Which of the following best explains why a service mesh is used to manage inter-service traffic in microservices?
Think about how a service mesh helps services talk to each other safely and efficiently.
A service mesh manages communication between microservices by handling service discovery, load balancing, encryption, and retries transparently. This avoids changing each service's code and centralizes traffic control.
What is the expected output when running the command istioctl proxy-status in a Kubernetes cluster with Istio service mesh installed?
istioctl proxy-status
This command shows the synchronization status of sidecar proxies managed by Istio.
The istioctl proxy-status command lists all sidecar proxies and their synchronization states with the control plane components like CDS, LDS, EDS, and RDS.
Which sequence correctly describes the steps to enable mutual TLS (mTLS) between services in a service mesh?
Think about configuring policies before deploying and verifying certificates.
First, enable mTLS policy so the mesh knows to secure traffic. Then deploy services with sidecars to enforce it. Next, certificates are issued to proxies for encryption. Finally, test communication to confirm mTLS works.
You notice that service A cannot reach service B in a service mesh environment. Which of the following is the most likely cause?
Focus on components directly involved in inter-service communication.
If the sidecar proxy for service B is down, service A's requests cannot be routed properly, causing communication failure.
Which practice is considered best for managing inter-service traffic in a service mesh to ensure reliability and security?
Think about how to keep services secure and reliable without changing their code.
Sidecar proxies provide a transparent layer to enforce communication policies, improving security and reliability without service code changes.