Careful!
You are browsing documentation for a version of Kuma that is not the latest release.
Looking for even older versions? Learn more.
Applying Policies
Once installed, Kuma can be configured via its policies.
You can apply policies with kumactl
on Universal, and with kubectl
on Kubernetes.
Regardless of what environment you use, you can always read the latest Kuma state with kumactl
on both environments.
We follow the best practices. You should always change your Kubernetes state with CRDs, that’s why Kuma disables kumactl apply [..]
when running in K8s environments.
echo "
apiVersion: kuma.io/v1alpha1
kind: ..
spec: ..
" | kubectl apply -f -
In addition to kumactl
, you can also retrieve the state via the Kuma HTTP API.
Applying policies on Zone and Global Control Planes
Multi-zone deployment consists of Global Control Plane (Global CP) deployment with one or many Zone Control Planes (Zone CP) connected to it. Each Zone CP represents a single cluster (i.e. Kubernetes or Universal cluster). Policies can be applied on both Global and Zone CPs.
When policy is applied on Global CP:
- it is propagated to all Zone CPs and applied to all matched data plane proxies in all zones
- Global CP is a source of truth for the policy (when Global CP is down it’s not possible to create/update those policies)
- You cannot manage this policy (modify / delete) on Zone CP
When policy is applied on Zone CP:
- it is applied only to matched data plane proxies in the same zone
- Zone CP is a source of truth for the policy (when Global CP is down it’s still possible to create/update zone-originated policies)
- you cannot manage this policy (modify / delete) on Global CP
- it is synced to Global CP to be visible in the UI and API calls
Applying policy on Zone CP requires setting kuma.io/origin
label to zone
(zone
is a keyword, not a name of the zone):
apiVersion: kuma.io/v1alpha1
kind: MeshTimeout
metadata:
name: timeout-on-zone-cp
namespace: kuma-system
labels:
kuma.io/origin: zone
kuma.io/mesh: default
spec:
targetRef:
kind: Mesh
to:
- targetRef:
kind: Mesh
default:
idleTimeout: 20s
connectionTimeout: 2s
http:
requestTimeout: 2s
Validation of the origin label can be disabled by configuring a zone CP with KUMA_MULTIZONE_ZONE_DISABLE_ORIGIN_LABEL_VALIDATION: "true"
.
Applying policies in shadow mode
Overview
The new shadow mode functionality allows users to mark policies with a specific label to simulate configuration changes without affecting the live environment. It enables the observation of potential impact on Envoy proxy configurations, providing a risk-free method to test, validate, and fine-tune settings before actual deployment. Ideal for learning, debugging, and migrating, shadow mode ensures configurations are error-free, improving the overall system reliability without disrupting ongoing operations.
Recommended setup
It’s not necessary but CLI tools like jq and jd can greatly improve the UX.
How to use shadow mode
-
Before applying the policy, add a
kuma.io/effect: shadow
label. - Check the proxy config with shadow policies taken into account through the Kuma API. By using HTTP API:
curl http://localhost:5681/meshes/${mesh}/dataplane/${dataplane}/_config?shadow=true
or by using
kumactl
:kumactl inspect dataplane ${name} --type=config --shadow
- Check the diff in JSONPatch format through the Kuma API. By using HTTP API:
curl http://localhost:5681/meshes/${mesh}/dataplane/${dataplane}/_config?shadow=true&include=diff
or by using
kumactl
:kumactl inspect dataplane ${name} --type=config --shadow --include=diff
Limitations and Considerations
Currently, the Kuma API mentioned above works only on Zone CP.
Attempts to use it on Global CP lead to 405 Method Not Allowed
.
This might change in the future.
Examples
Apply policy with kuma.io/effect: shadow
label:
apiVersion: kuma.io/v1alpha1
kind: MeshTimeout
metadata:
name: frontend-timeouts
namespace: kuma-system
labels:
kuma.io/effect: shadow
kuma.io/mesh: default
spec:
targetRef:
kind: MeshSubset
tags:
kuma.io/service: frontend
to:
- targetRef:
kind: MeshService
name: backend_kuma-demo_svc_3001
default:
idleTimeout: 23s
Check the diff using kumactl
:
$ kumactl inspect dataplane frontend-dpp --type=config --include=diff --shadow | jq '.diff' | jd -t patch2jd
@ ["type.googleapis.com/envoy.config.cluster.v3.Cluster","backend_kuma-demo_svc_3001","typedExtensionProtocolOptions","envoy.extensions.upstreams.http.v3.HttpProtocolOptions","commonHttpProtocolOptions","idleTimeout"]
- "3600s"
@ ["type.googleapis.com/envoy.config.cluster.v3.Cluster","backend_kuma-demo_svc_3001","typedExtensionProtocolOptions","envoy.extensions.upstreams.http.v3.HttpProtocolOptions","commonHttpProtocolOptions","idleTimeout"]
+ "23s"
The output not only identifies the exact location in Envoy where the change will occur, but also shows the current timeout value that we’re planning to replace.