2023-09-05T05:48:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\"},\"wordCount\":1508,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/imesh.ai\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg\",\"keywords\":[\"istio\",\"istio ambient mesh\",\"security\",\"zero trust\"],\"articleSection\":[\"Ambient Mesh\",\"Security\",\"zero trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\",\"url\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\",\"name\":\"What is Istio ambient mesh | why it's necessary for microservices?\",\"isPartOf\":{\"@id\":\"https:\/\/imesh.ai\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg\",\"datePublished\":\"2023-03-21T14:44:17+00:00\",\"dateModified\":\"2023-09-05T05:48:44+00:00\",\"description\":\"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.\",\"breadcrumb\":{\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage\",\"url\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg\",\"contentUrl\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/imesh.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Istio Ambient Mesh\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/imesh.ai\/blog\/#website\",\"url\":\"https:\/\/imesh.ai\/blog\/\",\"name\":\"IMESH Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/imesh.ai\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/imesh.ai\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/imesh.ai\/blog\/#organization\",\"name\":\"IMESH\",\"url\":\"https:\/\/imesh.ai\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/imesh.ai\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/IMESH-LOGO-scaled.jpg\",\"contentUrl\":\"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/IMESH-LOGO-scaled.jpg\",\"width\":2560,\"height\":1665,\"caption\":\"IMESH\"},\"image\":{\"@id\":\"https:\/\/imesh.ai\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/imeshai\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/imesh.ai\/blog\/#\/schema\/person\/b881b4a1c269b625dc91af0896f8036f\",\"name\":\"Debasree Panda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/imesh.ai\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1e02eb18435bad3283b1f03e1bf22de74113e9760ab00e90c41e539df347cd3d?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1e02eb18435bad3283b1f03e1bf22de74113e9760ab00e90c41e539df347cd3d?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Debasree Panda\"},\"description\":\"Debasree is the CEO of IMESH. He understands customer pain points in cloud and microservice architecture. Previously, he led product marketing and market research teams at Digitate and OpsMx, where he had created a multi-million dollar sales pipeline. He has helped open-source solution providers- Tetrate, OtterTune, and Devtron- design GTM from scratch and achieve product-led growth. He firmly believes serendipity happens to diligent and righteous people.\",\"sameAs\":[\"https:\/\/imesh.ai\"],\"url\":\"https:\/\/imesh.ai\/blog\/author\/debasreeimesh-ai\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Istio ambient mesh | why it's necessary for microservices?","description":"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/","og_locale":"en_US","og_type":"article","og_title":"What is Istio ambient mesh | why it's necessary for microservices?","og_description":"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.","og_url":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/","og_site_name":"IMESH","article_published_time":"2023-03-21T14:44:17+00:00","article_modified_time":"2023-09-05T05:48:44+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","type":"image\/jpeg"}],"author":"Debasree Panda","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Debasree Panda","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#article","isPartOf":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/"},"author":{"name":"Debasree Panda","@id":"https:\/\/imesh.ai\/blog\/#\/schema\/person\/b881b4a1c269b625dc91af0896f8036f"},"headline":"What is Istio Ambient Mesh","datePublished":"2023-03-21T14:44:17+00:00","dateModified":"2023-09-05T05:48:44+00:00","mainEntityOfPage":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/"},"wordCount":1508,"commentCount":0,"publisher":{"@id":"https:\/\/imesh.ai\/blog\/#organization"},"image":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage"},"thumbnailUrl":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","keywords":["istio","istio ambient mesh","security","zero trust"],"articleSection":["Ambient Mesh","Security","zero trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/","url":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/","name":"What is Istio ambient mesh | why it's necessary for microservices?","isPartOf":{"@id":"https:\/\/imesh.ai\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage"},"image":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage"},"thumbnailUrl":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","datePublished":"2023-03-21T14:44:17+00:00","dateModified":"2023-09-05T05:48:44+00:00","description":"Learn about the new Istio Ambient mesh, its architecture design and the benefits it brings for enterprises. Understand how the new ambient mesh can help firms to achieve zero trust network easily.","breadcrumb":{"@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#primaryimage","url":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","contentUrl":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/imesh.ai\/blog\/what-is-istio-ambient-mesh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/imesh.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Istio Ambient Mesh"}]},{"@type":"WebSite","@id":"https:\/\/imesh.ai\/blog\/#website","url":"https:\/\/imesh.ai\/blog\/","name":"IMESH Blog","description":"","publisher":{"@id":"https:\/\/imesh.ai\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/imesh.ai\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/imesh.ai\/blog\/#organization","name":"IMESH","url":"https:\/\/imesh.ai\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/imesh.ai\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/IMESH-LOGO-scaled.jpg","contentUrl":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/IMESH-LOGO-scaled.jpg","width":2560,"height":1665,"caption":"IMESH"},"image":{"@id":"https:\/\/imesh.ai\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/imeshai"]},{"@type":"Person","@id":"https:\/\/imesh.ai\/blog\/#\/schema\/person\/b881b4a1c269b625dc91af0896f8036f","name":"Debasree Panda","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/imesh.ai\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1e02eb18435bad3283b1f03e1bf22de74113e9760ab00e90c41e539df347cd3d?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1e02eb18435bad3283b1f03e1bf22de74113e9760ab00e90c41e539df347cd3d?s=96&d=wp_user_avatar&r=g","caption":"Debasree Panda"},"description":"Debasree is the CEO of IMESH. He understands customer pain points in cloud and microservice architecture. Previously, he led product marketing and market research teams at Digitate and OpsMx, where he had created a multi-million dollar sales pipeline. He has helped open-source solution providers- Tetrate, OtterTune, and Devtron- design GTM from scratch and achieve product-led growth. He firmly believes serendipity happens to diligent and righteous people.","sameAs":["https:\/\/imesh.ai"],"url":"https:\/\/imesh.ai\/blog\/author\/debasreeimesh-ai\/"}]}},"jetpack_featured_media_url":"https:\/\/imesh.ai\/blog\/wp-content\/uploads\/2023\/03\/What-is-Istio-Ambient-Mesh-e1679661546148.jpg","_links":{"self":[{"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/posts\/579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/comments?post=579"}],"version-history":[{"count":27,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/posts\/579\/revisions"}],"predecessor-version":[{"id":1463,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/posts\/579\/revisions\/1463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/media\/639"}],"wp:attachment":[{"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/media?parent=579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/categories?post=579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/imesh.ai\/blog\/wp-json\/wp\/v2\/tags?post=579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}