Skip to content

Commit 1517dd4

Browse files
authored
Merge pull request #27973 from neal-timpe/ossmdoc-165
OSSMDOC-165
2 parents 83f0e0e + 1dcd72e commit 1517dd4

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

modules/ossm-architecture.adoc

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,14 @@
77

88
{ProductName} is logically split into a data plane and a control plane:
99

10-
The *data plane* is a set of intelligent proxies deployed as sidecars. These proxies intercept and control all inbound and outbound network communication between microservices in the service mesh. Sidecar proxies also communicate with Mixer, the general-purpose policy and telemetry hub.
10+
The *data plane* is a set of intelligent proxies deployed as sidecars. These proxies intercept and control all inbound and outbound network communication between microservices in the service mesh.
1111

1212
* *Envoy proxy* intercepts all inbound and outbound traffic for all services in the service mesh. Envoy is deployed as a sidecar to the relevant service in the same pod.
1313

14-
The *control plane* manages and configures proxies to route traffic, and configures Mixers to enforce policies and collect telemetry.
14+
The *control plane* manages and configures Istiod to enforce proxies to route traffic.
1515

16-
* *Mixer* enforces access control and usage policies (such as authorization, rate limits, quotas, authentication, and request tracing) and collects telemetry data from the Envoy proxy and other services.
17-
* *Pilot* configures the proxies at runtime. Pilot provides service discovery for the Envoy sidecars, traffic management capabilities for intelligent routing (for example, A/B tests or canary deployments), and resiliency (timeouts, retries, and circuit breakers).
18-
* *Citadel* issues and rotates certificates. Citadel provides strong service-to-service and end-user authentication with built-in identity and credential management. You can use Citadel to upgrade unencrypted traffic in the service mesh. Operators can enforce policies based on service identity rather than on network controls using Citadel.
19-
* *Galley* ingests the service mesh configuration, then validates, processes, and distributes the configuration. Galley protects the other service mesh components from obtaining user configuration details from {product-title}.
16+
Istiod provides service discovery, configuration and certificate management. It converts high-level routing rules to Envoy configurations and propogates them to the sidcars at runtime.
17+
18+
Security Discovery Service (SDS) distributes certificates and keys to sidecars directly from Istiod.
2019

2120
{ProductName} also uses the *istio-operator* to manage the installation of the control plane. An _Operator_ is a piece of software that enables you to implement and automate common activities in your OpenShift cluster. It acts as a controller, allowing you to set or change the desired state of objects in your cluster.

0 commit comments

Comments
 (0)