Skip to content

Default Istio Configuration ​

Within the Istio module, Istio Operator provides baseline values for the Istio installation, which you can override in the Istio custom resource (CR).

See the major differences in the configuration of Istio Operator compared to upstream Istio:

  • Istiod (Pilot) and Ingress Gateway components are enabled by default.
  • Automatic Istio sidecar proxy injection is disabled by default.
  • To enhance security and performance, both Istio control plane and data plane use the distroless version of Istio images. Those images are not Debian-based and are slimmed down to reduce any potential attack surface. To learn more, see Harden Docker Container Images.
  • Resource requests and limits for Istio sidecars proxies are modified to best suit the needs of the evaluation and production profiles.
  • Mutual TLS (mTLS) is enabled in the STRICT mode for workloads in the Istio service mesh.
  • Egress traffic is not controlled. All applications deployed in the Kyma cluster can access outside resources without limitations.
  • The CNI component, used for the installation of an Istio sidecar, is provided as a DaemonSet. This means that one replica is present on every node of the target cluster.
  • The self-signed CA certificate’s bit length is set to 4096 instead of the default 2048.

Configuration Based on the Cluster Size ​

The configuration of Istio resources depends on the cluster capabilities. If your cluster has less than 5 total virtual CPU cores or its total memory capacity is less than 10 gigabytes, the default setup for resources and autoscaling is lighter. If your cluster exceeds both of these thresholds, Istio is installed with the higher resource configuration.

Default Resource Configuration for Smaller Clusters ​

ComponentCPU RequestsCPU LimitsMemory RequestsMemory Limits
Proxy10 m250 m32 Mi254 Mi
Ingress Gateway10 m1000 m32 Mi1024 Mi
Egress Gateway10 m1000 m32 Mi1024 Mi
Pilot50 m1000 m128 Mi1024 Mi
CNI10 m250 m128 Mi384 Mi

Default Resource Configuration for Larger Clusters ​

ComponentCPU RequestsCPU LimitsMemory RequestsMemory Limits
Proxy10 m1000 m192 Mi1024 Mi
Ingress Gateway100 m2000 m128 Mi1024 Mi
Egress Gateway100 m2000 m128 Mi1024 Mi
Pilot100 m4000 m512 Mi2 Gi
CNI100 m500 m512 Mi1024 Mi

Default Autoscaling Configuration for Smaller Clusters ​

ComponentminReplicasmaxReplicas
Ingress Gateway11
Egress Gateway11
Pilot11

Default Autoscaling Configuration for Larger Clusters ​

ComponentminReplicasmaxReplicas
Ingress Gateway310
Egress Gateway310
Pilot25