Skip to main content
logoTetrate Service BridgeVersion: 1.13.x

Introduction to TSB

In this guide, you can quickly learn how TSB functions. These exercises explain how to set TSB up to manage applications on your cluster, explaining the concepts of tenants, workspaces, and configuration groups. They explain how to onboard a simple application, expose it with a Tetrate gateway and examine how to observe traffic to that application.

They briefly cover some of the core security and traffic management capabilities of TSB, such as mTLS, security policies, and traffic shifting.

Before You Begin

The exercises in this guide are written from the perspective of users of the Hosted TSB Management Plane, but apply also to on-prem TSB MP installs. In this guide, we assume you have:

  • Obtained access to the TSB Management Plane, both the UI and with tctl
  • Onboarded a K8s workload cluster to the Management Plane, with kubectl access to the cluster
  1. TSB Concepts

    Create a TSB tenant to contain and isolate TSB configuration.

  2. Deploy an Application

    Deploy and onboard the Bookinfo application to your cluster. Create a TSB workspace for the application's configuration.

  3. Expose the Application

    Use a Tetrate Gateway to expose the application externally, first as plain HTTP and then as TLS-encrypted HTTPS.

  4. Observe Traffic and Traces

    Use TSB to observe traffic to the application and to obtain traces, metrics and logs from the running application.

  5. mTLS Security

    See how TSB protects your application with mTLS. Understand how to provide limited access where necessary for K8s clients outside the TSB mesh.

  6. Security Policies

    Learn how to use Security Policies to control traffic between TSB-managed resources.

  7. Traffic Shifting

    Use TSB to manage simple traffic shifting between different versions of a service.

  8. Clean Up

    Remove the configuration and services you created in these exercises.

  9. Summary - What have we seen?

    You've seen the beginning of the capabilities of the Tetrate platform to route and manage traffic, implement Zero-Trust security policies, and observe and monitor traffic, all in a single-cluster, single-user environment.