Skip to content

Istio

12 articles
· 16 min read

Tamper Detection at the Istio Gateway Layer

Learn how to detect and prevent tampering of incoming traffic at the Istio Gateway layer using mTLS, JWT validation, and custom authorization policies.

tamper-detection security gateway istio validation jwt mtls
· 25 min read

How IstioD Manages Configuration at Scale: A Deep Dive into XDS

How istiod translates Istio resources into Envoy xDS configuration, why it's fast, what makes it slow, how to scale it, and which metrics matter most.

istio istiod xds envoy performance scalability operations
· 9 min read

Using Custom JWT Claims for Authorization in Istio Gateway

How to extract custom claims from JWT tokens and use them for fine-grained authorization in Istio Gateway. Complete examples with audience claims, tenant IDs, roles, and permissions.

istio jwt authorization security authorizationpolicy
· 12 min read

Istio Observability Series (2/2): Golden Signals for the Control Plane — Monitoring istiod

Part 2 of our observability series. The golden signals for Istio's control plane — xDS push latency, config convergence, push rejections, certificate health, and istiod scaling thresholds.

istio istiod observability prometheus grafana metrics xds
· 12 min read

Istio Observability Series (1/2): Golden Signals for the Data Plane — HTTP, TLS, and gRPC

Part 1 of our observability series. The golden signals you should monitor for Istio's data plane — broken down by HTTP, TLS, and gRPC protocols. Specific Prometheus metrics, PromQL queries, and production alert rules.

istio envoy observability prometheus grafana metrics
· 12 min read

Building a Custom ext_authz Server for Istio: From Code to Production

How Envoy's ext_authz protocol works, why it's the right approach for custom authorization in Istio, and a complete walkthrough of building and deploying a gRPC ext_authz server.

istio envoy security authorization golang
· 17 min read

How WebAssembly Actually Works Inside Envoy Proxy

A deep dive into how WASM is integrated into Envoy — the proxy-wasm ABI, the sandbox model, V8 and Wasmtime runtimes, memory isolation, and the real limitations you'll hit in production.

envoy wasm proxy-wasm istio architecture
· 9 min read

Hacking on Istiod: A Step-by-Step Guide to Local Development and Testing

A complete walkthrough for building, running, and debugging a modified Istiod locally — and watching your changes take effect on connected Envoy sidecar proxies in real time.

istio istiod development kubernetes envoy xds
· 19 min read

Envoy config_dump Demystified: Follow the Packet Through Every Section

Trace an HTTP request through every section of Envoy's config_dump — from iptables capture to upstream delivery — and learn which Istio resources control each piece.

envoy istio debugging xds operations
· 4 min read

Istio Ambient Mesh: A Deep Dive into Ztunnel and Waypoint Proxies

Explore how Istio Ambient Mesh eliminates the sidecar model with per-node Ztunnels and on-demand Waypoint proxies, and what this means for your platform.

istio ambient-mesh ztunnel envoy kubernetes
· 4 min read

Building Envoy WASM Filters: From Hello World to Production

A practical guide to building, testing, and deploying WebAssembly extensions for Envoy Proxy — with real Go examples and production deployment patterns.

envoy wasm golang kubernetes istio
· 4 min read

The Definitive Guide to Debugging mTLS in Istio

Systematic approach to diagnosing mTLS handshake failures, certificate issues, and RBAC policy mismatches in Istio — with runbooks and real error messages.

istio mtls security debugging spiffe certificates