You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/istio-about.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,19 +50,16 @@ Istio-based service mesh add-on for AKS currently has the following limitations:
50
50
* The add-on doesn't support adding pods associated with virtual nodes to be added under the mesh.
51
51
* The add-on doesn't support egress gateways for outbound traffic control.
52
52
* The add-on doesn't support the sidecar-less Ambient dataplane mode.
53
-
* The add-on doesn't support multi-cluster, multi-mesh, multi-cloud, or hybrid deployments.
54
-
* The add-on restricts mesh-wide configuration options for the [Istio meshconfig][istio-meshconfig].
55
-
* The add-on doesn't support static IP address, port, or other customizations for the [Istio add-on ingress gateways][istio-ingress].
53
+
* The add-on doesn't support multi-cluster deployments.
56
54
* Istio doesn't support Windows Server containers.
57
-
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`. For `EnvoyFilter`, the add-on only supports customization of Lua script filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`) - other `EnvoyFilter` types are currently blocked.
58
-
59
-
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon.
55
+
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`. For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`) - other `EnvoyFilter` types are currently blocked.
56
+
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon. It's planned to allow customizations such as Static IP address in the Gateway API Istio implementation as part of the Istio add-on in future.
60
57
61
58
## Next steps
62
59
63
60
### Feedback and Feature Requests
64
61
65
-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with and add the `mesh` label.
62
+
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with the `mesh` label.
66
63
67
64
*[Deploy Istio-based service mesh add-on][istio-deploy-addon]
68
65
*[Troubleshoot Istio-based service mesh add-on][istio-troubleshooting]
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-addon.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -242,12 +242,11 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
242
242
243
243
### Feedback and Feature Requests
244
244
245
-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with and add the `mesh` label.
245
+
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue and add the `mesh` label.
246
246
247
247
*[Deploy external or internal ingresses for Istio service mesh add-on][istio-deploy-ingress]
248
248
*[Scale istiod and ingress gateway HPA][istio-scaling-guide]
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-ingress.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article shows you how to deploy external or internal ingresses for Istio se
17
17
18
18
## Prerequisites
19
19
20
-
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
20
+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy sample applications, and set environment variables.
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45
-
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
44
+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on. It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
46
45
47
46
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
48
47
@@ -129,7 +128,6 @@ Use `az aks mesh enable-ingress-gateway` to enable an internal Istio ingress on
129
128
az aks mesh enable-ingress-gateway --resource-group $RESOURCE_GROUP --name $CLUSTER --ingress-gateway-type internal
130
129
```
131
130
132
-
133
131
Use `kubectl get svc` to check the service mapped to the ingress gateway:
134
132
135
133
```bash
@@ -143,7 +141,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
Applications aren't mapped to the Istio ingress gateway after enabling the ingress gateway. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
144
+
After enabling the ingress gateway, applications need to be exposed through the gateway and routing rules need to be configured accordingly. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
147
145
148
146
```bash
149
147
kubectl apply -f - <<EOF
@@ -228,6 +226,12 @@ Confirm that the sample application's product page is accessible. The expected o
228
226
229
227
## Delete resources
230
228
229
+
If you want to clean up the Istio external or internal ingresses, but leave the mesh enabled on the cluster, run the following command:
230
+
231
+
```azure-cli-interactive
232
+
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUPS}
233
+
```
234
+
231
235
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
0 commit comments