Policies Overview

Policies in Kuma define how data plane proxies behave and how traffic flows through your mesh. They provide a declarative way to configure security, routing, observability, and resilience features.

Policy fundamentals

Before applying specific policies, understand how Kuma policies work:

Security and identity

Control authentication, authorization, and traffic encryption:

  • MeshTLS - Configure TLS for service-to-service communication
  • Mutual TLS - Enable automatic mutual TLS between services
  • MeshTrafficPermission - Define which services can communicate with each other
  • MeshIdentity - Manage service identity and certificate issuance
  • MeshTrust - Configure trust roots for your mesh

Traffic routing

Shape and control how requests flow between services:

Resilience and reliability

Improve service reliability with automatic failure handling:

  • MeshTimeout - Set request timeout limits to prevent hanging requests
  • MeshRetry - Configure automatic retries for failed requests
  • MeshCircuitBreaker - Prevent cascading failures by detecting unhealthy services
  • MeshHealthCheck - Actively monitor service health and remove unhealthy instances
  • MeshFaultInjection - Test resilience by injecting delays and failures
  • MeshRateLimit - Protect services from being overwhelmed by requests

Monitoring and observability

Monitor and understand your mesh behavior:

  • MeshAccessLog - Configure access logging to files, Syslog, or external systems
  • MeshMetric - Collect metrics from proxies for Prometheus or OpenTelemetry
  • MeshTrace - Enable distributed tracing with Zipkin, Jaeger, or OpenTelemetry

Advanced configuration

Fine-tune proxy behavior for specialized use cases:

Legacy policies

These policies are deprecated in favor of the new Mesh* policies:

See the migration guide for moving to new policies.

Next steps