You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-ingress.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,9 @@ ms.author: shasb
13
13
14
14
This article shows you how to deploy external or internal ingresses for Istio service mesh add-on for Azure Kubernetes Service (AKS) cluster.
15
15
16
+
> [!NOTE]
17
+
> When performing a [minor revision upgrade](./istio-upgrade.md#minor-revision-upgrades-with-the-ingress-gateway) of the Istio add-on, another deployment for the external / internal gateways will be created for the new control plane revision.
18
+
16
19
## Prerequisites
17
20
18
21
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
Copy file name to clipboardExpand all lines: articles/aks/istio-meshconfig.md
+35-35Lines changed: 35 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ This guide assumes you followed the [documentation][istio-deploy-addon] to enabl
67
67
68
68
### Mesh configuration and upgrades
69
69
70
-
When you're performing [canary upgrade for Istio](./istio-upgrade.md), you need create a separate ConfigMap for the new revision in the `aks-istio-system` namespace **before initiating the canary upgrade**. This way the configuration is available when the new revision's control plane is deployed on cluster. For example, if you're upgrading the mesh from asm-1-18 to asm-1-19, you need to copy changes over from `istio-shared-configmap-asm-1-18` to create a new ConfigMap called `istio-shared-configmap-asm-1-19` in the `aks-istio-system` namespace.
70
+
When you're performing [canary upgrade for Istio](./istio-upgrade.md), you need to create a separate ConfigMap for the new revision in the `aks-istio-system` namespace **before initiating the canary upgrade**. This way the configuration is available when the new revision's control plane is deployed on cluster. For example, if you're upgrading the mesh from asm-1-18 to asm-1-19, you need to copy changes over from `istio-shared-configmap-asm-1-18` to create a new ConfigMap called `istio-shared-configmap-asm-1-19` in the `aks-istio-system` namespace.
71
71
72
72
After the upgrade is completed or rolled back, you can delete the ConfigMap of the revision that was removed from the cluster.
73
73
@@ -83,39 +83,39 @@ Mesh configuration and the list of allowed/supported fields are revision specifi
83
83
84
84
### MeshConfig
85
85
86
-
|**Field**|**Supported**|
87
-
|-----------|---------------|
88
-
| proxyListenPort |false|
89
-
| proxyInboundListenPort |false|
90
-
| proxyHttpPort |false|
91
-
| connectTimeout |false|
92
-
| tcpKeepAlive |false|
93
-
| defaultConfig |true|
94
-
| outboundTrafficPolicy |true|
95
-
| extensionProviders |true|
96
-
|defaultProvideres|true|
97
-
| accessLogFile |true|
98
-
| accessLogFormat |true|
99
-
| accessLogEncoding |true|
100
-
| enableTracing |true|
101
-
| enableEnvoyAccessLogService |true|
102
-
| disableEnvoyListenerLog |true|
103
-
| trustDomain |false|
104
-
| trustDomainAliases |false|
105
-
| caCertificates |false|
106
-
| defaultServiceExportTo |false|
107
-
| defaultVirtualServiceExportTo |false|
108
-
| defaultDestinationRuleExportTo |false|
109
-
| localityLbSetting |false|
110
-
| dnsRefreshRate |false|
111
-
| h2UpgradePolicy |false|
112
-
| enablePrometheusMerge |true|
113
-
| discoverySelectors |true|
114
-
| pathNormalization |false|
115
-
| defaultHttpRetryPolicy |false|
116
-
| serviceSettings |false|
117
-
| meshMTLS |false|
118
-
| tlsDefaults |false|
86
+
|**Field**|**Supported**|**Notes**|
87
+
|-----------|---------------|-----------|
88
+
| proxyListenPort |false| - |
89
+
| proxyInboundListenPort |false| - |
90
+
| proxyHttpPort |false| - |
91
+
| connectTimeout |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#ConnectionPoolSettings-TCPSettings) |
92
+
| tcpKeepAlive |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#ConnectionPoolSettings-TCPSettings) |
93
+
| defaultConfig |true| Used to configure [ProxyConfig](https://istio.io/latest/docs/reference/config/istio.mesh.v1alpha1/#ProxyConfig) |
94
+
| outboundTrafficPolicy |true| Also configurable in [Sidecar CR](https://istio.io/latest/docs/reference/config/networking/sidecar/#OutboundTrafficPolicy) |
95
+
| extensionProviders |false| -|
96
+
|defaultProviders|false| -|
97
+
| accessLogFile |true| - |
98
+
| accessLogFormat |true| - |
99
+
| accessLogEncoding |true| - |
100
+
| enableTracing |true| - |
101
+
| enableEnvoyAccessLogService |true| - |
102
+
| disableEnvoyListenerLog |true| - |
103
+
| trustDomain |false| - |
104
+
| trustDomainAliases |false| - |
105
+
| caCertificates |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#ClientTLSSettings) |
106
+
| defaultServiceExportTo |false| Configurable in [ServiceEntry](https://istio.io/latest/docs/reference/config/networking/service-entry/#ServiceEntry) |
107
+
| defaultVirtualServiceExportTo |false| Configurable in [VirtualService](https://istio.io/latest/docs/reference/config/networking/virtual-service/#VirtualService) |
108
+
| defaultDestinationRuleExportTo |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#DestinationRule) |
109
+
| localityLbSetting |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#LoadBalancerSettings) |
110
+
| dnsRefreshRate |false| - |
111
+
| h2UpgradePolicy |false| Configurable in [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/#ConnectionPoolSettings-HTTPSettings) |
112
+
| enablePrometheusMerge |true| - |
113
+
| discoverySelectors |true| - |
114
+
| pathNormalization |false| - |
115
+
| defaultHttpRetryPolicy |false| Configurable in [VirtualService](https://istio.io/latest/docs/reference/config/networking/virtual-service/#HTTPRetry) |
Copy file name to clipboardExpand all lines: articles/aks/istio-plugin-ca.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,6 +55,9 @@ The add-on requires Azure CLI version 2.57.0 or later installed. You can run `az
55
55
az keyvault set-policy --name $AKV_NAME --object-id $OBJECT_ID --secret-permissions get list
56
56
```
57
57
58
+
> [!NOTE]
59
+
> If you created your Key Vault with Azure RBAC Authorization for your permission model instead of Vault Access Policy, follow the instructions [here][akv-rbac-guide] to create permissions for the managed identity. Add an Azure role assignment for`Key Vault Reader`for the add-on's user-assigned managed identity.
