This is a cache of https://docs.openshift.com/container-platform/4.7/service_mesh/v2x/ossm-deployment-models.html. It is a snapshot of the page at 2024-11-20T22:05:17.390+0000.
<strong>service</strong> Mesh deployment models - <strong>service</strong> Mesh 2.x | <strong>service</strong> Mesh | OpenShift Container Platform 4.7
×

Red Hat OpenShift service Mesh supports several different deployment models that can be combined in different ways to best suit your business requirements.

Single mesh deployment model

The simplest Istio deployment model is a single mesh.

service names within a mesh must be unique because Kubernetes only allows one service to be named myservice in the mynamespace namespace. However, workload instances can share a common identity since service account names can be shared across workloads in the same namespace

Single tenancy deployment model

In Istio, a tenant is a group of users that share common access and privileges for a set of deployed workloads. You can use tenants to provide a level of isolation between different teams. You can segregate access to different tenants using NetworkPolicies, AuthorizationPolicies, and exportTo annotations on istio.io or service resources.

Single tenant, cluster-wide service Mesh control plane configurations are deprecated as of Red Hat OpenShift service Mesh version 1.0. Red Hat OpenShift service Mesh defaults to a multitenant model.

Multitenant deployment model

Red Hat OpenShift service Mesh installs a serviceMeshControlPlane that is configured for multitenancy by default. Red Hat OpenShift service Mesh uses a multitenant Operator to manage the service Mesh control plane lifecycle. Within a mesh, namespaces are used for tenancy.

Red Hat OpenShift service Mesh uses serviceMeshControlPlane resources to manage mesh installations, whose scope is limited by default to namespace that contains the resource. You use serviceMeshMemberRoll and serviceMeshMember resources to include additional namespaces into the mesh. A namespace can only be included in a single mesh, and multiple meshes can be installed in a single OpenShift cluster.

Typical service mesh deployments use a single service Mesh control plane to configure communication between services in the mesh. Red Hat OpenShift service Mesh supports “soft multitenancy”, where there is one control plane and one mesh per tenant, and there can be multiple independent control planes within the cluster. Multitenant deployments specify the projects that can access the service Mesh and isolate the service Mesh from other control plane instances.

The cluster administrator gets control and visibility across all the Istio control planes, while the tenant administrator only gets control over their specific service Mesh, Kiali, and Jaeger instances.

You can grant a team permission to deploy its workloads only to a given namespace or set of namespaces. If granted the mesh-user role by the service mesh administrator, users can create a serviceMeshMember resource to add namespaces to the serviceMeshMemberRoll.

Multimesh or federated deployment model

Federation is a deployment model that lets you share services and workloads between separate meshes managed in distinct administrative domains.

The Istio multi-cluster model requires a high level of trust between meshes and remote access to all Kubernetes API servers on which the individual meshes reside. Red Hat OpenShift service Mesh federation takes an opinionated approach to a multi-cluster implementation of service Mesh that assumes minimal trust between meshes.

A federated mesh is a group of meshes behaving as a single mesh. The services in each mesh can be unique services, for example a mesh adding services by importing them from another mesh, can provide additional workloads for the same services across the meshes, providing high availability, or a combination of both. All meshes that are joined into a federated mesh remain managed individually, and you must explicitly configure which services are exported to and imported from other meshes in the federation. Support functions such as certificate generation, metrics and trace collection remain local in their respective meshes.