Careful!

You are browsing documentation for the next version of Kuma. Use this version at your own risk.

Policies Overview

Policies in Kuma define how data plane proxies behave and how traffic flows through your mesh. They provide a declarative way to configure security, routing, observability, and resilience features.

Policy fundamentals

Before applying specific policies, understand how Kuma policies work:

Security and identity

Control authentication, authorization, and traffic encryption:

  • MeshTLS - Configure TLS for service-to-service communication
  • Mutual TLS - Enable automatic mutual TLS between services
  • MeshTrafficPermission - Define which services can communicate with each other
  • MeshIdentity - Manage service identity and certificate issuance
  • MeshTrust - Configure trust roots for your mesh

Traffic routing

Shape and control how requests flow between services:

Resilience and reliability

Improve service reliability with automatic failure handling:

  • MeshTimeout - Set request timeout limits to prevent hanging requests
  • MeshRetry - Configure automatic retries for failed requests
  • MeshCircuitBreaker - Prevent cascading failures by detecting unhealthy services
  • MeshHealthCheck - Actively monitor service health and remove unhealthy instances
  • MeshFaultInjection - Test resilience by injecting delays and failures
  • MeshRateLimit - Protect services from being overwhelmed by requests

Monitoring and observability

Monitor and understand your mesh behavior:

  • MeshAccessLog - Configure access logging to files, Syslog, or external systems
  • MeshMetric - Collect metrics from proxies for Prometheus or OpenTelemetry
  • MeshTrace - Enable distributed tracing with Zipkin, Jaeger, or OpenTelemetry

Advanced configuration

Fine-tune proxy behavior for specialized use cases:

Legacy policies

Next steps