Introduction to TSB
In this guide, you can quickly learn how TSB functions. These exercises explain how to set TSB up to manage applications on your cluster, explaining the concepts of tenants, workspaces, and configuration groups. They explain how to onboard a simple application, expose it with a Tetrate gateway and examine how to observe traffic to that application.
They briefly cover some of the core security and traffic management capabilities of TSB, such as mTLS, security policies, and traffic shifting.
Before You Begin
The exercises in this guide are written from the perspective of users of the Hosted TSB Management Plane, but apply also to on-prem TSB MP installs. In this guide, we assume you have:
- Obtained access to the TSB Management Plane, both the UI and with
tctl
- Onboarded a K8s workload cluster to the Management Plane, with
kubectl
access to the cluster
TSB Concepts
Create a TSB tenant to contain and isolate TSB configuration.
Deploy an Application
Deploy and onboard the Bookinfo application to your cluster. Create a TSB workspace for the application's configuration.
Expose the Application
Use a Tetrate Gateway to expose the application externally, first as plain HTTP and then as TLS-encrypted HTTPS.
Observe Traffic and Traces
Use TSB to observe traffic to the application and to obtain traces, metrics and logs from the running application.
mTLS Security
See how TSB protects your application with mTLS. Understand how to provide limited access where necessary for K8s clients outside the TSB mesh.
Security Policies
Learn how to use Security Policies to control traffic between TSB-managed resources.
Traffic Shifting
Use TSB to manage simple traffic shifting between different versions of a service.
Clean Up
Remove the configuration and services you created in these exercises.
Summary - What have we seen?
You've seen the beginning of the capabilities of the Tetrate platform to route and manage traffic, implement Zero-Trust security policies, and observe and monitor traffic, all in a single-cluster, single-user environment.
📄️ TSB Concepts
TSB Configuration Concepts
📄️ Deploy an Application
Deploy an Application, Managed by TSB
📄️ Expose the Application
Expose an Application using a TSB Gateway
📄️ Observe Traffic
Understand how to observe traffic activity
📄️ Understanding mTLS
Understanding mTLS options with TSB
📄️ Security Policies
Building a Zero-Trust Security Policy with TSB
📄️ Traffic Shifting
Traffic Shifting with TSB
📄️ Clean Up
Clean Up the Exercises
📄️ Summary
What have we learned?