All posts

What Kuma TCP Proxies Actually Do and When to Use Them

Traffic never flows exactly how you expect. One moment it’s smooth, the next it’s rushing through unprotected ports or drowning your observability stack. Kuma TCP Proxies exist to tame that chaos, giving you a clear, policy-driven path for every packet that moves inside your service mesh. Kuma, built on top of Envoy, is more than a mesh controller. It defines how services talk to each other and what happens when they do. The TCP proxy is one of its simplest yet most powerful policies. It decide

Free White Paper

End-to-End Encryption: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Traffic never flows exactly how you expect. One moment it’s smooth, the next it’s rushing through unprotected ports or drowning your observability stack. Kuma TCP Proxies exist to tame that chaos, giving you a clear, policy-driven path for every packet that moves inside your service mesh.

Kuma, built on top of Envoy, is more than a mesh controller. It defines how services talk to each other and what happens when they do. The TCP proxy is one of its simplest yet most powerful policies. It decides which connections flow, which stop, and which get shaped before hitting their destination. For teams balancing security, performance, and compliance, that’s the difference between “it kinda works” and “we sleep at night.”

Think of it like an automatic traffic cop that enforces network intent at Layer 4. You define the rules once—source, destination, protocol, mTLS policies—and every connected service obeys them. No messy proxies per application. No YAML sprawl. Kuma TCP Proxies handle east-west traffic just as cleanly as north-south, giving you both flexibility and control.

Here’s the general flow. A service forwards a TCP connection request. Kuma intercepts it, evaluates matching policies, and routes through an Envoy-managed data plane. If the request passes rules for identity, encryption, and rate limits, it proceeds. Otherwise, it quietly drops or redirects as configured. All this happens without rewriting apps or managing sidecar quirks manually.

For the quick version: Kuma TCP Proxies let you standardize network policies across every service, automatically routing and securing TCP traffic with zero custom code.

Best practices for real-world clusters

Start small. Apply policies per namespace first, then scale global controls. Use mTLS everywhere, verified through your existing CA or trust domain. Record traffic actions for audit through your observability stack. Integrate identity through OIDC or an enterprise provider like Okta for clean RBAC mapping. Avoid creating edge cases where one service talks outside the mesh—it will break your visibility.

Continue reading? Get the full guide.

End-to-End Encryption: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of Kuma TCP Proxies

  • Encrypted transport without custom certificates
  • Unified policy enforcement for every TCP flow
  • Simplified traffic shaping through Envoy filters
  • Automatic injection and recovery of proxy sidecars
  • Strong compliance posture via centralized logging
  • Consistent connection behavior across hybrid environments

Developers love this because it lets them stop babysitting network configs. Faster onboarding, fewer “who opened that port” moments, and cleaner observability data mean shorter feedback loops. That’s real developer velocity, not corporate jargon.

Platforms like hoop.dev take it further by automating these guardrails. They transform policies from hopeful documentation into living enforcement, ensuring access stays verified and auditable without adding manual gates.

How do I choose when to use Kuma’s TCP Proxy vs. HTTP Proxy?

Use the TCP proxy when your traffic isn’t HTTP-aware, like databases, message queues, or raw application protocols. HTTP proxies add layer-7 routing, while TCP proxies secure and shape traffic below that layer with less overhead.

Does Kuma’s TCP Proxy support mTLS for non-HTTP services?

Yes. Kuma applies mTLS automatically through its data plane, mapping identities via your configured CA. That means encrypted communication even for custom TCP applications.

AI systems that auto-provision workloads or rotate service identities also thrive in this setup. They can safely request routes or apply ephemeral credentials without risking lateral exposure, since the mesh enforces every hop’s identity.

Kuma TCP Proxies aren’t shiny. They’re quiet, reliable, and precise, which is exactly what you need in production. Build trust in your network by making it boringly predictable.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts