Daniel's Tech Blog

Cloud Computing, Cloud Native & Kubernetes

Tag: Istio

  • Using Istio with Kubernetes native sidecars on Azure Kubernetes Service

    In my previous blog post, I showed you how to check for specific feature gates on an Azure Kubernetes Service cluster. -> https://www.danielstechblog.io/show-enabled-feature-gates-on-an-azure-kubernetes-service-cluster/ Especially for the SidecarContainers feature gate, which is enabled on Azure Kubernetes Service running Kubernetes version 1.29 or higher. The SidecarContainers feature gate brings support for running sidecar containers as init containers. For instance, a service…

  • Using HTTP status code 307/308 for HTTPS redirect with the Istio ingress gateway

    The gateway definition for the Istio ingress gateway provides a configuration parameter to enable the HTTPS redirect of HTTP connections. -> https://istio.io/latest/docs/reference/config/networking/gateway/#ServerTLSSettings apiVersion: networking.istio.io/v1beta1 kind: Gateway metadata: name: azst-aks-gateway namespace: istio-config spec: selector: istio: ingressgateway # use Istio default gateway implementation servers: – hosts: – “*.danielstechblog.de” port: number: 80 name: http protocol: HTTP tls: httpsRedirect:…

  • Configuring Istio using the Kubernetes Gateway API

    The Kubernetes Gateway API is the successor of the Kubernetes Ingress API and is currently in beta state. More and more projects add support for the Gateway API like Istio. -> https://istio.io/latest/blog/2022/gateway-api-beta/ -> https://istio.io/latest/blog/2022/getting-started-gtwapi/ In today’s blog post, I walk you through how to configure Istio using the Kubernetes Gateway API. At the time of…

  • Run the Istio ingress gateway with TLS termination and TLS passthrough

    The Istio ingress gateway supports two modes for dealing with TLS traffic: TLS termination and TLS passthrough. Running Istio with TLS termination is the default and standard configuration for most installations. Incoming TLS traffic is terminated at the Istio ingress gateway level and then sent to the destination service encrypted via mTLS within the service…

  • Monitor the Envoy Proxy ratelimit service with Azure Monitor for containers

    The last two blog posts of this series covered the setup of the Envoy Proxy ratelimit service and its implementation with Istio. -> https://www.danielstechblog.io/run-the-envoy-proxy-ratelimit-service-for-istio-on-aks-with-azure-cache-for-redis/ -> https://www.danielstechblog.io/implement-rate-limiting-with-istio-on-azure-kubernetes-service/ In today’s post I walk you through on how to monitor the ratelimit service with Azure Monitor for containers. Not the standard monitoring of the container itself. We focus…

  • Implement rate limiting with Istio on Azure Kubernetes Service

    In my last blog post I walked you through the setup of the rate limiting reference implementation: The Envoy Proxy ratelimit service. -> https://www.danielstechblog.io/run-the-envoy-proxy-ratelimit-service-for-istio-on-aks-with-azure-cache-for-redis/ Our today’s topic is about connecting the Istio ingress gateway to the ratelimit service. The first step for us is the Istio documentation. -> https://istio.io/latest/docs/tasks/policy-enforcement/rate-limit/ Connect Istio with the ratelimit service…

WordPress Cookie Notice by Real Cookie Banner