You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/istio-about.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,20 +46,21 @@ This service mesh add-on uses and builds on top of open-source Istio. The add-on
46
46
47
47
Istio-based service mesh add-on for AKS currently has the following limitations:
48
48
* The add-on doesn't work on AKS clusters that are using [Open Service Mesh addon for AKS][open-service-mesh-about].
49
-
* The add-on doesn't work on AKS clusters with Istio installed outside of the add-on installation.
49
+
* The add-on doesn't work on AKS clusters with self-managed installations of Istio.
50
50
* The add-on doesn't support adding pods associated with virtual nodes to be added under the mesh.
51
-
* The add-on doesn't support egress gateways for outbound traffic control.
52
-
* The add-on doesn't support the sidecar-less Ambient data plane mode.
53
-
* The add-on doesn't support multi-cluster deployments.
51
+
* The add-on doesn't yet support egress gateways for outbound traffic control.
52
+
* The add-on doesn't yet support the sidecar-less Ambient mode. Microsoft is currently contributing to Ambient workstream under Istio open source. Ambient mode is on the roadmap and will product integration is being continuously evaluated as the Ambient workstream evolves.
53
+
* The add-on doesn't yet support multi-cluster deployments.
54
54
* Istio doesn't support Windows Server containers.
55
-
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`. For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`) - other `EnvoyFilter` types are currently blocked.
55
+
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`.
56
+
* For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`). Note that this EnvoyFilter is allowed but any issue arising from the Lua script itself is not supported (to learn more about our support policy and distinction between "allowed" and "supported" configurations, see [the following section][istio-meshconfig-support]). Other `EnvoyFilter` types are currently blocked. other `EnvoyFilter` types are currently blocked.
56
57
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon. It's planned to allow customizations such as ingress static IP address configuration as part of the Gateway API implementation for the add-on in future.
57
58
58
59
## Next steps
59
60
60
-
### Feedback and Feature Requests
61
+
### Feedback and feature requests
61
62
62
-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS GitHub repository][aks-gh-issues]. Please open a new issue with the `mesh` label.
63
+
You can provide feedback or create feature requests for the add-on on [AKS GitHub repository][aks-gh-issues] by creating a new issue with the `mesh` label.
63
64
64
65
*[Deploy Istio-based service mesh add-on][istio-deploy-addon]
65
66
*[Troubleshoot Istio-based service mesh add-on][istio-troubleshooting]
@@ -73,5 +74,6 @@ Feedback and feature requests for the Istio-based service mesh add-on should be
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-addon.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -240,9 +240,9 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
240
240
241
241
## Next steps
242
242
243
-
### Feedback and Feature Requests
243
+
### Feedback and feature requests
244
244
245
-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS GitHub repository][aks-gh-issues]. Please open a new issue and add the `mesh` label.
245
+
You can provide feedback or create feature requests for the add-on on [AKS GitHub repository][aks-gh-issues] by creating a new issue with the `mesh` label.
246
246
247
247
*[Deploy external or internal ingresses for Istio service mesh add-on][istio-deploy-ingress]
248
248
*[Scale istiod and ingress gateway HPA][istio-scaling-guide]
Copy file name to clipboardExpand all lines: articles/aks/istio-deploy-ingress.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article shows you how to deploy external or internal ingresses for Istio se
17
17
18
18
## Prerequisites
19
19
20
-
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy sample applications, and set environment variables.
20
+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application, and set environment variables.
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on.It's planned to allow these customizations in the Gateway API implementation for the Istio add-on in future.
44
+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on.It's planned to allow these customizations in the Gateway API implementation for the Istio add-on in future.
45
45
46
46
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
47
47
@@ -229,7 +229,7 @@ Confirm that the sample application's product page is accessible. The expected o
229
229
If you want to clean up the Istio external or internal ingress gateways, but leave the mesh enabled on the cluster, run the following command:
230
230
231
231
```azure-cli-interactive
232
-
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUPS}
232
+
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUP}
233
233
```
234
234
235
235
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
0 commit comments