- Global Mesh Options
- MeshConfig
- ConfigSource
- Certificate
- MeshConfig.OutboundTrafficPolicy
- MeshConfig.ThriftConfig
- MeshConfig.CA
- MeshConfig.ServiceSettings.Settings
- Tracing
- SDS
- ProxyConfig
- RemoteService
- Tracing.Zipkin
- Tracing.Lightstep
- Tracing.Datadog
- Tracing.Stackdriver
- Tracing.OpenCensusAgent
- ProxyConfig.ProxyStatsMatcher
- Network
- MeshNetworks
- Network.NetworkEndpoints
- Network.IstioNetworkGateway
- MeshConfig.OutboundTrafficPolicy.Mode
- MeshConfig.IngressControllerMode
- MeshConfig.AccessLogEncoding
- MeshConfig.H2UpgradePolicy
- Resource
- Tracing.OpenCensusAgent.TraceContext
- ProxyConfig.InboundInterceptionMode
- AuthenticationPolicy
Global Mesh Options
Configuration affecting the service mesh as a whole.
MeshConfig
MeshConfig defines mesh-wide variables shared by all Envoy instances in the Istio service mesh.
NOTE: This configuration type should be used for the low-level global configuration, such as component addresses and port numbers. It should not be used for the features of the mesh that can be scoped by service or by namespace. Some of the fields in the mesh config are going to be deprecated and replaced with several individual configuration types (for example, tracing configuration).
Field | Type | Description | Required |
---|---|---|---|
proxyListenPort | int32 | Port on which Envoy should listen for incoming connections from other services. Default port is 15001. | No |
proxyHttpPort | int32 | Port on which Envoy should listen for HTTP PROXY requests if set. | No |
connectTimeout | Duration | Connection timeout used by Envoy. (MUST BE >=1ms) Default timeout is 10s. | No |
protocolDetectionTimeout | Duration | Automatic protocol detection uses a set of heuristics to determine whether the connection is using TLS or not (on the server side), as well as the application protocol being used (e.g., http vs tcp). These heuristics rely on the client sending the first bits of data. For server first protocols like MySQL, MongoDB, etc. Envoy will timeout on the protocol detection after the specified period, defaulting to non mTLS plain TCP traffic. Set this field to tweak the period that Envoy will wait for the client to send the first bits of data. (MUST BE >=1ms or 0s to disable). Default detection timeout is 5s. | No |
tcpKeepalive | TcpKeepalive | If set then set | No |
ingressClass | string | Class of ingress resources to be processed by Istio ingress controller. This corresponds to the value of | No |
ingressService | string | Name of the Kubernetes service used for the istio ingress controller. If no ingress controller is specified, the default value | No |
ingressControllerMode | IngressControllerMode | Defines whether to use Istio ingress controller for annotated or all ingress resources. Default mode is | No |
ingressSelector | string | Defines which gateway deployment to use as the Ingress controller. This field corresponds to the Gateway.selector field, and will be set as | No |
enableTracing | bool | Flag to control generation of trace spans and request IDs. Requires a trace span collector defined in the proxy configuration. | No |
accessLogFile | string | File address for the proxy access log (e.g. /dev/stdout). Empty value disables access logging. | No |
accessLogFormat | string | Format for the proxy access log Empty value results in proxy’s default access log format | No |
accessLogEncoding | AccessLogEncoding | Encoding for the proxy access log ( | No |
enableEnvoyAccessLogService | bool | This flag enables Envoy’s gRPC Access Log Service. See Access Log Service for details about Envoy’s gRPC Access Log Service API. Default value is | No |
disableEnvoyListenerLog | bool | This flag disables Envoy Listener logs. See Listener Access Log Istio Enables Envoy’s listener access logs on “NoRoute” response flag. Default value is | No |
defaultConfig | ProxyConfig | Default proxy config used by the proxy injection mechanism operating in the mesh (e.g. Kubernetes admission controller) In case of Kubernetes, the proxy config is applied once during the injection process, and remain constant for the duration of the pod. The rest of the mesh config can be changed at runtime and config gets distributed dynamically. | No |
outboundTrafficPolicy | OutboundTrafficPolicy | Set the default behavior of the sidecar for handling outbound traffic from the application. If your application uses one or more external services that are not known apriori, setting the policy to | No |
configSources | ConfigSource[] | ConfigSource describes a source of configuration data for networking rules, and other Istio configuration artifacts. Multiple data sources can be configured for a single control plane. | No |
enableAutoMtls | BoolValue | This flag is used to enable mutual | No |
trustDomain | string | The trust domain corresponds to the trust root of a system. Refer to SPIFFE-ID | No |
trustDomainAliases | string[] | The trust domain aliases represent the aliases of
Any service with the identity | No |
defaultServiceExportTo | string[] | The default value for the ServiceEntry.export_to field and services imported through container registry integrations, e.g. this applies to Kubernetes Service resources. The value is a list of namespace names and reserved namespace aliases. The allowed namespace aliases are:
If not set the system will use “” as the default value which implies that services are exported to all namespaces.
