Protocol Selection

Istio supports proxying any TCP traffic. This includes HTTP, HTTPS, gRPC, as well as raw TCP protocols. In order to provide additional capabilities, such as routing and rich metrics, the protocol must be determined. This can be done automatically or explicitly specified.

Non-TCP based protocols, such as UDP, are not proxied. These protocols will continue to function as normal, without any interception by the Istio proxy but cannot be used in proxy-only components such as ingress or egress gateways.

Automatic protocol selection

Istio can automatically detect HTTP and HTTP/2 traffic. If the protocol cannot automatically be determined, traffic will be treated as plain TCP traffic.

Explicit protocol selection

Protocols can be specified manually in the Service definition.

This can be configured in two ways:

  • By the name of the port: name: <protocol>[-<suffix>].
  • In Kubernetes 1.18+, by the appProtocol field: appProtocol: <protocol>.

Note that behavior at the Gateway differs in some cases as the gateway can terminate TLS and the protocol can be negotiated.

The following protocols are supported:

ProtocolSidecar PurposeGateway Purpose
httpPlaintext HTTP/1.1 trafficPlaintext HTTP (1.1 or 2) traffic
http2Plaintext HTTP/2 trafficPlaintext HTTP (1.1 or 2) traffic
httpsTLS Encrypted data. Because the Sidecar does not decrypt TLS traffic, this is the same as tlsTLS Encrypted HTTP (1.1 or 2) traffic
tcpOpaque TCP data streamOpaque TCP data stream
tlsTLS Encrypted dataTLS Encrypted data
grpc, grpc-webSame as http2Same as http2
mongo, mysql, redisExperimental application protocol support. To enable them, configure the corresponding Pilot environment variables. If not enabled, treated as opaque TCP data streamExperimental application protocol support. To enable them, configure the corresponding Pilot environment variables. If not enabled, treated as opaque TCP data stream

Below is an example of a Service that defines a https port by appProtocol and an http port by name:

kind: Service
  name: myservice
  - port: 3306
    name: database
    appProtocol: https
  - port: 80
    name: http-web

HTTP gateway protocol selection

Unlike sidecars, gateways are by default unable to automatically detect the specific HTTP protocol to use when forwarding requests to backend services. Therefore, unless explicit protocol selection is used to specify HTTP/1.1 (http) or HTTP/2 (http2 or grpc), gateways will forward all incoming HTTP requests using HTTP/1.1.

Instead of using explicit protocol selection, you can instruct gateways to forward requests using the same protocol as the incoming request by setting the useClientProtocol option for a Service. Note, however, that using this option with services that do not support HTTP/2 can be risky because HTTPS gateways always advertise support for HTTP/1.1 and HTTP/2. So even when a backend service doesn’t support HTTP/2, modern clients will think it does and often choose to use it.

Was this information useful?
Do you have any suggestions for improvement?

Thanks for your feedback!