BYO Waypoint in Istio Ambient Mode - Expanding Your Service Mesh Options
Introducing BYO Waypoint in Istio Ambient Mode
Istio Ambient’s architecture continues to evolve with powerful new capabilities that enhance flexibility and integration options. One significant advancement is the “Bring Your Own” (BYO) waypoint functionality, enabled through Ambient’s innovative “sandwich mode” deployment model. This approach allows any Kubernetes Gateway API conformant proxy to be deployed as a waypoint, opening up new possibilities for extending your service mesh.
Istio Ambient already supports BYO ingress functionality for north-south traffic (as covered in this detailed guide). In this post, we’ll explore how the same flexibility extends to east-west traffic through BYO waypoints, enabling enhanced service-to-service communication within the mesh.
Understanding the Waypoint in Ambient Architecture
Before diving into BYO waypoint capabilities, let’s revisit very briefly how waypoints function in the standard Ambient deployment model.
Standard Istio Ambient architecture with ztunnels and waypoint
In this standard configuration:
- Client Pod’s(app container’s) traffic gets redirected to the local ztunnel proxy running in its own network namespace.
- The ztunnel sends traffic via HBONE (HTTP-Based Overlay Network Environment) to the waypoint for L7 processing
- After processing, the waypoint sends traffic via HBONE to the destination ztunnel
- Finally, the destination ztunnel(running inside server pod’s network namespace) delivers traffic to the app container.
The ztunnel DaemonSet on each node provisions proxies within pod network namespaces but isn’t directly in the traffic path. All HBONE connections are secured with mTLS. Rather than revisiting the fundamentals of Ambient mode that are well-documented in the official Istio documentation and existing community resources, this post focuses specifically on the “sandwich mode” architecture and its implications for extending service mesh capabilities.
The “Sandwich Mode”
The “sandwich mode” deployment represents a significant architectural innovation. Instead of using the standard istio-waypoint
class for waypoint deployment, any Kubernetes Gateway API conformant proxy, such as EnvoyGateway can be used as a waypoint:
Sandwich Mode: Using Gateway Class for Waypoint
Key aspects of this architecture:
- The waypoint is deployed using provider specific gateway class ex:
class-eg
orclass-nginx
etc unlike istio-managed waypoint whereistio-waypoint
is used - It’s labeled with
istio.io/dataplane-mode: ambient
to enable traffic capture, unlike istio-managed waypoint where waypoint traffic is not intercepted by ztunnel - Server pods specify this non-istio gateway/waypoint as their waypoint using the usual
use-waypoint
label - Traffic to this waypoint is intercepted by ztunnel, which terminates the HBONE connection and uses plaintext within the waypoint’s network namespace. Please note because of ztunnel interception, we dont need to configure any mtls or HBONE at custom waypoint proxy.
- The waypoint proxy can be configured using HTTPRoute to apply L7 processing before routing to the server pod
- The outgoing waypoint traffic also gets intercepted by ztunnel(within the same network namespace) and forwarded via HBONE to the server pod, where another ztunnel terminates the connection.
Let’s look at the zoomed-in view of how this works within the waypoint node:
Detailed view of Gateway-class Waypoint in Sandwich Mode
This diagram shows how traffic flows through the waypoint:
- HBONE traffic arrives at the waypoint’s ztunnel proxy (port 15008)
- The ztunnel terminates HBONE and forwards to the Gateway proxy via plaintext (within the same network namespace)
- After L7 processing, which could be configured using any non-istio control plane,the Gateway proxy returns traffic to the ztunnel
- The ztunnel forwards traffic via HBONE to the destination
Bringing Your Own Waypoint: The EnvoyGateway Example
The most powerful aspect of this architecture is the ability to use alternative Gateway API conformant proxies as waypoints. This means you can leverage specialized proxies with advanced features that may not be available in Istio’s standard waypoint implementation.
