Skip to content

Commit 9164d6c

Browse files
authored
nits to What Is Istio (istio#41)
* nits * nits to nits
1 parent fc15fa1 commit 9164d6c

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

docs/concepts/what-is-istio.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -34,22 +34,22 @@ issues.
3434
- **Policy Enforcement**. Apply organizational policy to the interaction between services, ensure access policies are enforced and resources are fairly
3535
distributed among consumers. Policy changes are made by configuring the mesh, not by changing application code.
3636

37-
- **Service Identity and Security**. Provide services in the mesh with a verifiable identity [link] and provide the ability to protect [link] service traffic
37+
- **Service Identity and Security**. Provide services in the mesh with a verifiable identity and provide the ability to protect service traffic
3838
as it flows over networks of varying degrees of trustability.
3939

4040
In addition to these behaviors, Istio is designed for extensibility to meet diverse deployment needs:
4141

4242
- **Platform Support**. Istio is designed to run in a variety of environments including ones that span Cloud, on-premise, Kubernetes, Mesos etc. We’re
4343
initially focused on Kubernetes but are working to support other environments soon.
4444

45-
- **Integration and Customization**. The policy enforcement component can be extended [link] and customized [link] to integrate with existing solutions for
45+
- **Integration and Customization**. The policy enforcement component can be extended and customized to integrate with existing solutions for
4646
ACLs, logging, monitoring, quotas, auditing and more.
4747

4848
These capabilities greatly decrease the coupling between application code, the underlying platform and policy. This decreased coupling not only makes
4949
services easier to implement but also makes it simpler for operators to move application deployments between environments or to new policy schemes.
5050
Applications become inherently more portable as a result.
5151

52-
Istio’s service mesh is logically split into a *data plane* and a *control plane*. The data plane is composed of a set of intelligent (http|grpc|tcp|udp)
52+
Istio’s service mesh is logically split into a *data plane* and a *control plane*. The data plane is composed of a set of intelligent (HTTP, HTTP/2, gRPC, TCP or UDP)
5353
proxies deployed as sidecars that mediate and control all network communication between microservices. The control plane is responsible for managing and
5454
configuring proxies to route traffic, as well as enforce policies at runtime.
5555

@@ -69,7 +69,7 @@ functionality being provided. Components and APIs must all be designed with perf
6969

7070
- **Incrementality**.
7171
As operators and developers become more dependent on the functionality that Istio provides, the system must grow with their needs. While we expect to
72-
continue adding new features ourselves, we expect the greatest need will be the ability to extend the policy system, to integrate with other sources of policy and control and to propagate signals about mesh behavior to other systems for analysis. The policy runtime supports a standard extension mechanism for plugging in other services. In addition it allows for the extension of its vocabulary [[link]] to allow policies to be enforced based on new signals that the mesh produces.
72+
continue adding new features ourselves, we expect the greatest need will be the ability to extend the policy system, to integrate with other sources of policy and control and to propagate signals about mesh behavior to other systems for analysis. The policy runtime supports a standard extension mechanism for plugging in other services. In addition it allows for the extension of its vocabulary to allow policies to be enforced based on new signals that the mesh produces.
7373

7474
- **Portability**.
7575
The ecosystem in which Istio will be used varies along many dimensions. Istio must run on any cloud or on-prem environment with minimal effort. The task of
@@ -80,11 +80,11 @@ environments (on multiple clouds for redundancy for example) using Istio.
8080
The application of policy to API calls between services provides a great deal of control over mesh behavior but it can be equally important to apply
8181
policies to resources which are not necessarily expressed at the API level. For example applying quota to the amount of CPU consumed by an ML training task
8282
is more useful than applying quota to the call which initiated the work. To this end the policy system is maintained as a distinct service with its own API
83-
rather than being baked into the proxy, allowing services to directly integrate with it as needed.
83+
rather than being baked into the proxy/sidecar, allowing services to directly integrate with it as needed.
8484

8585
## High-level architecture
8686

87-
<img src="./arch.svg" alt="The overall architecture of an Istio-based service." />
87+
<img src="./arch.svg" alt="The overall architecture of an Istio-based application." />
8888

8989
### The sidecar model
9090

@@ -122,19 +122,19 @@ enable policy enforcement and to report telemetry.
122122
Mixer is responsible for enforcing access control and usage policies across the service mesh and collects telemetry data from the Envoy proxy and other
123123
services. The proxy extracts request level attributes which are sent to Mixer for evaluation. More information on the attribute extraction and policy
124124
evaluation can be found here. Mixer includes a flexible plugin model enabling it to interface with a variety of host environments and backends, abstracting
125-
the proxy and Istio-managed services from these details.
125+
the Envoy proxy and Istio-managed services from these details.
126126

127-
### Istio Manager
127+
### Istio-Manager
128128

129-
The Manager serves as an interface between the user and Istio, collecting and validating configuration and propagating it to the various Istio components.
130-
It abstracts environment-specific implementation details from the Mixer and Proxy, providing them with an abstract representation of the user’s services
129+
Istio-Manager serves as an interface between the user and Istio, collecting and validating configuration and propagating it to the various Istio components.
130+
It abstracts environment-specific implementation details from the Mixer and Envoy, providing them with an abstract representation of the user’s services
131131
that is independent of the underlying platform. In addition, traffic management rules (i.e. generic layer-4 rules and layer-7 HTTP/gRPC routing rules) can
132-
be programmed at runtime via the Istio Manager.
132+
be programmed at runtime via Istio-Manager.
133133

134-
### Istio Auth
134+
### Istio-Auth
135135

136-
Istio supports strong service-to-service and end-user authentication using mutual TLS, with built-in identity and credential management.
137-
Istio Auth can be used to upgrade unencrypted traffic in the service mesh, and provides operators the ability to enforce policy based
136+
Istio-Auth provides strong service-to-service and end-user authentication using mutual TLS, with built-in identity and credential management.
137+
It can be used to upgrade unencrypted traffic in the service mesh, and provides operators the ability to enforce policy based
138138
on service identity rather than network controls. Future releases of Istio will add fine-grained access control and auditing to control
139139
and monitor who accesses your service, API, or resource, using a variety of access control mechanisms, including attribute and
140140
role-based access control as well as authorization hooks.

0 commit comments

Comments
 (0)