Istio is often used with Kubernetes clusters. What is its main purpose?
Think about what happens when many microservices need to talk securely and reliably.
Istio acts as a service mesh that manages communication between microservices, adding security, observability, and traffic control.
Run the command istioctl version in a terminal connected to a Kubernetes cluster with Istio installed. What output do you expect?
istioctl version
This command shows versions of Istio components installed.
The istioctl version command outputs the client, control plane, and data plane versions of Istio installed in the cluster.
Choose the correct YAML snippet to enable mutual TLS (mTLS) for all services in the default namespace.
mTLS is configured using PeerAuthentication resource with mode STRICT.
PeerAuthentication with mtls.mode: STRICT enforces mutual TLS for all workloads in the namespace.
You deployed Istio with automatic sidecar injection enabled, but new pods in the namespace do not have the Istio proxy container. What could cause this?
Istio uses namespace labels to decide where to inject sidecars automatically.
Automatic sidecar injection requires the namespace to be labeled with istio-injection=enabled. Without it, pods won't get the sidecar.
Put these steps in the correct order to safely deploy a new version of a microservice using Istio's traffic shifting feature.
Think about deploying first, then routing traffic, then monitoring, then increasing traffic.
First deploy the new version separately, then configure traffic routing to it, monitor its behavior, and finally shift all traffic once stable.