--- title: Monitoring and Access Policies for HTTP Egress Traffic description: Describes how to configure Istio for monitoring and access policies of HTTP egress traffic. publishdate: 2018-06-22 last_update: 2019-03-04 attribution: Vadim Eisenberg and Ronen Schaffer (IBM) keywords: [egress,traffic-management,access-control,monitoring] target_release: 1.1 test: no --- While Istio's main focus is management of traffic between microservices inside a service mesh, Istio can also manage ingress (from outside into the mesh) and egress (from the mesh outwards) traffic. Istio can uniformly enforce access policies and aggregate telemetry data for mesh-internal, ingress and egress traffic. In this blog post, we show how to apply monitoring and access policies to HTTP egress traffic with Istio. ## Use case Consider an organization that runs applications that process content from _cnn.com_. The applications are decomposed into microservices deployed in an Istio service mesh. The applications access pages of various topics from _cnn.com_: [edition.cnn.com/politics](https://edition.cnn.com/politics), [edition.cnn.com/sport](https://edition.cnn.com/sport) and [edition.cnn.com/health](https://edition.cnn.com/health). The organization [configures Istio to allow access to edition.cnn.com](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/) and everything works fine. However, at some point in time, the organization decides to banish politics. Practically, it means blocking access to [edition.cnn.com/politics](https://edition.cnn.com/politics) and allowing access to [edition.cnn.com/sport](https://edition.cnn.com/sport) and [edition.cnn.com/health](https://edition.cnn.com/health) only. The organization will grant permissions to individual applications and to particular users to access [edition.cnn.com/politics](https://edition.cnn.com/politics), on a case-by-case basis. To achieve that goal, the organization's operations people monitor access to the external services and analyze Istio logs to verify that no unauthorized request was sent to [edition.cnn.com/politics](https://edition.cnn.com/politics). They also configure Istio to prevent access to [edition.cnn.com/politics](https://edition.cnn.com/politics) automatically. The organization is resolved to prevent any tampering with the new policy. It decides to put mechanisms in place that will prevent any possibility for a malicious application to access the forbidden topic. ## Related tasks and examples * The [Control Egress Traffic](/docs/tasks/traffic-management/egress/) task demonstrates how external (outside the Kubernetes cluster) HTTP and HTTPS services can be accessed by applications inside the mesh. * The [Configure an Egress Gateway](/docs/tasks/traffic-management/egress/egress-gateway/) example describes how to configure Istio to direct egress traffic through a dedicated gateway service called _egress gateway_. * The [Egress Gateway with TLS Origination](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/) example demonstrates how to allow applications to send HTTP requests to external servers that require HTTPS, while directing traffic through egress gateway. * The [Collecting Metrics](/docs/tasks/observability/mixer/metrics/collecting-metrics/) task describes how to configure metrics for services in a mesh. * The [Visualizing Metrics with Grafana](/docs/tasks/observability/metrics/using-istio-dashboard/) describes the Istio Dashboard to monitor mesh traffic. * The [Basic Access Control](/docs/tasks/policy-enforcement/denial-and-list/) task shows how to control access to in-mesh services. * The [Denials and White/Black Listing](/docs/tasks/policy-enforcement/denial-and-list/) task shows how to configure access policies using black or white list checkers. As opposed to the observability and security tasks above, this blog post describes Istio's monitoring and access policies applied exclusively to the egress traffic. ## Before you begin Follow the steps in the [Egress Gateway with TLS Origination](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/) example, **with mutual TLS authentication enabled**, without the [Cleanup](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination//#cleanup) step. After completing that example, you can access [edition.cnn.com/politics](https://edition.cnn.com/politics) from an in-mesh container with `curl` installed. This blog post assumes that the `SOURCE_POD` environment variable contains the source pod's name and that the container's name is `sleep`. ## Configure monitoring and access policies Since you want to accomplish your tasks in a _secure way_, you should direct egress traffic through _egress gateway_, as described in the [Egress Gateway with TLS Origination](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/) task. The _secure way_ here means that you want to prevent malicious applications from bypassing Istio monitoring and policy enforcement. According to our scenario, the organization performed the instructions in the [Before you begin](#before-you-begin) section, enabled HTTP traffic to _edition.cnn.com_, and configured that traffic to pass through the egress gateway. The egress gateway performs TLS origination to _edition.cnn.com_, so the traffic leaves the mesh encrypted. At this point, the organization is ready to configure Istio to monitor and apply access policies for the traffic to _edition.cnn.com_. ### Logging Configure Istio to log access to _*.cnn.com_. You create a `logentry` and two [stdio](/docs/reference/config/policy-and-telemetry/adapters/stdio/) `handlers`, one for logging forbidden access (_error_ log level) and another one for logging all access to _*.cnn.com_ (_info_ log level). Then you create `rules` to direct your `logentry` instances to your `handlers`. One rule directs access to _*.cnn.com/politics_ to the handler for logging forbidden access, another rule directs log entries to the handler that outputs each access to _*.cnn.com_ as an _info_ log entry. To understand the Istio `logentries`, `rules`, and `handlers`, see [Istio Adapter Model](/blog/2017/adapter-model/). A diagram with the involved entities and dependencies between them appears below: {{< image width="80%" link="egress-adapters-monitoring.svg" caption="Instances, rules and handlers for egress monitoring" >}} 1. Create the `logentry`, `rules` and `handlers`. Note that you specify `context.reporter.uid` as `kubernetes://istio-egressgateway` in the rules to get logs from the egress gateway only. {{< text bash >}} $ cat <}} 1. Send three HTTP requests to _cnn.com_, to [edition.cnn.com/politics](https://edition.cnn.com/politics), [edition.cnn.com/sport](https://edition.cnn.com/sport) and [edition.cnn.com/health](https://edition.cnn.com/health). All three should return _200 OK_. {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 200 200 200 {{< /text >}} 1. Query the Mixer log and see that the information about the requests appears in the log: {{< text bash >}} $ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep egress-access | grep cnn | tail -4 {"level":"info","time":"2019-01-29T07:43:24.611462Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":1883355,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"info","time":"2019-01-29T07:43:24.886316Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/sport","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2094561,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"info","time":"2019-01-29T07:43:25.369663Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/health","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2157009,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"error","time":"2019-01-29T07:43:24.611462Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":1883355,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {{< /text >}} You see four log entries related to your three requests. Three _info_ entries about the access to _edition.cnn.com_ and one _error_ entry about the access to _edition.cnn.com/politics_. The service mesh operators can see all the access instances, and can also search the log for _error_ log entries that represent forbidden accesses. This is the first security measure the organization can apply before blocking the forbidden accesses automatically, namely logging all the forbidden access instances as errors. In some settings this can be a sufficient security measure. Note the attributes: * `destination`, `path`, `responseCode`, `responseSize` are related to HTTP parameters of the requests * `sourcePrincipal`:`cluster.local/ns/default/sa/sleep` - a string that represents the `sleep` service account in the `default` namespace * `reporterUID`: `kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system` - a UID of the reporting pod, in this case `istio-egressgateway-747b6764b8-44rrh` in the `istio-system` namespace ### Access control by routing After enabling logging of access to _edition.cnn.com_, automatically enforce an access policy, namely allow accessing _/health_ and _/sport_ URL paths only. Such a simple policy control can be implemented with Istio routing. 1. Redefine your `VirtualService` for _edition.cnn.com_: {{< text bash >}} $ cat <}} Note that you added a `match` by `uri` condition that checks that the URL path is either _/health_ or _/sport_. Also note that this condition is added to the `istio-egressgateway` section of the `VirtualService`, since the egress gateway is a hardened component in terms of security (see [egress gateway security considerations] (/docs/tasks/traffic-management/egress/egress-gateway/#additional-security-considerations)). You don't want any tampering with your policies. 