WSO2 announced the beta of WSO2 Agent Manager on May 5, an open-source control plane for governing AI agents across the enterprise. Licensed under Apache 2.0, it promises federated agent management, identity and access controls, guardrails, observability, and a secure Kubernetes-native runtime — with general availability scheduled for June 2026.
It’s the third major “open-source agent governance” launch in under two months, following Tyk AI Studio and WSO2’s own API Platform GA in March. The pattern is clear: every API management vendor is racing to own the agent control plane, and “open source” is the positioning of the season.
The capabilities WSO2 describes are real. The question isn’t whether agent governance matters — it does — but whether the open-core, self-hosted model is actually the fastest path to getting it into production.
- Platform teams evaluating agent governance options for 2026
- Engineering leaders deciding between self-hosted and managed control planes
- API teams already running agent traffic who need identity, rate limiting, and observability today
What WSO2 Agent Manager actually does
Agent Manager is positioned as “the enterprise control plane for AI agents.” It tackles what WSO2 calls agent sprawl — the uncontrolled proliferation of AI agents across an organization, each with fragmented tooling, inconsistent security controls, and no unified audit trail.
The six pillars WSO2 describes:
- Federated agent management — manage agents across multiple frameworks (LangGraph, CrewAI, Ballerina, and others) and deployment environments from a single control plane
- Identity and access control — agent-specific identity provisioning, fine-grained access controls, delegation policies, and credential revocation
- Governance and guardrails — rule-based and LLM-based safety checks on GenAI interactions, MCP server policy definitions, and token consumption controls
- Observability — OpenTelemetry-compatible distributed tracing with deep visibility into LLM interactions, decision paths, and tool invocations
- Secure runtime — Kubernetes-native, zero-trust architecture with isolation controls and real-time intervention
- Framework flexibility — built on open standards including OpenTelemetry, OpenAPI, MCP, A2A, and OAuth
These are legitimate capabilities. If your organization has already committed to running WSO2’s stack on Kubernetes, Agent Manager will extend the surface you’re managing. The open-source license means you can inspect the code and avoid the worst forms of vendor lock-in.
But “open source” and “free to operate” are very different things.
The hidden cost of self-hosted agent governance
Every self-hosted control plane announcement skips past the same line item: the operational cost of actually running the thing.
WSO2 Agent Manager is a Kubernetes-native platform. That means before you govern your first agent, you need:
- A Kubernetes cluster — provisioned, patched, monitored, and scaled. If you’re running multi-region for resilience, multiply by the number of regions.
- Helm chart management — Agent Manager ships multiple charts
(
wso2-agent-manager, observability extensions, build extensions). Someone owns the upgrade cycle. - Networking and ingress — TLS termination, load balancing, DNS, and the certificate rotation that goes with it.
- Storage and state — trace data, audit logs, and agent identity records need durable storage with backup and retention policies.
- Security hardening — network policies, RBAC, secrets management, container image scanning, and CVE patching on a platform that’s still in beta.
None of this is unique to WSO2. It’s the tax on every self-hosted platform. The question is whether paying that tax is the best use of your platform team’s time when the alternative is a managed service that deploys to 300+ edge locations in under 20 seconds.
For some organizations, the answer is genuinely yes. Air-gapped environments, strict data residency requirements, or an existing Kubernetes platform team with spare capacity can make self-hosting the right call. We’ll come back to that.
For most teams shipping agent traffic today, it isn’t.
What an agent control plane actually has to solve
Strip away the positioning and every agent control plane — WSO2’s, Zuplo’s, anyone’s — has to solve five problems:
1. Agent identity
Every agent calling your API needs an identity. Not a shared service account,
not a hardcoded token in a .env file — a named, auditable identity that you
can trace in logs and revoke in seconds.
Zuplo’s API key management treats agents as first-class consumers. Each agent gets a named consumer with a unique API key, a metadata blob (tenant, model, plan, feature flags), and tags for querying across cohorts. Multiple keys can map to a single consumer identity, so key rotation doesn’t break your identity model.
The key format itself (zpka_<random>_<checksum>) is designed for the agent
era: the prefix enables
leaked key detection
via GitHub’s secret scanning program, the checksum allows edge validation
without a database call, and the structure supports instant rotation with
configurable transition windows. We covered this model in detail in
Managing API Keys for AI Agents.
2. Traffic governance
Agents don’t call APIs like humans do. A human hits an endpoint a handful of times per minute. An autonomous agent can chain fifty calls in ten seconds, go silent for an hour, then burst again. Your governance layer needs to handle both patterns without breaking legitimate workflows.
