Replies: 4 comments 2 replies
-
|
The istio.io/ingress-use-waypoint label belongs not on the gateway, but on the destination service (productpage). The |
Beta Was this translation helpful? Give feedback.
-
|
No, to do a security enforcement you would use an Authorization Policy.
that tells the ingress to send to the waypoint though
β¦On Mon, Sep 29, 2025, 1:38β―PM ctradar ***@***.***> wrote:
Thanks @howardjohn <https://github.com/howardjohn>. The label
istio.io/ingress-use-waypoint when applied on destination will ensure all
traffic to the destination will only come via waypoint ?
β
Reply to this email directly, view it on GitHub
<#57801 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAEYGXKT5SCUZKUI2KZY3ND3VGKFLAVCNFSM6AAAAACHWFW65WVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINJUGU4DCOI>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
yes
β¦On Mon, Sep 29, 2025 at 1:47β―PM ctradar ***@***.***> wrote:
Thanks for your response but I am a bit confused @howardjohn
<https://github.com/howardjohn> . Applying the label on the destination
service (lets say it is productpage service) will tell the ingress Gateway
to send traffic destined to productpage to go via waypoint ? Did I get this
correct ?
β
Reply to this email directly, view it on GitHub
<#57801 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAEYGXLAD5QVDJHQWI3DI2T3VGLE7AVCNFSM6AAAAACHWFW65WVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINJUGU4DSMI>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
@howardjohn do I need to set the below 2 labels too (in bold) on the productpage service if I am using a cross namespace waypoint ? istio.io/ingress-use-waypoint=true |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, Looking for clarity on running Ingress Gateway in Istio Ambient mode.
We are running the bookinfo app with k8s Gateway for exposing service externally
We are using a cross namespace waypoint and the namespace is configured with the below labels
However, I see that the Gateway service and pod have
istio.io/dataplane-mode=nonelabel which seems to be auto-added ? I tried removing this but it gets added back. I assume there is something reconciling it to some standard config. Is it possible to remove this label ?Reading through some docs, I found the below (excerpt) at https://ambientmesh.io/docs/traffic/gateways/#gateways-and-waypoints
The default behavior of Istio is to send traffic that transits a gateway to the destination directly, even if that destination is enrolled in a waypoint. This is to avoid cases of double handling, for example, where rules for traffic splitting or fault injection could be applied twice
You can enable ingress waypoint routing on a service, such that traffic will be sent from the gateway to the configured waypoint, not to the destination service. To do this, set the label istio.io/ingress-use-waypoint=true on a service
Added the labels as per above, but I still don't see traffic to Gateway traversing the waypoint. I suspect this is due to the
dataplane-node=nonelabel.Would like to know if Istio managed Kubernetes Gateway is supported with waypoint in ambient mode ? Basically, I would like to understand if traffic can traverse like below ?
bookinfo-gateway-istio ---> waypoint --> productpage
Beta Was this translation helpful? Give feedback.
All reactions