Kuadrant has recently released v0.6.0. This exciting release significantly enhances single-cluster support by adding DNSPolicy and TLSPolicy alongside the existing RateLimitPolicy and AuthPolicy APIs. It also brings together Gateway API v1 and support for Project Sail. You can now use Gateway API and Project Sail to provide gateways and Kuadrant to better secure, connect, and protect them.
What is Gateway API?
Gateway API is an open source project managed by the SIG-NETWORK community. It models service networking in Kubernetes.
What is Project Sail?
Project Sail is a Red Hat project that offers an operator to manage the installation of an Istio control plane in Red Hat OpenShift or Kubernetes.
What is Kuadrant?
Kuadrant is a Red Hat community project that offers a set of policy-based APIs that integrate with Gateway API via policy attachment to better secure, protect and connect your Gateway API-defined network.
Put it all together
Gateway API reached v1 recently, which is a major milestone for the project and means a core set of stable APIs is available for use with many different gateway providers. Kuadrant and Project Sail (via Istio) now support Gateway API v1.
Gateway API provides an expressive and powerful way to define networking components and configurations like ingress gateways and routing rules. You will need to pick a gateway provider to implement these APIs in your infrastructure. Project Sail helps you install and configure Istio as the gateway provider via a new operator.
However, once you have decided to deploy a gateway, especially an ingress gateway, a set of common concerns immediately arises:
- How do you define and express how external traffic should connect to the ingress gateway?
- How do you protect the infrastructure behind the gateway from being overwhelmed once it is exposed and available?
- How do you empower teams to protect their specific service endpoints with more refined requirements?
- How do you make sure that traffic for all endpoints uses HTTPS and that the certificates are only from a particular certificate authority?
- How do you protect the gateway with authentication and authorization?
With the v0.6 release of Kuadrant and its Gateway API v1 support, the project is now also compatible with Istio installations provided by Project Sail. Kuadrant leverages the policy attachment concept specified by Gateway API to offer a powerful set of Kubernetes CRD-based APIs, allowing you to declaratively define how you want to solve these key connectivity, security and service protection concerns.
Kuadrant has put together a quick start guide for these technologies. It sets you up with a local Kubernetes cluster, Project Sail and Kuadrant components and APIs. We have also put together a walkthrough showing how to use these components to solve common ingress connectivity requirements.
Wrap up
Find out more about what Kuadrant offers for both single and multi-cluster deployments via its DNSPolicy, TLSPolicy, AuthPolicy and RateLimitPolicy APIs on our website. If you are interested in exploring what Kuadrant offers in a multi-cluster environment, look at our multi-cluster quick start guide, which leverages OCM (open cluster management) to manage, deploy and enforce policies and provide features like DNS-based global load balancing and TLS certificate distribution.
저자 소개
Software Engineer working at RedHat since 2011. Craig is one of the architects for Kuadrant.
유사한 검색 결과
End-to-end security for AI: Integrating AltaStata Storage with Red Hat OpenShift confidential containers
Red Hat Enterprise Linux now available on the AWS European Sovereign Cloud
Data Security 101 | Compiler
Technically Speaking | Build a production-ready AI toolbox
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래