7.2 KiB
title | overview | order | layout | type |
---|---|---|---|---|
Installing Istio | This task shows you how to setup the Istio service mesh. | 10 | docs | markdown |
{% include home.html %}
This page shows how to install and configure Istio in a Kubernetes cluster.
Prerequisites
-
The following instructions assume you have access to a Kubernetes cluster. To install Kubernetes locally, try minikube.
-
If you are using Google Container Engine, please make sure you are using static client certificates before fetching cluster credentials:
gcloud config set container/use_client_certificate True gcloud container clusters get-credentials <cluster-name> --zone <zone> --project <project-name>
-
Ensure the
curl
command is present.
Installing on an existing cluster
For the Alpha release, Istio must be installed in the same Kubernetes namespace as the applications. Instructions below will deploy Istio in the default namespace. They can be modified for deployment in a different namespace.
-
Download and extract the istio installation files, or clone Istio's GitHub repository:
git clone https://github.com/istio/istio
-
Change directory to install/kubernetes:
cd install/kubernetes
-
Determine if your cluster has RBAC enabled by running this command:
kubectl get clusterrole
If the message printed says 'the server doesn't have a resource type "clusterrole"', go to the next step. Otherwise, apply the RBAC configuration file:
kubectl apply -f istio-rbac.yaml
-
Install Istio's core components (Istio-Manager, Mixer, Ingress-Controller, and Istio CA if auth is enabled):
If you would like to disable Istio Auth:
kubectl apply -f istio.yaml
If you would like to enable Istio Auth (For more information, please see Istio Auth installation guide):
kubectl apply -f istio-auth.yaml
-
Source the Istio configuration file:
source ../../istio.VERSION
-
Download one of the
istioctl
client binaries corresponding to your OS:istioctl-osx
,istioctl-win.exe
,istioctl-linux
, targeted at Mac, Windows or Linux users respectively. For example, run the following commands on a Mac system:curl ${ISTIOCTL_URL}/istioctl-osx > /usr/local/bin/istioctl chmod +x /usr/local/bin/istioctl
istioctl
is needed to inject Envoy as a sidecar proxy. It also provides a convenient CLI for creating routing rules and policies. Note: If you already have a previously installed version ofistioctl
, make sure that it is compatible with the manager image used inistio.yaml
. If in doubt, download again or add the--tag
option when runningistioctl kube-inject
. Invokeistioctl kube-inject --help
for more details. -
Optional: to view metrics collected by Mixer, install Prometheus, Grafana or ServiceGraph addons:
kubectl apply -f addons/grafana.yaml kubectl apply -f addons/prometheus.yaml kubectl apply -f addons/servicegraph.yaml
The grafana addon provides a dashboard visualization of the metrics by Mixer to a Prometheus instance. Please install both the prometheus.yaml and grafana.yaml addons to configure the Istio dashboard for use.
The simplest way to access the Istio dashboard is to configure port-forwarding for the grafana service, as follows:
kubectl port-forward $(kubectl get pod -l app=grafana -o jsonpath='{.items[0].metadata.name}') 3000:3000
Then open a web browser to
http://localhost:3000/dashboard/db/istio-dashboard
.The dashboard at that location should look something like the following:
NOTE: In some deployment environments, it will be possible to access the dashboard directly (without the
kubectl port-forward
command). This is because the default addon configuration requests an external IP address for the grafana service.When applicable, the external IP address for the grafana service can be retrieved via:
kubectl get services grafana
With the EXTERNAL-IP returned from that command, the Istio dashboard can be reached at
http://<EXTERNAL-IP>:3000/dashboard/db/istio-dashboard
.
Verifying the installation
-
Ensure the following Kubernetes services were deployed: "istio-manager", "istio-mixer", and "istio-ingress".
kubectl get svc NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE istio-ingress 10.83.241.84 35.184.70.168 80:30583/TCP 39m istio-manager 10.83.251.26 <none> 8080/TCP 39m istio-mixer 10.83.242.1 <none> 9091/TCP,42422/TCP 39m
Note that if your cluster is running in an environment that does not support an external loadbalancer (e.g., minikube), the
EXTERNAL-IP
will say<pending>
and you will need to access the application using the service NodePort instead. -
Check the corresponding Kubernetes pods were deployed: "istio-manager-*", "istio-mixer-*", "istio-ingress-*" and "istio-ca-*" (if Istio Auth is enabled).
kubectl get pods NAME READY STATUS RESTARTS AGE istio-ingress-594763772-j7jbz 1/1 Running 0 49m istio-manager-373576132-p2t9k 1/1 Running 0 49m istio-mixer-1154414227-56q3z 1/1 Running 0 49m istio-ca-1726969296-9srv2 1/1 Running 0 49m
Deploy your application
You can now deploy your own application or one of the Istio sample applications, for example BookInfo. Note that the application should use HTTP/1.1 or HTTP/2.0 protocol for all its HTTP traffic.
When deploying the application, use kube-inject to automatically inject Envoy containers in the pods running the services:
kubectl create -f <(istioctl kube-inject -f <your-app-spec>.yaml)
Uninstalling
-
Change directory to install/kubernetes:
cd install/kubernetes
-
Uninstall Istio:
If Istio has auth disabled:
kubectl delete -f istio.yaml
If Istio has auth enabled:
kubectl delete -f istio-auth.yaml
-
If RBAC was installed, please uninstall it:
kubectl delete -f istio-rbac.yaml
-
Delete the istioctl client:
rm /usr/local/bin/istioctl
What's next
-
Learn more about how to enable authentication.
-
See the sample BookInfo application.