Integrate Istio and Apache Skywalking for Kubernetes Observability

In enterprises, SREs, DevOps, and cloud architects often discuss which platform to choose for observability for faster troubleshooting of issues and understanding about performance of their production systems. There are certain questions they need to answer to get maximum value for their team, such as:

In this article, we will provide the best way to get started with unified observability of your entire infrastructure using open-source Skywalking and Istio service mesh. 

Istio Service Mesh of Multi-Cloud Application 

Let us take an example of a multi-cloud example where there are multiple services hosted on on-prem or managed Kubernetes clusters. The first step for unified observability will be to form a service mesh using Istio service mesh. The idea is that all the services or workloads in Kubernetes clusters (or VMs) should be accompanied by an Envoy proxy to abstract the security and networking out of business logic. As you can see in the below image, a service mesh is formed, and the network communication between edge to workloads, among workloads, and between clusters is controlled by the Istio control plane. 

In this case, the Istio service mesh emits a logs, metrics, and traces for each Envoy proxies, which will help to get unified observability. We need a visualization tool like Skywalking to collect the data and populate it for granular observability.

Integrate Istio and Apache Skywalking for Kubernetes Observability

Why Skywalking for Observability 

SREs from large companies such as Alibaba, Lenovo, ABInBev, and Baidu use Apache Skywalking, and the common reasons are:

It is open-source and free (with an affordable enterprise version).

Integrate Istio and Apache Skywalking for Kubernetes Observability


Now, let us see how to integrate Istio and Apache skywalking into your enterprise.

Steps To Integrate Istio and Apache Skywalking 

We have created a demo to establish the connection between the Istio data plane and Skywalking, where it will collect data from Envoy sidecars and populate them in the observability dashboards. 

Note: By default, Skywalking comes with predefined dashboards for Apache APISIX and AWS Gateways. Since we are using Istio Gateway, it will not get a dedicated dashboard out-of-the-box, but we’ll get metrics for it in other locations.

If you want to watch the video, check out my latest Istio-Skywalking configuration video.

You can refer to the GitHub link here.

Step 1: Add Kube-State-Metrics to Collect Metrics From the Kubernetes API Server

We have installed kube-state-metrics service to listen to the Kubernetes API server and send those metrics to Apache skywalking. 

First, add the Prometheus community repo:

Shell
 
helm repo add prometheus-community
https://prometheus-community.github.io/helm-charts


(After every helm repo add, add a line about running helm repo update to fetch the latest charts.)

And now you can install kube-state-metrics.

Shell
 
helm install kube-state-metrics prometheus-community/kube-state-metrics


Step 2: Install Skywalking Using HELM Charts

We will install Skywalking version 9.2.0 for this observability demo. 

You can run the following command to install Skywalking into a namespace (my namespace is skywalking). You can refer to the values.yaml.

Shell
 
helm install skywalking oci://registry-1.docker.io.apache/skywalking-helm -f -n skywalking


(Optional reading) In helm chart values.yaml, you will notice that:

This is to select the logs and metrics from the Envoy from the Istio configuration (‘c’ and ‘d’ are the rules for analyzing Envoy access logs).

We have instructed Skywalking to collect data from the Istio control plance, Kubernetes cluster, node, services, and also oap (Observability Analytics Platform by Skywalking).

(The configurations from ‘d’ to ‘i’ enable Skywalking OAP’s self-observability, meaning it will expose Prometheus-compatible metrics at port 1234 with SSL disabled. Again, in Step 3, we will configure the OTel collector to scrape this endpoint.)

In the helm chart, we have also enabled the creation of a service account for Skywalking OAP.

Step 3: Setting Up Istio + Skywalking Configuration

After that, we can install Istio using this IstioOperator configuration. In the IstioOperator configuration, we have set up the meshConfig so that every Sidecar will have enabled the envoy access logs service and set the address for access logs service and metrics service to skywalking. Additionally, with the proxyStatsMatcher, we are configuring all metrics to be sent via the metrics service.