60
+
58
61
## Set up Istio-based service mesh addon with plug-in CA certificates
59
62
60
63
1. Enable the Istio service mesh addon for your existing AKS cluster while referencing the Azure Key Vault secrets that were created earlier:
@@ -250,6 +253,7 @@ You may need to periodically rotate the certificate authorities for security or
Copy file name to clipboardExpand all lines: articles/aks/istio-upgrade.md
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,13 @@ author: shashankbarsin
11
11
12
12
This article addresses upgrade experiences for Istio-based service mesh add-on for Azure Kubernetes Service (AKS).
13
13
14
-
## Minor version upgrade
14
+
Announcements about the releases of new minor revisions or patches to the Istio-based service mesh add-on are published in the [AKS release notes][aks-release-notes].
15
15
16
-
Istio add-on allows upgrading the minor version using [canary upgrade process][istio-canary-upstream]. When an upgrade is initiated, the control plane of the new (canary) revision is deployed alongside the old (stable) revision's control plane. You can then manually roll over data plane workloads while using monitoring tools to track the health of workloads during this process. If you don't observe any issues with the health of your workloads, you can complete the upgrade so that only the new revision remains on the cluster. Else, you can roll back to the previous revision of Istio.
16
+
## Minor revision upgrade
17
17
18
-
If the cluster is currently using a supported minor version of Istio, upgrades are only allowed one minor version at a time. If the cluster is using an unsupported version of Istio, you must upgrade to the lowest supported minor version of Istio for that Kubernetes version. After that, upgrades can again be done one minor version at a time.
18
+
Istio add-on allows upgrading the minor revision using [canary upgrade process][istio-canary-upstream]. When an upgrade is initiated, the control plane of the new (canary) revision is deployed alongside the old (stable) revision's control plane. You can then manually roll over data plane workloads while using monitoring tools to track the health of workloads during this process. If you don't observe any issues with the health of your workloads, you can complete the upgrade so that only the new revision remains on the cluster. Else, you can roll back to the previous revision of Istio.
19
+
20
+
If the cluster is currently using a supported minor revision of Istio, upgrades are only allowed one minor revision at a time. If the cluster is using an unsupported revision of Istio, you must upgrade to the lowest supported minor revision of Istio for that Kubernetes version. After that, upgrades can again be done one minor revision at a time.
19
21
20
22
The following example illustrates how to upgrade from revision `asm-1-18` to `asm-1-19`. The steps are the same for all minor upgrades.
21
23
@@ -124,6 +126,12 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
124
126
> [!NOTE]
125
127
> Manually relabeling namespaces when moving them to a new revision can be tedious and error-prone. [Revision tags](https://istio.io/latest/docs/setup/upgrade/canary/#stable-revision-labels) solve this problem. Revision tags are stable identifiers that point to revisions and can be used to avoid relabeling namespaces. Rather than relabeling the namespace, a mesh operator can simply change the tag to point to a new revision. All namespaces labeled with that tag will be updated at the same time. However, note that you still need to restart the workloads to make sure the correct version of `istio-proxy` sidecars are injected.
126
128
129
+
### Minor revision upgrades with the ingress gateway
130
+
131
+
If you're currently using [Istio ingress gateways](./istio-deploy-ingress.md) and are performing a minor revision upgrade, keep in mind that Istio ingress gateway pods / deployments are deployed per-revision. However, we provide a single LoadBalancer service across all ingress gateway pods over multiple revisions, so the external/internal IP address of the ingress gateways will not change throughout the course of an upgrade.
132
+
133
+
Thus, during the canary upgrade, when two revisions exist simultaneously on the cluster, incoming traffic will be served by the ingress gateway pods of both revisions.
134
+
127
135
## Patch version upgrade
128
136
129
137
* Istio add-on patch version availability information is published in [AKS release notes][aks-release-notes].
0 commit comments