You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/concepts/what-is-istio.md
+14-14Lines changed: 14 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -34,22 +34,22 @@ issues.
34
34
-**Policy Enforcement**. Apply organizational policy to the interaction between services, ensure access policies are enforced and resources are fairly
35
35
distributed among consumers. Policy changes are made by configuring the mesh, not by changing application code.
36
36
37
-
-**Service Identity and Security**. Provide services in the mesh with a verifiable identity [link]and provide the ability to protect[link] service traffic
37
+
-**Service Identity and Security**. Provide services in the mesh with a verifiable identity and provide the ability to protect service traffic
38
38
as it flows over networks of varying degrees of trustability.
39
39
40
40
In addition to these behaviors, Istio is designed for extensibility to meet diverse deployment needs:
41
41
42
42
-**Platform Support**. Istio is designed to run in a variety of environments including ones that span Cloud, on-premise, Kubernetes, Mesos etc. We’re
43
43
initially focused on Kubernetes but are working to support other environments soon.
44
44
45
-
-**Integration and Customization**. The policy enforcement component can be extended [link]and customized[link] to integrate with existing solutions for
45
+
-**Integration and Customization**. The policy enforcement component can be extended and customized to integrate with existing solutions for
46
46
ACLs, logging, monitoring, quotas, auditing and more.
47
47
48
48
These capabilities greatly decrease the coupling between application code, the underlying platform and policy. This decreased coupling not only makes
49
49
services easier to implement but also makes it simpler for operators to move application deployments between environments or to new policy schemes.
50
50
Applications become inherently more portable as a result.
51
51
52
-
Istio’s service mesh is logically split into a *data plane* and a *control plane*. The data plane is composed of a set of intelligent (http|grpc|tcp|udp)
52
+
Istio’s service mesh is logically split into a *data plane* and a *control plane*. The data plane is composed of a set of intelligent (HTTP, HTTP/2, gRPC, TCP or UDP)
53
53
proxies deployed as sidecars that mediate and control all network communication between microservices. The control plane is responsible for managing and
54
54
configuring proxies to route traffic, as well as enforce policies at runtime.
55
55
@@ -69,7 +69,7 @@ functionality being provided. Components and APIs must all be designed with perf
69
69
70
70
-**Incrementality**.
71
71
As operators and developers become more dependent on the functionality that Istio provides, the system must grow with their needs. While we expect to
72
-
continue adding new features ourselves, we expect the greatest need will be the ability to extend the policy system, to integrate with other sources of policy and control and to propagate signals about mesh behavior to other systems for analysis. The policy runtime supports a standard extension mechanism for plugging in other services. In addition it allows for the extension of its vocabulary [[link]]to allow policies to be enforced based on new signals that the mesh produces.
72
+
continue adding new features ourselves, we expect the greatest need will be the ability to extend the policy system, to integrate with other sources of policy and control and to propagate signals about mesh behavior to other systems for analysis. The policy runtime supports a standard extension mechanism for plugging in other services. In addition it allows for the extension of its vocabulary to allow policies to be enforced based on new signals that the mesh produces.
73
73
74
74
-**Portability**.
75
75
The ecosystem in which Istio will be used varies along many dimensions. Istio must run on any cloud or on-prem environment with minimal effort. The task of
@@ -80,11 +80,11 @@ environments (on multiple clouds for redundancy for example) using Istio.
80
80
The application of policy to API calls between services provides a great deal of control over mesh behavior but it can be equally important to apply
81
81
policies to resources which are not necessarily expressed at the API level. For example applying quota to the amount of CPU consumed by an ML training task
82
82
is more useful than applying quota to the call which initiated the work. To this end the policy system is maintained as a distinct service with its own API
83
-
rather than being baked into the proxy, allowing services to directly integrate with it as needed.
83
+
rather than being baked into the proxy/sidecar, allowing services to directly integrate with it as needed.
84
84
85
85
## High-level architecture
86
86
87
-
<imgsrc="./arch.svg"alt="The overall architecture of an Istio-based service." />
87
+
<imgsrc="./arch.svg"alt="The overall architecture of an Istio-based application." />
88
88
89
89
### The sidecar model
90
90
@@ -122,19 +122,19 @@ enable policy enforcement and to report telemetry.
122
122
Mixer is responsible for enforcing access control and usage policies across the service mesh and collects telemetry data from the Envoy proxy and other
123
123
services. The proxy extracts request level attributes which are sent to Mixer for evaluation. More information on the attribute extraction and policy
124
124
evaluation can be found here. Mixer includes a flexible plugin model enabling it to interface with a variety of host environments and backends, abstracting
125
-
the proxy and Istio-managed services from these details.
125
+
the Envoy proxy and Istio-managed services from these details.
126
126
127
-
### IstioManager
127
+
### Istio-Manager
128
128
129
-
The Manager serves as an interface between the user and Istio, collecting and validating configuration and propagating it to the various Istio components.
130
-
It abstracts environment-specific implementation details from the Mixer and Proxy, providing them with an abstract representation of the user’s services
129
+
Istio-Manager serves as an interface between the user and Istio, collecting and validating configuration and propagating it to the various Istio components.
130
+
It abstracts environment-specific implementation details from the Mixer and Envoy, providing them with an abstract representation of the user’s services
131
131
that is independent of the underlying platform. In addition, traffic management rules (i.e. generic layer-4 rules and layer-7 HTTP/gRPC routing rules) can
132
-
be programmed at runtime via the IstioManager.
132
+
be programmed at runtime via Istio-Manager.
133
133
134
-
### IstioAuth
134
+
### Istio-Auth
135
135
136
-
Istio supports strong service-to-service and end-user authentication using mutual TLS, with built-in identity and credential management.
137
-
Istio Auth can be used to upgrade unencrypted traffic in the service mesh, and provides operators the ability to enforce policy based
136
+
Istio-Auth provides strong service-to-service and end-user authentication using mutual TLS, with built-in identity and credential management.
137
+
It can be used to upgrade unencrypted traffic in the service mesh, and provides operators the ability to enforce policy based
138
138
on service identity rather than network controls. Future releases of Istio will add fine-grained access control and auditing to control
139
139
and monitor who accesses your service, API, or resource, using a variety of access control mechanisms, including attribute and
140
140
role-based access control as well as authorization hooks.
0 commit comments