Skip to content

Commit 19323a2

Browse files
Merge pull request #280166 from nshankar13/nshankar/update-istio-docs-docs-bash
Docs updates for Istio add-on from docs bash.
2 parents 380e21d + 60e2a19 commit 19323a2

File tree

3 files changed

+28
-12
lines changed

3 files changed

+28
-12
lines changed

articles/aks/istio-about.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ Service-to-service communication is what makes a distributed application possibl
2424

2525
Istio is an open-source service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio enables load balancing, service-to-service authentication, and monitoring – with few or no service code changes. Its powerful control plane brings vital features, including:
2626

27-
* Secure service-to-service communication in a cluster with TLS encryption, strong identity-based authentication and authorization.
27+
* Secure service-to-service communication in a cluster with TLS (Transport Layer Security) encryption, strong identity-based authentication and authorization.
2828
* Automatic load balancing for HTTP, gRPC, WebSocket, and TCP traffic.
2929
* Fine-grained control of traffic behavior with rich routing rules, retries, failovers, and fault injection.
30-
* A pluggable policy layer and configuration API supporting access controls, rate limits and quotas.
30+
* A pluggable policy layer and configuration API supporting access controls, rate limits, and quotas.
3131
* Automatic metrics, logs, and traces for all traffic within a cluster, including cluster ingress and egress.
3232

3333
## How is the add-on different from open-source Istio?
@@ -44,22 +44,31 @@ This service mesh add-on uses and builds on top of open-source Istio. The add-on
4444

4545
## Limitations
4646

47-
Istio-based service mesh add-on for AKS has the following limitations:
47+
Istio-based service mesh add-on for AKS currently has the following limitations:
4848
* The add-on doesn't work on AKS clusters that are using [Open Service Mesh addon for AKS][open-service-mesh-about].
49-
* The add-on doesn't work on AKS clusters that have Istio installed on them already outside the add-on installation.
49+
* The add-on doesn't work on AKS clusters with self-managed installations of Istio.
5050
* The add-on doesn't support adding pods associated with virtual nodes to be added under the mesh.
51+
* The add-on doesn't yet support egress gateways for outbound traffic control.
52+
* The add-on doesn't yet support the sidecar-less Ambient mode. Microsoft is currently contributing to Ambient workstream under Istio open source. Product integration for Ambient mode is on the roadmap and is being continuously evaluated as the Ambient workstream evolves.
53+
* The add-on doesn't yet support multi-cluster deployments.
5154
* Istio doesn't support Windows Server containers.
52-
* Customization of mesh based on the following custom resources is blocked for now - `EnvoyFilter, ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`
53-
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon.
55+
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin, EnvoyFilter`.
56+
* For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`). Note that this EnvoyFilter is allowed but any issue arising from the Lua script itself is not supported (to learn more about our support policy and distinction between "allowed" and "supported" configurations, see [the following section][istio-meshconfig-support]). Other `EnvoyFilter` types are currently blocked. other `EnvoyFilter` types are currently blocked.
57+
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon. It's planned to allow customizations such as ingress static IP address configuration as part of the Gateway API implementation for the add-on in future.
5458

5559
## Next steps
5660

5761
* [Deploy Istio-based service mesh add-on][istio-deploy-addon]
62+
* [Troubleshoot Istio-based service mesh add-on][istio-troubleshooting]
5863

5964
[istio-overview]: https://istio.io/latest/
6065
[managed-prometheus-overview]: ../azure-monitor/essentials/prometheus-metrics-overview.md
6166
[managed-grafana-overview]: ../managed-grafana/overview.md
6267
[azure-cni-cilium]: azure-cni-powered-by-cilium.md
6368
[open-service-mesh-about]: open-service-mesh-about.md
69+
[istio-meshconfig]: ./istio-meshconfig.md
70+
[istio-ingress]: ./istio-deploy-ingress.md
71+
[istio-troubleshooting]: /troubleshoot/azure/azure-kubernetes/extensions/istio-add-on-general-troubleshooting
72+
[istio-meshconfig-support]: ./istio-meshconfig.md#allowed-supported-and-blocked-values
6473

6574
[istio-deploy-addon]: istio-deploy-addon.md

articles/aks/istio-deploy-addon.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,6 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
243243
* [Deploy external or internal ingresses for Istio service mesh add-on][istio-deploy-ingress]
244244
* [Scale istiod and ingress gateway HPA][istio-scaling-guide]
245245

246-
247246
<!--- External Links --->
248247
[install-aks-cluster-istio-bicep]: https://github.com/Azure-Samples/aks-istio-addon-bicep
249248
[uninstall-istio-oss]: https://istio.io/latest/docs/setup/install/istioctl/#uninstall-istio

articles/aks/istio-deploy-ingress.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article shows you how to deploy external or internal ingresses for Istio se
1717
1818
## Prerequisites
1919

20-
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
20+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application, and set environment variables.
2121

2222
## Enable external ingress gateway
2323

@@ -41,8 +41,7 @@ aks-istio-ingressgateway-external LoadBalancer 10.0.10.249 <EXTERNAL_IP>
4141
```
4242

4343
> [!NOTE]
44-
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45-
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
44+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on.It's planned to allow these customizations in the Gateway API implementation for the Istio add-on in future.
4645
4746
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
4847

@@ -129,7 +128,6 @@ Use `az aks mesh enable-ingress-gateway` to enable an internal Istio ingress on
129128
az aks mesh enable-ingress-gateway --resource-group $RESOURCE_GROUP --name $CLUSTER --ingress-gateway-type internal
130129
```
131130

132-
133131
Use `kubectl get svc` to check the service mapped to the ingress gateway:
134132

135133
```bash
@@ -143,7 +141,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
143141
aks-istio-ingressgateway-internal LoadBalancer 10.0.182.240 <IP> 15021:30764/TCP,80:32186/TCP,443:31713/TCP 87s
144142
```
145143

146-
Applications aren't mapped to the Istio ingress gateway after enabling the ingress gateway. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
144+
After enabling the ingress gateway, applications need to be exposed through the gateway and routing rules need to be configured accordingly. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
147145

148146
```bash
149147
kubectl apply -f - <<EOF
@@ -228,6 +226,12 @@ Confirm that the sample application's product page is accessible. The expected o
228226

229227
## Delete resources
230228

229+
If you want to clean up the Istio external or internal ingress gateways, but leave the mesh enabled on the cluster, run the following command:
230+
231+
```azure-cli-interactive
232+
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUP}
233+
```
234+
231235
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
232236

233237
```azurecli-interactive
@@ -242,9 +246,13 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
242246

243247
## Next steps
244248

249+
> [!NOTE]
250+
> In case of any issues encountered with deploying the Istio ingress gateway or configuring ingress traffic routing, refer to [article on troubleshooting Istio add-on ingress gateways][istio-ingress-tsg]
251+
245252
* [Secure ingress gateway for Istio service mesh add-on][istio-secure-gateway]
246253
* [Scale ingress gateway HPA][istio-scaling-guide]
247254

248255
[istio-deploy-addon]: istio-deploy-addon.md
249256
[istio-secure-gateway]: istio-secure-gateway.md
250257
[istio-scaling-guide]: istio-scale.md#scaling
258+
[istio-ingress-tsg]: /troubleshoot/azure/azure-kubernetes/extensions/istio-add-on-ingress-gateway

0 commit comments

Comments
 (0)