Dataplane
-
Networking describes inbound and outbound interfaces of the data plane proxy.
address
(required)IP on which the data plane proxy is accessible to the control plane and other data plane proxies in the same network. This can also be a hostname, in which case the control plane will periodically resolve it.
advertisedAddress
(optional)In some situations, a data plane proxy resides in a private network (e.g. Docker) and is not reachable via
address
to other data plane proxies.advertisedAddress
is configured with a routable address for such data plane proxy so that other proxies in the mesh can connect to it overadvertisedAddress
and not via address.Envoy still binds to the
address
, notadvertisedAddress
.gateway
(optional)Gateway describes a configuration of the gateway of the data plane proxy.
tags
(required)Tags associated with a gateway of this data plane to, e.g.
kuma.io/service=gateway
,env=prod
.kuma.io/service
tag is mandatory.type
(required, enum)Type of gateway this data plane proxy manages. There are two types:
DELEGATED
andBUILTIN
. Defaults toDELEGATED
.A
DELEGATED
gateway is an independently deployed proxy (e.g., Kong, Contour, etc) that receives inbound traffic that is not proxied by Kuma, and it sends outbound traffic into the data plane proxy.The
BUILTIN
gateway type causes the data plane proxy itself to be configured as a gateway.See https://kuma.io/docs/latest/explore/gateway/ for more information.
DELEGATED
BUILTIN
inbound
(optional, repeated)Inbound describes a list of inbound interfaces of the data plane proxy.
Inbound describes a service implemented by the data plane proxy. All incoming traffic to a data plane proxy is going through inbound listeners. For every defined Inbound there is a corresponding Envoy Listener.
port
(required)Port of the inbound interface that will forward requests to the service.
When transparent proxying is used, it is a port on which the service is listening to. When transparent proxying is not used, Envoy will bind to this port.
servicePort
(optional)Port of the service that requests will be forwarded to. Defaults to the same value as
port
.serviceAddress
(optional)Address of the service that requests will be forwarded to. Defaults to ‘inbound.address’, since Kuma DP should be deployed next to the service. When is true, this defaults to
127.0.0.1
.address
(optional)Address on which inbound listener will be exposed. Defaults to
networking.address
.tags
(required)Tags associated with an application this data plane proxy is deployed next to, e.g.
kuma.io/service=web
,version=1.0
. You can then reference these tags in policies like MeshTrafficPermission.kuma.io/service
tag is mandatory.serviceProbe
(optional)ServiceProbe defines parameters for probing the service next to sidecar. When service probe is defined, Envoy will periodically health check the application next to it and report the status to the control plane. On Kubernetes, Kuma deployments rely on Kubernetes probes so this is not used.
See for more information.
interval
(optional)Interval between consecutive health checks.
timeout
(optional)Maximum time to wait for a health check response.
unhealthyThreshold
(optional)Number of consecutive unhealthy checks before considering a host unhealthy.
healthyThreshold
(optional)Number of consecutive healthy checks before considering a host healthy.
tcp
(optional)Tcp checker tries to establish tcp connection with destination
outbound
(optional, repeated)Outbound describes a list of services consumed by the data plane proxy. For every defined Outbound, there is a corresponding Envoy Listener.
address
(optional)IP on which the consumed service will be available to this data plane proxy. On Kubernetes, it’s usually ClusterIP of a Service or PodIP of a Headless Service. Defaults to 127.0.0.1
port
(required)Port on which the consumed service will be available to this data plane proxy. When transparent proxying is not used, Envoy will bind to this port.
service
(optional)DEPRECATED: use
networking.outbound[].tags['kuma.io/service']
Service name identified by the value ofkuma.io/service
.tags
(optional)Tags of consumed data plane proxies.
kuma.io/service
tag is required. These tags can then be referenced indestinations
section of policies like TrafficRoute or into
section in policies like MeshAccessLog. It is recommended to only use . If you need to consume specific data plane proxy of a service (for example:version=v2
) the better practice is to use TrafficRoute.
transparentProxying
(optional)TransparentProxying describes the configuration for transparent proxying. It is used by default on Kubernetes.
redirectPortInbound
(optional)Port on which all inbound traffic is being transparently redirected.
directAccessServices
(optional, repeated)List of services that will be accessed directly via IP:PORT Use
*
to indicate direct access to every service in the Mesh. Using*
to directly access every service is a resource-intensive operation, use it only if needed.redirectPortInboundV6
(optional)Port on which all IPv6 inbound traffic is being transparently redirected.
reachableServices
(optional, repeated)List of reachable services (represented by the value of
kuma.io/service
) via transparent proxying. Setting an explicit list can dramatically improve the performance of the mesh. If not specified, all services in the mesh are reachable.
admin
(optional)Admin describes configuration related to Envoy Admin API. Due to security, all the Envoy Admin endpoints are exposed only on localhost. Additionally, Envoy will expose
/ready
endpoint onnetworking.address
for health checking systems to be able to check the state of Envoy. The rest of the endpoints exposed onnetworking.address
are always protected by mTLS and only meant to be consumed internally by the control plane.port
(optional)Port on which Envoy Admin API server will be listening
metrics
(optional)Configuration for metrics that should be collected and exposed by the data plane proxy.
Settings defined here will override their respective defaults defined at a Mesh level.
name
(optional)Name of the backend, can be then used in Mesh.metrics.enabledBackend
type
(optional)Type of the backend (Kuma ships with ‘prometheus’)
conf
(optional)Configuration of the backend
probes
(optional)Probes describe a list of endpoints that will be exposed without mTLS. This is useful to expose the health endpoints of the application so the orchestration system (e.g. Kubernetes) can still health check the application.
See https://kuma.io/docs/latest/policies/service-health-probes/#virtual-probes for more information.
port
(required)Port on which the probe endpoints will be exposed. This cannot overlap with any other ports.
endpoints
(required, repeated)List of endpoints to expose without mTLS.
inboundPort
(required)Inbound port is a port of the application from which we expose the endpoint.
inboundPath
(required)Inbound path is a path of the application from which we expose the endpoint. It is recommended to be as specific as possible.