istio.io/archive/v1.2/docs/tasks/traffic-management/egress/egress-control/index.html

228 lines
88 KiB
HTML

<!doctype html><html lang=en itemscope itemtype=https://schema.org/WebPage><head><meta charset=utf-8><meta http-equiv=x-ua-compatible content="IE=edge"><meta name=viewport content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name=theme-color content=#466BB0><meta name=title content="Accessing External Services"><meta name=description content="Describes how to configure Istio to route traffic from services in the mesh to external services."><meta name=keywords content=microservices,services,mesh,traffic-management,egress><meta property=og:title content="Accessing External Services"><meta property=og:type content=website><meta property=og:description content="Describes how to configure Istio to route traffic from services in the mesh to external services."><meta property=og:url content=/v1.2/docs/tasks/traffic-management/egress/egress-control/><meta property=og:image content=/v1.2/img/istio-whitelogo-bluebackground-framed.svg><meta property=og:image:alt content="Istio Logo"><meta property=og:image:width content=112><meta property=og:image:height content=150><meta property=og:site_name content=Istio><meta name=twitter:card content=summary><meta name=twitter:site content=@IstioMesh><title>Istioldie 1.2 / Accessing External Services</title><script async src="https://www.googletagmanager.com/gtag/js?id=UA-98480406-2"></script><script>window.dataLayer=window.dataLayer||[];function gtag(){dataLayer.push(arguments);}
gtag('js',new Date());gtag('config','UA-98480406-2');</script><link rel=alternate type=application/rss+xml title="Istio Blog" href=/v1.2/feed.xml><link rel="shortcut icon" href=/v1.2/favicons/favicon.ico><link rel=apple-touch-icon href=/v1.2/favicons/apple-touch-icon-180x180.png sizes=180x180><link rel=icon type=image/png href=/v1.2/favicons/favicon-16x16.png sizes=16x16><link rel=icon type=image/png href=/v1.2/favicons/favicon-32x32.png sizes=32x32><link rel=icon type=image/png href=/v1.2/favicons/android-36x36.png sizes=36x36><link rel=icon type=image/png href=/v1.2/favicons/android-48x48.png sizes=48x48><link rel=icon type=image/png href=/v1.2/favicons/android-72x72.png sizes=72x72><link rel=icon type=image/png href=/v1.2/favicons/android-96x96.png sizes=96xW96><link rel=icon type=image/png href=/v1.2/favicons/android-144x144.png sizes=144x144><link rel=icon type=image/png href=/v1.2/favicons/android-192x192.png sizes=192x192><link rel=manifest href=/v1.2/manifest.json><meta name=apple-mobile-web-app-title content=Istio><meta name=application-name content=Istio><link rel=stylesheet href="https://fonts.googleapis.com/css?family=Work+Sans:400|Chivo:400|Work+Sans:500,300,600,300italic,400italic,500italic,600italic|Chivo:500,300,600,300italic,400italic,500italic,600italic"><link rel=stylesheet href=/v1.2/css/all.css><script src=/v1.2/js/themes_init.min.js></script></head><body class="language-unknown archive-site"><script>const branchName="release-1.2";const docTitle="Accessing External Services";const iconFile="\/v1.2/img/icons.svg";const buttonCopy='Copy to clipboard';const buttonPrint='Print';const buttonDownload='Download';</script><script src="https://www.google.com/cse/brand?form=search-form" defer></script><script src=/v1.2/js/all.min.js data-manual defer></script><header><nav><a id=brand href=/v1.2/><span class=logo><svg viewBox="0 0 300 300"><circle cx="150" cy="150" r="146" stroke-width="2" /><path d="M65 240H225L125 270z"/><path d="M65 230l60-10V110z"/><path d="M135 220l90 10L135 30z"/></svg></span><span class=name>Istioldie 1.2</span></a><div id=hamburger><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#hamburger"/></svg></div><div id=header-links><span title="Learn how to deploy, use, and operate Istio.">Docs</span>
<a title="Posts about using Istio." href=/v1.2/blog/2019/announcing-1.2.5/>Blog</a>
<a title="Frequently Asked Questions about Istio." href=/v1.2/faq/>FAQ</a>
<a title="Get a bit more in-depth info about the Istio project." href=/v1.2/about/>About</a><div class=menu><button id=gearDropdownButton class=menu-trigger title="Options and settings" aria-label="Options and Settings" aria-controls=gearDropdownContent><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#gear"/></svg></button><div id=gearDropdownContent class=menu-content aria-labelledby=gearDropdownButton role=menu><a tabindex=-1 role=menuitem lang=en id=switch-lang-en class=active>English</a>
<a tabindex=-1 role=menuitem lang=zh id=switch-lang-zh>中文</a><div role=separator></div><a tabindex=-1 role=menuitem class=active id=light-theme-item>Light Theme</a>
<a tabindex=-1 role=menuitem id=dark-theme-item>Dark Theme</a><div role=separator></div><a tabindex=-1 role=menuitem id=syntax-coloring-item>Color Examples</a><div role=separator></div><h6>Other versions of this site</h6><a tabindex=-1 role=menuitem onclick="navigateToUrlOrRoot('https://istio.io/docs\/tasks\/traffic-management\/egress\/egress-control\/');return false;">Current Release</a>
<a tabindex=-1 role=menuitem onclick="navigateToUrlOrRoot('https://preliminary.istio.io/docs\/tasks\/traffic-management\/egress\/egress-control\/');return false;">Next Release</a>
<a tabindex=-1 role=menuitem href=https://archive.istio.io>Older Releases</a></div></div><button id=search-show title="Search this site" aria-label=Search><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#magnifier"/></svg></button></div><form id=search-form name=cse role=search><input type=hidden name=cx value=013699703217164175118:iwwf17ikgf4>
<input type=hidden name=ie value=utf-8>
<input type=hidden name=hl value=en>
<input type=hidden id=search-page-url value=/v1.2/search.html>
<input id=search-textbox class=form-control name=q type=search aria-label="Search this site">
<button id=search-close title="Cancel search" type=reset aria-label="Cancel search"><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#cancel-x"/></svg></button></form></nav></header><main class=primary><div id=sidebar-container class="sidebar-container sidebar-offcanvas"><nav id=sidebar aria-label="Section Navigation"><div class=directory><div class=card><button class="header dynamic" id=card24 title="Learn about the different parts of the Istio system and the abstractions it uses." aria-controls=card24-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#concepts"/></svg>Concepts</button><div class=body aria-labelledby=card24 role=region id=card24-body><ul role=tree aria-expanded=true class=leaf-section aria-labelledby=card24><li role=none><a role=treeitem title="Introduces Istio, the problems it solves, its high-level architecture and design goals." href=/v1.2/docs/concepts/what-is-istio/>What is Istio?</a></li><li role=none><a role=treeitem title="Describes the various Istio features focused on traffic routing and control." href=/v1.2/docs/concepts/traffic-management/>Traffic Management</a></li><li role=none><a role=treeitem title="Describes Istio's authorization and authentication functionality." href=/v1.2/docs/concepts/security/>Policies and Security</a></li><li role=none><a role=treeitem title="Describes the telemetry and monitoring features provided by Istio." href=/v1.2/docs/concepts/observability/>Observability</a></li><li role=none><a role=treeitem title="Introduces performance and scalability for Istio." href=/v1.2/docs/concepts/performance-and-scalability/>Performance and Scalability</a></li><li role=none><a role=treeitem title="Describes how a service mesh can be configured to include services from more than one cluster." href=/v1.2/docs/concepts/multicluster-deployments/>Multicluster Deployments</a></li></ul></div></div><div class=card><button class="header dynamic" id=card46 title="How to deploy and upgrade Istio in various environments such as Kubernetes and Consul." aria-controls=card46-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#setup"/></svg>Setup</button><div class=body aria-labelledby=card46 role=region id=card46-body><ul role=tree aria-expanded=true aria-labelledby=card46><li role=treeitem aria-label=Kubernetes><button aria-hidden=true></button><a title="Instructions for installing the Istio control plane on Kubernetes and adding virtual machines into the mesh." href=/v1.2/docs/setup/kubernetes/>Kubernetes</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="Download, install, and try out Istio." href=/v1.2/docs/setup/kubernetes/getting-started/>Getting Started</a></li><li role=treeitem aria-label="Platform Setup"><button aria-hidden=true></button><a title="How to prepare various Kubernetes platforms before installing Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/>Platform Setup</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Instructions to setup an Alibaba Cloud Kubernetes cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/alicloud/>Alibaba Cloud</a></li><li role=none><a role=treeitem title="Instructions to setup an Azure cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/azure/>Azure</a></li><li role=none><a role=treeitem title="Instructions to setup Docker Desktop for use with Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/docker/>Docker Desktop</a></li><li role=none><a role=treeitem title="Instructions to setup a Google Kubernetes Engine cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/gke/>Google Kubernetes Engine</a></li><li role=none><a role=treeitem title="Instructions to setup an IBM Cloud cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/ibm/>IBM Cloud</a></li><li role=none><a role=treeitem title="Instructions to setup a Gardener cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/gardener/>Kubernetes Gardener</a></li><li role=none><a role=treeitem title="Instructions to setup minikube for use with Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/minikube/>Minikube</a></li><li role=none><a role=treeitem title="Instructions to setup an OpenShift cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/openshift/>OpenShift</a></li><li role=none><a role=treeitem title="Instructions to setup an OKE cluster for Istio." href=/v1.2/docs/setup/kubernetes/platform-setup/oci/>Oracle Cloud Infrastructure</a></li></ul></li><li role=treeitem aria-label=Install><button aria-hidden=true></button><a title="Choose the guide that best suits your needs and platform." href=/v1.2/docs/setup/kubernetes/install/>Install</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="Instructions to install Istio in a Kubernetes cluster for evaluation." href=/v1.2/docs/setup/kubernetes/install/kubernetes/>Quick Start Evaluation Install</a></li><li role=none><a role=treeitem title="Install and configure Istio for in-depth evaluation or production use." href=/v1.2/docs/setup/kubernetes/install/helm/>Customizable Install with Helm</a></li><li role=treeitem aria-label="Multicluster Installation"><button aria-hidden=true></button><a title="Configure an Istio mesh spanning multiple Kubernetes clusters." href=/v1.2/docs/setup/kubernetes/install/multicluster/>Multicluster Installation</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Install an Istio mesh across multiple Kubernetes clusters with individually deployed control planes." href=/v1.2/docs/setup/kubernetes/install/multicluster/gateways/>Multiple control