Skip to content

Commit b6f69fc

Browse files
Add doc section about Istio CNI (#3057) (#3072)
1 parent 3136c3c commit b6f69fc

File tree

1 file changed

+41
-2
lines changed

1 file changed

+41
-2
lines changed

docs/advanced-topics/service-meshes.asciidoc

+41-2
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,6 @@ spec:
7979
nodeSets:
8080
- name: default
8181
count: 3
82-
config:
83-
node.store.allow_mmap: false
8482
podTemplate:
8583
metadata:
8684
annotations:
@@ -122,6 +120,47 @@ spec:
122120
Refer to the link:https://istio.io/docs/tasks/security/authentication/mtls-migration/[Istio documentation] for more information about other configuration options affecting authentication between services.
123121

124122

123+
[id="{p}-service-mesh-istio-cni"]
124+
===== Using init containers with Istio CNI
125+
126+
There are link:https://istio.io/docs/setup/additional-setup/cni/#compatibility-with-application-init-containers[known issues with init containers] when Istio CNI is configured. If you use init containers to <<{p}-init-containers-plugin-downloads,install Elasticsearch plugins>> or perform other initialization tasks that require network access, they may fail due to outbound traffic being blocked by the CNI plugin. To work around this issue, explicitly whitelist the external ports used by the init containers.
127+
128+
.Installing plugins using an init container
129+
[source,yaml,subs="attributes,callouts"]
130+
----
131+
apiVersion: elasticsearch.k8s.elastic.co/{eck_crd_version}
132+
kind: Elasticsearch
133+
metadata:
134+
name: elastic-istio
135+
spec:
136+
version: {version}
137+
http:
138+
tls:
139+
selfSignedCertificate:
140+
disabled: true
141+
nodeSets:
142+
- name: default
143+
count: 3
144+
podTemplate:
145+
metadata:
146+
annotations:
147+
traffic.sidecar.istio.io/includeInboundPorts: "*"
148+
traffic.sidecar.istio.io/excludeOutboundPorts: "9300,443" <1>
149+
traffic.sidecar.istio.io/excludeInboundPorts: "9300"
150+
spec:
151+
automountServiceAccountToken: true
152+
initContainers:
153+
- name: install-plugins
154+
command:
155+
- sh
156+
- -c
157+
- |
158+
bin/elasticsearch-plugin install --batch repository-gcs
159+
----
160+
161+
<1> Plugins are downloaded over the HTTPS port (443) and needs to be whitelisted when Istio CNI is installed.
162+
163+
125164
[id="{p}-service-mesh-istio-kibana"]
126165
==== Kibana
127166

0 commit comments

Comments
 (0)