

In April 2025, the ACA Cloud team visited Kubecon + CloudNativeCon 2025 in London. In this blog, we dive into the key takeaways from the conference, focussing on Istio ambient mode, and how it will significantly simplify and accelerate Istio adoption for ACA and our customers.

What is Istio?
Istio acts as a proxy between the different applications (services) within a Kubernetes cluster, ensuring that every request flows through a component of Istio. This layer, responsible for communication between all applications, is called a service mesh.
Istio provides traffic management, security, observability and simplified communications for all of the applications within the cluster.
Traffic management
Istio enables detailed traffic management, allowing developers to easily route, distribute, and control traffic between different versions of their services.
Security
With built-in mTLS encryption, Role-Based Access Control (RBAC), and centralized authentication policies, Istio ensures secure communication between services—without needing to manage certificates or security logic at the application level.
Observability
Through built-in instrumentation, Istio offers metrics, logs, and traces, providing deep visibility into how services perform and interact. This allows IT teams to quickly identify bottlenecks and debug issues in complex environments.
Simplified communication
By abstracting service-to-service communication, Istio removes networking concerns from application code. Developers can focus on features, while the mesh handles routing, security, and reliability behind the scenes.
Want to know more about Istio? Check our other blogs:
- Istio Service Mesh: What and Why
- How to Install Istio Service Mesh: A Comprehensive Step-by-Step Guide
For all official Istio documentation, go to https://istio.io/latest/.
Istio’s current design and its limitations
Istio ensures that every request within the cluster passes through one of its components (the envoy proxy). This allows Istio to inspect, manage and secure all requests. It's essential for enabling features like request tracing and enforcing encryption between services.

A request that uses all components follows this path :
- Traffic enters via the ingress gateway.
- The ingress gateway forwards traffic to the sidecar proxy of application 1 (Service A).
- Traffic passes through the sidecar proxy of application 2 (Service B)
- Traffic exits via the egress gateway.
All gateways and proxy sidecars are running the envoy proxy. The sidecar envoy proxy containers are running within the Kubernetes pod for each application.
Downside of the sidecar model
Istio is an interesting tool that offers a lot of added benefits, but the current sidecar model does have a few downsides:
- High resource usage: Every pod runs its own Envoy proxy
- Complex updates: Any proxy change requires pod restarts
- Kubernetes Jobs incompatibility: Sidecars don’t shut down with job completion
- Same resource config: Can’t fine-tune proxy resource per application
Despite the above limitations, ACA has successfully deployed Istio in a few customer environments. And with a redesign, a lot of these concerns might be resolved.

Added value of Istio for ACA and its customers
Before we get into the details of the redesign with ambient mode, let us explain which Istio features we use most and why.
Traceability and observability
Istio enables end-to-end request tracing, helping us:
- Visualize service flows
- Monitor versions of deployed applications
- Identify bottlenecks and performance issues

Strong cluster-wide security
Most setups and implementations for non-Istio clusters require reconfiguration and managing certificates on an ingress-controller and application level. Using Istio, all pod-to-pod and node-to-node traffic is encrypted by default. This meets regulatory standards (like NIS2) and prevents the need for custom TLS setups in every application.

Simplified authentication
Istio also simplifies our development flow. For one of our customers, we moved all authentication configuration to Istio using RequestAuthentication objects. Istio will handle authentication with Auth0 using jwt tokens. This means developers don’t need to handle authentication in the application, which leads to less code and faster development. On top of that, Istio takes care of authentication in a consistent way across all services.

Future-proof traffic control
Istio also offers additional features for traffic control, like:
- Blue/green deployments
- Feature flags
- Weighted routing
Although we have not used this features yet, it is convenient to have them in place as needs evolve.

Introducing ambient mode: the future of Istio
As mentioned above, the current sidecar model of Istio comes with a few downsides.
The goal of ambient mode is to create a new architecture where a new layer is added, that replaces the sidecars.
What is Istio ambient mode?
Ambient mode introduces a ztunnel (Zero Trust Tunnel), running on each Kubernetes node. It manages:
- mTLS encryption
- Basic L4 traffic policies (authn, authz, telemetry)
All traffic will flow through this layer, even if the traffic goes to a container on the same node.

If you need Layer 7 features like advanced traffic control, you’ll also need to deploy a waypoint proxy. This is an envoy proxy that handles the same advanced traffic management tasks as the traditional sidecar mode.