planes</a></li><li role=none><a role=treeitem title="Install an Istio mesh across multiple Kubernetes clusters with a shared control plane and VPN connectivity between clusters." href=/v1.2/docs/setup/kubernetes/install/multicluster/shared-vpn/>Shared control plane (single-network)</a></li><li role=none><a role=treeitem title="Install an Istio mesh across multiple Kubernetes clusters using a shared control plane for diconnected cluster networks." href=/v1.2/docs/setup/kubernetes/install/multicluster/shared-gateways/>Shared control plane (multi-network)</a></li></ul></li><li role=treeitem aria-label="Platform-specific Instructions"><button aria-hidden=true></button><a title="Additional installation instructions for supported Kubernetes platforms." href=/v1.2/docs/setup/kubernetes/install/platform/>Platform-specific Instructions</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Instructions to install Istio using the Alibaba Cloud Kubernetes Container Service." href=/v1.2/docs/setup/kubernetes/install/platform/alicloud/>Alibaba Cloud</a></li><li role=none><a role=treeitem title="Instructions to install Istio using the Google Kubernetes Engine (GKE)." href=/v1.2/docs/setup/kubernetes/install/platform/gke/>Google Kubernetes Engine</a></li><li role=none><a role=treeitem title="Instructions to install Istio using IBM Cloud Public or IBM Cloud Private." href=/v1.2/docs/setup/kubernetes/install/platform/ibm/>IBM Cloud</a></li></ul></li></ul></li><li role=treeitem aria-label=Upgrade><button aria-hidden=true></button><a title="Information on upgrading Istio." href=/v1.2/docs/setup/kubernetes/upgrade/>Upgrade</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Important changes operators must understand before upgrading to Istio 1.2." href=/v1.2/docs/setup/kubernetes/upgrade/notice/>1.2 Upgrade Notice</a></li><li role=none><a role=treeitem title="Upgrade the Istio control plane and data plane independently." href=/v1.2/docs/setup/kubernetes/upgrade/steps/>Upgrade Steps</a></li></ul></li><li role=treeitem aria-label="More Guides"><button aria-hidden=true></button><a title="More information on additional setup tasks." href=/v1.2/docs/setup/kubernetes/additional-setup/>More Guides</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Prepare your Kubernetes pods and services to run in an Istio-enabled cluster." href=/v1.2/docs/setup/kubernetes/additional-setup/requirements/>Pods and Services</a></li><li role=none><a role=treeitem title="Describes the built-in Istio installation configuration profiles." href=/v1.2/docs/setup/kubernetes/additional-setup/config-profiles/>Installation Configuration Profiles</a></li><li role=none><a role=treeitem title="Install the Istio sidecar in application pods automatically using the sidecar injector webhook or manually using istioctl CLI." href=/v1.2/docs/setup/kubernetes/additional-setup/sidecar-injection/>Installing the Sidecar</a></li><li role=none><a role=treeitem title="Install and use Istio with the Istio CNI plugin, allowing operators to deploy services with lower privilege." href=/v1.2/docs/setup/kubernetes/additional-setup/cni/>Install Istio with the Istio CNI plugin</a></li><li role=none><a role=treeitem title="Integrate VMs and bare metal hosts into an Istio mesh deployed on Kubernetes." href=/v1.2/docs/setup/kubernetes/additional-setup/mesh-expansion/>Mesh Expansion</a></li></ul></li></ul></li><li role=treeitem aria-label="Nomad &amp; Consul"><button aria-hidden=true></button><a title="Instructions for installing the Istio control plane in a Consul based environment, with or without Nomad." href=/v1.2/docs/setup/consul/>Nomad &amp; Consul</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Quick Start instructions to setup the Istio service mesh with Docker Compose." href=/v1.2/docs/setup/consul/quick-start/>Quick Start on Docker</a></li><li role=none><a role=treeitem title="Instructions for installing the Istio control plane in a Consul-based environment, with or without Nomad." href=/v1.2/docs/setup/consul/install/>Installation</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card69 title="How to do single specific targeted activities with the Istio system." aria-controls=card69-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#tasks"/></svg>Tasks</button><div class="body default" aria-labelledby=card69 role=region id=card69-body><ul role=tree aria-expanded=true aria-labelledby=card69><li role=treeitem aria-label="Traffic Management"><button class=show aria-hidden=true></button><a title="Tasks that demonstrate Istio's traffic routing features." href=/v1.2/docs/tasks/traffic-management/>Traffic Management</a><ul role=group aria-expanded=true><li role=none><a role=treeitem title="This task shows you how to configure dynamic request routing to multiple versions of a microservice." href=/v1.2/docs/tasks/traffic-management/request-routing/>Request Routing</a></li><li role=none><a role=treeitem title="This task shows you how to inject faults to test the resiliency of your application." href=/v1.2/docs/tasks/traffic-management/fault-injection/>Fault Injection</a></li><li role=none><a role=treeitem title="Shows you how to migrate traffic from an old to new version of a service." href=/v1.2/docs/tasks/traffic-management/traffic-shifting/>Traffic Shifting</a></li><li role=none><a role=treeitem title="Shows you how to migrate TCP traffic from an old to new version of a TCP service." href=/v1.2/docs/tasks/traffic-management/tcp-traffic-shifting/>TCP Traffic Shifting</a></li><li role=none><a role=treeitem title="This task shows you how to setup request timeouts in Envoy using Istio." href=/v1.2/docs/tasks/traffic-management/request-timeouts/>Request Timeouts</a></li><li role=none><a role=treeitem title="This task shows you how to configure circuit breaking for connections, requests, and outlier detection." href=/v1.2/docs/tasks/traffic-management/circuit-breaking/>Circuit Breaking</a></li><li role=none><a role=treeitem title="This task demonstrates the traffic mirroring/shadowing capabilities of Istio." href=/v1.2/docs/tasks/traffic-management/mirroring/>Mirroring</a></li><li role=treeitem aria-label=Ingress><button aria-hidden=true></button><a title="Controlling ingress traffic for an Istio service mesh." href=/v1.2/docs/tasks/traffic-management/ingress/>Ingress</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes how to configure an Istio gateway to expose a service outside of the service mesh." href=/v1.2/docs/tasks/traffic-management/ingress/ingress-control/>Ingress Gateways</a></li><li role=none><a role=treeitem title="Expose a service outside of the service mesh over TLS or mTLS using file-mounted certificates." href=/v1.2/docs/tasks/traffic-management/ingress/secure-ingress-mount/>Secure Gateways (File Mount)</a></li><li role=none><a role=treeitem title="Expose a service outside of the service mesh over TLS or mTLS using the secret discovery service (SDS)." href=/v1.2/docs/tasks/traffic-management/ingress/secure-ingress-sds/>Secure Gateways (SDS)</a></li><li role=none><a role=treeitem title="Describes how to configure SNI passthrough for an ingress gateway." href=/v1.2/docs/tasks/traffic-management/ingress/ingress-sni-passthrough/>Ingress Gateway without TLS Termination</a></li><li role=none><a role=treeitem title="Demonstrates how to obtain Let's Encrypt TLS certificates for Kubernetes Ingress automatically using Cert-Manager." href=/v1.2/docs/tasks/traffic-management/ingress/ingress-certmgr/>Kubernetes Ingress with Cert-Manager</a></li></ul></li><li role=treeitem aria-label=Egress><button class=show aria-hidden=true></button><a title="Controlling egress traffic for an Istio service mesh." href=/v1.2/docs/tasks/traffic-management/egress/>Egress</a><ul role=group aria-expanded=true class=leaf-section><li role=none><span role=treeitem class=current title="Describes how to configure Istio to route traffic from services in the mesh to external services.">Accessing External Services</span></li><li role=none><a role=treeitem title="Describes how to configure Istio to perform TLS origination for traffic to external services." href=/v1.2/docs/tasks/traffic-management/egress/egress-tls-origination/>Egress TLS Origination</a></li><li role=none><a role=treeitem title="Describes how to configure Istio to direct traffic to external services through a dedicated gateway." href=/v1.2/docs/tasks/traffic-management/egress/egress-gateway/>Egress Gateways</a></li><li role=none><a role=treeitem title="Describes how to configure an Egress Gateway to perform TLS origination to external services." href=/v1.2/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/>Egress Gateways with TLS Origination</a></li><li role=none><a role=treeitem title="Describes how to enable egress traffic for a set of hosts in a common domain, instead of configuring each and every host separately." href=/v1.2/docs/tasks/traffic-management/egress/wildcard-egress-hosts/>Egress using Wildcard Hosts</a></li><li role=none><a role=treeitem title="Describes how to configure SNI monitoring and apply policies on TLS egress traffic." href=/v1.2/docs/tasks/traffic-management/egress/egress_sni_monitoring_and_policies/>Monitoring and Policies for TLS Egress</a></li><li role=none><a role=treeitem title="Describes how to configure Istio to let applications use an external HTTPS proxy." href=/v1.2/docs/tasks/traffic-management/egress/http-proxy/>Using an External HTTPS Proxy</a></li></ul></li></ul></li><li role=treeitem aria-label=Security><button aria-hidden=true></button><a title="Demonstrates how to secure the mesh." href=/v1.2/docs/tasks/security/>Security</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Shows you how to use Istio authentication policy to setup mutual TLS and basic end-user authentication." href=/v1.2/docs/tasks/security/authn-policy/>Authentication Policy</a></li><li role=none><a role=treeitem title="Shows how to set up role-based access control for HTTP services." href=/v1.2/docs/tasks/security/authz-http/>Authorization for HTTP Services</a></li><li role=none><a role=treeitem title="Shows how to set up role-based access control for TCP services." href=/v1.2/docs/tasks/security/authz-tcp/>Authorization for TCP Services</a></li><li role=none><a role=treeitem title="Tutorial on how to configure the groups-base authorization and configure the authorization of list-typed claims in Istio." href=/v1.2/docs/tasks/security/rbac-groups/>Authorization for groups and list claims</a></li><li role=none><a role=treeitem title="Shows how to use Authorization permissive mode." href=/v1.2/docs/tasks/security/authz-permissive/>Authorization permissive mode</a></li><li role=none><a role=treeitem title="This task shows you how to integrate a Vault Certificate Authority with Istio for mutual TLS." href=/v1.2/docs/tasks/security/vault-ca/>Istio Vault CA Integration</a></li><li role=none><a role=treeitem title="Shows you how to verify and test Istio's automatic mutual TLS authentication." href=/v1.2/docs/tasks/security/mutual-tls/>Mutual TLS Deep-Dive</a></li><li role=none><a role=treeitem title="Shows how operators can configure Citadel with existing root certificate, signing certificate and key." href=/v1.2/docs/tasks/security/plugin-ca-cert/>Plugging in External CA Key and