Alternatives to F5 NGINX Gateway Fabric

Compare F5 NGINX Gateway Fabric alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to F5 NGINX Gateway Fabric in 2024. Compare features, ratings, user reviews, pricing, and more from F5 NGINX Gateway Fabric competitors and alternatives in order to make an informed decision for your business.

  • 1
    Gloo Edge

    Gloo Edge

    solo.io

    Gloo Edge is an Envoy-based API gateway and ingress controller to facilitate and secure application traffic at the edge. An API gateway receives requests from clients (e.g. external clients like web and mobile applications or applications and services located on-premises, in the cloud or mixed in hybrid environments) and manages ingress to the appropriate services within its domain. The API gateway sits in the data plane and manages “North/South” traffic by providing services including security, reliability, filtering, transformations, and routing. Working collectively, the API gateway can provide higher-level services such as high availability, load balancing, failover, zero-trust security, tracing, and metrics gathering. Gloo Edge is a Kubernetes-native, next-generation API Gateway built on Envoy Proxy to manage, secure, and observe traffic at the edge.
  • 2
    Google Kubernetes Engine (GKE)
    Run advanced apps on a secured and managed Kubernetes service. GKE is an enterprise-grade platform for containerized applications, including stateful and stateless, AI and ML, Linux and Windows, complex and simple web apps, API, and backend services. Leverage industry-first features like four-way auto-scaling and no-stress management. Optimize GPU and TPU provisioning, use integrated developer tools, and get multi-cluster support from SREs. Start quickly with single-click clusters. Leverage a high-availability control plane including multi-zonal and regional clusters. Eliminate operational overhead with auto-repair, auto-upgrade, and release channels. Secure by default, including vulnerability scanning of container images and data encryption. Integrated Cloud Monitoring with infrastructure, application, and Kubernetes-specific views. Speed up app development without sacrificing security.
  • 3
    Google Cloud Traffic Director
    Toil-free traffic management for your service mesh. Service mesh is a powerful abstraction that's become increasingly popular to deliver microservices and modern applications. In a service mesh, the service mesh data plane, with service proxies like Envoy, moves the traffic around and the service mesh control plane provides policy, configuration, and intelligence to these service proxies. Traffic Director is GCP's fully managed traffic control plane for service mesh. With Traffic Director, you can easily deploy global load balancing across clusters and VM instances in multiple regions, offload health checking from service proxies, and configure sophisticated traffic control policies. Traffic Director uses open xDSv2 APIs to communicate with the service proxies in the data plane, which ensures that you are not locked into a proprietary interface.
  • 4
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 5
    Kong Mesh
    Enterprise service mesh based on Kuma for multi-cloud and multi-cluster on both Kubernetes and VMs. Deploy with a single command. Connect to other services automatically with built-in service discovery, including an Ingress resource and remote CPs. Support across any environment, including multi-cluster, multi-cloud and multi-platform on both Kubernetes and VMs. Accelerate initiatives like zero-trust and GDPR with native mesh policies, improving the speed and efficiency of every application team. Deploy a single control plane that can scale horizontally to many data planes, or support multiple clusters or even hybrid service meshes running on both Kubernetes and VMs combined. Simplify cross-zone communication using an Envoy-based ingress deployment on both Kubernetes and VMs, as well as the built-in DNS resolver for service-to-service communication. Built on top of Envoy with 50+ observability charts out of the box, you can collect metrics, traces, and logs of all L4-L7 traffic.
    Starting Price: $250 per month
  • 6
    Linkerd

