Service Mesh Manager
Centrally Manage all Application Traffic for your Kubernetes Infrastructure
Simplified, centralized configuration of security controls and traffic management policies for microservices – fleet-wide, powered by Istio
Service Mesh Automation, Standardization, and Governance Across Your Fleet Powered by Istio
With Rafay, platform teams can automate Service Mesh lifecycle management across clusters, clouds, and hybrid environments enabling mutual TLS (mTLS) between services by default, while allowing developers to simplify managing traffic routing policies for their applications.
Reduce operational burden by standardizing deployments and automating service mesh upgrades
Reduce risk and satisfy compliance requirements by enabling mTLS for interservice communication
Enable developer self-service by delegating configuration and traffic management policies to application teams
Enforce Application Communication Standards at the Cluster and Namespace Level
In order to meet compliance and governance requirements, it is critical for platform teams to enforce standards to secure, connect, and monitor cluster-wide communication across the organization.
Apply Traffic Management Policies and Monitor Application Flows
Centralize traffic routing, load balancing and locality-aware policies with visibility into application performance and health of service to service communication patterns from a single pane of glass. Historical traffic flows are also available for debugging and forensic purposes.
Encrypt Communication Between Services For Consistent Security
Rafay enables platform teams to centrally configure controls with out-of-box service mesh integration, policy enforcement to enable mTLS for secure interservice communication, and automated certificate lifecycle management for mTLS.
See the Service Mesh Manager in Action!
Service Mesh Service FAQs
Service meshes help organizations run distributed, microservices-based apps by quickly and securely connecting and monitoring microservices.
Rafay reduces risk and operational overhead of stitching together disparate technologies with an integrated platform to ensure consistency and protect against misconfigurations with a single pane of glass.
- Secure Communication & Reliability: Apply policies and rules for encryption, authentication and authorization and enforce requirements, such as mTLS, request retries, timeouts, rate limiting, and circuit-breaking in all or partial communication.
- Communication Visibility: With many microservices running, customers need visibility into performance and availability to ensure optimal traffic flows across their entire fleet.
- App Fault Tolerance Testing & Upgrades: Dynamic service discovery and routing, including traffic shadowing (duplicating) for testing, traffic splitting for canary (staged/gradual) releases and A/B type experimentation.
- Traffic Distribution & Control: Dynamically control traffic routing and balance traffic via policies enabling application-level service/network segmentation (e.g., “service A” can communicate with “service B,” but not “service C”).
Download the White Paper
Best Practices for Securing Kubernetes
How to Apply Zero-Trust Principles to Secure Access to Kubernetes