Same features, easy updates
Ambient mode uses fewer resources and decouples Istio from the applications themselves. As a result, changes like upgrades or configuration updates no longer require application restarts. Even better, ambient mode still provides the same powerful features we had with sidecar mode.
Shifting from sidecars to ambient mode
While ambient mode is a promising step forward, it’s still under active development. The traditional sidecar setup remains fully supported, and not all features have been migrated yet. For the most up-to-date status, checkIstio’s official documentation.
We’re excited to begin transitioning our current environments to ambient mode and to roll out Istio in clusters that haven’t yet adopted a service mesh. Stay tuned—we’ll be sharing more updates on our journey soon!
Curious how Istio ambient mode could benefit your environment?
Whether you're considering Istio for the first time or looking to modernize your current setup, our cloud experts are happy to explore the possibilities with you.
What others have also read


CloudBrew has always been a highlight on our calendar, but the 2025 edition felt different. Perhaps it was the timing. Just the month prior, November 2025, the Azure Belgium Central region finally opened its doors. ACA has always operated from the heart of Europe, so seeing this massive national milestone go live just before the conference added a layer of excitement.
Read more

Better uptime, lower costs, and avoiding vendor lock-in. These are three of the reasons why our customers opt for a multicloud strategy. Our Cloud Project Manager Roel Van Steenberghe explains what such a strategy entails and what the advantages of Google Cloud Platform (GCP) are.
Read more

In the complex world of modern software development, companies are faced with the challenge of seamlessly integrating diverse applications developed and managed by different teams. An invaluable asset in overcoming this challenge is the Service Mesh. In this blog article, we delve into Istio Service Mesh and explore why investing in a Service Mesh like Istio is a smart move." What is Service Mesh? A service mesh is a software layer responsible for all communication between applications, referred to as services in this context. It introduces new functionalities to manage the interaction between services, such as monitoring, logging, tracing, and traffic control. A service mesh operates independently of the code of each individual service, enabling it to operate across network boundaries and collaborate with various management systems. Thanks to a service mesh, developers can focus on building application features without worrying about the complexity of the underlying communication infrastructure. Istio Service Mesh in Practice Consider managing a large cluster that runs multiple applications developed and maintained by different teams, each with diverse dependencies like ElasticSearch or Kafka. Over time, this results in a complex ecosystem of applications and containers, overseen by various teams. The environment becomes so intricate that administrators find it increasingly difficult to maintain a clear overview. This leads to a series of pertinent questions: What is the architecture like? Which applications interact with each other? How is the traffic managed? Moreover, there are specific challenges that must be addressed for each individual application: Handling login processes Implementing robust security measures Managing network traffic directed towards the application ... A Service Mesh, such as Istio, offers a solution to these challenges. Istio acts as a proxy between the various applications (services) in the cluster, with each request passing through a component of Istio. How Does Istio Service Mesh Work? Istio introduces a sidecar proxy for each service in the microservices ecosystem. This sidecar proxy manages all incoming and outgoing traffic for the service. Additionally, Istio adds components that handle the incoming and outgoing traffic of the cluster. Istio's control plane enables you to define policies for traffic management, security, and monitoring, which are then applied to the added components. For a deeper understanding of Istio Service Mesh functionality, our blog article, "Installing Istio Service Mesh: A Comprehensive Step-by-Step Guide" , provides a detailed, step-by-step explanation of the installation and utilization of Istio. Why Istio Service Mesh? Traffic Management: Istio enables detailed traffic management, allowing developers to easily route, distribute, and control traffic between different versions of their services. Security: Istio provides a robust security layer with features such as traffic encryption using its own certificates, Role-Based Access Control (RBAC), and capabilities for implementing authentication and authorization policies. Observability: Through built-in instrumentation, Istio offers deep observability with tools for monitoring, logging, and distributed tracing. This allows IT teams to analyze the performance of services and quickly detect issues. Simplified Communication: Istio removes the complexity of service communication from application developers, allowing them to focus on building application features. Is Istio Suitable for Your Setup? While the benefits are clear, it is essential to consider whether the additional complexity of Istio aligns with your specific setup. Firstly, a sidecar container is required for each deployed service, potentially leading to undesired memory and CPU overhead. Additionally, your team may lack the specialized knowledge required for Istio. If you are considering the adoption of Istio Service Mesh, seek guidance from specialists with expertise. Feel free to ask our experts for assistance. More Information about Istio Istio Service Mesh is a technological game-changer for IT professionals aiming for advanced control, security, and observability in their microservices architecture. Istio simplifies and secures communication between services, allowing IT teams to focus on building reliable and scalable applications. Need quick answers to all your questions about Istio Service Mesh? Contact our experts
Read moreWant to dive deeper into this topic?
Get in touch with our experts today. They are happy to help!

Want to dive deeper into this topic?
Get in touch with our experts today. They are happy to help!

Want to dive deeper into this topic?
Get in touch with our experts today. They are happy to help!

Want to dive deeper into this topic?
Get in touch with our experts today. They are happy to help!

