Skip to content

Latest commit

 

History

History
executable file
·
24 lines (11 loc) · 1.24 KB

25-Implement-pod-to-pod-encryption-by-use-of-mTLS.md

File metadata and controls

executable file
·
24 lines (11 loc) · 1.24 KB

Implement pod to pod encryption by use of mTLS

In this section, we will take a look at Implement pod to pod encryption by use of mTLS.

  • It is better to let the communications between pods without encryption format and use other ways to add the encrypted format on top.

  • Istio and linkerd enable mutual Transport Layer Security (mTLS) for most TCP traffic between meshed pods.

    linkerd

  • You add Istio support to services by deploying a special sidecar proxy throughout your environment that intercepts all network communication between micro services.

    lstio1

  • Istio external inbound traffic, This traffic coming from an outside client that is captured by the sidecar. If the client is inside the mesh, this traffic may be encrypted with Istio mutual TLS. By default, the sidecar will be configured to accept both mTLS and non-mTLS traffic, known as PERMISSIVE mode. The mode can alternatively be configured to STRICT, where traffic must be mTLS, or DISABLE, where traffic must be plain text.

    lstio3

    lstio2