You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/istio-about.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,17 +22,17 @@ Service-to-service communication is what makes a distributed application possibl
22
22
23
23
## What is Istio?
24
24
25
-
Istio is an opensource service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio enables load balancing, service-to-service authentication, and monitoring – with few or no service code changes. Its powerful control plane brings vital features, including:
25
+
Istio is an open-source service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio enables load balancing, service-to-service authentication, and monitoring – with few or no service code changes. Its powerful control plane brings vital features, including:
26
26
27
-
* Secure service-to-service communication in a cluster with TLS encryption, strong identity-based authentication and authorization
28
-
* Automatic load balancing for HTTP, gRPC, WebSocket, and TCP traffic
29
-
* Fine-grained control of traffic behavior with rich routing rules, retries, failovers, and fault injection
30
-
* A pluggable policy layer and configuration API supporting access controls, rate limits and quotas
31
-
* Automatic metrics, logs, and traces for all traffic within a cluster, including cluster ingress and egress
27
+
* Secure service-to-service communication in a cluster with TLS encryption, strong identity-based authentication and authorization.
28
+
* Automatic load balancing for HTTP, gRPC, WebSocket, and TCP traffic.
29
+
* Fine-grained control of traffic behavior with rich routing rules, retries, failovers, and fault injection.
30
+
* A pluggable policy layer and configuration API supporting access controls, rate limits and quotas.
31
+
* Automatic metrics, logs, and traces for all traffic within a cluster, including cluster ingress and egress.
32
32
33
-
## How is the add-on different from opensource Istio?
33
+
## How is the add-on different from open-source Istio?
34
34
35
-
This service mesh add-on uses and builds on top of opensource Istio. The add-on flavor provides the following extra benefits:
35
+
This service mesh add-on uses and builds on top of open-source Istio. The add-on flavor provides the following extra benefits:
36
36
37
37
* Istio versions are tested and verified to be compatible with supported versions of Azure Kubernetes Service.
38
38
* Scaling of Istio control plane configured and handled by Microsoft.
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-addon.md
+29-23Lines changed: 29 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,45 +13,44 @@ This article shows you how to install the Istio-based service mesh add-on for Az
13
13
14
14
For more information on Istio and the service mesh add-on, see [Istio-based service mesh add-on for Azure Kubernetes Service][istio-about].
15
15
16
+
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
17
+
16
18
## Before you begin
17
19
18
-
You need the Azure CLI version 2.44.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
20
+
### Set environment variables:
19
21
20
-
Set environment variables:
22
+
```bash
23
+
export CLUSTER=<cluster-name>
24
+
export RESOURCE_GROUP=<resource-group-name>
25
+
export LOCATION=<location>
26
+
```
21
27
22
-
```bash
23
-
export CLUSTER=<cluster-name>
24
-
export RESOURCE_GROUP=<resource-group-name>
25
-
export LOCATION=<location>
26
-
```
28
+
### Verify Azure CLI and aks-preview extension versions
29
+
* You need the Azure CLI version 2.44.0 or later installed. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
30
+
* You need the `aks-preview` Azure CLI extension of version 0.5.133 or later installed. Run `az --version` to find the version.
27
31
28
-
## Install the aks-preview Azure CLI extension
29
-
30
-
You need the `aks-preview` Azure CLI extension of version 0.5.133 or later installed and configured. Run `az --version` to find the version.
31
-
32
-
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
33
32
34
33
To install the aks-preview extension, run the following command:
35
34
36
-
```azurecli
35
+
```azurecli-interactive
37
36
az extension add --name aks-preview
38
37
```
39
38
40
39
Run the following command to update to the latest version of the extension released:
41
40
42
-
```azurecli
41
+
```azurecli-interactive
43
42
az extension update --name aks-preview
44
43
```
45
44
46
-
## Register the 'AzureServiceMeshPreview' feature flag
45
+
###Register the _AzureServiceMeshPreview_ feature flag
47
46
48
-
Register the `AzureServiceMeshPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
47
+
Register the `AzureServiceMeshPreview` feature flag by using the [az feature register][az-feature-register] command below:
49
48
50
49
```azurecli-interactive
51
50
az feature register --namespace "Microsoft.ContainerService" --name "AzureServiceMeshPreview"
52
51
```
53
52
54
-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
53
+
It takes a few minutes for the feature to register. Verify the registration status by using the [az feature show][az-feature-show] command:
55
54
56
55
```azurecli-interactive
57
56
az feature show --namespace "Microsoft.ContainerService" --name "AzureServiceMeshPreview"
@@ -65,7 +64,7 @@ az provider register --namespace Microsoft.ContainerService
65
64
66
65
## Install Istio add-on at the time of cluster creation
67
66
68
-
To install the Istio add-on when creating the cluster, use `--enable-asm` or`--enable-azure-service-mesh` parameters.