    Linkerd

    Buoyant

    Linkerd adds critical security, observability, and reliability features to your Kubernetes stack—no code change required. Linkerd is 100% Apache-licensed, with an incredibly fast-growing, active, and friendly community. Built in Rust, Linkerd's data plane proxies are incredibly small (<10 mb) and blazing fast (p99 < 1ms). No complex APIs or configuration. For most applications, Linkerd will “just work” out of the box. Linkerd's control plane installs into a single namespace, and services can be safely added to the mesh, one at a time. Get a comprehensive suite of diagnostic tools, including automatic service dependency maps and live traffic samples. Best-in-class observability allows you to monitor golden metrics—success rate, request volume, and latency—for every service.
  • 7
    F5 Aspen Mesh
    F5 Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. As part of F5, Aspen Mesh is focused on delivering enterprise-class products that enhance companies’ modern app environments. Deliver new and differentiating features faster with microservices. Aspen Mesh lets you do that at scale, with confidence. Reduce the risk of downtime and improve your customers’ experience. If you’re scaling microservices to production on Kubernetes, Aspen Mesh will help you get the most out of your distributed systems. Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. Alerts that decrease the risk of application failure or performance degradation based on data and machine learning models. Secure Ingress safely exposes enterprise apps to customers and the web.
  • 8
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 9
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 10
    Buoyant Cloud
    Fully managed Linkerd, right on your cluster. Running a service mesh shouldn’t require a team of engineers. Buoyant Cloud manages Linkerd so that you don’t have to. Automate away the toil. Buoyant Cloud automatically keeps your Linkerd control plane and data plane up to date with the latest versions and handles installs, trust anchor rotation, and more. Automate upgrades, installs, and more. Keep data plane proxy versions always in sync. Rotate TLS trust anchors without breaking a sweat. Never get taken unaware. Buoyant Cloud continuously monitors the health of your Linkerd deployments and proactively alerts you of potential issues before they escalate. Automatically track service mesh health. Get a global, cross-cluster view of Linkerd's behavior. Monitor and report Linkerd best practices. Forget overly-complicated solutions that pile one layer of complexity on top of another. Linkerd just works, and Buoyant Cloud makes Linkerd easier than ever.¿
  • 11
    Traefik Mesh

    Traefik Mesh

    Traefik Labs

    Traefik Mesh is a straight-forward, easy to configure, and non-invasive service mesh that allows visibility and management of the traffic flows inside any Kubernetes cluster. By improving monitoring, logging, and visibility, as well as implementing access controls. Allows administrators to increase the security of their clusters easily and quickly. By being able to monitor and trace how applications communicate in your Kubernetes cluster, administrators are able to optimize internal communications, and improve application performance. Reducing the time to learn, install, and configure makes it easier to implement, and to provide value for the time actually spent implementing. Administrators can focus on their business applications. Being open source means that there is no vendor lock-in, as Traefik Mesh is opt-in by design.
  • 12
    Netmaker

    Netmaker

    Netmaker

    Netmaker is an open source tool based on the groundbreaking WireGuard protocol. Netmaker unifies distributed environments with ease, from multi-cloud to Kubernetes. Netmaker enhances Kubernetes clusters by providing flexible and secure networking for cross-environment scenarios. Netmaker uses WireGuard for modern, secure encryption. It is built with zero trust in mind, utilizes access control lists, and follows leading industry standards for secure networking. Netmaker enables you to create relays, gateways, full VPN meshes, and even zero trust networks. Netmaker is fully configurable to let you maximize the power of Wireguard.
  • 13
    Istio

    Istio

    Istio

    Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh.
  • 14
    Anthos Service Mesh
    Designing your applications as microservices provides many benefits. However, your workloads can become complex and fragmented as they scale. Anthos Service Mesh is Google's implementation of the powerful Istio open source project, which allows you to manage, observe, and secure services without having to change your application code. Anthos Service Mesh simplifies service delivery, from managing mesh telemetry and traffic to protecting communications between services, significantly reducing the burden on development and operations teams. Anthos Service Mesh is Google's fully managed service mesh, allowing you to easily manage these complex environments and reap all the benefits they offer. As a fully managed offering, Anthos Service Mesh takes the guesswork and effort out of purchasing and managing your service mesh solution. Focus on building great apps and let us take care of the mesh.
  • 15
    Gloo Mesh

    Gloo Mesh

    solo.io

    Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware network tasks to be managed independently from the application, adding observability, security, and reliability to distributed applications. By introducing the service mesh to your applications, you can: Simplify the application layer Provide more insights into your traffic Increase the security of your application
  • 16
    Kiali