YAML
 
meshConfig:
  defaultConfig:
    envoyAccessLogService:
      address: "skywalking-skywalking-helm-oap.skywalking.svc:11800"
    envoyMetricsService:
    	address: "skywalking-skywalking-helm-oap.skywalking.svc:11800"
    proxyStatsMatcher:
    	inclusionRegexps:
        - .*
  enableEnvoyAccessLogService: true


Step 4: OpenTelemetry Collector

Once the Istio and Skywalking configuration is done, we need to feed metrics from applications, gateways, nodes, etc, to Skywalking. We have used the opentelemetry-collector.yaml to scrape the Prometheus compatible endpoints. In the collector, we have mentioned that OpenTelemetry will scrape metrics from istiod, Kubernetes-cluster, kube-state-metrics, and skywalking.

Integrate Istio and Apache Skywalking for Kubernetes Observability

We have created a service account for OpenTelemetry. Using opentelemetry-serviceaccount.yaml, we have set up a service account, declared ClusterRole and ClusterRoleBinding to define what all actions the opentelemetry service account will be able to take on various resources in our Kubernetes cluster. 

Once you deploy the opentelemetry-collector.yaml and opentelemetry-serviceaccount.yaml, there will be data flowing into Skywalking from- Envoy, Kubernetes cluster, kube-state-metrics, and Skywalking (oap). 

Step 5: Observability of Kubernetes Resources and Istio Resource in Skywalking

To check the UI of Skywalking, port-forward the Skywalking UI service to port (say 8080). Run the following command:

Shell
 
kubectl port-forward svc/skywalking-skywalking-helm-ui -n skywalking 8080:80


You can open the Skywalking UI service at localhost:8080.

(Note: For setting up load to services and see the behavior and performance of apps, cluster, and Envoy proxy, check out the full video. )

Once you are on the Skywalking UI (refer to the image below), you can select service mesh in the left-side menu and select control plane or data plane. 

Skywalking would provide all the resource consumption and observability data of Istio control and data plane, respectively.

Integrate Istio and Apache Skywalking for Kubernetes Observability

 Skywalking Istio-dataplane provides info about all the Envoy proxies attached to services.

Skywalking provides metrics, logs, and traces of all the Envoy proxies. Refer to the below image, where all the observability details are displayed for just one service-proxy.

 Integrate Istio and Apache Skywalking for Kubernetes Observability

Skywalking provides the resource consumption of Envoy proxies in various namespaces.


Similarly, Skywalking also provides all the observable data of the Istio control plane. Note, in case you have multiple control planes in different namespaces (in multiple clusters), you just provide the access Skywalking oap service.

Integrate Istio and Apache Skywalking for Kubernetes Observability

Skywalking provides Istio control planes like metrics, number of pilot pushes, ADS monitoring, etc.


Apart from the Istio service mesh, we also configured Skywalking to fetch information about the Kubernetes cluster. You can see in the below image Skywalking provides all the info about the Kubernetes dashboard, such as the number of nodes, pods, K8s deployments, services, pods, containers, etc.  You also get the respective resource utilization metrics of each K8 resource in the same dashboard.

Integrate Istio and Apache Skywalking for Kubernetes Observability

Skywalking provides holistic information about a Kubernetes cluster.


Similarly, you can drill further down into a service in the Kubernetes cluster and get granular information about their behavior and performance. (refer to the below images.)

Integrate Istio and Apache Skywalking for Kubernetes Observability

Integrate Istio and Apache Skywalking for Kubernetes Observability

For setting up load to services and seeing the behavior and performance of apps, cluster, and Envoy proxy, check out the full video.

Benefits of Istio Skywalking Integrations

There are several benefits of integrating Istio and Apache Skywalking for Unified observability. 

Integrate Istio and Apache Skywalking for Kubernetes Observability


 

 

 

 

Top