For further discussion see the reference documentation for | No |
defaultVirtualServiceExportTo | string[] | The default value for the VirtualService.export_to field. Has the same syntax as If not set the system will use “” as the default value which implies that virtual services are exported to all namespaces | No |
defaultDestinationRuleExportTo | string[] | The default value for the If not set the system will use “” as the default value which implies that destination rules are exported to all namespaces | No |
rootNamespace | string | The namespace to treat as the administrative root namespace for Istio configuration. When processing a leaf namespace Istio will search for declarations in that namespace first and if none are found it will search in the root namespace. Any matching declaration found in the root namespace is processed as if it were declared in the leaf namespace. The precise semantics of this processing are documented on each resource type. | No |
localityLbSetting | LocalityLoadBalancerSetting | Locality based load balancing distribution or failover settings. | No |
dnsRefreshRate | Duration | Configures DNS refresh rate for Envoy clusters of type | No |
h2UpgradePolicy | H2UpgradePolicy | Specify if http1.1 connections should be upgraded to http2 by default. if sidecar is installed on all pods in the mesh, then this should be set to | No |
inboundClusterStatName | string | Name to be used while emitting statistics for inbound clusters. The same pattern is used while computing stat prefix for network filters like TCP and Redis. By default, Istio emits statistics with the pattern A Pattern can be composed of various pre-defined variables. The following variables are supported.
Following are some examples of supported patterns for reviews:
| No |
outboundClusterStatName | string | Name to be used while emitting statistics for outbound clusters. The same pattern is used while computing stat prefix for network filters like TCP and Redis. By default, Istio emits statistics with the pattern A Pattern can be composed of various pre-defined variables. The following variables are supported.
Following are some examples of supported patterns for reviews:
| No |
certificates | Certificate[] | Configure the provision of certificates. | No |
thriftConfig | ThriftConfig | Set configuration for Thrift protocol | No |
enablePrometheusMerge | BoolValue | If enabled, Istio agent will merge metrics exposed by the application with metrics from Envoy and Istio agent. The sidecar injection will replace | No |
verifyCertificateAtClient | BoolValue |
For SAN, client-side proxy will exact match host in | No |
ConfigSource
ConfigSource describes information about a configuration store inside a mesh. A single control plane instance can interact with one or more data sources.
