Add POD_NAMESPACE env variable to mixer containers (#15796)
Some adapters (e.g. kubernetesenv) might rely on that variable, using "istio-system" as a fallback value. This is an issue if the control plane is deployed in another namespace.
|1 day ago|
|.github||2 months ago|
|bin||5 days ago|
|docker||3 weeks ago|
|galley||1 day ago|
|install||1 day ago|
|istioctl||3 days ago|
|mixer||5 days ago|
|pilot||1 day ago|
|pkg||1 day ago|
|prow||1 week ago|
|release||2 days ago|
|samples||1 week ago|
|scripts||3 weeks ago|
|security||4 days ago|
|sidecar-injector||1 week ago|
|tests||1 day ago|
|tools||1 day ago|
|vendor||5 days ago|
|.codecov.yml||4 months ago|
|.commonfiles.sha||3 weeks ago|
|.gitattributes||5 months ago|
|.gitignore||2 months ago|
|.golangci.yml||2 months ago|
|BUGS-AND-FEATURE-REQUESTS.md||2 months ago|
|CODEOWNERS||5 days ago|
|CONTRIBUTING.md||1 year ago|
|LICENSE||2 months ago|
|Makefile||1 week ago|
|Makefile.common.mk||2 months ago|
|README.md||2 weeks ago|
|SUPPORT.md||2 months ago|
|codecov.skip||1 month ago|
|codecov.threshold||2 months ago|
|go.mod||5 days ago|
|go.sum||5 days ago|
|istio.deps||2 days ago|
An open platform to connect, manage, and secure microservices.
In this README:
In addition, here are some other documents you may wish to read:
You’ll find many other useful documents on our Wiki.
Istio is an open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio’s control plane provides an abstraction layer over the underlying cluster management platform, such as Kubernetes.
Istio is composed of these components:
Note: The service mesh is not an overlay network. It simplifies and enhances how microservices in an application talk to each other over the network provided by the underlying platform.
Mixer - Central component that is leveraged by the proxies and microservices to enforce policies such as authorization, rate limits, quotas, authentication, request tracing and telemetry collection.
Pilot - A component responsible for configuring the proxies at runtime.
Citadel - A centralized component responsible for certificate issuance and rotation.
Citadel Agent - A per-node component responsible for certificate issuance and rotation.
Galley- Central component for validating, ingesting, aggregating, transforming and distributing config within Istio.
Istio currently supports Kubernetes and Consul-based environments. We plan support for additional platforms such as Cloud Foundry, and Mesos in the near future.
The Istio project is divided across a few GitHub repositories.
istio/istio. This is the main repository that you are currently looking at. It hosts Istio’s core components and also the sample programs and the various documents that govern the Istio open source project. It includes:
istio/api. This repository defines component-level APIs and common configuration formats for the Istio platform.
We use GitHub combined with ZenHub to track all of our bugs and feature requests. Each issue we track has a variety of metadata:
Epic. An epic represents a feature area for Istio as a whole. Epics are fairly broad in scope and are basically product-level things. Each issue is ultimately part of an epic.
Milestone. Each issue is assigned a milestone. This is 0.1, 0.2, …, or ‘Nebulous Future’. The milestone indicates when we think the issue should get addressed.
Priority/Pipeline. Each issue has a priority which is represented by the Pipeline field within GitHub. Priority can be one of P0, P1, P2, or >P2. The priority indicates how important it is to address the issue within the milestone. P0 says that the milestone cannot be considered achieved if the issue isn’t resolved.
We don’t annotate issues with Releases; Milestones are used instead. We don’t use GitHub projects at all, that support is disabled for our organization.