Certificate</a></li><li role=none><a role=treeitem title="Shows how to enable Citadel health checking with Kubernetes." href=/v1.2/docs/tasks/security/health-check/>Citadel Health Checking</a></li><li role=none><a role=treeitem title="Shows how to enable SDS (secret discovery service) for Istio identity provisioning." href=/v1.2/docs/tasks/security/auth-sds/>Provisioning Identity through SDS</a></li><li role=none><a role=treeitem title="Shows you how to incrementally migrate your Istio services to mutual TLS." href=/v1.2/docs/tasks/security/mtls-migration/>Mutual TLS Migration</a></li><li role=none><a role=treeitem title="Shows how to enable mutual TLS on HTTPS services." href=/v1.2/docs/tasks/security/https-overlay/>Mutual TLS over HTTPS</a></li></ul></li><li role=treeitem aria-label=Policies><button aria-hidden=true></button><a title="Demonstrates policy enforcement features." href=/v1.2/docs/tasks/policy-enforcement/>Policies</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="This task shows you how to enable Istio policy enforcement." href=/v1.2/docs/tasks/policy-enforcement/enabling-policy/>Enabling Policy Enforcement</a></li><li role=none><a role=treeitem title="This task shows you how to use Istio to dynamically limit the traffic to a service." href=/v1.2/docs/tasks/policy-enforcement/rate-limiting/>Enabling Rate Limits</a></li><li role=none><a role=treeitem title="Shows how to modify request headers and routing using policy adapters." href=/v1.2/docs/tasks/policy-enforcement/control-headers/>Control Headers and Routing</a></li><li role=none><a role=treeitem title="Shows how to control access to a service using simple denials or white/black listing." href=/v1.2/docs/tasks/policy-enforcement/denial-and-list/>Denials and White/Black Listing</a></li></ul></li><li role=treeitem aria-label=Telemetry><button aria-hidden=true></button><a title="Demonstrates how to collect telemetry information from the mesh." href=/v1.2/docs/tasks/telemetry/>Telemetry</a><ul role=group aria-expanded=false><li role=treeitem aria-label=Metrics><button aria-hidden=true></button><a title="Demonstrates the configuration, collection, and processing of Istio mesh metrics." href=/v1.2/docs/tasks/telemetry/metrics/>Metrics</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="This task shows you how to configure Istio to collect and customize metrics." href=/v1.2/docs/tasks/telemetry/metrics/collecting-metrics/>Collecting Metrics</a></li><li role=none><a role=treeitem title="This task shows you how to configure Istio to collect metrics for TCP services." href=/v1.2/docs/tasks/telemetry/metrics/tcp-metrics/>Collecting Metrics for TCP services</a></li><li role=none><a role=treeitem title="This task shows you how to query for Istio Metrics using Prometheus." href=/v1.2/docs/tasks/telemetry/metrics/querying-metrics/>Querying Metrics from Prometheus</a></li><li role=none><a role=treeitem title="This task shows you how to setup and use the Istio Dashboard to monitor mesh traffic." href=/v1.2/docs/tasks/telemetry/metrics/using-istio-dashboard/>Visualizing Metrics with Grafana</a></li></ul></li><li role=treeitem aria-label=Logs><button aria-hidden=true></button><a title="Demonstrates the configuration, collection, and processing of Istio mesh logs." href=/v1.2/docs/tasks/telemetry/logs/>Logs</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="This task shows you how to configure Istio to collect and customize logs." href=/v1.2/docs/tasks/telemetry/logs/collecting-logs/>Collecting Logs</a></li><li role=none><a role=treeitem title="This task shows you how to configure Envoy proxies to print access log to their standard output." href=/v1.2/docs/tasks/telemetry/logs/access-log/>Getting Envoy&#39;s Access Logs</a></li><li role=none><a role=treeitem title="This task shows you how to configure Istio to log to a Fluentd daemon." href=/v1.2/docs/tasks/telemetry/logs/fluentd/>Logging with Fluentd</a></li></ul></li><li role=treeitem aria-label="Distributed Tracing"><button aria-hidden=true></button><a title="This task shows you how to configure Istio-enabled applications to collect trace spans." href=/v1.2/docs/tasks/telemetry/distributed-tracing/>Distributed Tracing</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Overview of distributed tracing in Istio." href=/v1.2/docs/tasks/telemetry/distributed-tracing/overview/>Overview</a></li><li role=none><a role=treeitem title="Learn how to configure the proxies to send tracing requests to Jaeger." href=/v1.2/docs/tasks/telemetry/distributed-tracing/jaeger/>Jaeger</a></li><li role=none><a role=treeitem title="Learn how to configure the proxies to send tracing requests to Zipkin." href=/v1.2/docs/tasks/telemetry/distributed-tracing/zipkin/>Zipkin</a></li><li role=none><a role=treeitem title="How to configure the proxies to send tracing requests to LightStep." href=/v1.2/docs/tasks/telemetry/distributed-tracing/lightstep/>LightStep</a></li></ul></li><li role=none><a role=treeitem title="This task shows you how to visualize your services within an Istio mesh." href=/v1.2/docs/tasks/telemetry/kiali/>Visualizing Your Mesh</a></li><li role=none><a role=treeitem title="This task shows you how to configure external access to the set of Istio telemetry addons." href=/v1.2/docs/tasks/telemetry/gateways/>Remotely Accessing Telemetry Addons</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card83 title="A variety of fully working example uses for Istio that you can experiment with." aria-controls=card83-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#examples"/></svg>Examples</button><div class=body aria-labelledby=card83 role=region id=card83-body><ul role=tree aria-expanded=true aria-labelledby=card83><li role=none><a role=treeitem title="Deploys a sample application composed of four separate microservices used to demonstrate various Istio features." href=/v1.2/docs/examples/bookinfo/>Bookinfo Application</a></li><li role=none><a role=treeitem title="Explains how to manually integrate Google Cloud Endpoints services with Istio." href=/v1.2/docs/examples/endpoints/>Install Istio for Google Cloud Endpoints Services</a></li><li role=none><a role=treeitem title="Illustrates how to use Istio to control a Kubernetes cluster and raw VMs as a single mesh." href=/v1.2/docs/examples/integrating-vms/>Integrating Virtual Machines</a></li><li role=treeitem aria-label="Multicluster Service Mesh"><button aria-hidden=true></button><a title="Multicluster service mesh examples for Istio that you can experiment with." href=/v1.2/docs/examples/multicluster/>Multicluster Service Mesh</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Set up a multicluster mesh over two GKE clusters." href=/v1.2/docs/examples/multicluster/gke/>Google Kubernetes Engine</a></li><li role=none><a role=treeitem title="Example multicluster mesh over two IBM Cloud Private clusters." href=/v1.2/docs/examples/multicluster/icp/>IBM Cloud Private</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card100 title="Hints, tips, tricks about running an Istio mesh." aria-controls=card100-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#guide"/></svg>Operations</button><div class=body aria-labelledby=card100 role=region id=card100-body><ul role=tree aria-expanded=true aria-labelledby=card100><li role=none><a role=treeitem title="Describes how to use component-level logging to get insights into a running component's behavior." href=/v1.2/docs/ops/component-logging/>Component Logging</a></li><li role=none><a role=treeitem title="Describes how to use ControlZ to get insight into individual running components." href=/v1.2/docs/ops/controlz/>Component Introspection</a></li><li role=none><a role=treeitem title="How to do low-level debugging of Istio components." href=/v1.2/docs/ops/component-debugging/>Component Debugging</a></li><li role=treeitem aria-label="Traffic Management"><button aria-hidden=true></button><a title="Helps you manage the networking aspects of a running mesh." href=/v1.2/docs/ops/traffic-management/>Traffic Management</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="An introduction to Istio networking operational aspects." href=/v1.2/docs/ops/traffic-management/introduction/>Introduction to Network Operations</a></li><li role=none><a role=treeitem title="Provides specific deployment and configuration guidelines." href=/v1.2/docs/ops/traffic-management/deploy-guidelines/>Deployment and Configuration Guidelines</a></li><li role=none><a role=treeitem title="Describes common networking issues and how to recognize and avoid them." href=/v1.2/docs/ops/traffic-management/troubleshooting/>Troubleshooting Networking Issues</a></li><li role=none><a role=treeitem title="Describes tools and techniques to diagnose Envoy configuration issues related to traffic management." href=/v1.2/docs/ops/traffic-management/proxy-cmd/>Debugging Envoy and Pilot</a></li><li role=none><a role=treeitem title="Information on how to enable and understand Locality Load Balancing." href=/v1.2/docs/ops/traffic-management/locality-load-balancing/>Locality Load Balancing</a></li></ul></li><li role=treeitem aria-label=Security><button aria-hidden=true></button><a title="Helps you manage the security aspects of a running mesh." href=/v1.2/docs/ops/security/>Security</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Demonstrates how to debug authorization." href=/v1.2/docs/ops/security/debugging-authorization/>Debugging Authorization</a></li><li role=none><a role=treeitem title="What to do if Citadel is not behaving properly." href=/v1.2/docs/ops/security/repairing-citadel/>Repairing Citadel</a></li><li role=none><a role=treeitem title="What to do if you suspect problems with Istio keys and certificates." href=/v1.2/docs/ops/security/keys-and-certs/>Keys and Certificates</a></li><li role=none><a role=treeitem title="What to do if mutual TLS authentication isn't working." href=/v1.2/docs/ops/security/mutual-tls/>Mutual TLS</a></li><li role=none><a role=treeitem title="Authorization is enabled, but requests make it through anyway." href=/v1.2/docs/ops/security/authorization-permissive/>Authorization Too Permissive</a></li><li role=none><a role=treeitem title="Authorization is enabled and no requests make it through to the service." href=/v1.2/docs/ops/security/authorization-restrictive/>Authorization Too Restrictive</a></li><li role=none><a role=treeitem title="What to do if end-user authentication doesn't work." href=/v1.2/docs/ops/security/end-user-auth/>End User Authentication</a></li><li role=none><a role=treeitem title="Learn how to extend the lifetime of the Istio self-signed root certificate." href=/v1.2/docs/ops/security/root-transition/>Extending Self-Signed Certificate Lifetime</a></li></ul></li><li role=treeitem aria-label=Telemetry><button aria-hidden=true></button><a title="Helps you manage telemetry collection and visualization in a running mesh." href=/v1.2/docs/ops/telemetry/>Telemetry</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Diagnose problems where metrics are not being collected." href=/v1.2/docs/ops/telemetry/missing-metrics/>Missing Metrics</a></li><li role=none><a role=treeitem title="Dealing with Grafana issues." href=/v1.2/docs/ops/telemetry/grafana/>Grafana</a></li><li role=none><a