You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/istio-about.md
+15-6Lines changed: 15 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,10 +24,10 @@ Service-to-service communication is what makes a distributed application possibl
24
24
25
25
Istio is an open-source service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio enables load balancing, service-to-service authentication, and monitoring – with few or no service code changes. Its powerful control plane brings vital features, including:
26
26
27
-
* Secure service-to-service communication in a cluster with TLS encryption, strong identity-based authentication and authorization.
27
+
* Secure service-to-service communication in a cluster with TLS (Transport Layer Security) encryption, strong identity-based authentication and authorization.
28
28
* Automatic load balancing for HTTP, gRPC, WebSocket, and TCP traffic.
29
29
* Fine-grained control of traffic behavior with rich routing rules, retries, failovers, and fault injection.
30
-
* A pluggable policy layer and configuration API supporting access controls, rate limits and quotas.
30
+
* A pluggable policy layer and configuration API supporting access controls, rate limits, and quotas.
31
31
* Automatic metrics, logs, and traces for all traffic within a cluster, including cluster ingress and egress.
32
32
33
33
## How is the add-on different from open-source Istio?
@@ -44,22 +44,31 @@ This service mesh add-on uses and builds on top of open-source Istio. The add-on
44
44
45
45
## Limitations
46
46
47
-
Istio-based service mesh add-on for AKS has the following limitations:
47
+
Istio-based service mesh add-on for AKS currently has the following limitations:
48
48
* The add-on doesn't work on AKS clusters that are using [Open Service Mesh addon for AKS][open-service-mesh-about].
49
-
* The add-on doesn't work on AKS clusters that have Istio installed on them already outside the add-on installation.
49
+
* The add-on doesn't work on AKS clusters with self-managed installations of Istio.
50
50
* The add-on doesn't support adding pods associated with virtual nodes to be added under the mesh.
51
+
* The add-on doesn't yet support egress gateways for outbound traffic control.
52
+
* The add-on doesn't yet support the sidecar-less Ambient mode. Microsoft is currently contributing to Ambient workstream under Istio open source. Product integration for Ambient mode is on the roadmap and is being continuously evaluated as the Ambient workstream evolves.
53
+
* The add-on doesn't yet support multi-cluster deployments.
51
54
* Istio doesn't support Windows Server containers.
52
-
* Customization of mesh based on the following custom resources is blocked for now - `EnvoyFilter, ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`
53
-
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon.
55
+
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin, EnvoyFilter`.
56
+
* For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`). Note that this EnvoyFilter is allowed but any issue arising from the Lua script itself is not supported (to learn more about our support policy and distinction between "allowed" and "supported" configurations, see [the following section][istio-meshconfig-support]). Other `EnvoyFilter` types are currently blocked. other `EnvoyFilter` types are currently blocked.
57
+
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon. It's planned to allow customizations such as ingress static IP address configuration as part of the Gateway API implementation for the add-on in future.
54
58
55
59
## Next steps
56
60
57
61
*[Deploy Istio-based service mesh add-on][istio-deploy-addon]
62
+
*[Troubleshoot Istio-based service mesh add-on][istio-troubleshooting]
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-ingress.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article shows you how to deploy external or internal ingresses for Istio se
17
17
18
18
## Prerequisites
19
19
20
-
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
20
+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application, and set environment variables.
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45
-
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
44
+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on.It's planned to allow these customizations in the Gateway API implementation for the Istio add-on in future.
46
45
47
46
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
48
47
@@ -129,7 +128,6 @@ Use `az aks mesh enable-ingress-gateway` to enable an internal Istio ingress on
129
128
az aks mesh enable-ingress-gateway --resource-group $RESOURCE_GROUP --name $CLUSTER --ingress-gateway-type internal
130
129
```
131
130
132
-
133
131
Use `kubectl get svc` to check the service mapped to the ingress gateway:
134
132
135
133
```bash
@@ -143,7 +141,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
Applications aren't mapped to the Istio ingress gateway after enabling the ingress gateway. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
144
+
After enabling the ingress gateway, applications need to be exposed through the gateway and routing rules need to be configured accordingly. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
147
145
148
146
```bash
149
147
kubectl apply -f - <<EOF
@@ -228,6 +226,12 @@ Confirm that the sample application's product page is accessible. The expected o
228
226
229
227
## Delete resources
230
228
229
+
If you want to clean up the Istio external or internal ingress gateways, but leave the mesh enabled on the cluster, run the following command:
230
+
231
+
```azure-cli-interactive
232
+
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUP}
233
+
```
234
+
231
235
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
232
236
233
237
```azurecli-interactive
@@ -242,9 +246,13 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
242
246
243
247
## Next steps
244
248
249
+
> [!NOTE]
250
+
> In case of any issues encountered with deploying the Istio ingress gateway or configuring ingress traffic routing, refer to [article on troubleshooting Istio add-on ingress gateways][istio-ingress-tsg]
251
+
245
252
*[Secure ingress gateway for Istio service mesh add-on][istio-secure-gateway]
0 commit comments