67
+
To install the Istio add-on when creating the cluster, use the `--enable-azure-service-mesh` or`--enable-asm` parameter.
69
68
70
69
```azurecli-interactive
71
70
az group create --name ${RESOURCE_GROUP} --location ${LOCATION}
@@ -82,14 +81,14 @@ The following example enables Istio add-on for an existing AKS cluster:
82
81
83
82
> [!IMPORTANT]
84
83
> You can't enable the Istio add-on on an existing cluster if an OSM add-on is already on your cluster. [Uninstall OSM add-on on your cluster][uninstall-osm-addon] before enabling the Istio add-on.
85
-
> You can't enable the Istio add-on on an existing cluster if an OSM add-on is already on your cluster. Uninstall the OSM add-on before installing the Istio add-on. For more information, see [uninstall the OSM add-on from your AKS cluster][uninstall-osm-addon].
84
+
> For more information, see [uninstall the OSM add-on from your AKS cluster][uninstall-osm-addon].
86
85
> Istio add-on can only be enabled on AKS clusters of version >= 1.23.
87
86
88
87
```azurecli-interactive
89
88
az aks mesh enable --resource-group ${RESOURCE_GROUP} --name ${CLUSTER}
90
89
```
91
90
92
-
## Verify add-on was installed successfully
91
+
## Verify successful installation
93
92
94
93
To verify the Istio add-on is installed on your cluster, run the following command:
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-ingress.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,11 @@ This article shows you how to deploy external or internal ingresses for Istio se
15
15
16
16
## Prerequisites
17
17
18
-
This guide assumes an existing AKS cluster with the Istio add-on enabled and an application deployed. For more information on enabling the Istio add-on in your cluster and deploying a sample application, see [Deploy Istio-based service mesh add-on for AKS][istio-deploy-addon].
18
+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
19
19
20
20
## Enable external ingress gateway
21
21
22
-
Use `az aks mesh enable-ingress-gateway` to enable an externally accessible Istio ingress on your AKS cluster. For example:
22
+
Use `az aks mesh enable-ingress-gateway` to enable an externally accessible Istio ingress on your AKS cluster:
23
23
24
24
```azurecli-interactive
25
25
az aks mesh enable-ingress-gateway --resource-group $RESOURCE_GROUP --name $CLUSTER --ingress-gateway-type external
@@ -31,14 +31,14 @@ Use `kubectl get svc` to check the service mapped to the ingress gateway:
31
31
kubectl get svc aks-istio-ingressgateway-external -n aks-istio-ingress
32
32
```
33
33
34
-
Check external IP address of the service. For example:
34
+
Check the external IP address of the service in the output:
Applications aren't accessible from outside the cluster after enabling the ingress gateway. To make an application accessible, map the deployment's ingress to the Istio Ingress Gate. For example, the following manifest creates this mapping for the sample application:
41
+
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
Applications aren't mapped to the Istio Ingress Gateway after enabling the ingress gateway. The following manifest maps the deployment's ingress to the Istio Ingress Gateway. For example, the following manifest creates this mapping for the sample application:
135
+
Applications aren't mapped to the Istio ingress gateway after enabling the ingress gateway. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
136
136
137
137
```bash
138
138
kubectl apply -f - <<EOF
@@ -209,15 +209,15 @@ Use `kubectl exec` to confirm application is accessible from inside the cluster'
209
209
kubectl exec"$(kubectl get pod -l app=ratings -o jsonpath='{.items[0].metadata.name}')" -c ratings -- curl -sS "http://$GATEWAY_URL_INTERNAL/productpage"| grep -o "<title>.*</title>"
210
210
```
211
211
212
-
Confirm you see the sample application's product page is accessible. For example:
212
+
Confirm that the sample application's product page is accessible. The expected output is:
213
213
214
214
```html
215
215
<title>Simple Bookstore App</title>
216
216
```
217
217
218
218
## Delete resources
219
219
220
-
If you want to clean up the Istio service mesh and the ingresses while leaving behind the cluster, run the following command:
220
+
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
221
221
222
222
```azurecli-interactive
223
223
az aks mesh disable --resource-group ${RESOURCE_GROUP} --name ${CLUSTER}
0 commit comments