1. Send the previous three HTTP requests to _cnn.com_: {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 404 200 200 {{< /text >}} The request to [edition.cnn.com/politics](https://edition.cnn.com/politics) returned _404 Not Found_, while requests to [edition.cnn.com/sport](https://edition.cnn.com/sport) and [edition.cnn.com/health](https://edition.cnn.com/health) returned _200 OK_, as expected. {{< tip >}} You may need to wait several seconds for the update of the `VirtualService` to propagate to the egress gateway. {{< /tip >}} 1. Query the Mixer log and see that the information about the requests appears again in the log: {{< text bash >}} $ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep egress-access | grep cnn | tail -4 {"level":"info","time":"2019-01-29T07:55:59.686082Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":404,"responseSize":0,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"info","time":"2019-01-29T07:55:59.697565Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/sport","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2094561,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"info","time":"2019-01-29T07:56:00.264498Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/health","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2157009,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {"level":"error","time":"2019-01-29T07:55:59.686082Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":404,"responseSize":0,"sourcePrincipal":"cluster.local/ns/default/sa/sleep"} {{< /text >}} You still get info and error messages regarding accesses to [edition.cnn.com/politics](https://edition.cnn.com/politics), however this time the `responseCode` is `404`, as expected. While implementing access control using Istio routing worked for us in this simple case, it would not suffice for more complex cases. For example, the organization may want to allow access to [edition.cnn.com/politics](https://edition.cnn.com/politics) under certain conditions, so more complex policy logic than just filtering by URL paths will be required. You may want to apply [Istio Mixer Adapters](/blog/2017/adapter-model/), for example [white lists or black lists](/docs/tasks/policy-enforcement/denial-and-list/#attribute-based-whitelists-or-blacklists) of allowed/forbidden URL paths, respectively. [Policy Rules](/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/) allow specifying complex conditions, specified in a [rich expression language](/docs/reference/config/policy-and-telemetry/expression-language/), which includes AND and OR logical operators. The rules can be reused for both logging and policy checks. More advanced users may want to apply [Istio Role-Based Access Control](/docs/concepts/security/#authorization). An additional aspect is integration with remote access policy systems. If the organization in our use case operates some [Identity and Access Management](https://en.wikipedia.org/wiki/Identity_management) system, you may want to configure Istio to use access policy information from such a system. You implement this integration by applying [Istio Mixer Adapters](/blog/2017/adapter-model/). Cancel the access control by routing you used in this section and implement access control by Mixer policy checks in the next section. 1. Replace the `VirtualService` for _edition.cnn.com_ with your previous version from the [Configure an Egress Gateway](/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/#perform-tls-origination-with-an-egress-gateway) example: {{< text bash >}} $ cat <}} 1. Send the previous three HTTP requests to _cnn.com_, this time you should get three _200 OK_ responses as previously: {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 200 200 200 {{< /text >}} {{< tip >}} You may need to wait several seconds for the update of the `VirtualService` to propagate to the egress gateway. {{< /tip >}} ### Access control by Mixer policy checks In this step you use a Mixer [`Listchecker` adapter](/docs/reference/config/policy-and-telemetry/adapters/list/), its whitelist variety. You define a `listentry` with the URL path of the request and a `listchecker` to check the `listentry` using a static list of allowed URL paths, specified by the `overrides` field. For an external [Identity and Access Management](https://en.wikipedia.org/wiki/Identity_management) system, use the `providerurl` field instead. The updated diagram of the instances, rules and handlers appears below. Note that you reuse the same policy rule, `handle-cnn-access` both for logging and for access policy checks. {{< image width="80%" link="egress-adapters-monitoring-policy.svg" caption="Instances, rules