SOLUTIONS

TETRA WING

TETRA WING INTRODUCTION

Microservices act as the basis for the development and improvement of new applications in a manner that is quicker and easier than the existing monolithic method. They are a total solution that allows companies to implement next-generation MSA. Microservices and APIs are both needed to effectively implement these next-generation architectures.

​​ TETRA WING defines an API (application programming interface) management solution suitable for any company. It provides unprecedented scale and real-time customer experience for the high-performance data exchange requirements of companies and government agencies.​

TETRA WING VALUE

TETRA WING places efficiency and cost savings as its most fundamental values.
​ The most direct way to measure and demonstrate increased productivity is business process cycle time.
TETRA WING makes it possible to complete tasks that used to take days or weeks in less than 10 minutes.​

  1. ① TETRA WING is a platform that integrates hardware and software to provide companies and government agencies with better security.
  2. ② TETRA WING provides 24/7/365 enterprise-level support.
  3. ③ TETRA WING supports scalability of up to 1,000,000 transactions per second (TPS).
  4. ④ TETRA WING provides an enterprise SLA (server level agreement) to ensure that the solution is always operational.
  5. ⑤ TETRA WING supports on-premise installation through customized enterprise integration.

TETRA WING is suitable for large corporations, government agencies, and small and medium-sized businesses. TETRA WING is able to deliver high-performance SLAs at millions of transactions per second for most data environments.

  • Major Companies
    • Real-time traffic monitoring
    • Enterprise load balancer
    • Enterprise proxy
    • High-performance API gateway
    • Cache with real-time analysis function
  • Government Agencies
    • Secure data exchange and legacy data monitoring
    • Predictive information security analytics
    • API gateway scalable to millions of TPS
    • Highly scalable data exchange
  • SMEs
    • High-performance API management service
    • Delivery partner API integration
    • Load balancer that can withstand unexpected overload
    • Highly scalable B2B API support

TETRA WING’s value lies in its integration with the enterprise ecosystem. With its high performance and scalability, it is capable of integrating with all types of existing infrastructure.
- Enterprise system, Business application, IoT (Internet of Things), etc

TETRA WING Technology Stack

TETRA WING is a solution platform that integrates hardware and software based on the next-generation container technology environment by placing all technology stacks on containers.
Container technology that runs applications in production provides a set of operational requirements including security, compliance, performance, resource management, scalability, availability, data persistence, networking, and monitoring.

TETRA WING 통합 솔루션은 차세대 컨테이너 기술
환경에 기반을 두고 모든 기술 스택을 컨테이너에 올린
하드웨어와 소프트웨어가 통합된 솔루션 플랫폼입니다.
TETRA WING은 컨테이너 기술을 기반으로 운영되며,
프로덕션에서 애플리케이션을 실행하는 컨테이너 기술은
보안, 규정준수, 성능, 리소스 관리, 확장성, 가용성,
데이터 지속성, 네트워킹 및 모니터링 등 일련의 운영
요구사항을 제공합니다.

컨테이너화된 애플리케이션이라도 크게 다르진
않습니다. 하지만, 컨테이너화된 어플리케이션은
Orchestration Layer가 필요합니다. 상당한 리스크와
비용으로 물리적 하드웨어에 맞춤형 스택을 구축하여
컨테이너형 앱의 요구사항을 충족시키시겠습니까?
아니면 입증되고 비용효율적이며 위험이 적은 가상화
솔루션을 컨테이너 및 오케스트레이션 시스템의
기본 인프라로 사용하시겠습니까! 최근 IT트랜드는
컨테이너를 통해 개발자의 대응력을 향상하고
애플리케이션 이동성 및 배포 자동화를 돕는 것입니다.
이 두 가지를 결합으로 엔터프라이즈 애플리케이션의
개발, 구축 및 관리가 간소화됩니다.

  • TETRA WING - Hardware
    The hardware layer supports x86 architecture such as Dell, IBM, Sun, HP, NEC and all common hardware OEMs. The network integration layer integrates all network interfaces including Cisco, Juniper, and various general-purpose network OEMs.
  • TETRA WING - Operating System
    TETRA WING requires Linux or Windows OS such as Ubuntu, Fedora, Red Hat, and CentOS as well as Linux BSD to support all commercial Linux-based operating system OEMs.
  • TETRA WING - Container Orchestration
    TETRA WING is an all-in-one product line that operates on a container basis. As prominent orchestration tools, Docker Swarm, Kubernetes, and OpenShift are available and Kubernetes (K8s) is an open source system that automates the construction, scaling, and management of TETRA WING containerized applications.
  • TETRA WING - API MANAGEMENT
    The TETRA WING Integrated API Gateway Suite includes TETRA WING API Gateway Proxy, TETRA WING Supervision, and TETRA WING Insights. All the component products are deployed as containers.
  • TETRA WING - TELEMETRY AND ANALYTICS
    The TETRA WING Integrated API Gateway Telemetry and Analytics Suite consists of a time series database and real-time visualizations. The time series database stores real-time traffic events originating from TETRA WING proxies and supervision. Real-time visualizations showcase graphs made up of real-time data and traffic statistics.
  • TETRA WING - SECURITY AND MONITORING
    The TETRA WING Integrated API Gateway Security and Monitoring Suite provides security for the container orchestration layer and real-time monitoring across hardware. It also provides a monitoring layer that generates alarms for events.