    Kiali

    Kiali

    Kiali is a management console for Istio service mesh. Kiali can be quickly installed as an Istio add-on or trusted as a part of your production environment. Using Kiali wizards to generate application and request routing configuration. Kiali provides Actions to create, update and delete Istio configuration, driven by wizards. Kiali offers a robust set of service actions, with accompanying wizards. Kiali provides a list and detailed views for your mesh components. Kiali provides filtered list views of all your service mesh definitions. Each view provides health, details, YAML definitions and links to help you visualize your mesh. Overview is the default Tab for any detail page. The overview tab provides detailed information, including health status, and a detailed mini-graph of the current traffic involving the component. The full set of tabs, as well as the detailed information, varies based on the component type.
  • 17
    F5 NGINX Plus
    The software load balancer, reverse proxy, web server, & content cache with the enterprise features and support you expect. Modern app infrastructure and dev teams love NGINX Plus. More than just the fastest web server around, NGINX Plus brings you everything you love about NGINX Open Source, adding enterprise‑grade features like high availability, active health checks, DNS system discovery, session persistence, and a RESTful API. NGINX Plus is a cloud‑native, easy-to-use reverse proxy, load balancer, and API gateway. Whether you need to integrate advanced monitoring, strengthen security controls, or orchestrate Kubernetes containers, NGINX Plus delivers the five‑star support you expect from NGINX. NGINX Plus provides scalable and reliable high availability along with monitoring to support debugging and diagnosing complex application architectures. Active health checks proactively poll upstream server status to get ahead of issues.
  • 18
    greymatter.io

    greymatter.io

    greymatter.io

    Maximize your resources. Ensure optimal use of your clouds, platforms, and software. This is application and API network operations management redefined. The same governance rules, observability, auditing, and policy control for every application, API, and network across your multi-cloud, data center and edge environments, all in one place. Zero-trust micro-segmentation, omni-directional traffic splitting, infrastructure agnostic attestation, and traffic management to secure your resources. ​IT-informed decision-making is real. Application, API & network monitoring and control generate massive IT operations data. Use it in real time through AI. Logging, metrics, tracing, and audits through Grey Matter simplifies integration and standardizes aggregation for all IT Operations data. Fully leverage your mesh telemetry and securely and flexibly future-proof your hybrid infrastructure.
  • 19
    Meshery

    Meshery

    Meshery

    Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes.
  • 20
    AWS App Mesh

    AWS App Mesh

    Amazon Web Services

    AWS App Mesh is a service mesh that provides application-level networking to facilitate communication between your services across various types of computing infrastructure. App Mesh offers comprehensive visibility and high availability for your applications. Modern applications are generally made up of multiple services. Each service can be developed using various types of compute infrastructure, such as Amazon EC2, Amazon ECS, Amazon EKS, and AWS Fargate. As the number of services within an application grows, it becomes difficult to pinpoint the exact location of errors, redirect traffic after errors, and safely implement code changes. Previously, this required creating monitoring and control logic directly in your code and redeploying your services every time there were changes.
  • 21
    IBM Cloud Managed Istio
    Istio is an open technology that provides a way for developers to seamlessly connect, manage and secure networks of different microservices — regardless of platform, source or vendor. Istio is currently one of the fastest-growing open-source projects based on Github contributors, and its strength is its community. IBM is proud to be a founder and contributor of the Istio project and a leader of Istio Working Groups. Istio on IBM Cloud Kubernetes Service is offered as a managed add-on that integrates Istio directly with your Kubernetes cluster. A single click deploys a tuned, production-ready Istio instance on your IBM Cloud Kubernetes Service cluster. A single click runs Istio core components and tracing, monitoring and visualization tools. IBM Cloud updates all Istio components and manages the control-plane component's lifecycle.
  • 22
    VMware Avi Load Balancer
    Simplify application delivery with software-defined load balancers, web application firewall, and container ingress services for any application in any data center and cloud. Simplify administration with centralized policies and operational consistency across on-premises data centers, and hybrid and public clouds, including VMware Cloud (VMC on AWS, OCVS, AVS, GCVE), AWS, Azure, Google, and Oracle Cloud. Free infrastructure teams from manual tasks and enable DevOps teams with self-service. Application delivery automation toolkits include Python SDK, RESTful APIs, Ansible and Terraform integrations. Gain unprecedented insights, including network, end users and security, with real-time application performance monitoring, closed-loop analytics and deep machine learning.
  • 23
    Calisti

    Calisti

    Cisco

    Calisti enables security, observability, traffic management for microservices and cloud native applications, and allows admins to switch between live and historical views. Configuring Service Level Objectives (SLOs), burn rate, error budget and compliance monitoring, Calisti sends a GraphQL alert to automatically scale based on SLO burn rate. Calisti manages microservices running on containers and virtual machines, allowing for application migration from VMs to containers in a phased manner. Reducing management overhead by applying policies consistently and meeting application Service Level Objectives across both K8s and VMs. Istio has new releases every three months. Calisti includes our Istio Operator that automates lifecycle management, and even enables canary deployment of the platform itself.
  • 24
    Network Service Mesh

