Gateway

    For example, the following Gateway configuration sets up a proxy to act as a load balancer exposing port 80 and 9080 (http), 443 (https), 9443(https) and port 2379 (TCP) for ingress. The gateway will be applied to the proxy running on a pod with labels app: my-gateway-controller. While Istio will configure the proxy to listen on these ports, it is the responsibility of the user to ensure that external traffic to these ports are allowed into the mesh.

    1. apiVersion: networking.istio.io/v1beta1
    2. kind: Gateway
    3. metadata:
    4. name: my-gateway
    5. namespace: some-config-namespace
    6. spec:
    7. selector:
    8. app: my-gateway-controller
    9. servers:
    10. - port:
    11. number: 80
    12. name: http
    13. protocol: HTTP
    14. hosts:
    15. - uk.bookinfo.com
    16. - eu.bookinfo.com
    17. tls:
    18. httpsRedirect: true # sends 301 redirect for http requests
    19. - port:
    20. number: 443
    21. name: https-443
    22. protocol: HTTPS
    23. hosts:
    24. - uk.bookinfo.com
    25. - eu.bookinfo.com
    26. tls:
    27. mode: SIMPLE # enables HTTPS on this port
    28. serverCertificate: /etc/certs/servercert.pem
    29. privateKey: /etc/certs/privatekey.pem
    30. - port:
    31. number: 9443
    32. name: https-9443
    33. protocol: HTTPS
    34. hosts:
    35. - "bookinfo-namespace/*.bookinfo.com"
    36. tls:
    37. mode: SIMPLE # enables HTTPS on this port
    38. credentialName: bookinfo-secret # fetches certs from Kubernetes secret
    39. - port:
    40. number: 9080
    41. name: http-wildcard
    42. protocol: HTTP
    43. hosts:
    44. - "*"
    45. - port:
    46. number: 2379 # to expose internal service via external port 2379
    47. name: mongo
    48. protocol: MONGO
    49. hosts:
    50. - "*"

    The Gateway specification above describes the L4-L6 properties of a load balancer. A VirtualService can then be bound to a gateway to control the forwarding of traffic arriving at a particular host or gateway port.

    For example, the following VirtualService splits traffic for https://uk.bookinfo.com/reviews, https://eu.bookinfo.com/reviews, http://uk.bookinfo.com:9080/reviews, http://eu.bookinfo.com:9080/reviews into two versions (prod and qa) of an internal reviews service on port 9080. In addition, requests containing the cookie “user: dev-123” will be sent to special port 7777 in the qa version. The same rule is also applicable inside the mesh for requests to the “reviews.prod.svc.cluster.local” service. This rule is applicable across ports 443, 9080. Note that http://uk.bookinfo.com gets redirected to https://uk.bookinfo.com (i.e. 80 redirects to 443).

    1. apiVersion: networking.istio.io/v1alpha3
    2. kind: VirtualService
    3. metadata:
    4. name: bookinfo-rule
    5. namespace: bookinfo-namespace
    6. spec:
    7. hosts:
    8. - reviews.prod.svc.cluster.local
    9. - uk.bookinfo.com
    10. - eu.bookinfo.com
    11. gateways:
    12. - some-config-namespace/my-gateway
    13. - mesh # applies to all the sidecars in the mesh
    14. http:
    15. - match:
    16. - headers:
    17. cookie:
    18. exact: "user=dev-123"
    19. route:
    20. - destination:
    21. port:
    22. host: reviews.qa.svc.cluster.local
    23. - match:
    24. - uri:
    25. prefix: /reviews/
    26. route:
    27. - destination:
    28. port:
    29. number: 9080 # can be omitted if it's the only port for reviews
    30. host: reviews.prod.svc.cluster.local
    31. weight: 80
    32. - destination:
    33. host: reviews.qa.svc.cluster.local
    34. weight: 20
    1. apiVersion: networking.istio.io/v1beta1
    2. kind: VirtualService
    3. metadata:
    4. name: bookinfo-rule
    5. namespace: bookinfo-namespace
    6. spec:
    7. hosts:
    8. - reviews.prod.svc.cluster.local
    9. - uk.bookinfo.com
    10. - eu.bookinfo.com
    11. gateways:
    12. - some-config-namespace/my-gateway
    13. - mesh # applies to all the sidecars in the mesh
    14. http:
    15. - match:
    16. - headers:
    17. cookie:
    18. exact: "user=dev-123"
    19. route:
    20. - destination:
    21. number: 7777
    22. host: reviews.qa.svc.cluster.local
    23. - match:
    24. - uri:
    25. prefix: /reviews/
    26. route:
    27. - destination:
    28. port:
    29. number: 9080 # can be omitted if it's the only port for reviews
    30. host: reviews.prod.svc.cluster.local
    31. weight: 80
    32. - destination:
    33. host: reviews.qa.svc.cluster.local
    34. weight: 20

