Mutual TLS (mTLS) is used between services in Kubernetes. What is its main goal?
Think about security and trust between two communicating services.
Mutual TLS ensures that both the client and server prove their identity and encrypt the communication, preventing unauthorized access and eavesdropping.
Given the command istioctl authn tls-check myservice.default, what does the output STRICT mean?
istioctl authn tls-check myservice.default
STRICT mode means strict enforcement of TLS.
STRICT means the service only accepts connections secured with mutual TLS, rejecting any plaintext traffic.
Choose the correct PeerAuthentication resource configuration to enforce mutual TLS for all workloads in the default namespace.
Look for the resource that controls mTLS enforcement at the workload level.
PeerAuthentication with mode: STRICT enforces mutual TLS for all workloads in the namespace.
You have set mode: STRICT in PeerAuthentication, but the client pod logs show TLS handshake errors. What could be the cause?
mTLS requires proxies to handle certificates and encryption.
Without the Envoy sidecar proxy, the client pod cannot perform mTLS handshake, causing failures.
Arrange the following steps in the correct order to enable mutual TLS between two services in Kubernetes using Istio.
Think about preparing the environment before deploying workloads.
First label the namespace to inject sidecars, then deploy services, enforce mTLS with PeerAuthentication, and finally verify.