In order for traffic to flow through the Kong Mesh data plane, all inbound and outbound traffic for a service needs to go through its data plane proxy. The recommended way of accomplishing this is via transparent proxying.
On Kubernetes it’s handled automatically by default with the
initContainer
kuma-init
, but this container requires certain privileges.
Another option is to use the Kong Mesh CNI. This frees every
Pod
in the mesh from requiring said privileges, which can make security compliance easier.
The CNI
DaemonSet
itself requires elevated privileges because it writes executables to the host filesystem asroot
.
Install the CNI using either
kumactl or Helm. The default settings are tuned for OpenShift with Multus. To use it in other environments, set the relevant configuration parameters.
Kong Mesh CNI applies
NetworkAttachmentDefinitions
to applications in any namespace withkuma.io/sidecar-injection
label. To applyNetworkAttachmentDefinitions
to applications not in a Mesh, add the labelkuma.io/sidecar-injection
with the valuedisabled
to the namespace.