Skip to content
Community

logo

Istio#

Istio is an open source service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio is the path to load balancing, service-to-service authentication, and monitoring – with few or no service code changes.


Looking for Commercial Support? LEARN MORE

Prerequisites#

Deploy k0rdent v1.7.0: QuickStart

Install template to k0rdent#

helm upgrade --install istio-base oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istio-base:1.27.1" -n kcm-system
helm upgrade --install istiod oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istiod:1.27.1" -n kcm-system
helm upgrade --install istio-gateway oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istio-gateway:1.27.1" -n kcm-system

Verify service template#

kubectl get servicetemplates -A
# NAMESPACE    NAME                            VALID
# kcm-system   istio-base-1-27-1               true
# kcm-system   istiod-1-27-1                   true
# kcm-system   istio-gateway-1-27-1            true

Deploy service template#

apiVersion: k0rdent.mirantis.com/v1beta1
kind: MultiClusterService
metadata:
  name: istio
spec:
  clusterSelector:
    matchLabels:
      group: demo
  serviceSpec:
    services:
    - template: istio-base-1-27-1
      name: istio-base
      namespace: istio-system
    - template: istiod-1-27-1
      name: istiod
      namespace: istio-system
    - template: istio-gateway-1-27-1
      name: istio-gateway
      namespace: istio-system

Aggregated CVE Summary#

This table provides an aggregated overview of known CVEs affecting this application.

Critical High Medium Low Unknown
0 12 26 23 0

The counts represent the number of unique CVE identifiers detected across the entire application stack, including all associated Helm charts, container images, and underlying OS or language-level packages. If the same CVE appears in multiple images or packages, it is counted only once in this summary.

The vulnerability data is generated using the Trivy security scanner, which analyzes container images and their dependencies against multiple vulnerability databases. The results reflect the state of the analyzed images at the time of scanning.

Severity levels#

CVEs are grouped by severity according to standard vulnerability scoring:

  • Critical – Vulnerabilities that can be easily exploited and may lead to full system compromise, remote code execution, or severe data exposure.
  • High – Serious vulnerabilities that could significantly impact confidentiality, integrity, or availability, often requiring prompt remediation.
  • Medium – Vulnerabilities with moderate impact that typically require specific conditions or configurations to be exploitable.
  • Low – Issues with limited impact or difficult exploitation, often informational or defense-in-depth concerns.
  • Unknown – CVEs for which a severity score is not available or could not be determined at the time of analysis.

This summary is intended to provide a high-level security posture of the application.

Prerequisites#

Deploy k0rdent v1.7.0: QuickStart

Install template to k0rdent#

helm upgrade --install istio-base oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istio-base:1.27.1" -n kcm-system
helm upgrade --install istiod oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istiod:1.27.1" -n kcm-system
helm upgrade --install istio-gateway oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=istio-gateway:1.27.1" -n kcm-system
helm upgrade --install cert-manager oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=cert-manager:1.18.2" -n kcm-system
helm upgrade --install knative-operator oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=knative-operator:1.17.4" -n kcm-system
helm upgrade --install kserve-crd oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=kserve-crd:v0.15.0" -n kcm-system
helm upgrade --install kserve oci://ghcr.io/k0rdent/catalog/charts/kgst --set "chart=kserve:v0.15.0" -n kcm-system

Verify service template#

kubectl get servicetemplates -A
# NAMESPACE    NAME                            VALID
# kcm-system   istio-base-1-27-1               true
# kcm-system   istiod-1-27-1                   true
# kcm-system   istio-gateway-1-27-1            true
# kcm-system   cert-manager-1-18-2             true
# kcm-system   knative-operator-1-17-4         true
# kcm-system   kserve-crd-v0-15-0              true
# kcm-system   kserve-v0-15-0                  true

Deploy service template#

apiVersion: k0rdent.mirantis.com/v1beta1
kind: MultiClusterService
metadata:
  name: kserve
spec:
  clusterSelector:
    matchLabels:
      group: demo
  serviceSpec:
    services:
    - template: istio-base-1-27-1
      name: istio-base
      namespace: kserve
    - template: istiod-1-27-1
      name: istiod
      namespace: kserve
    - template: istio-gateway-1-27-1
      name: istio-gateway
      namespace: kserve
    - template: cert-manager-1-18-2
      name: cert-manager
      namespace: kserve
      values: |
        cert-manager:
          crds:
            enabled: true
    - template: knative-operator-1-17-4
      name: knative-operator
      namespace: kserve
    - template: kserve-crd-v0-15-0
      name: kserve-crd
      namespace: kserve
    - template: kserve-v0-15-0
      name: kserve
      namespace: kserve
      values: |
        kserve:
          controller:
            deploymentMode: RawDeployment # Serverless
          modelmesh:
            enabled: false