istio
1apiVersion: install.istio.io/v1alpha1
2kind: IstioOperator
3spec:
4meshConfig:
5accessLogFile: /dev/stdout
6extensionProviders:
7- name: otel
8envoyOtelAls:
9service: otel-collector.istio-system.svc.cluster.local
10port: 4317
11- name: prometheus
12prometheus:
13- name: stackdriver
14stackdriver:
15- name: envoy
16envoyFileAccessLog:
17path: /dev/stdout
18- name: envoyExtAuthzHttp
19envoyExtAuthzHttp:
20- name: envoyExtAuthzGrpc
21envoyExtAuthzGrpc:
22- name: zipkin
23zipkin:
24- name: lightstep
25lightstep:
26- name: datadog
27datadog:
28- name: opencensus
29opencensus:
30- name: skywalking
31skywalking:
32- name: envoyHttpAls
33envoyHttpAls:
34- name: envoyTcpAls
35envoyTcpAls:
36- name: opentelemetry
37opentelemetry:
38components:
39egressGateways:
40- name: istio-egressgateway
41enabled: true
42k8s:
43resources:
44requests:
45cpu: 10m
46memory: 40Mi
47
48ingressGateways:
49- name: istio-ingressgateway
50enabled: true
51k8s:
52resources:
53requests:
54cpu: 10m
55memory: 40Mi
56service:
57ports:
58## You can add custom gateway ports in user values overrides, but it must include those ports since helm replaces.
59# Note that AWS ELB will by default perform health checks on the first port
60# on this list. Setting this to the health check port will ensure that health
61# checks always work. https://github.com/istio/istio/issues/12503
62- port: 15021
63targetPort: 15021
64name: status-port
65- port: 80
66targetPort: 8080
67name: http2
68- port: 443
69targetPort: 8443
70name: https
71- port: 31400
72targetPort: 31400
73name: tcp
74# This is the port where sni routing happens
75- port: 15443
76targetPort: 15443
77name: tls
78
79pilot:
80k8s:
81env:
82- name: PILOT_TRACE_SAMPLING
83value: "100"
84resources:
85requests:
86cpu: 10m
87memory: 100Mi
88
89values:
90global:
91proxy:
92resources:
93requests:
94cpu: 10m
95memory: 40Mi
96
97pilot:
98autoscaleEnabled: false
99
100gateways:
101istio-egressgateway:
102autoscaleEnabled: false
103istio-ingressgateway:
104autoscaleEnabled: false
105