ASM allows you to create a Basic service mesh for commercial use.
A CCE cluster is available.
Only service meshes of the Basic edition are supported for commercial use.
Enter a service mesh name, which consists of 4 to 64 characters. It must start with a lowercase letter and cannot end with a hyphen (-). Only lowercase letters, digits, and hyphens (-) are allowed.
Service mesh names under the same account must be unique and cannot be modified after creation.
Select the Istio version supported by the service mesh.
Conditions for enabling IPv4/IPv6 dual stack for a service mesh
Service Mesh Edition |
Istio Version |
Cluster Type |
Cluster Network Type |
Remarks |
---|---|---|---|---|
Basic edition |
1.18 or later |
CCE Turbo clusters |
Cloud native network 2.0 |
To enable IPv6. |
For details, see How Do I Create a Service Mesh with IPv4/IPv6 Dual Stack Enabled
Select the cluster from the cluster list or enter the cluster name in the upper right corner of the list to search for it. You can only select the clusters whose versions are supported by the current service mesh version.
The control plane components of the Basic service mesh are installed in the user cluster. Therefore, you need to select a node for installing the control plane. If HA is required, you can select two or more nodes from different AZs.
A selected node will be labeled with istio:master, and the components will be scheduled to that node.
If this option is enabled, you can specify service access metrics, application topologies, and service health and SLO definitions in the service mesh.
- Sampling Rate: Number of requests generated by the tracing service/Total number of requests
- Version: tracing service. If you select Third-party Jaeger/Zipkin service, you need to set Service Address and Service Port, which indicate the address and port number used by the third-party tracing service to receive requests.
Select a namespace and label it with istio-injection=enabled. After being restarted, all pods in the namespace will be automatically injected with an istio-proxy sidecar.
If you do not configure namespace injection, you can inject a sidecar on the Sidecar Management tab (Mesh Configuration > Sidecar Management) after the service mesh is created. For details, see Injecting a Sidecar.
: Pods of the existing services in the namespace will be restarted, which will temporarily interrupt your services. The istio-proxy sidecar is automatically injected into the pods of the existing services.
: The istio-proxy sidecar cannot be automatically injected into the pods of the existing services. You need to manually restart the workloads on the CCE console to inject the sidecar.
By default, sidecars intercept all inbound and outbound traffic of pods. You can modify the default traffic rules in Traffic Interception Settings.
Inbound Ports: Inbound ports separated by commas (,). You can use this field to specify the ports that will be included or excluded for inbound traffic redirection.
Outbound Ports: Outbound ports separated by commas (,). You can use this field to specify the ports that will be included or excluded for outbound traffic redirection.
Outbound IP Ranges: IP address ranges separated by commas (,) in CIDR format. You can use this field to specify the IP ranges that will be included or excluded for outbound traffic redirection.
Enter the tag key and tag value. A maximum of 20 tags can be added.
It takes about 1 to 3 minutes to create a service mesh. If the service mesh status changes from Installing to Running, the service mesh is successfully created.
When the service mesh is enabled, the following operations are performed: