Explore essential concepts and features of service mesh in Kubernetes with this quiz focusing on Istio and Linkerd basics. Designed for users seeking to understand traffic management, observability, and security within Kubernetes service meshes.
In a Kubernetes service mesh, what is a primary responsibility of the control plane, such as in Istio or Linkerd?
Explanation: The control plane in a service mesh is chiefly responsible for managing and configuring traffic policies, such as routing, retries, and access control rules for services. The option about storing data refers to storage layers, not the service mesh. Monitoring node resources is typically handled by system monitoring tools, not the service mesh control plane. The control plane does not run application workloads directly; instead, it coordinates sidecars or proxies to enforce policies.
Why are sidecar proxies commonly injected alongside application pods when using a service mesh in Kubernetes?
Explanation: Sidecar proxies intercept and manage network traffic to and from each application pod, enabling features like secure communication and observability. Storing environment variables is handled by the system itself and not proxies. Running backups and disaster recovery jobs is not the function of a sidecar. Disabling autoscaling is neither related to nor managed by injected proxies.
Which scenario best demonstrates how traffic splitting is useful in a Kubernetes service mesh deployment?
Explanation: Traffic splitting allows gradual control over routing between service versions, which is highly beneficial for controlled releases and testing. Increasing storage space or attaching volumes is handled by storage plugins, not service mesh. Scaling up replicas is done by deployment controllers and does not use traffic splitting.
How does a service mesh improve security for service-to-service communication within a Kubernetes cluster?
Explanation: A service mesh can automatically enforce mTLS, encrypting service-to-service traffic and performing mutual authentication. Creating admin users does not enhance mesh security and can even be risky. Updating OS patches is a system administrator task. Encrypting configuration files is related to internal storage or system security, not communication between services.
Which capability is provided by a service mesh to enhance observability in Kubernetes environments?
Explanation: Service meshes offer observability features such as collecting traffic metrics, latency data, and traces between services. Deploying specialized workloads, provisioning storage, or granting internet access are not observability functions. The distractors refer to different infrastructure concerns, not traffic monitoring or tracing.