In order for traffic to flow through the Kong Mesh data plane, all inbound and outbound traffic for a service needs to go through its data plane proxy. The recommended way of accomplishing this is via transparent proxying.
On Kubernetes it’s handled automatically by default with the
initContainer kuma-init, but this container requires certain privileges.
Another option is to use the Kong Mesh CNI. This frees every
Pod in the mesh from requiring said privileges, which can make security compliance easier.
The CNI
DaemonSetitself requires elevated privileges because it writes executables to the host filesystem asroot.
Install the CNI using either
kumactl or Helm. The default settings are tuned for OpenShift with Multus. To use it in other environments, set the relevant configuration parameters.
Kong Mesh CNI applies
NetworkAttachmentDefinitionsto applications in any namespace withkuma.io/sidecar-injectionlabel. To applyNetworkAttachmentDefinitionsto applications not in a Mesh, add the labelkuma.io/sidecar-injectionwith the valuedisabledto the namespace.