29 Integrations with Istio
View a list of Istio integrations and software that integrates with Istio below. Compare the best Istio integrations as well as features, ratings, user reviews, and pricing of software that integrates with Istio. Here are the current Istio integrations in 2024:
-
1
New Relic
New Relic
There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.Starting Price: Free -
2
Kubernetes
Kubernetes
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.Starting Price: Free -
3
Ambassador
Ambassador Labs
Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience -
4
Cequence Security
Cequence Security
Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool. -
5
Traceable
Traceable
Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.Starting Price: $0 -
6
Kong Konnect
Kong
Kong Konnect Enterprise Service Connectivity Platform brokers an organization’s information across all services. Built on top of Kong’s battle-tested core, Kong Konnect Enterprise enables customers to simplify management of APIs and microservices across hybrid-cloud and multi-cloud deployments. With Kong Konnect Enterprise, customers can proactively identify anomalies and threats, automate tasks, and improve visibility across their entire organization. Stop managing your applications and services, and start owning them with the Kong Konnect Enterprise Service Connectivity Platform. Kong Konnect Enterprise provides the industry’s lowest latency and highest scalability to ensure your services always perform at their best. Kong Konnect has a lightweight, open source core that allows you to optimize performance across all your services, no matter where they run. -
7
D2iQ
D2iQ
D2iQ Enterprise Kubernetes Platform (DKP) Run Kubernetes Workloads at Scale DKP includes everything you need to ease Kubernetes adoption, expand Kubernetes use, and enable advanced workloads across any infrastructure, whether on-prem, on the cloud, in air-gapped environments, or at the edge. Built to Solve the Toughest Enterprise Kubernetes Challenges Created to accelerate the journey to production at scale, DKP provides a single, centralized point of control to build, run, and manage applications across any infrastructure. Enable Day 2 Readiness Out-of-the-Box Without Lock-In DKP takes care of the heavy lifting by providing a comprehensive, enterprise-grade Kubernetes distribution and a full stack of CNCF-certified Day 2 platform applications that are integrated, automated, and tested at scale for an out-of-the-box, production-ready experience. -
8
Elastic Observability
Elastic
Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.Starting Price: $16 per month -
9
Glasnostic
Glasnostic
Glasnostic inserts agentlessly into the network data path, observes interaction patterns between services, detects anomalies, and responds with effective and predictable control primitives, in real-time and automatically. Visibility is worth little if disconnected from the action. With Glasnostic, engineers can respond to system behaviors in real-time and proactively. Glasnostic inserts transparent controllers into the network data plane, which collectively act as a brain-in-the-wire that detects and responds to behaviors in real-time. Interaction metrics are sent to the control plane for storage, anomaly detection, and automated or manual control. Glasnostic works with all major cloud technologies and integrates with existing tools from AIOps to workflow and security tools via APIs and webhooks. Glasnostic works with all major technology stacks. View system behaviors holistically, uniformly, and everywhere.Starting Price: $250 per month -
10
Gloo Mesh
solo.io
Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware network tasks to be managed independently from the application, adding observability, security, and reliability to distributed applications. By introducing the service mesh to your applications, you can: Simplify the application layer Provide more insights into your traffic Increase the security of your application -
11
Speedscale
Speedscale
Validate the performance and quality of your apps with real-world traffic scenarios. Preview code performance, quickly spot problems, and rest assured your app runs optimally when it’s time to release. Mimic real-life scenarios, test load, and create intelligent simulations of third-party and internal backend systems to better prepare for production. No need to spin up costly new environments each time you test. Built-in autoscaling drives your cloud costs down even further. Bypass complex, homegrown frameworks and manual test scripts so you can ship more code, faster. Be confident that new code changes can handle high-traffic scenarios. Prevent major outages, meet SLAs, and protect the customer experience. Simulate third-party systems and internal backends for more reliable, affordable testing. No need to spin up costly, end-to-end environments that take days to deploy. Seamlessly migrate off legacy architecture without disrupting the customer experience.Starting Price: $100 per GB -
12
Northflank
Northflank