For example, you can use EnvoyGateway as your waypoint control plane while still benefiting from Istio’s service mesh foundation:
BYO Waypoint with EnvoyGateway Control Plane
This architecture provides several significant advantages:
- Istio still manages service discovery, certificates and ztunnel configuration
- The alternative control plane (like EnvoyGateway) manages the waypoint proxy configurations
- Both systems coexist within the same mesh architecture
Advantages of Using Alternative Gateway API Conformant Proxies
- Leverage existing investments: Use proxies your team already knows and has deployed
- Best-of-breed approach: Select specialized proxies with capabilities tailored to your needs
- Advanced features: Access capabilities like sophisticated rate limiting, custom filters, and authentication methods that may not be available in Istio
- Operational efficiency: Maintain familiar debugging workflows and monitoring tools
- Ecosystem integration: Better align with your existing API gateway and ingress solutions
Use Cases Where This Flexibility Matters
- Advanced traffic management: When you need sophisticated features such as rate limiting or AI gateway capabilities
- Security requirements: For specialized authentication protocols or custom security filters
- Multi-team environments: Different teams can use their preferred proxies while maintaining mesh cohesion
- Gradual migration: Adopt Ambient mode while preserving existing gateway investments
- Feature requirements: Access specialized proxy capabilities not yet available in Istio
Important: The integration between EnvoyGateway and Istio Ambient’s waypoint functionality is currently under active development. Keep an eye on the EnvoyGateway project for updates as this feature progresses.
Implementation Details
To deploy a waypoint in “sandwich mode”, you need to:
- Deploy a gateway using provider specific class (not
istio-waypoint
) - Label it with
istio.io/dataplane-mode: ambient
- Configure your workloads to use this gateway as their waypoint with appropriate labels
- Configure HTTPRoute or other gateway resources to define L7 routing and policies
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
---
apiVersion: gateway.networking.k8s.io/v1
kind: GatewayClass
metadata:
name: envoy-gateway-class
spec:
controllerName: gateway.envoyproxy.io/gatewayclass-controller
---
# Example Gateway in "sandwich mode"
apiVersion: gateway.networking.k8s.io/v1beta1
kind: Gateway
metadata:
name: byo-waypoint
namespace: my-ns
labels:
istio.io/dataplane-mode: ambient
spec:
gatewayClassName: envoy-gateway-class # provider specific class name
listeners:
- allowedRoutes:
namespaces:
from: Same
hostname: my-svc.my-ns.svc.cluster.local
name: captured-fqdn
port: 80
protocol: HTTP
- allowedRoutes:
namespaces:
from: Same
name: fake-hbone-port
port: 15008
protocol: TCP
---
# Example HTTPRoute for L7 routing
apiVersion: gateway.networking.k8s.io/v1beta1
kind: HTTPRoute
metadata:
name: example-route
namespace: my-ns
spec:
hostnames:
- my-svc.my-ns.svc.cluster.local
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: byo-waypoint
rules:
- matches:
- path:
type: PathPrefix
value: /
backendRefs:
- group: ""
kind: Service
name: my-svc
port: 80
If you are a hands-on kind of person like me, then trying out istio integration test TestSimpleHTTPSandwich can be a good starting point.
Conclusion
BYO Waypoint functionality in Istio Ambient mode represents a significant advancement in service mesh architecture. It embraces the Kubernetes Gateway API ecosystem while maintaining the security and connectivity benefits of the Ambient mesh.
This approach gives operators unprecedented flexibility to:
- Leverage specialized gateway implementations
- Access advanced traffic management features
- Integrate with existing infrastructure
- Gradually adopt Ambient mode
As service mesh technology continues to evolve, this kind of architectural flexibility will be crucial for accommodating diverse workloads and infrastructure requirements while maintaining a consistent security and observability foundation.
I welcome your thoughts and questions on this complex topic in the comments section below, or reach out to me directly to continue the conversation!