Authentication Strategies
Choosing and configuring the appropriate authentication strategy.
Choosing and configuring the appropriate authentication strategy.
Configuring additional, non-default dashboards.
Kiali’s default configuration matches settings present in Istio’s installation configuration profiles. If you are customizing your Istio installation some Kiali settings may need to be adjusted. Also, some Istio management features can be enabled or disabled selectively.
Configuring the namespaces accessible and visible to Kiali.
Prometheus and Jaeger are primary data sources for Kiali. This page describes how to configure Kiali to communicate with these dependencies. A minimalistic Grafana integration is also available.
Configuring RBAC based on the authentication strategy.
Customizing Health for Request Traffic.
Ensuring Kiali can visualize a VM WorkloadEntry.