Field | Type | Description | Required |
---|---|---|---|
address | string | Address of the server implementing the Istio Mesh Configuration protocol (MCP). Can be IP address or a fully qualified DNS name. Use fs:/// to specify a file-based backend with absolute path to the directory. | No |
tlsSettings | ClientTLSSettings | Use the tls_settings to specify the tls mode to use. If the MCP server uses Istio mutual TLS and shares the root CA with Pilot, specify the TLS mode as | No |
subscribedResources | Resource[] | Describes the source of configuration, if nothing is specified default is MCP | No |
Certificate
Certificate configures the provision of a certificate and its key. Example 1: key and cert stored in a secret
{ secretName: galley-cert
secretNamespace: istio-system
dnsNames:
- galley.istio-system.svc
- galley.mydomain.com
}
Example 2: key and cert stored in a directory
{ dnsNames:
- pilot.istio-system
- pilot.istio-system.svc
- pilot.mydomain.com
}
Field | Type | Description | Required |
---|---|---|---|
secretName | string | Name of the secret the certificate and its key will be stored into. If it is empty, it will not be stored into a secret. Instead, the certificate and its key will be stored into a hard-coded directory. | No |
dnsNames | string[] | The DNS names for the certificate. A certificate may contain multiple DNS names. | No |
MeshConfig.OutboundTrafficPolicy
Field | Type | Description | Required |
---|---|---|---|
mode | Mode | No |
MeshConfig.ThriftConfig
Field | Type | Description | Required |
---|---|---|---|
rateLimitUrl | string | Specify thrift rate limit service URL. If pilot has thrift protocol support enabled, this will enable the rate limit service for destinations that have matching rate limit configurations. | No |
rateLimitTimeout | Duration | Specify thrift rate limit service timeout, in milliseconds. Default is | No |
MeshConfig.CA
Field | Type | Description | Required |
---|---|---|---|
address | string | REQUIRED. Address of the CA server implementing the Istio CA gRPC API. Can be IP address or a fully qualified DNS name with port Eg: custom-ca.default.svc.cluster.local:8932, 192.168.23.2:9000 | No |
tlsSettings | ClientTLSSettings | Use the tlssettings to specify the tls mode to use. Regarding tlssettings: - DISABLE MODE is legitimate for the case Istiod is making the request via an Envoy sidecar. DISABLE MODE can also be used for testing - TLS MUTUAL MODE be on by default. If the CA certificates (cert bundle to verify the CA server’s certificate) is omitted, Istiod will use the system root certs to verify the CA server’s certificate. | No |
requestTimeout | Duration | timeout for forward CSR requests from Istiod to External CA Default: 10s | No |
istiodSide | bool | Use istiod_side to specify CA Server integrate to Istiod side or Agent side Default: true | No |
MeshConfig.ServiceSettings.Settings
Settings for the selected services.
Field | Type | Description | Required |
---|---|---|---|
clusterLocal | bool | If true, specifies that the client and service endpoints must reside in the same cluster. By default, in multi-cluster deployments, the Istio control plane assumes all service endpoints to be reachable from any client in any of the clusters which are part of the mesh. This configuration option limits the set of service endpoints visible to a client to be cluster scoped. There are some common scenarios when this can be useful:
By default, Istio will consider all services in the kube-system namespace to be cluster-local, unless explicitly overridden here. | No |
Tracing
Tracing defines configuration for the tracing performed by Envoy instances.
Field | Type | Description | Required |
---|---|---|---|
zipkin | Zipkin (oneof) | Use a Zipkin tracer. | No |
lightstep | Lightstep (oneof) | Use a Lightstep tracer. | No |
datadog | Datadog (oneof) | Use a Datadog tracer. | No |
stackdriver | Stackdriver (oneof) | Use a Stackdriver tracer. | No |
openCensusAgent | OpenCensusAgent (oneof) | Use an OpenCensus tracer exporting to an OpenCensus agent. | No |
tlsSettings | ClientTLSSettings | Use the tls_settings to specify the tls mode to use. If the remote tracing service uses Istio mutual TLS and shares the root CA with Pilot, specify the TLS mode as | No |
SDS
SDS defines secret discovery service(SDS) configuration to be used by the proxy. For workload, its values are set in sidecar injector(passed as arguments to istio-proxy container). For pilot/mixer, it’s passed as arguments to istio-proxy container in pilot/mixer deployment yaml files directly.
Field | Type | Description | Required |
---|---|---|---|
enabled | bool | True if SDS is enabled. | No |
k8sSaJwtPath | string | Path of k8s service account JWT path. | No |
ProxyConfig
ProxyConfig defines variables for individual Envoy instances.
