istio ingressgateway #20

Supports: kubernetes

Deploy this charm on Kubernetes with the CLI. Find out how by reading the docs.

Description

Istio is an open platform-independent service mesh that provides traffic management, policy enforcement, and telemetry collection.

Open: Istio is being developed and maintained as open-source software. We encourage contributions and feedback from the community at-large.

Platform-independent: Istio is not targeted at any specific deployment environment. During the initial stages of development, Istio will support Kubernetes-based deployments. However, Istio is being built to enable rapid and easy adaptation to other environments.

Service mesh: Istio is designed to manage communications between microservices and applications. Without requiring changes to the underlying services, Istio provides automated baseline traffic resilience, service metrics collection, distributed tracing, traffic encryption, protocol upgrades, and advanced routing functionality for all service-to-service communication.

For more detail, please see: https://istio.io/docs/concepts/what-is-istio/


None

Configuration

citadel-grpc-port
(int) Citadel GRPC server
8060
dns-tls-port
(int) DNS (TLS)
853
grafana-port
(int) Grafana User Interface
15031
http-port
(int) HTTP
80
https-port
(int) Webhooks
443
kiali-port
(int) Kiali User Interface
15029
log-level
(string) Istio logging level
default:info
prometheus-port
(int) Prometheus User Interface
15030
proxy-admin-port
(string) Envoy admin port (commands/diagnostics)
15000
status-port
(int) Health checks
15020
tls-port
(int) Ingress / Egress (SNI)
15443
tracing-port
(int) Tracing User Interface
15032
xds-ca-port-legacy
(int) xDS (various discovery services) and CA services (TLS) [legacy]
15011