    The following VirtualService forwards traffic arriving at (external) port 27017 to internal Mongo server on port 5555. This rule is not applicable internally in the mesh as the gateway list omits the reserved name mesh.

    1. apiVersion: networking.istio.io/v1beta1
    2. kind: VirtualService
    3. metadata:
    4. name: bookinfo-mongo
    5. namespace: bookinfo-namespace
    6. spec:
    7. hosts:
    8. - mongosvr.prod.svc.cluster.local # name of internal Mongo service
    9. gateways:
    10. - some-config-namespace/my-gateway # can omit the namespace if gateway is in same namespace as virtual service.
    11. tcp:
    12. - match:
    13. - port: 27017
    14. route:
    15. - destination:
    16. host: mongo.prod.svc.cluster.local
    17. port:
    18. number: 5555

    It is possible to restrict the set of virtual services that can bind to a gateway server using the namespace/hostname syntax in the hosts field. For example, the following Gateway allows any virtual service in the ns1 namespace to bind to it, while restricting only the virtual service with foo.bar.com host in the ns2 namespace to bind to it.

    1. apiVersion: networking.istio.io/v1alpha3
    2. kind: Gateway
    3. metadata:
    4. name: my-gateway
    5. namespace: some-config-namespace
    6. spec:
    7. selector:
    8. app: my-gateway-controller
    9. servers:
    10. - port:
    11. number: 80
    12. protocol: HTTP
    13. hosts:
    14. - "ns1/*"
    15. - "ns2/foo.bar.com"
    1. apiVersion: networking.istio.io/v1beta1
    2. kind: Gateway
    3. metadata:
    4. name: my-gateway
    5. namespace: some-config-namespace
    6. spec:
    7. selector:
    8. app: my-gateway-controller
    9. servers:
    10. - port:
    11. number: 80
    12. name: http
    13. protocol: HTTP
    14. hosts:
    15. - "ns1/*"
    16. - "ns2/foo.bar.com"

    Gateway describes a load balancer operating at the edge of the mesh receiving incoming or outgoing HTTP/TCP connections.

    Server

    Server describes the properties of the proxy on a given load balancer port. For example,

    1. apiVersion: networking.istio.io/v1beta1
    2. kind: Gateway
    3. metadata:
    4. name: my-ingress
    5. spec:
    6. selector:
    7. app: my-ingressgateway
    8. servers:
    9. - port:
    10. number: 80
    11. name: http2
    12. protocol: HTTP2
    13. hosts:
    14. - "*"

    Another example

    1. apiVersion: networking.istio.io/v1alpha3
    2. kind: Gateway
    3. metadata:
    4. name: my-tcp-ingress
    5. spec:
    6. selector:
    7. app: my-tcp-ingressgateway
    8. servers:
    9. - port:
    10. number: 27018
    11. name: mongo
    12. protocol: MONGO
    13. hosts:
    14. - "*"
    1. apiVersion: networking.istio.io/v1beta1
    2. kind: Gateway
    3. metadata:
    4. name: my-tcp-ingress
    5. spec:
    6. selector:
    7. app: my-tcp-ingressgateway
    8. servers:
    9. - port:
    10. number: 27018
    11. name: mongo
    12. protocol: MONGO
    13. hosts:
    14. - "*"

    The following is an example of TLS configuration for port 443

    1. kind: Gateway
    2. metadata:
    3. name: my-tls-ingress
    4. spec:
    5. selector:
    6. app: my-tls-ingressgateway
    7. servers:
    8. - port:
    9. number: 443
    10. name: https
    11. protocol: HTTPS
    12. hosts:
    13. - "*"
    14. tls:
    15. credentialName: tls-cert
    FieldTypeDescriptionRequired
    port

    The Port on which the proxy should listen for incoming connections.