role=treeitem title="Fine-grained control of Envoy statistics." href=/v1.2/docs/ops/telemetry/envoy-stats/>Envoy Statistics</a></li></ul></li><li role=treeitem aria-label="Installation and Setup"><button aria-hidden=true></button><a title="Helps you diagnose and repair Istio installations." href=/v1.2/docs/ops/setup/>Installation and Setup</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Provides a general overview of Istio's use of Kubernetes webhooks and the related issues that can arise." href=/v1.2/docs/ops/setup/webhook/>Dynamic Admission Webhooks Overview</a></li><li role=none><a role=treeitem title="Describes Istio's use of Kubernetes webhooks for server-side configuration validation." href=/v1.2/docs/ops/setup/validation/>Configuration Validation Webhook</a></li><li role=none><a role=treeitem title="Istio includes a supplemental tool that provides debugging and diagnosis for Istio service mesh deployments." href=/v1.2/docs/ops/setup/istioctl/>Using the istioctl command-line tool</a></li><li role=none><a role=treeitem title="Describes Istio's use of Kubernetes webhooks for automatic sidecar injection." href=/v1.2/docs/ops/setup/injection/>Sidecar Injection Webhook</a></li><li role=none><a role=treeitem title="Describes how to check which capabilities are allowed for your pods." href=/v1.2/docs/ops/setup/required-pod-capabilities/>Required Pod Capabilities</a></li><li role=none><a role=treeitem title="Shows how to do health checking for Istio services." href=/v1.2/docs/ops/setup/app-health-check/>Health Checking of Istio Services</a></li></ul></li><li role=none><a role=treeitem title="Advice on tackling common problems with Istio." href=/v1.2/docs/ops/misc/>Miscellaneous</a></li></ul></div></div><div class=card><button class="header dynamic" id=card130 title="Detailed authoritative reference material such as command-line options, configuration options, and API calling parameters." aria-controls=card130-body><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#reference"/></svg>Reference</button><div class=body aria-labelledby=card130 role=region id=card130-body><ul role=tree aria-expanded=true aria-labelledby=card130><li role=treeitem aria-label=Configuration><button aria-hidden=true></button><a title="Detailed information on configuration options." href=/v1.2/docs/reference/config/>Configuration</a><ul role=group aria-expanded=false><li role=treeitem aria-label="Traffic Management"><button aria-hidden=true></button><a title="Describes how to configure HTTP/TCP routing features." href=/v1.2/docs/reference/config/networking/>Traffic Management</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Configuration affecting load balancing, outlier detection, etc." href=/v1.2/docs/reference/config/networking/v1alpha3/destination-rule/>Destination Rule</a></li><li role=none><a role=treeitem title="Configuration affecting insertion of custom Envoy filters." href=/v1.2/docs/reference/config/networking/v1alpha3/envoy-filter/>Envoy Filter</a></li><li role=none><a role=treeitem title="Configuration affecting edge load balancer." href=/v1.2/docs/reference/config/networking/v1alpha3/gateway/>Gateway</a></li><li role=none><a role=treeitem title="Configuration affecting service registry." href=/v1.2/docs/reference/config/networking/v1alpha3/service-entry/>Service Entry</a></li><li role=none><a role=treeitem title="Configuration affecting network reachability of a sidecar." href=/v1.2/docs/reference/config/networking/v1alpha3/sidecar/>Sidecar</a></li><li role=none><a role=treeitem title="Configuration affecting label/content routing, sni routing, etc." href=/v1.2/docs/reference/config/networking/v1alpha3/virtual-service/>Virtual Service</a></li></ul></li><li role=treeitem aria-label=Authorization><button aria-hidden=true></button><a title="Describes how to configure Istio's authorization features." href=/v1.2/docs/reference/config/authorization/>Authorization</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes the supported constraints and properties." href=/v1.2/docs/reference/config/authorization/constraints-and-properties/>Constraints and Properties</a></li><li role=none><a role=treeitem title="Configuration for Role Based Access Control." href=/v1.2/docs/reference/config/authorization/istio.rbac.v1alpha1/>RBAC</a></li></ul></li><li role=none><a role=treeitem title="Describes the options available when installing Istio using the included Helm chart." href=/v1.2/docs/reference/config/installation-options/>Installation Options</a></li><li role=none><a role=treeitem title="Details the Helm chart installation options differences between release-1.1 and release-1.2." href=/v1.2/docs/reference/config/installation-options-changes/>Installation Options Changes</a></li><li role=treeitem aria-label="Policies and Telemetry"><button aria-hidden=true></button><a title="Describes how to configure Istio's policy and telemetry features." href=/v1.2/docs/reference/config/policy-and-telemetry/>Policies and Telemetry</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="Describes the configuration model for Istio's policy enforcement and telemetry mechanisms." href=/v1.2/docs/reference/config/policy-and-telemetry/mixer-overview/>Mixer Configuration Model</a></li><li role=none><a role=treeitem title="Describes the base attribute vocabulary used for policy and control." href=/v1.2/docs/reference/config/policy-and-telemetry/attribute-vocabulary/>Attribute Vocabulary</a></li><li role=none><a role=treeitem title="Mixer configuration expression language reference." href=/v1.2/docs/reference/config/policy-and-telemetry/expression-language/>Expression Language</a></li><li role=treeitem aria-label=Adapters><button aria-hidden=true></button><a title="Mixer adapters allow Istio to interface to a variety of infrastructure backends for such things as metrics and logs." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/>Adapters</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Adapter to deliver metrics to Apache SkyWalking." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/apache-skywalking/>Apache SkyWalking</a></li><li role=none><a role=treeitem title="Adapter for Apigee's distributed policy checks and analytics." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/apigee/>Apigee</a></li><li role=none><a role=treeitem title="Adapter for circonus.com's monitoring solution." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/circonus/>Circonus</a></li><li role=none><a role=treeitem title="Adapter for cloudmonitor metrics." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/cloudmonitor/>CloudMonitor</a></li><li role=none><a role=treeitem title="Adapter for cloudwatch metrics." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/cloudwatch/>CloudWatch</a></li><li role=none><a role=treeitem title="Adapter to deliver metrics to a dogstatsd agent for delivery to DataDog." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/datadog/>Datadog</a></li><li role=none><a role=treeitem title="Adapter that always returns a precondition denial." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/denier/>Denier</a></li><li role=none><a role=treeitem title="Adapter that delivers logs to a Fluentd daemon." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/fluentd/>Fluentd</a></li><li role=none><a role=treeitem title="Adapter that extracts information from a Kubernetes environment." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/kubernetesenv/>Kubernetes Env</a></li><li role=none><a role=treeitem title="Adapter that performs whitelist or blacklist checks." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/list/>List</a></li><li role=none><a role=treeitem title="Adapter for a simple in-memory quota management system." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/memquota/>Memory quota</a></li><li role=none><a role=treeitem title="Adapter that implements an Open Policy Agent engine." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/opa/>OPA</a></li><li role=none><a role=treeitem title="Adapter that exposes Istio metrics for ingestion by a Prometheus harvester." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/prometheus/>Prometheus</a></li><li role=none><a role=treeitem title="Adapter for a Redis-based quota management system." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/redisquota/>Redis Quota</a></li><li role=none><a role=treeitem title="Adapter that sends metrics to SignalFx." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/signalfx/>SignalFx</a></li><li role=none><a role=treeitem title="Adapter to deliver logs and metrics to Papertrail and AppOptics backends." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/solarwinds/>SolarWinds</a></li><li role=none><a role=treeitem title="Adapter to deliver logs, metrics, and traces to Stackdriver." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/stackdriver/>Stackdriver</a></li><li role=none><a role=treeitem title="Adapter to deliver metrics to a StatsD backend." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/statsd/>StatsD</a></li><li role=none><a role=treeitem title="Adapter to locally output logs and metrics." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/stdio/>Stdio</a></li><li role=none><a role=treeitem title="Adapter to deliver metrics to Wavefront by VMware." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/wavefront/>Wavefront by VMware</a></li><li role=none><a role=treeitem title="Adapter to deliver tracing data to Zipkin." href=/v1.2/docs/reference/config/policy-and-telemetry/adapters/zipkin/>Zipkin</a></li></ul></li><li role=none><a role=treeitem title="Default Metrics exported from Istio through Mixer." href=/v1.2/docs/reference/config/policy-and-telemetry/metrics/>Default Metrics</a></li><li role=treeitem aria-label=Templates><button aria-hidden=true></button><a title="Mixer templates are used to send data to individual adapters." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/>Templates</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="A template that represents a single API key." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/apikey/>API Key</a></li><li role=none><a role=treeitem title="The Analytics template is used to dispatch runtime telemetry to Apigee." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/analytics/>Analytics</a></li><li role=none><a role=treeitem title="A template used to represent an access control query." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/authorization/>Authorization</a></li><li role=none><a role=treeitem title="A template that carries no data, useful for testing." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/checknothing/>Check Nothing</a></li><li role=none><a role=treeitem title="A template designed to report observed communication edges between workloads." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/edge/>Edge</a></li><li role=none><a role=treeitem title="A template that is used to control the production of Kubernetes-specific attributes." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/kubernetes/>Kubernetes</a></li><li role=none><a role=treeitem title="A template designed to let you perform list checking operations." