Leverage the full Gloo Platform stack, including central management with the Gloo management server, built-in Prometheus metrics, observability via the Gloo UI, and access to various traffic policies to protect the apps in your cluster.
A waypoint proxy is automatically created when you create a Gloo route table for traffic between your apps or an L7 traffic policy, such as a fault injection policy, and apply it to an ambient workload in your cluster. You can optionally override the default waypoint proxy specification in Gloo Mesh to create multiple waypoint proxy replicas by default.
Expose apps within the mesh under an internal hostname, and use this hostname to send requests to apps across clusters.
Route to external services
Coming soon
Route requests from ambient workloads to endpoints that are located outside the ambient mesh.
Route traffic to delegated route table
Coming soon
Delegate incoming traffic for an app to another Gloo route table.
Gloo policies
The order in which policies are applied in an ambient mesh differs from the order they are applied in a service mesh that is based on the Istio sidecar architecture. In particular, the failover and outlier detection policies are applied before traffic policies are applied, such as fault injection, timeouts, or retries.
Only with Gloo Gateway license: Apply a CSRF filter to the gateway to help prevent cross-site request forgery attacks. Note that this policy can only be applied to an ingress gateway and requires a separate Gloo Gateway license.
Only with Gloo Gateway license: Set up external authentication and authorization to protect the workloads in your cluster. For example, you can set up basic, passthrough, API key, OAuth, OPA, or LDAP authentication. Note that this policy can only be applied to an ingress gateway and requires a separate Gloo Gateway license.
Only with Gloo Gateway license: Control the rate of requests to destinations in the ambient mesh. Note that this policy can only be applied to an ingress gateway and requires a separate Gloo Gateway license.
Access logs
Coming soon
Configure how access logs are recorded for your services.
JWT
Coming soon
Control access or route traffic based on verified claims in a JSON web token (JWT).
Transformation
Coming soon
Alter a request before matching and routing, such as with an Inja header template.
TCP connection
Coming soon
Set up connection pool settings such as keepalive for TCP protocols.
Wasm
Coming soon
Apply WebAssembly filters to requests before forwarding them to the target app.
WAF
Coming soon
Filter, monitor, and block potentially harmful HTTP traffic with a Web Application Firewall (WAF) policy.