and handlers for egress monitoring and access policies" >}} 1. Define `path-checker` and `request-path`: {{< text bash >}} $ cat <}} 1. Modify the `handle-cnn-access` policy rule to send `request-path` instances to the `path-checker`: {{< text bash >}} $ cat <}} 1. Perform your usual test by sending HTTP requests to [edition.cnn.com/politics](https://edition.cnn.com/politics), [edition.cnn.com/sport](https://edition.cnn.com/sport) and [edition.cnn.com/health](https://edition.cnn.com/health). As expected, the request to [edition.cnn.com/politics](https://edition.cnn.com/politics) returns _403_ (Forbidden). {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 403 200 200 {{< /text >}} ### Access control by Mixer policy checks, part 2 After the organization in our use case managed to configure logging and access control, it decided to extend its access policy by allowing the applications with a special [Service Account](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/) to access any topic of _cnn.com_, without being monitored. You'll see how this requirement can be configured in Istio. 1. Start the [sleep]({{< github_tree >}}/samples/sleep) sample with the `politics` service account. {{< text bash >}} $ sed 's/: sleep/: politics/g' @samples/sleep/sleep.yaml@ | kubectl create -f - serviceaccount "politics" created service "politics" created deployment "politics" created {{< /text >}} 1. Define the `SOURCE_POD_POLITICS` shell variable to hold the name of the source pod with the `politics` service account, for sending requests to external services. {{< text bash >}} $ export SOURCE_POD_POLITICS=$(kubectl get pod -l app=politics -o jsonpath={.items..metadata.name}) {{< /text >}} 1. Perform your usual test of sending three HTTP requests this time from `SOURCE_POD_POLITICS`. The request to [edition.cnn.com/politics](https://edition.cnn.com/politics) returns _403_, since you did not configure the exception for the _politics_ namespace. {{< text bash >}} $ kubectl exec -it $SOURCE_POD_POLITICS -c politics -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 403 200 200 {{< /text >}} 1. Query the Mixer log and see that the information about the requests from the _politics_ namespace appears in the log: {{< text bash >}} $ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep egress-access | grep cnn | tail -4 {"level":"info","time":"2019-01-29T08:04:42.559812Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":403,"responseSize":84,"sourcePrincipal":"cluster.local/ns/default/sa/politics"} {"level":"info","time":"2019-01-29T08:04:42.568424Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/sport","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2094561,"sourcePrincipal":"cluster.local/ns/default/sa/politics"} {"level":"error","time":"2019-01-29T08:04:42.559812Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/politics","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":403,"responseSize":84,"sourcePrincipal":"cluster.local/ns/default/sa/politics"} {"level":"info","time":"2019-01-29T08:04:42.615641Z","instance":"egress-access.logentry.istio-system","destination":"edition.cnn.com","path":"/health","reporterUID":"kubernetes://istio-egressgateway-747b6764b8-44rrh.istio-system","responseCode":200,"responseSize":2157009,"sourcePrincipal":"cluster.local/ns/default/sa/politics"} {{< /text >}} Note that `sourcePrincipal` is `cluster.local/ns/default/sa/politics` which represents the `politics` service account in the `default` namespace. 1. Redefine `handle-cnn-access` and `handle-politics` policy rules, to make the applications in the _politics_ namespace exempt from monitoring and policy enforcement. {{< text bash >}} $ cat <}} 1. Perform your usual test from `SOURCE_POD`: {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 403 200 200 {{< /text >}} Since `SOURCE_POD` does not have `politics` service account, access to [edition.cnn.com/politics](https://edition.cnn.com/politics) is forbidden, as previously. 1. Perform the previous test from `SOURCE_POD_POLITICS`: {{< text bash >}} $ kubectl exec -it $SOURCE_POD_POLITICS -c politics -- sh -c 'curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/politics; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/sport; curl -sL -o /dev/null -w "%{http_code}\n" http://edition.cnn.com/health' 200 200 200 {{< /text >}} Access to all the topics of _edition.cnn.com_ is allowed. 