The following guide describes how to onboard a Kubernetes microservice to an OSM instance.
Refer to the application requirements guide before onboarding applications.
Configure and Install Service Mesh Interface (SMI) policies
OSM conforms to the SMI specification. By default, OSM denies all traffic communications between Kubernetes services unless explicitly allowed by SMI policies. This behavior can be overridden with the
--enable-permissive-traffic-policyflag on the
osm installcommand, allowing SMI policies not to be enforced while allowing traffic and services to still take advantage of features such as mTLS-encrypted traffic, metrics, and tracing.
For example SMI policies, please see the following examples:
Onboard Kubernetes Namespaces to enable OSM
To onboard a namespace containing services to enable for OSM, run the
osm namespace addcommand, which does the equivalent of the following:
$ kubectl label namespace <namespace> openservicemesh.io/monitored-by=<mesh-name>
By default, the
osm namespace addcommand enables automatic sidecar injection for pods in the namespace. This does the equivalent of the following:
$ kubectl label namespace <namespace> openservicemesh.io/monitored-by=<mesh-name> $ kubectl annotate namespace <namespace> openservicemesh.io/sidecar-injection=enabled
To disable automatic sidecar injection as a part of enrolling a namespace into the mesh, use
osm namespace add <namespace> --disable-sidecar-injection.
Once a namespace has been onboarded, pods can be enrolled in the mesh by configuring automatic sidecar injection. See the Sidecar Injection document for more details.
For an example on how to onboard and join namespaces to the OSM mesh, please see the following example:
Inject the Proxy Sidecars
At the moment to onboard your Kubernetes services to OSM, a restart of the pods backing the services is needed. In the near future, manual sidecar injection will be supported no longer requiring this step.
For an example on how to invoke a rolling restart of your services’ pods, please see the following example:
Verify the new behavior
The OSM control plane supports Prometheus, Grafana and Jaeger instances that can be used to help make sure the application is working properly. These are disabled by default. More details can be found in the Observability documents.
Note: Removing Namespaces
Namespaces can be removed from the OSM mesh with the
osm namespace remove command, which does the equivalent of the following:
$ kubectl label namespace <namespace> openservicemesh.io/monitored-by-
Please Note: The
osm namespace removecommand only tells OSM to stop applying updates to the sidecar proxy configurations in the namespace. It does not remove the proxy sidecars. This means the existing proxy configuration will continue to be used, but it will not be updated by the OSM control plane. If you wish to remove the proxies from all pods, remove the pods’ namespaces from the OSM mesh with the CLI and reinstall all the pod workloads.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.