Skip to main content

Service Mesh

Istio is deployed on every GKE cluster, providing mTLS between services, fine-grained traffic management, and an ingress gateway backed by Cloud Armor WAF protection.

  • mTLS: All service-to-service traffic within the mesh is encrypted and authenticated automatically
  • Traffic management: Istio VirtualServices and DestinationRules control routing, retries, and timeouts
  • Ingress gateway: External traffic enters the mesh through a managed gateway with Datadog AAP (Application and API Protection) deployed as an Envoy external processor for WAF and threat detection
  • cert-manager integration: Istio's built-in CA is replaced by cert-manager via istio-csr, which issues and rotates all workload mTLS certificates in the mesh

Components

ComponentDescription
istio-control-planeThe Istio control plane deployed via Helm, managing traffic policy across the mesh
ingress-gatewayA managed ingress gateway exposed via a GCP load balancer
waf-policyA Cloud Armor security policy attached to the ingress gateway (OWASP rules, rate limiting, adaptive DDoS)
virtual-serviceAn Istio routing rule defining traffic behavior for a service (retries, timeouts, fault injection)
destination-ruleAn Istio policy defining connection pool and circuit breaker settings for a destination
peer-authenticationA mesh-wide policy enforcing strict mTLS between all services

Core Invariant

mTLS is enforced on every cluster via Istio — no plaintext pod-to-pod traffic.