mirror of
https://github.com/rancher/rancher-docs.git
synced 2026-05-13 08:33:35 +00:00
Update Istio docs for Network Isolation
In clusters with namespace Network Isolation enabled, the default installation of Istio needs further tweaking for it to work
This commit is contained in:
committed by
GitHub
parent
d7db443233
commit
d6f9fdbbe2
@@ -22,6 +22,22 @@ Only a user with the following [Kubernetes default roles](https://kubernetes.io/
|
||||
|
||||
Automatic sidecar injection is disabled by default. To enable this, set the `sidecarInjectorWebhook.enableNamespacesByDefault=true` in the values.yaml on install or upgrade. This automatically enables Istio sidecar injection into all new namespaces that are deployed.
|
||||
|
||||
>**Note:** In clusters where:
|
||||
>
|
||||
> - The [Canal network plug-in]({{<baseurl>}}/rancher/v2.x/en/cluster-provisioning/rke-clusters/options/#canal) is in use.
|
||||
> - The Project Network Isolation option is enabled.
|
||||
> - You install the Istio Ingress module
|
||||
>
|
||||
>The Istio Ingress Gateway pod won't be able to redirect ingress traffic to the workloads by default. This is because all the namespaces will be innacessible from the namespace where Istio is installed. You have two options:
|
||||
> 1. You add a new Network Policy in each of the namespaces where you intend to have ingress controlled by Istio. Your policy should include the following lines:
|
||||
> ```
|
||||
> ...
|
||||
> - podSelector:
|
||||
> matchLabels:
|
||||
> app: istio-ingressgateway
|
||||
>```
|
||||
> 2. You move the `ingress-system` namespace to the `system` project, which by default is excluded from the network isolation
|
||||
|
||||
## Additonal Config Options
|
||||
|
||||
### Overlay File
|
||||
@@ -147,4 +163,4 @@ This enables monitoring accross namespaces by giving prometheus additional scrap
|
||||
- source_labels: [__meta_kubernetes_pod_name]
|
||||
action: replace
|
||||
target_label: pod_name
|
||||
```
|
||||
```
|
||||
|
||||
Reference in New Issue
Block a user