TrustRadius: an HG Insights company

Istio

Score9 out of 10

6 Reviews and Ratings

What is Istio?

The Istio service mesh is designed to address the challenges developers and operators face with a distributed or microservices architecture, whether they are building from scratch or migrating existing applications to cloud native.

An open source service mesh, Istio's features provide a uniform way to secure, connect, and monitor services. Istio is the path to load balancing, service-to-service authentication, and monitoring – with few or no service code changes. Its powerful control plane brings vital features, including:
  • Secure service-to-service communication in a cluster with TLS encryption, strong identity-based authentication and authorization
  • Automatic load balancing for HTTP, gRPC, WebSocket, and TCP traffic
  • Fine-grained control of traffic behavior with rich routing rules, retries, failovers, and fault injection
  • A pluggable policy layer and configuration API supporting access controls, rate limits and quotas
  • Automatic metrics, logs, and traces for all traffic within a cluster, including cluster ingress and egress
Istio is designed for extensibility and can handle a diverse range of deployment needs. Istio’s control plane runs on Kubernetes, and the user can add applications deployed in that cluster to a mesh, extend the mesh to other clusters, or even connect VMs or other endpoints running outside of Kubernetes.

Categories & Use Cases

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Product Demos

Technical Details

Technical Details
Mobile ApplicationNo

FAQs

What is Istio?
Istio is an open source service mesh that layers transparently onto existing distributed applications. Istio’s features provide a uniform way to secure, connect, and monitor services. Istio is the path to load balancing, service-to-service authentication, and monitoring.