1. Examine the Mixer log and see that no more requests with `sourcePrincipal` equal `cluster.local/ns/default/sa/politics` appear in the log. {{< text bash >}} $ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep egress-access | grep cnn | tail -4 {{< /text >}} ## Comparison with HTTPS egress traffic control In this use case the applications use HTTP and Istio Egress Gateway performs TLS origination for them. Alternatively, the applications could originate TLS themselves by issuing HTTPS requests to _edition.cnn.com_. In this section we describe both approaches and their pros and cons. In the HTTP approach, the requests are sent unencrypted on the local host, intercepted by the Istio sidecar proxy and forwarded to the egress gateway. Since you configure Istio to use mutual TLS between the sidecar proxy and the egress gateway, the traffic leaves the pod encrypted. The egress gateway decrypts the traffic, inspects the URL path, the HTTP method and headers, reports telemetry and performs policy checks. If the request is not blocked by some policy check, the egress gateway performs TLS origination to the external destination (_cnn.com_ in our case), so the request is encrypted again and sent encrypted to the external destination. The diagram below demonstrates the network flow of this approach. The HTTP protocol inside the gateway designates the protocol as seen by the gateway after decryption. {{< image width="80%" link="http-to-gateway.svg" caption="HTTP egress traffic through an egress gateway" >}} The drawback of this approach is that the requests are sent unencrypted inside the pod, which may be against security policies in some organizations. Also some SDKs have external service URLs hard-coded, including the protocol, so sending HTTP requests could be impossible. The advantage of this approach is the ability to inspect HTTP methods, headers and URL paths, and to apply policies based on them. In the HTTPS approach, the requests are encrypted end-to-end, from the application to the external destination. The diagram below demonstrates the network flow of this approach. The HTTPS protocol inside the gateway designates the protocol as seen by the gateway. {{< image width="80%" link="https-to-gateway.svg" caption="HTTPS egress traffic through an egress gateway" >}} The end-to-end HTTPS is considered a better approach from the security point of view. However, since the traffic is encrypted the Istio proxies and the egress gateway can only see the source and destination IPs and the [SNI](https://en.wikipedia.org/wiki/Server_Name_Indication) of the destination. Since you configure Istio to use mutual TLS between the sidecar proxy and the egress gateway, the [identity of the source](/docs/concepts/security/#istio-identity) is also known. The gateway is unable to inspect the URL path, the HTTP method and the headers of the requests, so no monitoring and policies based on the HTTP information can be possible. In our use case, the organization would be able to allow access to _edition.cnn.com_ and to specify which applications are allowed to access _edition.cnn.com_. However, it will not be possible to allow or block access to specific URL paths of _edition.cnn.com_. Neither blocking access to [edition.cnn.com/politics](https://edition.cnn.com/politics) nor monitoring such access are possible with the HTTPS approach. We guess that each organization will consider the pros and cons of the two approaches and choose the one most appropriate to its needs. ## Summary In this blog post we showed how different monitoring and policy mechanisms of Istio can be applied to HTTP egress traffic. Monitoring can be implemented by configuring a logging adapter. Access policies can be implemented by configuring `VirtualServices` or by configuring various policy check adapters. We demonstrated a simple policy that allowed certain URL paths only. We also showed a more complex policy that extended the simple policy by making an exemption to the applications with a certain service account. Finally, we compared HTTP-with-TLS-origination egress traffic with HTTPS egress traffic, in terms of control possibilities by Istio. ## Cleanup 1. Perform the instructions in [Cleanup](/docs/tasks/traffic-management/egress/egress-gateway//#cleanup) section of the [Configure an Egress Gateway](/docs/tasks/traffic-management/egress/egress-gateway//) example. 1. Delete the logging and policy checks configuration: {{< text bash >}} $ kubectl delete logentry egress-access -n istio-system $ kubectl delete stdio egress-error-logger -n istio-system $ kubectl delete stdio egress-access-logger -n istio-system $ kubectl delete rule handle-politics -n istio-system $ kubectl delete rule handle-cnn-access -n istio-system $ kubectl delete -n istio-system listchecker path-checker $ kubectl delete -n istio-system listentry request-path {{< /text >}} 1. Delete the _politics_ source pod: {{< text bash >}} $ sed 's/: sleep/: politics/g' @samples/sleep/sleep.yaml@ | kubectl delete -f - serviceaccount "politics" deleted service "politics" deleted deployment "politics" deleted {{< /text >}}