TETRA WING Multiple Construction Options

The following TETRA WING integrated solutions can be deployed in companies or government agencies.

  • Load Balancer
    TETRA WING integrated solution is a load balancer that can scale up to 1,000,000 (one million) TPS depending on how it is configured.
    TETRA WING provides several ways to load balance requests to multiple backend services. It offers a simple DNS-based method and a more dynamic load balancer
    that is capable of running service registries without a DNS server.
  • Proxy
    TETRA WING inspects requests and routes them to the correct API or microservice. TETRA WING is capable of supporting different routing mechanisms depending on the client’s needs.
  • API Gateway
    In order to achieve this, TETRA WING implements industry-standard encryption and authentication, providing API developers with a way to direct their customers to the right place.
  • Software Defined Firewall
    TETRA WING’s software-defined firewall functionality supports highly dynamic and flexible APIs that enable comprehensive and centralized management of
    network security infrastructure for seamless integration into today’s diverse enterprise environments.
  • Perimeter Protection Gateway
    TETRA WING can proxy and route raw tcp streams. It also deploys a service mesh sidecar pattern to support mutual TLS communication between nodes.
  • High Performance Cache
    TETRA WING uses an external datastore to store configurations such as registered APIs, consumers, and plugins.
    The plugins can store any information that needs to be persistent (e.g. rate limiting data or consumer credentials).
  • High Availability Layer
    It has a rich plugin environment that can provide a variety of features such as proxy caching, rate limiting, and access control.
    TETRA WING uses DNS for load balancing and provides both round-robin and hash-based balancing. It also provides passive and active health check functions.

TETRA WING Operational Dashboard

TETRA WING provides a web-based operational dashboard that allows users to easily maintain, monitor, analyze, and visualize all areas of the solution. Anyone can easily navigate each section of TETRA WING as shown below.

  • TETRA WING
    Supervision
    Provides detailed items for service, routes, APIs, consumers, plug-ins, upstreams, and users along with additional deletion functions
  • TETRA WING
    Insights
    Enables users to understand, query, visualize, and set alert conditions on metrics regardless of where they are stored
  • TETRA WING
    Container
    Provides detailed information about the Docker environment and manages containers, images, networks, and volumes
  • TETRA WING
    Security & Surveillance
    Allows users to see all types of security services, servers, and alerts in real time to help resolve issues as quickly as possible​

Privacy Policy

Close

Refusal of Unauthorized Collection of Email Addresses

We refuse unauthorized collection of e-mail addresses posted on this website using e-mail collection programs or other technical devices, and please keep in mind that violations will result in criminal penalties under the Information and Communication Network Act

※ Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.

* Article 50-2 (Prohibition of unauthorized collection of e-mail addresses, etc.)
  • No one shall collect e-mail addresses using a program or other technical device that automatically collects e-mail addresses from an Internet homepage where the intention to refuse collection of e-mail addresses is stated.
  • No one shall sell or distribute the e-mail addresses collected in violation of the provisions of Paragraph 1.
  • Anyone who knows that the collection, sale, and distribution of the e-mail address is prohibited in accordance with the provisions of paragraphs 1 and 2 shall not use it for information transmission.

* Article 74 (Penalty) A person who falls under any of the following subparagraphs shall be punished by a fine not exceeding 10 million won.
  • A person who displays, sells, or displays for sale in violation of Article 8 (4)
  • A person who distributes, sells, rents, or publicly displays obscene code, words, sound, image, or video in violation of Article 44-7 (1) 1
  • A person who repeatedly reaches the other party with code, words, sound, image, or video that induces fear or anxiety in violation of Article 44-7 (1) 3
  • A person who takes technical measures in violation of Article 50 (6)
  • A person who transmits advertising information in violation of Article 50-8 A person who collects, sells, distributes, or uses e-mail addresses for information transmission in violation of Article 50-2
  • A person who transmits advertising information in violation of Article 50-8
  • A person who fails to register changes in registered matters, transfer or acquisition of business, or report merger or inheritance in violation of Article 53 (4)
닫기