This guide demonstrates deploying the Bookinfo application with Istio to explore its service mesh capabilities.
This guide demonstrates how to deploy the Bookinfo application with Istio to explore its service mesh capabilities. The Bookinfo sample application is available in the Samples folder you downloaded.
Run the following command from the directory containing your Istio samples. Adjust the directory path if your Istio samples are located elsewhere on your computer:
After executing the command, several deployments and services are created. To verify the installation, check the status of the pods. You should see pods for the ProductPage, Details, Ratings microservices, and three versions of the Reviews microservice—all deployed in the default namespace.
At this point, with Istio installed, you might expect every pod to include an additional Envoy proxy container. However, the output under the “READY” column indicates that each pod has only a single container. This suggests that the Envoy sidecar is not present.The issue lies in the namespace configuration. Execute the following command for a detailed analysis:
Copy
Ask AI
$ istioctl analyzeInfo [IST0102] (Namespace default) The namespace is not enabled for Istio injection. Run 'kubectl label namespace default istio-injection=enabled' to enable it, or'kubectl label namespace default istio-injection=disabled' to explicitly mark it asnot needing injection.
The analysis reveals that sidecar injection is not active for the default namespace. In Kubernetes environments with multiple namespaces (e.g., kube-system for core services and default for user applications), you must explicitly enable Istio sidecar injection where required.
This output confirms that Istio has successfully injected the Envoy proxies into every pod.
In upcoming lessons, you’ll explore how these Envoy sidecar proxies manage traffic, enforce policies, and enhance the overall security within the Istio service mesh.
That’s it for now—happy exploring, and see you in the demo!