The self-service developer platform for your apps, databases, and jobs. Start with one workload, and scale to hundreds on compute or GPUs. Accelerate every step from push to production with highly configurable self-service workflows, pipelines, templates, and GitOps. Securely deploy preview, staging, and production environments with observability tooling, backups, restores, and rollbacks included. Northflank seamlessly integrates with your preferred tooling and can accommodate any tech stack. Whether you deploy on Northflank’s secure infrastructure or on your own cloud account, you get the same exceptional developer experience, and total control over your data residency, deployment regions, security, and cloud expenses. Northflank leverages Kubernetes as an operating system to give you the best of cloud-native, without the overhead. Deploy to Northflank’s cloud for maximum simplicity, or connect your GKE, EKS, AKS, or bare-metal to deliver a managed platform experience in minutes.Starting Price: $6 per month -
13
Prosimo
Prosimo
Applications are fragmented & distributed. The proliferation of infrastructure stacks across multi-cloud for users to access applications and to talk to each other creates complexity. The result is subpar application experience, increased operational cost, and fragmented security. Today's multi-cloud world requires a new Application eXperience Infrastructure stack—one that improves user application experience, provides secure access and optimizes cloud spend so that you can focus on business outcomes. The Prosimo Application eXperience Infrastructure (AXI) is a vertically integrated cloud-native infrastructure stack that sits in front of applications and delivers consistently faster, more secure application experiences cost-optimized. AXI gives cloud architects and operations teams a decision-oriented platform that is easy to use. Powered by data insights and machine learning models, the Prosimo AXI platform delivers better results in minutes. -
14
Beats
Elastic
Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.Starting Price: $16 per month -
15
Circonus IRONdb
Circonus
Circonus IRONdb makes it easy to handle and store unlimited volumes of telemetry data, easily handling billions of metric streams. Circonus IRONdb enables users to identify areas of opportunity and challenge in real time, providing forensic, predictive, and automated analytics capabilities that no other product can match. Rely on machine learning to automatically set a “new normal” as your data and operations dynamically change. Circonus IRONdb integrates with Grafana, which has native support for our analytics query language. We are also compatible with other visualization apps, such as Graphite-web. Circonus IRONdb keeps your data safe by storing multiple copies of your data in a cluster of IRONdb nodes. System administrators typically manage clustering, often spending significant time maintaining it and keeping it working. Circonus IRONdb allows operators to set and forget their cluster, and stop wasting resources manually managing their time series data store. -
16
Wallarm API Security Platform
Wallarm
Wallarm automates real-time application protection for websites, microservices and APIs with its next-gen WAF, API protection, automated incident response and asset discovery features. Wallarm protects websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. Easy deployment in AWS, GCP, Azure, and hybrid clouds. Native support of Kubernetes environments and service-mesh architectures. Stop account takeover (ATO) and credential stuffing with flexible rules. Wallarm is the platform DevSecOps teams choose to build cloud-native applications securely. Wallarm protects websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. Wallarm API security natively deploys with industry-leading API gateway solutions. Depending on the API gateway your organization uses, you can easily install Wallarm. -
17
Flux
Flux CD
Flux is a set of continuous and progressive delivery solutions for Kubernetes that are open and extensible. The latest version of Flux brings many new features, making it more flexible and versatile. Flux is a CNCF Incubating project. Flux and Flagger deploy apps with canaries, feature flags, and A/B rollouts. Flux can also manage any Kubernetes resource. Infrastructure and workload dependency management are built-in. Flux enables application deployment (CD) and (with the help of Flagger) progressive delivery (PD) through automatic reconciliation. Flux can even push back to Git for you with automated container image updates to Git (image scanning and patching). Flux works with your Git providers (GitHub, GitLab, Bitbucket, can even use s3-compatible buckets as a source), all major container registries, and all CI workflow providers. Kustomize, Helm, RBAC, and policy-driven validation (OPA, Kyverno, admission controllers) so it simply falls into place. -
18
F5 Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. As part of F5, Aspen Mesh is focused on delivering enterprise-class products that enhance companies’ modern app environments. Deliver new and differentiating features faster with microservices. Aspen Mesh lets you do that at scale, with confidence. Reduce the risk of downtime and improve your customers’ experience. If you’re scaling microservices to production on Kubernetes, Aspen Mesh will help you get the most out of your distributed systems. Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. Alerts that decrease the risk of application failure or performance degradation based on data and machine learning models. Secure Ingress safely exposes enterprise apps to customers and the web.