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/listentry/>List Entry</a></li><li role=none><a role=treeitem title="A template that represents a single runtime log entry." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/logentry/>Log Entry</a></li><li role=none><a role=treeitem title="A template that represents a single runtime metric." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/metric/>Metric</a></li><li role=none><a role=treeitem title="A template that represents a quota allocation request." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/quota/>Quota</a></li><li role=none><a role=treeitem title="A template that carries no data, useful for testing." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/reportnothing/>Report Nothing</a></li><li role=none><a role=treeitem title="A template that represents an individual span within a distributed trace." href=/v1.2/docs/reference/config/policy-and-telemetry/templates/tracespan/>Trace Span</a></li></ul></li><li role=none><a role=treeitem title="Configuration state for the Mixer client library." href=/v1.2/docs/reference/config/policy-and-telemetry/istio.mixer.v1.config.client/>Mixer Client</a></li><li role=none><a role=treeitem title="Describes the rules used to configure Mixer's policy and telemetry features." href=/v1.2/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/>Rules</a></li></ul></li><li role=none><a role=treeitem title="Authentication policy for Istio services." href=/v1.2/docs/reference/config/istio.authentication.v1alpha1/>Authentication Policy</a></li><li role=none><a role=treeitem title="Configuration affecting the service mesh as a whole." href=/v1.2/docs/reference/config/istio.mesh.v1alpha1/>Service Mesh</a></li></ul></li><li role=treeitem aria-label=Commands><button aria-hidden=true></button><a title="Describes usage and options of the Istio commands and utilities." href=/v1.2/docs/reference/commands/>Commands</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Galley provides configuration management services for Istio." href=/v1.2/docs/reference/commands/galley/>galley</a></li><li role=none><a role=treeitem title="Istio Certificate Authority (CA)." href=/v1.2/docs/reference/commands/istio_ca/>istio_ca</a></li><li role=none><a role=treeitem title="Istio control interface." href=/v1.2/docs/reference/commands/istioctl/>istioctl</a></li><li role=none><a role=treeitem title="Mixer is Istio's abstraction on top of infrastructure backends." href=/v1.2/docs/reference/commands/mixs/>mixs</a></li><li role=none><a role=treeitem title="Istio security per-node agent." href=/v1.2/docs/reference/commands/node_agent/>node_agent</a></li><li role=none><a role=treeitem title="The Istio operator." href=/v1.2/docs/reference/commands/operator/>operator</a></li><li role=none><a role=treeitem title="Istio Pilot agent." href=/v1.2/docs/reference/commands/pilot-agent/>pilot-agent</a></li><li role=none><a role=treeitem title="Istio Pilot." href=/v1.2/docs/reference/commands/pilot-discovery/>pilot-discovery</a></li><li role=none><a role=treeitem title="Kubernetes webhook for automatic Istio sidecar injection." href=/v1.2/docs/reference/commands/sidecar-injector/>sidecar-injector</a></li></ul></li><li role=none><a role=treeitem title="A glossary of common Istio terms." href=/v1.2/docs/reference/glossary/>Glossary</a></li></ul></div></div></div></nav></div><div class=article-container><button tabindex=-1 id=sidebar-toggler title="Toggle the navigation bar"><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#pull"/></svg></button><nav aria-label=Breadcrumb><ol><li><a href=/v1.2/ title="Connect, secure, control, and observe services.">Istio</a></li><li><a href=/v1.2/docs/ title="Learn how to deploy, use, and operate Istio.">Docs</a></li><li><a href=/v1.2/docs/tasks/ title="How to do single specific targeted activities with the Istio system.">Tasks</a></li><li><a href=/v1.2/docs/tasks/traffic-management/ title="Tasks that demonstrate Istio's traffic routing features.">Traffic Management</a></li><li><a href=/v1.2/docs/tasks/traffic-management/egress/ title="Controlling egress traffic for an Istio service mesh.">Egress</a></li><li>Accessing External Services</li></ol></nav><article aria-labelledby=title><div class=title-area><div><h1 id=title>Accessing External Services</h1><p class=byline><span title="2485 words"><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#clock"/></svg><span>&nbsp;</span>12 minute read</span></p></div></div><nav class=toc-inlined aria-label="Table of Contents"><div><hr><ol><li role=none aria-label="Before you begin"><a href=#before-you-begin>Before you begin</a><li role=none aria-label="Envoy passthrough to external services"><a href=#envoy-passthrough-to-external-services>Envoy passthrough to external services</a><li role=none aria-label="Controlled access to external services"><a href=#controlled-access-to-external-services>Controlled access to external services</a><ol><li role=none aria-label="Change to the blocking-by-default policy"><a href=#change-to-the-blocking-by-default-policy>Change to the blocking-by-default policy</a><li role=none aria-label="Access an external HTTP service"><a href=#access-an-external-http-service>Access an external HTTP service</a><li role=none aria-label="Access an external HTTPS service"><a href=#access-an-external-https-service>Access an external HTTPS service</a><li role=none aria-label="Manage traffic to external services"><a href=#manage-traffic-to-external-services>Manage traffic to external services</a><li role=none aria-label="Cleanup the controlled access to external services"><a href=#cleanup-the-controlled-access-to-external-services>Cleanup the controlled access to external services</a></ol></li><li role=none aria-label="Direct access to external services"><a href=#direct-access-to-external-services>Direct access to external services</a><ol><li role=none aria-label="Determine the internal IP ranges for your platform"><a href=#determine-the-internal-ip-ranges-for-your-platform>Determine the internal IP ranges for your platform</a><ol><li role=none aria-label="IBM Cloud Private"><a href=#ibm-cloud-private>IBM Cloud Private</a><li role=none aria-label="IBM Cloud Kubernetes Service"><a href=#ibm-cloud-kubernetes-service>IBM Cloud Kubernetes Service</a><li role=none aria-label="Google Container Engine (GKE)"><a href=#google-container-engine-gke>Google Container Engine (GKE)</a><li role=none aria-label="Azure Container Service(ACS)"><a href=#azure-container-service-acs>Azure Container Service(ACS)</a><li role=none aria-label="Minikube, Docker For Desktop, Bare Metal"><a href=#minikube-docker-for-desktop-bare-metal>Minikube, Docker For Desktop, Bare Metal</a></ol></li><li role=none aria-label="Configuring the proxy bypass"><a href=#configuring-the-proxy-bypass>Configuring the proxy bypass</a><li role=none aria-label="Access the external services"><a href=#access-the-external-services>Access the external services</a><li role=none aria-label="Cleanup the direct access to external services"><a href=#cleanup-the-direct-access-to-external-services>Cleanup the direct access to external services</a></ol></li><li role=none aria-label="Understanding what happened"><a href=#understanding-what-happened>Understanding what happened</a><li role=none aria-label="Security note"><a href=#security-note>Security note</a><li role=none aria-label=Cleanup><a href=#cleanup>Cleanup</a><li role=none aria-label="See also"><a href=#see-also>See also</a></li></ol><hr></div></nav><p>Because all outbound traffic from an Istio-enabled pod is redirected to its sidecar proxy by default,
accessibility of URLs outside of the cluster depends on the configuration of the proxy.
By default, Istio configures the Envoy proxy to passthrough requests for unknown services.
Although this provides a convenient way to get started with Istio, configuring
stricter control is usually preferable.</p><p>This task shows you how to access external services in three different ways:</p><ol><li>Allow the Envoy proxy to pass requests through to services that are not configured inside the mesh.</li><li>Configure <a href=/v1.2/docs/reference/config/networking/v1alpha3/service-entry/>service entries</a> to provide controlled access to external services.</li><li>Completely bypass the Envoy proxy for a specific range of IPs.</li></ol><h2 id=before-you-begin>Before you begin</h2><ul><li><p>Setup Istio by following the instructions in the <a href=/v1.2/docs/setup/>Installation guide</a>.</p></li><li><p>Deploy the <a href=https://github.com/istio/istio/tree/release-1.2/samples/sleep>sleep</a> sample app to use as a test source for sending requests.
If you have
<a href=/v1.2/docs/setup/kubernetes/additional-setup/sidecar-injection/#automatic-sidecar-injection>automatic sidecar injection</a>
enabled, run the following command to deploy the sample app:</p><div><a data-skipendnotes=true style=display:none href=https://raw.githubusercontent.com/istio/istio/release-1.2/samples/sleep/sleep.yaml>Zip</a><pre><code class=language-bash data-expandlinks=true>$ kubectl apply -f @samples/sleep/sleep.yaml@
</code></pre></div><p>Otherwise, manually inject the sidecar before deploying the <code>sleep</code> application with the following command:</p><div><a data-skipendnotes=true style=display:none href=https://raw.githubusercontent.com/istio/istio/release-1.2/samples/sleep/sleep.yaml>Zip</a><pre><code class=language-bash data-expandlinks=true>$ kubectl apply -f &lt;(istioctl kube-inject -f @samples/sleep/sleep.yaml@)
</code></pre></div><div><aside class="callout tip"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-tip"/></svg></div><div class=content>You can use any pod with <code>curl</code> installed as a test source.</div></aside></div></li><li><p>Set the <code>SOURCE_POD</code> environment variable to the name of your source pod:</p><pre><code class=language-bash data-expandlinks=true>$ export SOURCE_POD=$(kubectl get pod -l app=sleep -o jsonpath={.items..metadata.name})
</code></pre></li></ul><h2 id=envoy-passthrough-to-external-services>Envoy passthrough to external services</h2><p>Istio has an <a href=/v1.2/docs/reference/config/installation-options/>installation option</a>,
<code>global.outboundTrafficPolicy.mode</code>, that configures the sidecar handling
of external services, that is, those services that are not defined in Istio&rsquo;s internal service registry.
If this option is set to <code>ALLOW_ANY</code>, the Istio proxy lets calls to unknown services pass through.
If the option is set to <code>REGISTRY_ONLY</code>, then the Istio proxy blocks any host without an HTTP service or
service entry defined within the mesh.
<code>ALLOW_ANY</code> is the default value, allowing you to start evaluating Istio quickly,
without controlling access to external services.
You can then decide to <a href=#controlled-access-to-external-services>configure access to external services</a> later.</p><div><aside class="callout warning"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-warning"/></svg></div><div class=content>In versions prior to Istio 1.1.4, <code>ALLOW_ANY</code> only worked on ports with no HTTP services or
service entries defined within the mesh.
External hosts using the same port as any internal HTTP service
fell back to a blocking-by-default behavior.