Field | Type | Description | Required |
---|---|---|---|
configPath | string | Path to the generated configuration file directory. Proxy agent generates the actual configuration and stores it in this directory. | No |
binaryPath | string | Path to the proxy binary | No |
serviceCluster | string | Service cluster defines the name for the Since Istio does not assign a local | No |
drainDuration | Duration | The time in seconds that Envoy will drain connections during a hot restart. MUST be >=1s (e.g., 1s/1m/1h) Default drain duration is | No |
parentShutdownDuration | Duration | The time in seconds that Envoy will wait before shutting down the parent process during a hot restart. MUST be >=1s (e.g., | No |
discoveryAddress | string | Address of the discovery service exposing xDS with mTLS connection. The inject configuration may override this value. | No |
statsdUdpAddress | string | IP Address and Port of a statsd UDP listener (e.g. | No |
proxyAdminPort | int32 | Port on which Envoy should listen for administrative commands. Default port is | No |
controlPlaneAuthPolicy | AuthenticationPolicy | AuthenticationPolicy defines how the proxy is authenticated when it connects to the control plane. Default is set to | No |
customConfigFile | string | File path of custom proxy configuration, currently used by proxies in front of Mixer and Pilot. | No |
statNameLength | int32 | Maximum length of name field in Envoy’s metrics. The length of the name field is determined by the length of a name field in a service and the set of labels that comprise a particular version of the service. The default value is set to 189 characters. Envoy’s internal metrics take up 67 characters, for a total of 256 character name per metric. Increase the value of this field if you find that the metrics from Envoys are truncated. | No |
concurrency | Int32Value | The number of worker threads to run. If unset, this will be automatically determined based on CPU requests/limits. If set to 0, all cores on the machine will be used. Default is 2 worker threads. | No |
proxyBootstrapTemplatePath | string | Path to the proxy bootstrap template file | No |
interceptionMode | InboundInterceptionMode | The mode used to redirect inbound traffic to Envoy. | No |
tracing | Tracing | Tracing configuration to be used by the proxy. | No |
sds | SDS | Secret Discovery Service(SDS) configuration to be used by the proxy. | No |
envoyAccessLogService | RemoteService | Address of the service to which access logs from Envoys should be sent. (e.g. | No |
envoyMetricsService | RemoteService | Address of the Envoy Metrics Service implementation (e.g. | No |
statusPort | int32 | Port on which the agent should listen for administrative commands such as readiness probe. Default is set to port | No |
extraStatTags | string[] | An additional list of tags to extract from the in-proxy Istio telemetry. These extra tags can be added by configuring the telemetry extension. Each additional tag needs to be present in this list. Extra tags emitted by the telemetry extensions must be listed here so that they can be processed and exposed as Prometheus metrics. | No |
terminationDrainDuration | Duration | The amount of time allowed for connections to complete on proxy shutdown. On receiving | No |
meshId | string | The unique identifier for the service mesh All control planes running in the same service mesh should specify the same mesh ID. Mesh ID is used to label telemetry reports for cases where telemetry from multiple meshes is mixed together. | No |
readinessProbe | ReadinessProbe | VM Health Checking readiness probe. This health check config exactly mirrors the kubernetes readiness probe configuration both in schema and logic. Only one health check method of 3 can be set at a time. | No |
proxyStatsMatcher | ProxyStatsMatcher | Proxy stats matcher defines configuration for reporting custom Envoy stats. To reduce memory and CPU overhead from Envoy stats system, Istio proxies by default create and expose only a subset of Envoy stats. This option is to control creation of additional Envoy stats with prefix, suffix, and regex expressions match on the name of the stats. This replaces the stats inclusion annotations (
Note including more Envoy stats might increase number of time series collected by prometheus significantly. Care needs to be taken on Prometheus resource provision and configuration to reduce cardinality. | No |
holdApplicationUntilProxyStarts | BoolValue | Boolean flag for enabling/disabling the holdApplicationUntilProxyStarts behavior. This feature adds hooks to delay application startup until the pod proxy is ready to accept traffic, mitigating some startup race conditions. Default value is ‘false’. | No |
zipkinAddress | string | Address of the Zipkin service (e.g. zipkin:9411). DEPRECATED: Use tracing instead. | No |
RemoteService
Field | Type | Description | Required |
---|---|---|---|
address | string | Address of a remove service used for various purposes (access log receiver, metrics receiver, etc.). Can be IP address or a fully qualified DNS name. | No |
tlsSettings | ClientTLSSettings | Use the | No |
tcpKeepalive | TcpKeepalive | If set then set | No |
Tracing.Zipkin
Zipkin defines configuration for a Zipkin tracer.