-
19
ARMO
ARMO
ARMO provides total security for in-house workloads and data. Our patent-pending technology prevents breaches and protects against security overhead regardless of your environment, cloud-native, hybrid, or legacy. ARMO protects every microservice and protects it uniquely. We do this by creating a cryptographic code DNA-based workload identity, analyzing each application’s unique code signature, to deliver an individualized and secure identity to every workload instance. To prevent hacking, we establish and maintain trusted security anchors in the protected software memory throughout the application execution lifecycle. Stealth coding-based technology blocks all attempts at reverse engineering of the protection code and ensures comprehensive protection of secrets and encryption keys while in-use. Our keys are never exposed and thus cannot be stolen. -
20
Keyfactor Control
Keyfactor
You know the drill. Tight budgets, hardware constraints, and complex supply chains make it nearly impossible to consider all factors necessary to embed strong security into your devices. But when safety, security, and trust are at stake – it has to happen. Keyfactor Control is an end-to-end IoT Identity Platform that enables manufacturers to build high-assurance identity at every step of the device lifecycle – from product design through end-of-life. Embed PKI-based digital identity and integrity into every device at scale – from design and manufacturing throughout the product lifecycle. Build secure identity into device design and development easily, cost-effectively, and at scale. Reduce the cost of device maintenance with secure over-the-air updates and remote management. Protect devices against fraud and tampering, and avoid preventable security and warranty recalls. -
21
MicroK8s
Canonical
Low-ops, minimal production Kubernetes, for devs, cloud, clusters, workstations, Edge and IoT. MicroK8s automatically chooses the best nodes for the Kubernetes datastore. When you lose a cluster database node, another node is promoted. No admin needed for your bulletproof edge. MicroK8s is small, with sensible defaults that ‘just work’. A quick install, easy upgrades and great security make it perfect for micro clouds and edge computing. Full enterprise support available, with no subscription needed. Optional 24/7 support with 10 year security maintenance. Under the cell tower. On the racecar. On satellites or everyday appliances, MicroK8s delivers the full Kubernetes experience on IoT and micro clouds. Fully containerized deployment with compressed over-the-air updates for ultra-reliable operations. MicroK8s will apply security updates automatically by default, defer them if you want. Upgrade to a newer version of Kubernetes with a single command. It’s really that easy. -
22
Kiali
Kiali
Kiali is a management console for Istio service mesh. Kiali can be quickly installed as an Istio add-on or trusted as a part of your production environment. Using Kiali wizards to generate application and request routing configuration. Kiali provides Actions to create, update and delete Istio configuration, driven by wizards. Kiali offers a robust set of service actions, with accompanying wizards. Kiali provides a list and detailed views for your mesh components. Kiali provides filtered list views of all your service mesh definitions. Each view provides health, details, YAML definitions and links to help you visualize your mesh. Overview is the default Tab for any detail page. The overview tab provides detailed information, including health status, and a detailed mini-graph of the current traffic involving the component. The full set of tabs, as well as the detailed information, varies based on the component type. -
23
KubeSphere
KubeSphere
KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform. -
24
Tetrate
Tetrate
Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network. -
25
Meshery
Meshery
Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes. -
26
dynamic content
dc AG
Our content management system is custom-made for digital brand and shopping environments. Design and create stunning websites, landing pages and web shops. Manage content like texts, banners, photo galleries, forms, blogs or social media feeds in a swift and easy manner. Our content management system has all important types of content on board to design comprehensive business websites. With a few clicks texts, banners and contact forms can be drag-and-drop positioned on the sites. Collections through which individually structured contents like blogs, job offers and event listings can be created are a feature highlight. The software has been developed from scratch based on a modern technology stack aimed at: Security, performance, scaleability, expandability and reliability. The API-first application consists of several micro services which can be scaled flexibly. Via Open-API or your own identity provider you can exchange data and logins with external applications in a secure way. -
27
Theom
Theom
Theom is a cloud data security product that discovers and protects all data in cloud stores, APIs, and message queues. Like a bodyguard who closely follows and protects a high-value asset, Theom ensures controls follow the data regardless of how it is stored or accessed. Theom identifies PII, PHI, financial information, and trade secrets using agentless scanning and NLP classifiers, which support custom taxonomies. Theom discovers dark data, data that are never accessed, and shadow data, data whose security posture is different from the primary copy. Theom pinpoints confidential data, e.g., developer keys, in APIs and message queues. Theom estimates the financial value of data to help prioritize risks. Theom maps the relationships between data, access identities, and security attributes to uncover the risks to data. Theom shows how high-value data is accessed by identities (users and roles). Security attributes including user location, atypical access patterns, etc. -
28
Lens Autopilot
Mirantis
Lens Autopilot is a DevOps as-a-Service offering that eliminates technology and operational complexity by providing teams with the necessary resources and tools to accelerate their application delivery process on top of Kubernetes. Lens Autopilot optimizes your operations with continuous proactive security and real-time monitoring and alerting, empowering your developers to focus on building and deploying valuable applications, not worrying about operational tasks. With Lens Autopilot, you work closely with a dedicated team of cloud native experts from Mirantis to transform your processes, optimize cost, and enhance security so you can accelerate your business outcomes. -
29
Apache SkyWalking
Apache
Application performance monitor tool for distributed systems, specially designed for microservices, cloud-native and container-based (Kubernetes) architectures. 100+ billion telemetry data could be collected and analyzed from one SkyWalking cluster. Support log formatting, extract metrics, and various sampling policies through script pipeline in high performance. Support service-centric, deployment-centric, and API-centric alarm rule setting. Support forwarding alarms and all telemetry data to 3rd party. Metrics, traces, and logs from mature ecosystems are supported, e.g. Zipkin, OpenTelemetry, Prometheus, Zabbix, Fluentd.
- Previous
- You're on page 1
- Next