Software Secure Workload
Activity Configure

Deep Visibility and Enforcement with Istio Service Mesh

Secure workload provides comprehensive visibility and enforcement for all applications running within Kubernetes or OpenShift clusters that are enabled with Istio Service Mesh.

Following are key components and guidelines for effective segmentation of these applications:

Service Mesh Sidecars

Service Mesh uses sidecar proxies deployed with application containers to intercept and manage network traffic. Sharing the same network namespace as the application, these sidecars mediate all inbound and outbound network communication.

Traffic Enforcement

  • When implementing segmentation policies for Service Mesh enabled applications, it's essential to consider the additional ports used by sidecar proxies. These ports play a vital role in managing and securing the application's network traffic.

  • For the Service Mesh to remain intact and available, ensure your segmentation policies explicitly include rules for the ports used by sidecar proxies.

Supported Port and Protocol for Sidecar Proxy

Include the following ports while enforcing segmentation policies on Service Mesh enabled applications.

Port

Protocol

Description

15000

TCP

Envoy admin port (commands/diagnostics)

15001

TCP

Envoy outbound

15004

HTTP

Debug port

15006

TCP

Envoy inbound

15008

HTTP2

HBONE mTLS tunnel port

15020

HTTP

Mereged Prometheus telemetry from Istio agent, Envoy, and application

15021

HTTP

Health Checks

15053

DNS

DNS port, if capture is enabled

15090

HTTP

Envoy Prometheus telemetry


 

The above ports are the default ports used by Istio for Envoy sidecar proxy communication.If these ports have been updated in the Istio global Service Mesh configuration settings, use the updated ports in the applications.

Supported Port and Protocol for Service Mesh Control Plane

Use the following port and protocol when segmenting the control plane.

Port

Protocol

Description

443

HTTPS

Webhook servie port

8080

HTTP

Debug Interface (deprecated, container port only)

15010

GRPC

XDS and CA services (Plaintext, only for secure networks)

15012

GRPC

XDS and CA services (TLS and mTLS, recommended for production use)

15014

HTTP

Control plane monitoring

15017

HTTPS

Webhook container port, forwarded from 443