Because some ports, such as port 80, have HTTP services inside Istio by default,
prior to Istio 1.1.4 you couldn&rsquo;t call external services on any of those ports either.</div></aside></div><ol><li><p>To see this approach in action you need to ensure that your Istio installation is configured
with the <code>global.outboundTrafficPolicy.mode</code> option set to <code>ALLOW_ANY</code>. Unless you explicitly
set it to <code>REGISTRY_ONLY</code> mode when you installed Istio, it is probably enabled by default.</p><p>Run the following command to confirm it is configured correctly:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl get configmap istio -n istio-system -o yaml | grep -o &#34;mode: ALLOW_ANY&#34;
mode: ALLOW_ANY
</code></pre><p>The string <code>mode: ALLOW_ANY</code> should appear in the output if it is enabled.</p><div><aside class="callout tip"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-tip"/></svg></div><div class=content><p>If you have explicitly configured <code>REGISTRY_ONLY</code> mode, you can run the following command to change it:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl get configmap istio -n istio-system -o yaml | sed &#39;s/mode: REGISTRY_ONLY/mode: ALLOW_ANY/g&#39; | kubectl replace -n istio-system -f -
configmap &#34;istio&#34; replaced
</code></pre></div></aside></div></li><li><p>Make a couple of requests to external HTTPS services from the <code>SOURCE_POD</code> to confirm
successful <code>200</code> responses:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep -- curl -I https://www.google.com | grep &#34;HTTP/&#34;; kubectl exec -it $SOURCE_POD -c sleep -- curl -I https://edition.cnn.com | grep &#34;HTTP/&#34;
HTTP/2 200
HTTP/2 200
</code></pre></li></ol><p>Congratulations! You successfully sent egress traffic from your mesh.</p><p>This simple approach to access external services, has the drawback that you lose Istio monitoring and control
for traffic to external services; calls to external services will not appear in the Mixer log, for example.
The next section shows you how to monitor and control your mesh&rsquo;s access to external services.</p><h2 id=controlled-access-to-external-services>Controlled access to external services</h2><p>Using Istio <code>ServiceEntry</code> configurations, you can access any publicly accessible service
from within your Istio cluster. This section shows you how to configure access to an external HTTP service,
<a href=http://httpbin.org>httpbin.org</a>, as well as an external HTTPS service,
<a href=https://www.google.com>www.google.com</a> without losing Istio&rsquo;s traffic monitoring and control features.</p><h3 id=change-to-the-blocking-by-default-policy>Change to the blocking-by-default policy</h3><p>To demonstrate the controlled way of enabling access to external services, you need to change the
<code>global.outboundTrafficPolicy.mode</code> option from the <code>ALLOW_ANY</code> mode to the <code>REGISTRY_ONLY</code> mode.</p><div><aside class="callout tip"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-tip"/></svg></div><div class=content>You can add controlled access to services that are already accessible in <code>ALLOW_ANY</code> mode.
This way, you can start using Istio features on some external services without blocking any others.
Once you&rsquo;ve configured all of your services, you can then switch the mode to <code>REGISTRY_ONLY</code> to block
any other unintentional accesses.</div></aside></div><ol><li><p>Run the following command to change the <code>global.outboundTrafficPolicy.mode</code> option to <code>REGISTRY_ONLY</code>:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl get configmap istio -n istio-system -o yaml | sed &#39;s/mode: ALLOW_ANY/mode: REGISTRY_ONLY/g&#39; | kubectl replace -n istio-system -f -
configmap &#34;istio&#34; replaced
</code></pre></li><li><p>Make a couple of requests to external HTTPS services from <code>SOURCE_POD</code> to verify that they are now blocked:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep -- curl -I https://www.google.com | grep &#34;HTTP/&#34;; kubectl exec -it $SOURCE_POD -c sleep -- curl -I https://edition.cnn.com | grep &#34;HTTP/&#34;
command terminated with exit code 35
command terminated with exit code 35
</code></pre><div><aside class="callout warning"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-warning"/></svg></div><div class=content>It may take a while for the configuration change to propagate, so you might still get successful connections.
Wait for several seconds and then retry the last command.</div></aside></div></li></ol><h3 id=access-an-external-http-service>Access an external HTTP service</h3><ol><li><p>Create a <code>ServiceEntry</code> to allow access to an external HTTP service:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl apply -f - &lt;&lt;EOF
apiVersion: networking.istio.io/v1alpha3
kind: ServiceEntry
metadata:
name: httpbin-ext
spec:
hosts:
- httpbin.org
ports:
- number: 80
name: http
protocol: HTTP
resolution: DNS
location: MESH_EXTERNAL
EOF
</code></pre></li><li><p>Make a request to the external HTTP service from <code>SOURCE_POD</code>:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep -- curl http://httpbin.org/headers
{
&#34;headers&#34;: {
&#34;Accept&#34;: &#34;*/*&#34;,
&#34;Connection&#34;: &#34;close&#34;,
&#34;Host&#34;: &#34;httpbin.org&#34;,
&#34;User-Agent&#34;: &#34;curl/7.60.0&#34;,
...
&#34;X-Envoy-Decorator-Operation&#34;: &#34;httpbin.org:80/*&#34;,
}
}
</code></pre><p>Note the headers added by the Istio sidecar proxy: <code>X-Envoy-Decorator-Operation</code>.</p></li><li><p>Check the log of the sidecar proxy of <code>SOURCE_POD</code>:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl logs $SOURCE_POD -c istio-proxy | tail
[2019-01-24T12:17:11.640Z] &#34;GET /headers HTTP/1.1&#34; 200 - 0 599 214 214 &#34;-&#34; &#34;curl/7.60.0&#34; &#34;17fde8f7-fa62-9b39-8999-302324e6def2&#34; &#34;httpbin.org&#34; &#34;35.173.6.94:80&#34; outbound|80||httpbin.org - 35.173.6.94:80 172.30.109.82:55314 -
</code></pre><p>Note the entry related to your HTTP request to <code>httpbin.org/headers</code>.</p></li><li><p>Check the Mixer log. If Istio is deployed in the <code>istio-system</code> namespace, the command to print the log is:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep &#39;httpbin.org&#39;
{&#34;level&#34;:&#34;info&#34;,&#34;time&#34;:&#34;2019-01-24T12:17:11.855496Z&#34;,&#34;instance&#34;:&#34;accesslog.logentry.istio-system&#34;,&#34;apiClaims&#34;:&#34;&#34;,&#34;apiKey&#34;:&#34;&#34;,&#34;clientTraceId&#34;:&#34;&#34;,&#34;connection_security_policy&#34;:&#34;unknown&#34;,&#34;destinationApp&#34;:&#34;&#34;,&#34;destinationIp&#34;:&#34;I60GXg==&#34;,&#34;destinationName&#34;:&#34;unknown&#34;,&#34;destinationNamespace&#34;:&#34;default&#34;,&#34;destinationOwner&#34;:&#34;unknown&#34;,&#34;destinationPrincipal&#34;:&#34;&#34;,&#34;destinationServiceHost&#34;:&#34;httpbin.org&#34;,&#34;destinationWorkload&#34;:&#34;unknown&#34;,&#34;grpcMessage&#34;:&#34;&#34;,&#34;grpcStatus&#34;:&#34;&#34;,&#34;httpAuthority&#34;:&#34;httpbin.org&#34;,&#34;latency&#34;:&#34;214.661667ms&#34;,&#34;method&#34;:&#34;GET&#34;,&#34;permissiveResponseCode&#34;:&#34;none&#34;,&#34;permissiveResponsePolicyID&#34;:&#34;none&#34;,&#34;protocol&#34;:&#34;http&#34;,&#34;receivedBytes&#34;:270,&#34;referer&#34;:&#34;&#34;,&#34;reporter&#34;:&#34;source&#34;,&#34;requestId&#34;:&#34;17fde8f7-fa62-9b39-8999-302324e6def2&#34;,&#34;requestSize&#34;:0,&#34;requestedServerName&#34;:&#34;&#34;,&#34;responseCode&#34;:200,&#34;responseSize&#34;:599,&#34;responseTimestamp&#34;:&#34;2019-01-24T12:17:11.855521Z&#34;,&#34;sentBytes&#34;:806,&#34;sourceApp&#34;:&#34;sleep&#34;,&#34;sourceIp&#34;:&#34;AAAAAAAAAAAAAP//rB5tUg==&#34;,&#34;sourceName&#34;:&#34;sleep-88ddbcfdd-rgk77&#34;,&#34;sourceNamespace&#34;:&#34;default&#34;,&#34;sourceOwner&#34;:&#34;kubernetes://apis/apps/v1/namespaces/default/deployments/sleep&#34;,&#34;sourcePrincipal&#34;:&#34;&#34;,&#34;sourceWorkload&#34;:&#34;sleep&#34;,&#34;url&#34;:&#34;/headers&#34;,&#34;userAgent&#34;:&#34;curl/7.60.0&#34;,&#34;xForwardedFor&#34;:&#34;0.0.0.0&#34;}
</code></pre><p>Note that the <code>destinationServiceHost</code> attribute is equal to <code>httpbin.org</code>. Also notice the HTTP-related attributes:
<code>method</code>, <code>url</code>, <code>responseCode</code> and others. Using Istio egress traffic control, you can monitor access to external
HTTP services, including the HTTP-related information of each access.</p></li></ol><h3 id=access-an-external-https-service>Access an external HTTPS service</h3><ol><li><p>Create a <code>ServiceEntry</code> to allow access to an external HTTPS service.</p><pre><code class=language-bash data-expandlinks=true>$ kubectl apply -f - &lt;&lt;EOF
apiVersion: networking.istio.io/v1alpha3
kind: ServiceEntry
metadata:
name: google
spec:
hosts:
- www.google.com
ports:
- number: 443
name: https
protocol: HTTPS
resolution: DNS
location: MESH_EXTERNAL
EOF
</code></pre></li><li><p>Make a request to the external HTTPS service from <code>SOURCE_POD</code>:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep -- curl -I https://www.google.com | grep &#34;HTTP/&#34;
HTTP/2 200
</code></pre></li><li><p>Check the log of the sidecar proxy of <code>SOURCE_POD</code>:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl logs $SOURCE_POD -c istio-proxy | tail
[2019-01-24T12:48:54.977Z] &#34;- - -&#34; 0 - 601 17766 1289 - &#34;-&#34; &#34;-&#34; &#34;-&#34; &#34;-&#34; &#34;172.217.161.36:443&#34; outbound|443||www.google.com 172.30.109.82:59480 172.217.161.36:443 172.30.109.82:59478 www.google.com
</code></pre><p>Note the entry related to your HTTPS request to <code>www.google.com</code>.</p></li><li><p>Check the Mixer log. If Istio is deployed in the <code>istio-system</code> namespace, the command to print the log is:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl -n istio-system logs -l istio-mixer-type=telemetry -c mixer | grep &#39;www.google.com&#39;
{&#34;level&#34;:&#34;info&#34;,&#34;time&#34;:&#34;2019-01-24T12:48:56.266553Z&#34;,&#34;instance&#34;:&#34;tcpaccesslog.logentry.istio-system&#34;,&#34;connectionDuration&#34;:&#34;1.289085134s&#34;,&#34;connectionEvent&#34;:&#34;close&#34;,&#34;connection_security_policy&#34;:&#34;unknown&#34;,&#34;destinationApp&#34;:&#34;&#34;,&#34;destinationIp&#34;:&#34;rNmhJA==&#34;,&#34;destinationName&#34;:&#34;unknown&#34;,&#34;destinationNamespace&#34;:&#34;default&#34;,&#34;destinationOwner&#34;:&#34;unknown&#34;,&#34;destinationPrincipal&#34;:&#34;&#34;,&#34;destinationServiceHost&#34;:&#34;www.google.com&#34;,&#34;destinationWorkload&#34;:&#34;unknown&#34;,&#34;protocol&#34;:&#34;tcp&#34;,&#34;receivedBytes&#34;:601,&#34;reporter&#34;:&#34;source&#34;,&#34;requestedServerName&#34;:&#34;www.google.com&#34;,&#34;sentBytes&#34;:17766,&#34;sourceApp&#34;:&#34;sleep&#34;,&#34;sourceIp&#34;:&#34;rB5tUg==&#34;,&#34;sourceName&#34;:&#34;sleep-88ddbcfdd-rgk77&#34;,&#34;sourceNamespace&#34;:&#34;default&#34;,&#34;sourceOwner&#34;:&#34;kubernetes://apis/apps/v1/namespaces/default/deployments/sleep&#34;,&#34;sourcePrincipal&#34;:&#34;&#34;,&#34;sourceWorkload&#34;:&#34;sleep&#34;,&#34;totalReceivedBytes&#34;:601,&#34;totalSentBytes&#34;:17766}
</code></pre><p>Note that the <code>requestedServerName</code> attribute is equal to <code>www.google.com</code>. Using Istio egress traffic control, you
can monitor access to external HTTPS services, in particular the
<a href=https://en.wikipedia.org/wiki/Server_Name_Indication>SNI</a> and the number of sent and received bytes. Note that in
HTTPS all the HTTP-related information like method, URL path, response code, is encrypted so Istio cannot see and
cannot monitor that information for HTTPS. If you need to monitor HTTP-related information in access to external
HTTPS services, you may want to let your applications issue HTTP requests and
<a href=/v1.2/docs/tasks/traffic-management/egress/egress-tls-origination/>configure Istio to perform TLS origination</a>.</p></li></ol><h3 id=manage-traffic-to-external-services>Manage traffic to external services</h3><p>Similar to inter-cluster requests, Istio
<a href=/v1.2/docs/concepts/traffic-management/#routing-rules>routing rules</a>
can also be set for external services that are accessed using <code>ServiceEntry</code> configurations.