    Network Service Mesh

    Network Service Mesh

    A common flat vL3 domain allowing DBs running in multiple clusters/clouds/hybrid to communicate just with each other for DB replication. Workloads from multiple companies connecting to a single ‘collaborative’ Service Mesh for cross company interactions. Each workload has a single option of what connectivity domain to be connected to, and only workloads in a given runtime domain could be part of its connectivity domain. In short: Connectivity Domains are Strongly Coupled to Runtime Domains. A central tenant of Cloud Native is Loose Coupling. In a Loosely Coupled system, the ability for each workload to receive service from alternative providers is preserved. What Runtime Domain a workload is running in is a non-sequitur to its communications needs. Workloads that are part of the same App need Connectivity between each other no matter where they are running.
  • 25
    ServiceStage

    ServiceStage

    Huawei Cloud

    Deploys your applications using containers, VMs, or serverless, and easily implements auto scaling, performance analysis, and fault diagnosis. Supports native Spring Cloud and Dubbo frameworks and Service Mesh, provides all-scenario capabilities, and supports mainstream languages such as Java, Go, PHP, Node.js, and Python. Supports cloud-native transformation of Huawei core services, meeting strict performance, usability, and security compliance requirements. Development frameworks, running environments, and common components are available for web, microservice, mobile, and AI applications. Full management of applications throughout the entire process, including deployment and upgrade. Monitoring, events, alarms, logs, and tracing diagnosis, and built-in AI capabilities, making O&M easy. Creates a flexibly customizable application delivery pipeline with only a few clicks.
    Starting Price: $0.03 per hour-instance
  • 26
    ARMO

    ARMO

    ARMO

    ARMO provides total security for in-house workloads and data. Our patent-pending technology prevents breaches and protects against security overhead regardless of your environment, cloud-native, hybrid, or legacy. ARMO protects every microservice and protects it uniquely. We do this by creating a cryptographic code DNA-based workload identity, analyzing each application’s unique code signature, to deliver an individualized and secure identity to every workload instance. To prevent hacking, we establish and maintain trusted security anchors in the protected software memory throughout the application execution lifecycle. Stealth coding-based technology blocks all attempts at reverse engineering of the protection code and ensures comprehensive protection of secrets and encryption keys while in-use. Our keys are never exposed and thus cannot be stolen.
  • 27
    Envoy

    Envoy

    Envoy Proxy

    As on the ground microservice practitioners quickly realize, the majority of operational problems that arise when moving to a distributed architecture are ultimately grounded in two areas: networking and observability. It is simply an orders of magnitude larger problem to network and debug a set of intertwined distributed services versus a single monolithic application. Envoy is a self contained, high performance server with a small memory footprint. It runs alongside any application language or framework. Envoy supports advanced load balancing features including automatic retries, circuit breaking, global rate limiting, request shadowing, zone local load balancing, etc. Envoy provides robust APIs for dynamically managing its configuration.
  • 28
    Valence