Field | Type | Description | Required |
---|---|---|---|
address | string | Address of the Zipkin service (e.g. zipkin:9411). | No |
Tracing.Lightstep
Defines configuration for a Lightstep tracer.
Field | Type | Description | Required |
---|---|---|---|
address | string | Address of the Lightstep Satellite pool. | No |
accessToken | string | The Lightstep access token. | No |
Tracing.Datadog
Datadog defines configuration for a Datadog tracer.
Field | Type | Description | Required |
---|---|---|---|
address | string | Address of the Datadog Agent. | No |
Tracing.Stackdriver
Stackdriver defines configuration for a Stackdriver tracer. See Envoy’s OpenCensus trace configuration and OpenCensus trace config for details.
Field | Type | Description | Required |
---|
Tracing.OpenCensusAgent
OpenCensusAgent defines configuration for an OpenCensus tracer writing to an OpenCensus agent backend. See Envoy’s OpenCensus trace configuration and OpenCensus trace config for details.
Field | Type | Description | Required |
---|---|---|---|
address | string | gRPC address for the OpenCensus agent (e.g. dns://authority/host:port or unix:path). See gRPC naming docs for details. | No |
context | TraceContext[] | Specifies the set of context propagation headers used for distributed tracing. Default is | No |
ProxyConfig.ProxyStatsMatcher
Proxy stats name matchers for stats creation. Note this is in addition to the minimum Envoy stats that Istio generates by default.
Field | Type | Description | Required |
---|---|---|---|
inclusionPrefixes | string[] | Proxy stats name prefix matcher for inclusion. | No |
inclusionSuffixes | string[] | Proxy stats name suffix matcher for inclusion. | No |
inclusionRegexps | string[] | Proxy stats name regexps matcher for inclusion. | No |
Network
Network provides information about the endpoints in a routable L3 network. A single routable L3 network can have one or more service registries. Note that the network has no relation to the locality of the endpoint. The endpoint locality will be obtained from the service registry.
Field | Type | Description | Required |
---|---|---|---|
endpoints | NetworkEndpoints[] | The list of endpoints in the network (obtained through the constituent service registries or from CIDR ranges). All endpoints in the network are directly accessible to one another. | Yes |
gateways | IstioNetworkGateway[] | Set of gateways associated with the network. | Yes |
MeshNetworks
MeshNetworks (config map) provides information about the set of networks inside a mesh and how to route to endpoints in each network. For example
MeshNetworks(file/config map):
networks:
network1:
- endpoints:
- fromRegistry: registry1 #must match kubeconfig name in Kubernetes secret
- fromCidr: 192.168.100.0/22 #a VM network for example
gateways:
- registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
port: 15443
locality: us-east-1a
- address: 192.168.100.1
port: 15443
locality: us-east-1a
Field | Type | Description | Required |
---|---|---|---|
networks | map<string, Network> | The set of networks inside this mesh. Each network should have a unique name and information about how to infer the endpoints in the network as well as the gateways associated with the network. | Yes |
Network.NetworkEndpoints
NetworkEndpoints describes how the network associated with an endpoint should be inferred. An endpoint will be assigned to a network based on the following rules:
Implicitly: If the registry explicitly provides information about the network to which the endpoint belongs to. In some cases, its possible to indicate the network associated with the endpoint by adding the
ISTIO_META_NETWORK
environment variable to the sidecar.Explicitly:
a. By matching the registry name with one of the “fromRegistry” in the mesh config. A “from_registry” can only be assigned to a single network.
b. By matching the IP against one of the CIDR ranges in a mesh config network. The CIDR ranges must not overlap and be assigned to a single network.
(2) will override (1) if both are present.