In this example, you set a timeout rule on calls to the <code>httpbin.org</code> service.</p><ol><li><p>From inside the pod being used as the test source, make a <em>curl</em> request to the <code>/delay</code> endpoint of the
httpbin.org external service:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep sh
$ time curl -o /dev/null -s -w &#34;%{http_code}\n&#34; http://httpbin.org/delay/5
200
real 0m5.024s
user 0m0.003s
sys 0m0.003s
</code></pre><p>The request should return 200 (OK) in approximately 5 seconds.</p></li><li><p>Exit the source pod and use <code>kubectl</code> to set a 3s timeout on calls to the <code>httpbin.org</code> external service:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl apply -f - &lt;&lt;EOF
apiVersion: networking.istio.io/v1alpha3
kind: VirtualService
metadata:
name: httpbin-ext
spec:
hosts:
- httpbin.org
http:
- timeout: 3s
route:
- destination:
host: httpbin.org
weight: 100
EOF
</code></pre></li><li><p>Wait a few seconds, then make the <em>curl</em> request again:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl exec -it $SOURCE_POD -c sleep sh
$ time curl -o /dev/null -s -w &#34;%{http_code}\n&#34; http://httpbin.org/delay/5
504
real 0m3.149s
user 0m0.004s
sys 0m0.004s
</code></pre><p>This time a 504 (Gateway Timeout) appears after 3 seconds.
Although httpbin.org was waiting 5 seconds, Istio cut off the request at 3 seconds.</p></li></ol><h3 id=cleanup-the-controlled-access-to-external-services>Cleanup the controlled access to external services</h3><pre><code class=language-bash data-expandlinks=true>$ kubectl delete serviceentry httpbin-ext google
$ kubectl delete virtualservice httpbin-ext --ignore-not-found=true
</code></pre><h2 id=direct-access-to-external-services>Direct access to external services</h2><p>If you want to completely bypass Istio for a specific IP range,
you can configure the Envoy sidecars to prevent them from
<a href=/v1.2/docs/concepts/traffic-management/#traffic-routing-and-configuration>intercepting</a>
external requests. To set up the bypass, change either the <code>global.proxy.includeIPRanges</code>
or the <code>global.proxy.excludeIPRanges</code> <a href=/v1.2/docs/reference/config/installation-options/>configuration option</a> and
update the <code>istio-sidecar-injector</code> configuration map using the <code>kubectl apply</code> command.
After updating the <code>istio-sidecar-injector</code> configuration, it affects all
future application pod deployments.</p><div><aside class="callout warning"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-warning"/></svg></div><div class=content>Unlike <a href=#envoy-passthrough-to-external-services>Envoy passthrough to external services</a>,
which uses the <code>ALLOW_ANY</code> traffic policy to instruct the Istio sidecar proxy to
passthrough calls to unknown services,
this approach completely bypasses the sidecar, essentially disabling all of Istio&rsquo;s features
for the specified IPs. You cannot incrementally add service entries for specific
destinations, as you can with the <code>ALLOW_ANY</code> approach.
Therefore, this configuration approach is only recommended as a last resort
when, for performance or other reasons, external access cannot be configured using the sidecar.</div></aside></div><p>A simple way to exclude all external IPs from being redirected to the sidecar proxy is
to set the <code>global.proxy.includeIPRanges</code> configuration option to the IP range or ranges
used for internal cluster services.
These IP range values depend on the platform where your cluster runs.</p><h3 id=determine-the-internal-ip-ranges-for-your-platform>Determine the internal IP ranges for your platform</h3><p>Set the value of <code>global.proxy.includeIPRanges</code> according to your cluster provider.</p><h4 id=ibm-cloud-private>IBM Cloud Private</h4><ol><li><p>Get your <code>service_cluster_ip_range</code> from IBM Cloud Private configuration file under <code>cluster/config.yaml</code>:</p><pre><code class=language-bash data-expandlinks=true>$ cat cluster/config.yaml | grep service_cluster_ip_range
</code></pre><p>The following is a sample output:</p><pre><code class=language-plain data-expandlinks=true>service_cluster_ip_range: 10.0.0.1/24
</code></pre></li><li><p>Use <code>--set global.proxy.includeIPRanges=&quot;10.0.0.1/24&quot;</code></p></li></ol><h4 id=ibm-cloud-kubernetes-service>IBM Cloud Kubernetes Service</h4><p>Use <code>--set global.proxy.includeIPRanges=&quot;172.30.0.0/16\,172.21.0.0/16\,10.10.10.0/24&quot;</code></p><h4 id=google-container-engine-gke>Google Container Engine (GKE)</h4><p>The ranges are not fixed, so you will need to run the <code>gcloud container clusters describe</code> command to determine the
ranges to use. For example:</p><pre><code class=language-bash data-expandlinks=true>$ gcloud container clusters describe XXXXXXX --zone=XXXXXX | grep -e clusterIpv4Cidr -e servicesIpv4Cidr
clusterIpv4Cidr: 10.4.0.0/14
servicesIpv4Cidr: 10.7.240.0/20
</code></pre><p>Use <code>--set global.proxy.includeIPRanges=&quot;10.4.0.0/14\,10.7.240.0/20&quot;</code></p><h4 id=azure-container-service-acs>Azure Container Service(ACS)</h4><p>Use <code>--set global.proxy.includeIPRanges=&quot;10.244.0.0/16\,10.240.0.0/16</code></p><h4 id=minikube-docker-for-desktop-bare-metal>Minikube, Docker For Desktop, Bare Metal</h4><p>The default value is <code>10.96.0.0/12</code>, but it&rsquo;s not fixed. Use the following command to determine your actual value:</p><pre><code class=language-bash data-expandlinks=true>$ kubectl describe pod kube-apiserver -n kube-system | grep &#39;service-cluster-ip-range&#39;
--service-cluster-ip-range=10.96.0.0/12
</code></pre><p>Use <code>--set global.proxy.includeIPRanges=&quot;10.96.0.0/12&quot;</code></p><h3 id=configuring-the-proxy-bypass>Configuring the proxy bypass</h3><div><aside class="callout warning"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-warning"/></svg></div><div class=content>Remove the service entry and virtual service previously deployed in this guide.</div></aside></div><p>Update your <code>istio-sidecar-injector</code> configuration map using the IP ranges specific to your platform.
For example, if the range is 10.0.0.1&#47;24, use the following command:</p><pre><code class=language-bash data-expandlinks=true>$ helm template install/kubernetes/helm/istio &lt;the flags you used to install Istio&gt; --set global.proxy.includeIPRanges=&#34;10.0.0.1/24&#34; -x templates/sidecar-injector-configmap.yaml | kubectl apply -f -
</code></pre><p>Use the same Helm command that you used to <a href=/v1.2/docs/setup/kubernetes/install/helm>install Istio</a>,
specifically, ensure you use the same value for the <code>--namespace</code> flag and
add these flags: <code>--set global.proxy.includeIPRanges=&quot;10.0.0.1/24&quot; -x templates/sidecar-injector-configmap.yaml</code>.</p><h3 id=access-the-external-services>Access the external services</h3><p>Because the bypass configuration only affects new deployments, you need to redeploy the <code>sleep</code>
application as described in the <a href=#before-you-begin>Before you begin</a> section.</p><p>After updating the <code>istio-sidecar-injector</code> configmap and redeploying the <code>sleep</code> application,
the Istio sidecar will only intercept and manage internal requests
within the cluster. Any external request bypasses the sidecar and goes straight to its intended destination.