    Valence

    Valence Security

    Today, organizations automate business processes by integrating hundreds of applications via direct APIs, SaaS marketplaces and third-party apps, and hyperautomation platforms, forming a SaaS to SaaS supply chain. ‍ The supply chain enables exchange of data and privileges via an expanding network of indiscriminate and shadow connectivity. This leads to an increasing risk surface of supply chain attacks, misconfigurations and data exposure. Bring SaaS to SaaS connectivity out of the shadows and map your risk surface. Identify and alert on risky changes, new integrations and anomalous data flows. Extend zero trust principles to your SaaS to SaaS supply chain with governance and policy enforcement. Delivers quick, continuous and non-intrusive SaaS to SaaS supply chain risk surface management. Streamlines collaboration between business application teams and enterprise IT security teams.
  • 29
    NGINX Unit
    An universal web app server that combines several layers of the typical application stack into a single component. NGINX Unit simplifies the application stack for web apps and APIs by combining several layers of the typical stack into a single component. NGINX Unit is a universal web app server, intended as a building block for any web architecture regardless of its complexity, from enterprise-scale deployments to your pet's home page. It is equally suited to simplifying modern microservices environments as it is to modernizing legacy and monolithic applications. NGINX Unit was created by the original NGINX team on an all-new, open-source codebase. The architecture incorporates insights from over a decade of running the world’s most popular web server. Unlike the NGINX web server, NGINX Unit uses a multi-process, multi-threaded architecture. The NGINX web server is often deployed as a reverse proxy in front of web applications. NGINX Unit can run the application code natively.
  • 30
    F5 NGINX Ingress Controller
    Streamline and simplify Kubernetes (north-south) network traffic management, delivering consistent, predictable performance at scale without slowing down your apps. Advanced app‑centric configuration – Use role‑based access control (RBAC) and self‑service to set up security guardrails (not gates), so your teams can manage their apps securely and with agility. Enable multi‑tenancy, reusability, simpler configs, and more. A native, type‑safe, and indented configuration style to simplify capabilities like circuit breaking, sophisticated routing, header manipulation, mTLS authentication, and WAF. Plus if you’re already using NGINX, NGINX Ingress resources make it easy to adapt existing configuration from your other environments.
  • 31
    F5 NGINXaaS for Azure
    NGINX as a Service (NGINXaaS) for Azure is a fully managed offering that integrates the Microsoft Azure ecosystem with advanced NGINX traffic services. Lift and shift, migrate, or extend existing NGINX workloads to the cloud with minimal effort, helping your organization save money, increase flexibility, and achieve consistency in performance and security across its estate of on-prem and Azure cloud apps. Enables application developers to deliver consistent apps in the cloud, deployed straight from the Azure Marketplace with just a few clicks on the console. Deploy and manage NGINXaaS via the Azure Portal with built-in integrations, including Azure Monitor and Azure Key Vault for SSL/TLS certificate management. Seamless lift-and-shift experience of your existing NGINX configuration, so you can migrate or extend your workloads to the cloud faster and with minimal effort.
    Starting Price: $0.015 per ncu per hour
  • 32
    Mirantis Kubernetes Engine
    Mirantis Kubernetes Engine (formerly Docker Enterprise) provides simple, flexible, and scalable container orchestration and enterprise container management. Use Kubernetes, Swarm, or both, and experience the fastest time to production for modern applications across any environment. Enterprise container orchestration Avoid lock-in. Run Mirantis Kubernetes Engine on bare metal, or on private or public clouds—and on a range of popular Linux distributions. Reduce time-to-value. Hit the ground running with out-of-the-box dependencies including Calico for Kubernetes networking and NGINX for Ingress support. Leverage open source. Save money and maintain control by using a full stack of open source-based technologies that are production-proven, scalable, and extensible. Focus on apps—not infrastructure. Enable your IT team to focus on building business-differentiating applications when you couple Mirantis Kubernetes Engine with OpsCare Plus for a fully-managed K8s experience.
  • 33
    ApacheBooster

    ApacheBooster

    NdimensionZ

    ApacheBooster has been specifically designed to enhance the working of web servers based on cPanel. ApacheBooster as the name suggests boosts the working ability of the Apache web server, which is according to the census the most used web server in the world! Nginx and varnish has been fused together in ApacheBooster to make it effectively efficient in its working. Nginx is a super quality high performing web server software that speeds up the working of the web server. The best feature of Nginx is that it is very fast in its working i.e in retrieving static files and also helps in saving memory by using less memory for processing of concurrent requests. It is very efficient in handling traffic requests. With the less amount of memory used, it is capable of handling more requests/clients when compared to Apache. Nginx is a reverse proxy server of open source type that smartly balances the load, a web server and web cache (also known as HTTP cache).
  • 34
    HashiCorp Consul
    A multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. Real-time health and location information of all services. Progressive delivery and zero trust security with less overhead. Receive peace of mind that all HCP connections are secured out of the box. Gain insight into service health and performance metrics with built-in visualization directly in the Consul UI or by exporting metrics to a third-party solution. Many modern applications have migrated towards decentralized architectures as opposed to traditional monolithic architectures. This is especially true with microservices. Since applications are composed of many inter-dependent services, there's a need to have a topological view of the services and their dependencies. Furthermore, there is a desire to have insight into health and performance metrics for the different services.
  • 35
    Apache ServiceComb
    Open-source, full-stack microservice solution. With out-of-the-box, high performance, compatible with popular ecology, and multi-language support. Service contract guarantee based on OpenAPI. One-click scaffolding, out of the box, speeds up the building of microservice applications. The ecological extension supports multiple development languages such as Java/Golang/PHP/NodeJS. Apache ServiceComb is an open-source solution for microservices. It consists of multiple components that can be flexibly adapted to different scenarios through the combination of components. This guide can help you get started quickly with Apache ServiceComb, which is the best place to start trying for first-time users. To decouple the programming and communication models, so that a programming model can be combined with any communication models as needed. Application developers only need to focus on APIs during development and can flexibly switch communication models during deployment.
  • 36
    Cisco Service Mesh Manager
    The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language. With the accelerating demand for digital transformation, businesses are increasingly adopting cloud-native architectures. Microservice-based applications are created with software functionality spread across multiple services that are independently deployable, easier to maintain and test, and can be more rapidly updated.
  • 37
    OpenResty

