Getting started with Envoy Proxy in 15 Minutes: installation-free Gloo Edge

How long does it take to configure your cloud-native application on an open-source API Gateway? Getting started with Envoy Proxy can be fast and easy. Give us 15 minutes and we’ll give you a Kubernetes-hosted application accessible via an open-source gateway, and configured with policies for routing, service discovery, timeouts, debugging, access logging, and observability. […]

Jim Barton | August 10, 2021
Read More

From Zero to Gloo Edge in 15 Minutes: OpenShift Edition

Learn how to configure Gloo Edge, an Envoy Proxy API gateway, with Red Hat OpenShift How long does it take to configure your a cloud-native application on an open-source API Gateway, using Envoy Proxy with OpenShift? How about 15 minutes? Give us that much time and we’ll give you a Kubernetes-hosted application accessible via a […]

Jim Barton | July 15, 2021
Read More

Bridging a Prometheus Authentication Gap with Gloo Edge Transformations

  Addressing Prometheus authentication with Gloo Edge transforms Gloo Edge is a versatile API gateway that provides a rich library of transformation capabilities that can be used to solve a variety of problems, such as Prometheus authentication. Integration issues are often at the heart of what our users want to accomplish: Client X wants to […]

Jim Barton | July 14, 2021
Read More

From Zero to Gloo Edge in 15 Minutes: Amazon EKS Edition

How long does it take to configure your a cloud-native application on an open-source API gateway using Envoy Proxy with EKS? How about 15 minutes? Give us that much time and we’ll give you a Kubernetes-hosted application accessible via a gateway configured with policies for routing, service discovery, timeouts, debugging, access logging, and observability. We’ll […]

Jim Barton | June 25, 2021
Read More

From Zero to Gloo Edge in 15 Minutes: GKE Edition

How long does it take to configure your a cloud-native application on an open-source API Gateway? How about 15 minutes? Give us that much time and we’ll give you a Kubernetes-hosted application accessible via a gateway configured with policies for routing, service discovery, timeouts, debugging, access logging, and observability. We’ll host all of this on […]

Jim Barton | June 24, 2021
Read More

From Zero to Gloo Edge in 15 Minutes*

. *…your mileage may vary How long does it take to configure your first cloud-native application on an open-source API Gateway? How about 15 minutes? Give us that much time and we’ll give you a Kubernetes-hosted application accessible via a gateway configured with policies for routing, service discovery, timeouts, debugging, access logging, and observability. We’ll […]

Jim Barton | June 15, 2021
Read More

Self-Service User Registration with Gloo Portal and Okta

Gloo Portal allows users to catalog, manage and securely publish running APIs to onboard developers both inside and outside your organization.  With the recent 0.7.0 release, it adds gRPC support to its existing OpenAPI / REST facilities to become the first enterprise-class gRPC portal.  And of course, all of this is delivered with a cloud-native […]

Jim Barton | April 23, 2021
Read More

Solving a Real-World Information Leakage Problem with WebAssembly and Gloo Edge

Multiple Gloo Edge customers have approached us recently with questions like, “Our product security team wants our applications to remove any response headers from our services that indicate to a potential attacker that we’re using Envoy as the foundation of our API Gateway.  In particular, we’d like to remove the server header and any header […]

Jim Barton | April 9, 2021
Read More

Securing Your APIs with Gloo Edge and Auth0

  Gloo Edge is a cloud-native API Gateway and Ingress Controller built on Envoy Proxy to facilitate and secure application traffic at the edge.  Enterprise users of Gloo Edge commonly want to delegate authentication decisions to an Identity Management Provider based on the popular OpenID Connect (OIDC) standard. Auth0 is one of the most popular […]

Jim Barton | March 14, 2021
Read More

[Tutorial] Crush CSRF Attacks with Gloo Edge

Shield your applications from session-riding, Cross-Site Request Forgery attacks.   According to OWASP: “Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. With a little help of social engineering (such as sending a link via email or chat), an […]

Jim Barton | January 11, 2021
Read More

[Tutorial] External Authorization of Service Requests in Istio Service Mesh

Istio is an open source and platform-independent service mesh that provides functionality for traffic management, policy enforcement and telemetry collection in Kubernetes application environments. As a service mesh, Istio solves the service-to-service communication for the applications deployed within the cluster. Istio has a robust feature set to address these east-west traffic concerns.  In fact, we are huge Istio […]

Jim Barton | October 5, 2020
Read More

[Tutorial] Rate Limiting of Service Requests in Istio Service Mesh

Istio is an open source and platform-independent service mesh that provides functionality for traffic management, policy enforcement and telemetry collection in Kubernetes application environments. As a service mesh, Istio solves the service-to-service communication for the applications deployed within the cluster.  While Istio has a robust feature set, end users are currently unable to set rate […]

Jim Barton | August 24, 2020
Read More