Zuplo’s rate limiting supports per-IP, per-user, per-API-key, and custom-function rate limiting. The custom function path is where agent governance gets interesting: you can return different thresholds based on any property of the request — subscription tier, model being called, time of day, or metadata from the consumer’s API key. The complex rate limiting policy layers multiple rate limits with different time windows simultaneously, which matters when you’re tracking both requests-per-minute and tokens-per-day for LLM traffic. For a deeper walkthrough of token-based metering, see Rate Limit LLM APIs by Tokens, Not Requests.
Beyond rate limiting, Zuplo’s programmable gateway lets you write TypeScript policies that run at the edge. Need to enforce a guardrail that blocks certain tool calls based on agent identity? That’s a policy, not a feature request.
3. Security
Agent traffic expands your attack surface. Agents pass prompts, tool calls, and context windows that can carry injection attacks, PII, and leaked credentials. The security stack needs to cover authentication, authorization, and content inspection.
Zuplo supports JWT authentication (any OpenID-compliant provider), API key authentication, OAuth 2.0, and mTLS — the full auth spectrum that agent architectures need. Because Zuplo runs on Cloudflare’s network, WAF and DDoS protection are integrated without additional infrastructure.
For AI-specific threats, Zuplo’s AI Gateway includes prompt injection protection and PII redaction policies that run inline on every request.
4. Observability
You can’t govern what you can’t see. Agent traffic generates complex call chains — an agent calls your API, which calls an LLM, which triggers a tool call, which calls another API. Without distributed tracing, debugging is archaeology.
Zuplo’s observability stack includes built-in logging with per-consumer attribution, real-time analytics, and integrations with Datadog, Splunk, New Relic, and a dozen other platforms. For teams that need distributed tracing, OpenTelemetry support exports full request lifecycle traces to any OTLP-compatible backend.
The key advantage: REST, MCP, and AI traffic all flow through the same policy engine and the same observability pipeline. You don’t need separate tools for separate protocols.
5. Deployment and scale
Agent traffic is global and bursty. Your governance layer needs to be where the traffic is, not in a single Kubernetes cluster that adds 200ms of latency for every request from the other side of the world.
Zuplo deploys to 300+ edge locations on every plan. A push to your Git repository triggers a deployment that goes live across all data centers in under 20 seconds. Every branch gets a preview environment on the same edge infrastructure as production. There’s no cluster to provision, no Helm charts to manage, no capacity planning to get wrong.
This is the core trade-off: WSO2 gives you Kubernetes-native control, and you pay with Kubernetes-native operations. Zuplo gives you GitOps-native control — routes, policies, and TypeScript handlers as files in Git — and the infrastructure is someone else’s problem.
When self-hosted open-core makes sense
We’re not going to pretend self-hosted never wins. There are real scenarios where it’s the right choice:
- Air-gapped environments — if your agents and APIs can’t touch the public internet, you need a control plane that runs inside your network
- Strict data residency — if regulatory requirements mandate that all traffic, including control-plane metadata, stays within a specific jurisdiction
- Existing platform investment — if you already have a Kubernetes platform team, Helm chart pipelines, and the operational muscle to run another stateful service
In those cases, WSO2 Agent Manager (or similar self-hosted options) is a legitimate fit. The Apache 2.0 license gives you real flexibility, and the standards-based approach (OpenTelemetry, MCP, OpenAPI) reduces the lock-in risk.
But be honest about the math. “Free to download” is not “free to run.” Every self-hosted platform has a fully loaded cost that includes the infrastructure, the team that operates it, the opportunity cost of what that team isn’t building, and the latency penalty of a centralized deployment model.
When managed edge wins
For the majority of teams running agent traffic today, the calculus points the other way:
- You want governance shipping this week, not after a Kubernetes migration. Zuplo’s agent identity, rate limiting, and observability work out of the box. Add a policy, push to Git, and it’s live at the edge in seconds.
- Your agents call APIs from everywhere. A centralized Kubernetes cluster adds latency. An edge deployment puts governance where the traffic is.
- Your platform team has better things to do. Every hour spent managing Helm charts and Kubernetes networking is an hour not spent on the product your agents are actually calling.
- You want OpenAPI as the source of truth. Zuplo is OpenAPI-first — your API definition drives routing, validation, documentation, and developer portal generation. That’s a more portable spec than any vendor’s proprietary configuration format.
The bottom line
WSO2 Agent Manager is a credible product from a company with deep roots in API management and identity. The open-source model is genuine, and the capabilities map to real problems that enterprises face with agent governance.
But the question you should be asking isn’t “which vendor has the best feature matrix?” It’s “how fast can I get production-grade agent governance running, and what does it cost me to keep it running?”
If your answer to the first question is “this week” and your answer to the second is “as little as possible,” the managed edge model wins. Zuplo ships per-agent identity, MCP gateway governance, AI traffic controls, rate limiting, and full observability — on a global edge network, with GitOps deployment, and without a Kubernetes cluster in sight.
Start with Zuplo’s free plan and have agent governance running at the edge in minutes, not months.