    OpenResty

    OpenResty

    OpenResty® is a full-fledged web platform that integrates our enhanced version of the Nginx core, our enhanced version of LuaJIT, many carefully written Lua libraries, lots of high-quality 3rd-party Nginx modules, and most of their external dependencies. It is designed to help developers easily build scalable web applications, web services, and dynamic web gateways. By taking advantage of various well-designed Nginx modules (most of which are developed by the OpenResty team themselves), OpenResty® effectively turns the nginx server into a powerful web app server, in which the web developers can use the Lua programming language to script various existing nginx C modules and Lua modules and construct extremely high-performance web applications that are capable to handle 10K ~ 1000K+ connections in a single box. OpenResty® aims to run your server-side web app completely in the Nginx server, leveraging Nginx's event model to do non-blocking I/O with the HTTP clients.
  • 38
    Gloo

    Gloo

    Solo.io

    Gloo Platform integrates API gateway, API management, Kubernetes Ingress, Istio service mesh and cloud-native networking into a unified application networking platform. By addressing both internal and external communication security, the unified Gloo Platform UI and API leads to more automation and faster app deployment times, reduces time-to-value for new applications and services deployments, and makes you more competitive in your markets. Customers may start by addressing one challenge, but the unified nature of Gloo Platform makes it easy to solve your next challenge using the same solution. This makes it easier to introduce concepts like zero trust security to your modern infrastructure today. Gloo Platform components are powered by open source projects like Envoy proxy, Istio service mesh, and Cilium CNI.
  • 39
    BunkerWeb

    BunkerWeb

    Bunkerity

    BunkerWeb is a next-generation and open-source Web Application Firewall (WAF). Being a full-featured web server (based on NGINX under the hood), it will protect your web services to make them "secure by default". BunkerWeb integrates seamlessly into your existing environments (Linux, Docker, Swarm, Kubernetes, …) and is fully configurable (don't panic, there is an awesome web UI if you don't like the CLI) to meet your own use-cases . In other words, cybersecurity is no more a hassle. BunkerWeb contains primary security features as part of the core but can be easily extended with additional ones thanks to a plugin system).
  • 40
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 41
    Galapagos
    Galapagos is a server-side framework that can be used to develop multiplayer, Turn Based games for popular mobile platforms. It uses a service based approach offering a list of APIs through which you can directly implement all basic functionalities of a Turn Based game. Written in Python, Galapagos uses WebOb and Requests libraries to handle HTTP requests and responses. Nginx in the frontend acts as reverse proxy. Galapagos stores game data in our servers using MySQL. Python and MySQL database interact using PyMySQL. Games with multiplayer feature allow more than one player to play the game. All the players play the same game together. Games that use this strategy require the player to wait for his turn while his opponents complete their turn of play. This is one of the many ways mobile games are played and our gaming platform can be used to build games with such a logic.
  • 42
    open-appsec

    open-appsec

    open-appsec

    automatic web application & API security using machine learning open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 43
    Google Cloud Endpoints
    Develop, deploy, protect, and monitor your APIs with Cloud Endpoints. An NGINX-based proxy and distributed architecture give unparalleled performance and scalability. Using an OpenAPI Specification or one of our API frameworks, Cloud Endpoints gives you the tools you need for every phase of API development and provides insight with Cloud Logging, Cloud Monitoring, and Cloud Trace. Control who has access to your API and validate every call with JSON Web Tokens and Google API keys. Integration with Auth0 and Firebase Authentication lets you identify the users of your web or mobile application. Extensible Service Proxy delivers security and insight in less than 1 ms per call. Deploy your API automatically with App Engine and Google Kubernetes Engine, or add our proxy container to your Kubernetes deployment. Monitor critical operations metrics in Google Cloud Console, and gain insight into your users and usage with Cloud Trace, Cloud Logging, and BigQuery.
  • 44
    F5 BIG-IP Container Ingress Services
    Organizations are adopting containerized environments to speed app development. But these apps still need services, such as routing, SSL offload, scale, and security. F5 Container Ingress Services makes it easy to deliver advanced application services to your container deployments, enabling Ingress control HTTP routing, load balancing, and application delivery performance, as well as robust security services. Container Ingress Services easily integrates BIG-IP solutions with native container environments, such as Kubernetes, and PaaS container orchestration and management systems, such as RedHat OpenShift. Scale apps to meet container workloads and enable security services to protect container data. Container Ingress Services enables self-service app performance and security services within your orchestration by integrating BIG-IP platforms with your container environment.
  • 45
    Hava