    Yes
    bindstring

    The ip or the Unix domain socket to which the listener should be bound to. Format: x.x.x.x or unix:///path/to/uds or unix://@foobar (Linux abstract namespace). When using Unix domain sockets, the port number should be 0. This can be used to restrict the reachability of this server to be gateway internal only. This is typically used when a gateway needs to communicate to another mesh service e.g. publishing metrics. In such case, the server created with the specified bind will not be available to external gateway clients.

    No
    hostsstring[]

    One or more hosts exposed by this gateway. While typically applicable to HTTP services, it can also be used for TCP services using TLS with SNI. A host is specified as a dnsName with an optional namespace/ prefix. The dnsName should be specified using FQDN format, optionally including a wildcard character in the left-most component (e.g., prod/.example.com). Set the dnsName to to select all VirtualService hosts from the specified namespace (e.g.,prod/).

    The namespace can be set to or ., representing any or the current namespace, respectively. For example, /foo.example.com selects the service from any available namespace while ./foo.example.com only selects the service from the namespace of the sidecar. The default, if no namespace/ is specified, is /, that is, select services from any namespace. Any associated DestinationRule in the selected namespace will also be used.

    NOTE: Only virtual services exported to the gateway’s namespace (e.g., exportTo value of ) can be referenced. Private configurations (e.g., exportTo set to .) will not be available. Refer to the exportTo setting in VirtualService, DestinationRule, and ServiceEntry configurations for details.

    Yes
    tlsServerTLSSettings

    Set of TLS related options that govern the server’s behavior. Use these options to control if all http requests should be redirected to https, and the TLS modes to use.

    No
    namestring

    An optional name of the server, when set must be unique across all servers. This will be used for variety of purposes like prefixing stats generated with this name etc.

    No

    Port describes the properties of a specific port of a service.

    ServerTLSSettings

    FieldTypeDescriptionRequired
    httpsRedirectbool

    If set to true, the load balancer will send a 301 redirect for all http connections, asking the clients to use HTTPS.

    No
    modeTLSmode

    Optional: Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced.

    No
    serverCertificatestring

    REQUIRED if mode is SIMPLE or MUTUAL. The path to the file holding the server-side TLS certificate to use.

    No
    privateKeystring

    REQUIRED if mode is SIMPLE or MUTUAL. The path to the file holding the server’s private key.

    No
    caCertificatesstring

    REQUIRED if mode is MUTUAL. The path to a file containing certificate authority certificates to use in verifying a presented client side certificate.

    No
    credentialNamestring

    For gateways running on Kubernetes, the name of the secret that holds the TLS certs including the CA certificates. Applicable only on Kubernetes. The secret (of type generic) should contain the following keys and values: key: <privateKey> and cert: <serverCert>. For mutual TLS, cacert: <CACertificate> can be provided in the same secret or a separate secret named <secret>-cacert. Secret of type tls for server certificates along with ca.crt key for CA certificates is also supported. Only one of server certificates and CA certificate or credentialName can be specified.

    No
    subjectAltNamesstring[]

    A list of alternate names to verify the subject identity in the certificate presented by the client.

    No
    verifyCertificateSpkistring[]No
    verifyCertificateHashstring[]

    An optional list of hex-encoded SHA-256 hashes of the authorized client certificates. Both simple and colon separated formats are acceptable. Note: When both verify_certificate_hash and verify_certificate_spki are specified, a hash matching either value will result in the certificate being accepted.

    No
    minProtocolVersion

    Optional: Minimum TLS protocol version.

    No
    maxProtocolVersionTLSProtocol

    Optional: Maximum TLS protocol version.

    No
    cipherSuitesstring[]

    Optional: If specified, only support the specified cipher list. Otherwise default to the default cipher list supported by Envoy.

    No

    TLS modes enforced by the proxy

    ServerTLSSettings.TLSProtocol

    TLS protocol versions.

    NameDescription
    TLS_AUTO

    Automatically choose the optimal TLS version.

    TLSV1_0

    TLS version 1.0

    TLSV1_1

    TLS version 1.1

    TLS version 1.2

    TLSV1_3