For example:</p><pre><code class=language-bash data-expandlinks=true>$ export SOURCE_POD=$(kubectl get pod -l app=sleep -o jsonpath={.items..metadata.name})
$ kubectl exec -it $SOURCE_POD -c sleep curl http://httpbin.org/headers
{
&#34;headers&#34;: {
&#34;Accept&#34;: &#34;*/*&#34;,
&#34;Connection&#34;: &#34;close&#34;,
&#34;Host&#34;: &#34;httpbin.org&#34;,
&#34;User-Agent&#34;: &#34;curl/7.60.0&#34;
}
}
</code></pre><p>Unlike accessing external services through HTTP or HTTPS, you don&rsquo;t see any headers related to the Istio sidecar and the
requests sent to external services appear neither in the log of the sidecar nor in the Mixer log.
Bypassing the Istio sidecars means you can no longer monitor the access to external services.</p><h3 id=cleanup-the-direct-access-to-external-services>Cleanup the direct access to external services</h3><p>Update the <code>istio-sidecar-injector.configmap.yaml</code> configuration map to redirect all outbound traffic to the sidecar
proxies:</p><pre><code class=language-bash data-expandlinks=true>$ helm template install/kubernetes/helm/istio &lt;the flags you used to install Istio&gt; -x templates/sidecar-injector-configmap.yaml | kubectl apply -f -
</code></pre><h2 id=understanding-what-happened>Understanding what happened</h2><p>In this task you looked at three ways to call external services from an Istio mesh:</p><ol><li><p>Configuring Envoy to allow access to any external service.</p></li><li><p>Use a service entry to register an accessible external service inside the mesh. This is the
recommended approach.</p></li><li><p>Configuring the Istio sidecar to exclude external IPs from its remapped IP table.</p></li></ol><p>The first approach directs traffic through the Istio sidecar proxy, including calls to services
that are unknown inside the mesh. When using this approach,
you can&rsquo;t monitor access to external services or take advantage of Istio&rsquo;s traffic control features for them.
To easily switch to the second approach for specific services, simply create service entries for those external services.
This process allows you to initially access any external service and then later
decide whether or not to control access, enable traffic monitoring, and use traffic control features as needed.</p><p>The second approach lets you use all of the same Istio service mesh features for calls to services inside or
outside of the cluster. In this task, you learned how to monitor access to external services and set a timeout
rule for calls to an external service.</p><p>The third approach bypasses the Istio sidecar proxy, giving your services direct access to any external server.
However, configuring the proxy this way does require cluster-provider specific knowledge and configuration.
Similar to the first approach, you also lose monitoring of access to external services and you can&rsquo;t apply
Istio features on traffic to external services.</p><h2 id=security-note>Security note</h2><div><aside class="callout warning"><div class=type><svg class="large-icon"><use xlink:href="/v1.2/img/icons.svg#callout-warning"/></svg></div><div class=content>Note that configuration examples in this task <strong>do not enable secure egress traffic control</strong> in Istio.
A malicious application can bypass the Istio sidecar proxy and access any external service without Istio control.</div></aside></div><p>To implement egress traffic control in a more secure way, you must
<a href=/v1.2/docs/tasks/traffic-management/egress/egress-gateway/>direct egress traffic through an egress gateway</a>
and review the security concerns described in the
<a href=/v1.2/docs/tasks/traffic-management/egress/egress-gateway/#additional-security-considerations>additional security considerations</a>
section.</p><h2 id=cleanup>Cleanup</h2><p>Shutdown the <a href=https://github.com/istio/istio/tree/release-1.2/samples/sleep>sleep</a> service:</p><div><a data-skipendnotes=true style=display:none href=https://raw.githubusercontent.com/istio/istio/release-1.2/samples/sleep/sleep.yaml>Zip</a><pre><code class=language-bash data-expandlinks=true>$ kubectl delete -f @samples/sleep/sleep.yaml@
</code></pre></div><nav id=see-also><h2>See also</h2><div class=see-also><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2019/egress-traffic-control-in-istio-part-3/>Secure Control of Egress Traffic in Istio, part 3</a></p><p class=desc>Comparison of alternative solutions to control egress traffic including performance considerations.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2019/egress-traffic-control-in-istio-part-2/>Secure Control of Egress Traffic in Istio, part 2</a></p><p class=desc>Use Istio Egress Traffic Control to prevent attacks involving egress traffic.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2019/egress-traffic-control-in-istio-part-1/>Secure Control of Egress Traffic in Istio, part 1</a></p><p class=desc>Attacks involving egress traffic and requirements for egress traffic control.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2019/egress-performance/>Egress Gateway Performance Investigation</a></p><p class=desc>Verifies the performance impact of adding an egress gateway.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2018/egress-mongo/>Consuming External MongoDB Services</a></p><p class=desc>Describes a simple scenario based on Istio&#39;s Bookinfo example.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.2/blog/2018/egress-monitoring-access-control/>Monitoring and Access Policies for HTTP Egress Traffic</a></p><p class=desc>Describes how to configure Istio for monitoring and access policies of HTTP egress traffic.</p></div></div></nav></article><nav class=pagenav><div class=left></div><div class=right><a title="Describes how to configure Istio to perform TLS origination for traffic to external services." href=/v1.2/docs/tasks/traffic-management/egress/egress-tls-origination/>Egress TLS Origination<svg class="icon"><use xlink:href="/v1.2/img/icons.svg#right-arrow"/></svg></a></div></nav><div id=endnotes-container aria-hidden=true><h2>Links</h2><ol id=endnotes></ol></div></div><div class=toc-container><nav class=toc aria-label="Table of Contents"><div id=toc><ol><li role=none aria-label="Before you begin"><a href=#before-you-begin>Before you begin</a><li role=none aria-label="Envoy passthrough to external services"><a href=#envoy-passthrough-to-external-services>Envoy passthrough to external services</a><li role=none aria-label="Controlled access to external services"><a href=#controlled-access-to-external-services>Controlled access to external services</a><ol><li role=none aria-label="Change to the blocking-by-default policy"><a href=#change-to-the-blocking-by-default-policy>Change to the blocking-by-default policy</a><li role=none aria-label="Access an external HTTP service"><a href=#access-an-external-http-service>Access an external HTTP service</a><li role=none aria-label="Access an external HTTPS service"><a href=#access-an-external-https-service>Access an external HTTPS service</a><li role=none aria-label="Manage traffic to external services"><a href=#manage-traffic-to-external-services>Manage traffic to external services</a><li role=none aria-label="Cleanup the controlled access to external services"><a href=#cleanup-the-controlled-access-to-external-services>Cleanup the controlled access to external services</a></ol></li><li role=none aria-label="Direct access to external services"><a href=#direct-access-to-external-services>Direct access to external services</a><ol><li role=none aria-label="Determine the internal IP ranges for your platform"><a href=#determine-the-internal-ip-ranges-for-your-platform>Determine the internal IP ranges for your platform</a><ol><li role=none aria-label="IBM Cloud Private"><a href=#ibm-cloud-private>IBM Cloud Private</a><li role=none aria-label="IBM Cloud Kubernetes Service"><a href=#ibm-cloud-kubernetes-service>IBM Cloud Kubernetes Service</a><li role=none aria-label="Google Container Engine (GKE)"><a href=#google-container-engine-gke>Google Container Engine (GKE)</a><li role=none aria-label="Azure Container Service(ACS)"><a href=#azure-container-service-acs>Azure Container Service(ACS)</a><li role=none aria-label="Minikube, Docker For Desktop, Bare Metal"><a href=#minikube-docker-for-desktop-bare-metal>Minikube, Docker For Desktop, Bare Metal</a></ol></li><li role=none aria-label="Configuring the proxy bypass"><a href=#configuring-the-proxy-bypass>Configuring the proxy bypass</a><li role=none aria-label="Access the external services"><a href=#access-the-external-services>Access the external services</a><li role=none aria-label="Cleanup the direct access to external services"><a href=#cleanup-the-direct-access-to-external-services>Cleanup the direct access to external services</a></ol></li><li role=none aria-label="Understanding what happened"><a href=#understanding-what-happened>Understanding what happened</a><li role=none aria-label="Security note"><a href=#security-note>Security note</a><li role=none aria-label=Cleanup><a href=#cleanup>Cleanup</a><li role=none aria-label="See also"><a href=#see-also>See also</a></li></ol></div></nav></div></main><footer><div class=user-links><a class=channel title="Go download Istio 1.2.5 now" href=https://github.com/istio/istio/releases/tag/1.2.5 aria-label="Download Istio"><span>download</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#download"/></svg>
</a><a class=channel title="Join the Istio discussion board to participate in discussions and get help troubleshooting problems" href=https://discuss.istio.io aria-label="Istio discussion board"><span>discuss</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#discourse"/></svg></a>
<a class=channel title="Stack Overflow is where you can ask questions and find curated answers on deploying, configuring, and using Istio" href=https://stackoverflow.com/questions/tagged/istio aria-label="Stack Overflow"><span>stack overflow</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#stackoverflow"/></svg></a>
<a class=channel title="Interactively discuss issues with the Istio community on Slack" href=https://istio.slack.com aria-label=slack><span>slack</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#slack"/></svg></a>
<a class=channel title="Follow us on Twitter to get the latest news" href=https://twitter.com/IstioMesh aria-label=Twitter><span>twitter</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#twitter"/></svg></a><div class=tag>for everyone</div></div><div class=info><p class=copyright>Istio Archive
1.2.5<br>&copy; 2019 Istio Authors, <a href=https://policies.google.com/privacy>Privacy Policy</a><br>Archived on September 12, 2019</p></div><div class=dev-links><a class=channel title="GitHub is where development takes place on Istio code" href=https://github.com/istio/community aria-label=GitHub><span>github</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#github"/></svg></a>
<a class=channel title="Access our team drive if you'd like to take a look at the Istio technical design documents" href=https://groups.google.com/forum/#!forum/istio-team-drive-access aria-label="team drive"><span>drive</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#drive"/></svg></a>
<a class=channel title="If you'd like to contribute to the Istio project, consider participating in our working groups" href=https://github.com/istio/community/blob/master/WORKING-GROUPS.md aria-label="working groups"><span>working groups</span><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#working-groups"/></svg></a><div class=tag>for developers</div></div></footer><div id=scroll-to-top-container aria-hidden=true><button id=scroll-to-top title="Back to top"><svg class="icon"><use xlink:href="/v1.2/img/icons.svg#top"/></svg></button></div></body></html>