    Hava

    Hava

    Create interactive cloud diagrams in minutes from multiple cloud vendors. Discover what's actually configured and running, view security, open ports, and traffic ingress/egress. Fully automated, no tedious drawing required. Once you connect Hava securely to your cloud accounts, within minutes you will have a set of logically laid out infrastructure diagrams grouped by VPCs or resource zones, detailing all the resources and their connectivity. Selecting each resource will reveal all the attributes like security groups, connections, subnets, and ingress/egress IPs which means you can easily spot anomalies, review cost forecasts, and export diagrams for on-boarding, management, audit, and compliance purposes. View live interactive diagrams and export them in seconds. No more trawling through consoles and spending days with drag and drop drawing tools. View configures resources, security groups, route tables, resource connections, and subnets.
  • 46
    Traefik

    Traefik

    Traefik Labs

    What is Traefik Enterprise Edition? TraefikEE is a cloud-native load balancer and Kubernetes ingress controller that eases networking complexity for application teams. Built on top of open source Traefik, TraefikEE brings exclusive distributed and high-availability features combined with premium bundled support for production grade deployments. Split into proxies and controllers, TraefikEE supports clustered deployments to increase security, scalability and high availability. Deploy applications anywhere, on-premises or in the cloud, and natively integrate with top-notch infrastructure tooling. Save time and give better consistency while deploying, managing, and scaling applications by leveraging dynamic and automatic TraefikEE features. Improve the application development and delivery cycle by giving developers the visibility and ownership of their services.
  • 47
    Anthos

    Anthos

    Google

    Anthos lets you build, deploy, and manage applications anywhere in a secure, consistent manner. You can modernize existing applications running on virtual machines while deploying cloud-native apps on containers in an increasingly hybrid and multi-cloud world. Our application platform provides a consistent development and operations experience across all your deployments while reducing operational overhead and improving developer productivity. Anthos GKE: Enterprise-grade container orchestration and management service for running Kubernetes clusters anywhere, in both cloud and on-premises environments. Anthos Config Management: Define, automate, and enforce policies across environments in order to meet your organization’s unique security and compliance requirements. Anthos Service Mesh: Anthos unburdens operations and development teams by empowering them to manage and secure traffic between services while monitoring, troubleshooting, and improving application performance.
  • 48
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 49
    Volumez

    Volumez

    Volumez

    We make composable data infrastructure possible and the "compossibilities" are endless. Volumez is SaaS composable data infrastructure. With Volumez, you can deploy applications in your cloud with precise control of IO characteristics using a fully declarative interface. In composable infrastructure, storage, networking, and compute resources are abstracted from their physical locations and provided dynamically to applications. Volumez profiles the performance and capabilities of each infrastructure component and uses this information to compose direct Linux data paths between media and applications. Once the composing work is done, there is no need for the control plane to be in the way between applications and their data. This enables applications to get enterprise-grade logical volumes, with extremely guaranteed performance, and enterprise-grade services that are built on top of Linux, such as snapshots, thin provisioning, erasure coding, and more.
  • 50
    Project Calico

    Project Calico

    Project Calico

    Calico is an open-source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Mirantis Kubernetes Engine (MKE), OpenStack, and bare metal services. Whether you opt to use Calico's eBPF data plane or Linux’s standard networking pipeline, Calico delivers blazing-fast performance with true cloud-native scalability. Calico provides developers and cluster operators with a consistent experience and set of capabilities whether running in the public cloud or on-prem, on a single node, or across a multi-thousand-node cluster. Calico gives you a choice of data planes, including a pure Linux eBPF data plane, a standard Linux networking data plane, and a Windows HNS data plane. Whether you prefer the cutting-edge features of eBPF or the familiarity of the standard primitives that existing system administrators already know, Calico has you covered.