Skip to content

Commit 5659958

Browse files
authored
Merge pull request #43998 from JStickler/OSSMDOC-464
OSSMDOC-464: Verify traffic encryption with Kiali.
2 parents ca08d88 + bed532a commit 5659958

6 files changed

+36
-4
lines changed
178 KB
Loading
7.38 KB
Loading
7.89 KB
Loading

modules/ossm-security-mtls.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
// * service_mesh/v2x/ossm-config.adoc
44

55
[id="ossm-security-mtls_{context}"]
6-
= Mutual Transport Layer Security (mTLS)
6+
= About mutual Transport Layer Security (mTLS)
77

8-
Mutual Transport Layer Security (mTLS) is a protocol that enables two parties authenticate each other. It is the default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). mTLS can be used without changes to the application or service code. The TLS is handled entirely by the service mesh infrastructure and between the two sidecar proxies.
8+
Mutual Transport Layer Security (mTLS) is a protocol that enables two parties to authenticate each other. It is the default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). You can use mTLS without changes to the application or service code. The TLS is handled entirely by the service mesh infrastructure and between the two sidecar proxies.
99

1010
By default, mTLS in {SMProductName} is enabled and set to permissive mode, where the sidecars in {SMProductShortName} accept both plain-text traffic and connections that are encrypted using mTLS. If a service in your mesh is communicating with a service outside the mesh, strict mTLS could break communication between those services. Use permissive mode while you migrate your workloads to {SMProductShortName}. Then, you can enable strict mTLS across your mesh, namespace, or application.
1111

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
////
2+
This module included in the following assemblies:
3+
* service_mesh/v2x/prepare-to-deploy-applications-ossm.adoc
4+
////
5+
:_content-type: CONCEPT
6+
[id="ossm-validating-sidecar_{context}"]
7+
= Validating encryption with Kiali
8+
9+
The Kiali console offers several ways to validate whether or not your applications, services, and workloads have mTLS encryption enabled.
10+
11+
.Masthead icon mesh-wide mTLS enabled
12+
image::ossm-kiali-masthead-mtls-enabled.png[mTLS enabled]
13+
14+
At the right side of the masthead, Kiali shows a lock icon when the mesh has strictly enabled mTLS for the whole service mesh. It means that all communications in the mesh use mTLS.
15+
16+
.Masthead icon mesh-wide mTLS partially enabled
17+
image::ossm-kiali-masthead-mtls-partial.png[mTLS partially enabled]
18+
19+
Kiali displays a hollow lock icon when either the mesh is configured in `PERMISSIVE` mode or there is a error in the mesh-wide mTLS configuration.
20+
21+
.Security badge
22+
image::ossm-kiali-graph-badge-security.png[Security badge]
23+
24+
The *Graph* page has the option to display a *Security* badge on the graph edges to indicate that mTLS is enabled. To enable security badges on the graph, from the *Display* menu, under *Show Badges*, select the *Security* checkbox. When an edge shows a lock icon, it means at least one request with mTLS enabled is present. In case there are both mTLS and non-mTLS requests, the side-panel will show the percentage of requests that use mTLS.
25+
26+
The *Applications Detail Overview* page displays a *Security* icon on the graph edges where at least one request with mTLS enabled is present.
27+
28+
The *Workloads Detail Overview* page displays a *Security* icon on the graph edges where at least one request with mTLS enabled is present.
29+
30+
The *Services Detail Overview* page displays a *Security* icon on the graph edges where at least one request with mTLS enabled is present. Also note that Kiali displays a lock icon in the *Network* section next to ports that are configured for mTLS.

service_mesh/v2x/ossm-security.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ If your service mesh application is constructed with a complex array of microser
1010

1111
.Before you begin
1212

13-
If you have a project, add your project to the xref:../../service_mesh/v2x/installing-ossm.adoc#ossm-member-roll-modify_ossm-create-mesh[`ServiceMeshMemberRoll` resource].
13+
If you have a project, add your project to the xref:../../service_mesh/v2x/ossm-create-mesh.adoc#ossm-member-roll-create_ossm-create-mesh[`ServiceMeshMemberRoll` resource].
1414

15-
If you don't have a project, install the xref:../../service_mesh/v2x/prepare-to-deploy-applications-ossm.adoc#ossm-tutorial-bookinfo-overview_ossm-create-mesh[Bookinfo sample application] and add it to the `ServiceMeshMemberRoll` resource. The sample application helps illustrate security concepts.
15+
If you don't have a project, install the xref:../../service_mesh/v2x/ossm-create-mesh.adoc#ossm-tutorial-bookinfo-overview_ossm-create-mesh[Bookinfo sample application] and add it to the `ServiceMeshMemberRoll` resource. The sample application helps illustrate security concepts.
1616

1717
include::modules/ossm-security-mtls.adoc[leveloffset=+1]
1818

@@ -24,6 +24,8 @@ include::modules/ossm-config-sidecar-out-mtls.adoc[leveloffset=+2]
2424

2525
include::modules/ossm-config-mtls-min-max.adoc[leveloffset=+2]
2626

27+
include::modules/ossm-validate-encryption-kiali.adoc[leveloffset=+2]
28+
2729
include::modules/ossm-security-auth-policy.adoc[leveloffset=+1]
2830

2931
include::modules/ossm-security-cipher.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)