Field | Type | Description | Required |
---|---|---|---|
fromCidr | string (oneof) | A CIDR range for the set of endpoints in this network. The CIDR ranges for endpoints from different networks must not overlap. | No |
fromRegistry | string (oneof) | Add all endpoints from the specified registry into this network. The names of the registries should correspond to the kubeconfig file name inside the secret that was used to configure the registry (Kubernetes multicluster) or supplied by MCP server. | No |
Network.IstioNetworkGateway
The gateway associated with this network. Traffic from remote networks will arrive at the specified gateway:port. All incoming traffic must use mTLS.
Field | Type | Description | Required |
---|---|---|---|
registryServiceName | string (oneof) | A fully qualified domain name of the gateway service. Pilot will lookup the service from the service registries in the network and obtain the endpoint IPs of the gateway from the service registry. Note that while the service name is a fully qualified domain name, it need not be resolvable outside the orchestration platform for the registry. e.g., this could be istio-ingressgateway.istio-system.svc.cluster.local. | No |
address | string (oneof) | IP address or externally resolvable DNS address associated with the gateway. | No |
port | uint32 | The port associated with the gateway. | Yes |
locality | string | The locality associated with an explicitly specified gateway (i.e. ip) | No |
MeshConfig.OutboundTrafficPolicy.Mode
Name | Description |
---|---|
REGISTRY_ONLY | outbound traffic will be restricted to services defined in the service registry as well as those defined through ServiceEntries |
ALLOW_ANY | outbound traffic to unknown destinations will be allowed, in case there are no services or ServiceEntries for the destination port |
MeshConfig.IngressControllerMode
Name | Description |
---|---|
UNSPECIFIED | Unspecified Istio ingress controller. |
OFF | Disables Istio ingress controller. |
DEFAULT | Istio ingress controller will act on ingress resources that do not contain any annotation or whose annotations match the value specified in the ingress_class parameter described earlier. Use this mode if Istio ingress controller will be the default ingress controller for the entireKubernetes cluster. |
STRICT | Istio ingress controller will only act on ingress resources whose annotations match the value specified in the ingress_class parameter described earlier. Use this mode if Istio ingress controller will be a secondary ingress controller (e.g., in addition to a cloud-provided ingress controller). |
MeshConfig.AccessLogEncoding
Name | Description |
---|---|
TEXT | text encoding for the proxy access log |
JSON | json encoding for the proxy access log |
MeshConfig.H2UpgradePolicy
Default Policy for upgrading http1.1 connections to http2.
Name | Description |
---|---|
DO_NOT_UPGRADE | Do not upgrade connections to http2. |
UPGRADE | Upgrade the connections to http2. |
Resource
Resource describes the source of configuration
Name | Description |
---|---|
SERVICE_REGISTRY | Set to only receive service entries that are generated by the platform. These auto generated service entries are combination of services and endpoints that are generated by a specific platform e.g. k8 |
Tracing.OpenCensusAgent.TraceContext
TraceContext selects the context propagation headers used for distributed tracing.
Name | Description |
---|---|
W3C_TRACE_CONTEXT | Use W3C Trace Context propagation using the |
GRPC_BIN | Use gRPC binary context propagation using the |
CLOUD_TRACE_CONTEXT | Use Cloud Trace context propagation using the |
B3 | Use multi-header B3 context propagation using the |
ProxyConfig.InboundInterceptionMode
The mode used to redirect inbound traffic to Envoy. This setting has no effect on outbound traffic: iptables REDIRECT
is always used for outbound connections.
Name | Description |
---|---|
REDIRECT | The |
TPROXY | The |
AuthenticationPolicy
AuthenticationPolicy defines how the proxy is authenticated when it connects to the control plane. It can be set for two different scopes, mesh-wide or set on a per-pod basis using the ProxyConfig annotation. Mesh policy cannot be INHERIT.
Name | Description |
---|---|
NONE | Do not encrypt proxy to control plane traffic. |
MUTUAL_TLS | Proxy to control plane traffic is wrapped into mutual TLS connections. |
INHERIT | Use the policy defined by the parent scope. Should not be used for mesh policy. |