Updating Istio
Do not use istioctl to update the version of Istio that is installed by the managed add-on. When updated, the managed Istio add-on includes an update of the Istio version as well. Supported versions of Istio are tested by IBM Cloud
and approved for the use in IBM Cloud Kubernetes Service.
Before you begin
-
You can only manually update the Istio add-on one version at a time. To update the Istio add-on by two or more versions, you can repeat the manual update process or you can uninstall the add-on and then install the later version.
-
You can't revert your managed Istio add-on to a previous version. To revert to an earlier minor version, you must uninstall the add-on and then install the earlier version.
-
When you update the Istio control components in the
istio-systemnamespace to the latest minor version, you might experience disruptive changes. Review the following changes that occur during a minor version update.- As updates are rolled out to control plane pods, the pods are re-created. The Istio control plane is not fully available until after the update completes.
- The Istio data plane continues to function during the update. However, some traffic to apps in the service mesh might be interrupted for a short period of time.
- The external IP address for the
istio-ingressgatewayload balancer does not change during or after the update.
Updating from version 1.23 to 1.24 of the Istio add-on
The update process is different for updating to version 1.24 of the add-on than for other versions because of the changes included in Istio 1.24. Istio ended support for the in-cluster operator, which versions 1.4 through 1.23 of the add-on use to to reconcile and manage the Istio configuration. For 1.24 and later, the add-on uses a cyclical invocation of Helm to manage the Istio installation.
Before you begin:
-
Review the prerequisites that apply to all version updates.
-
Complete testing before migrating production clusters.
- Test these migration steps in a test cluster.
- Test any existing custom gateways with a new test cluster that starts at
addon-istio1.24. - Test any additional custom gateways you want to create with a new test cluster that starts at
addon-istio1.24.
-
Keep in mind that custom gateways are not migrated by completing this task. The gateways are not impacted if they don't have the same names as the default gateways. When the new default gateways exist, you can edit their
value.yamlfiles with similar freedom to what a single custom gateway allowed. In cases where you need more than one ingress or egress gateway deployment, you can install and manage additional gateways with Helm. -
In contrast to the data plane's gateway
value.yamlfiles, the limited customization of the control planevalue.yamlfiles are made available by adding new key-values to themanaged-istio-customConfigMap in theibm-operatorsnamespace as before. The cluster updater reconciles the control planevalue.yamlfiles and updates them to match the configuration specified by the add-on or by themanaged-istio-customConfigMap.apiVersion: v1 kind: ConfigMap metadata: annotations: version: xxxCU_VERSIONxxx razee.io/source-url: xxxSOURCE_URLxxx razee.io/build-url: xxxBUILD_URLxxx labels: addonmanager.kubernetes.io/mode: EnsureExists name: managed-istio-custom namespace: ibm-operators data: _example: | ... # Global Envoy proxy access logging # --------------------------------- # To allow Envoy proxy access logging use: "/dev/stdout". # # Add the following key below this _example section. # Key: istio-global-proxy-accessLogFile # Values: (quotes are required) # "" is used to disable proxy access logging (Default) # "/dev/stdout" is used to enable proxy access logging ... istio-global-proxy-accessLogFile: "/dev/stdout"
To update the add-on:
-
Disable the in-cluster operator to stop any reconciling of the
IstioOperatorCRs, but leaves the current installation of Istio intact.a. Run the
disablecommand.ibmcloud ks cluster addon disable istio -c $CLUSTER_IDb. Wait 10 minutes.
c. Get the administrator
kubeconfigfile, or akubeconfigfile with enough authority to run the rest of these commands.Example:
One method for getting the administrator
kubeconfigfile is to run the following command, which sets the defaultkubeconfigfor this shell to be the administratorkubeconfigfor the cluster.ibmcloud ks cluster config -c $CLUSTER_ID --admin -
Remove the in-cluster operator by running the following commands.
a. Remove the deployment.
kubectl delete deployment -n ibm-operators addon-istio-operator --ignore-not-found=truea. Remove the service account.
kubectl delete serviceaccount -n ibm-operators addon-istio-operator --ignore-not-found=truec. Remove the role binding.
kubectl delete clusterrolebinding addon-istio-operator --ignore-not-found=trued. Remove the role.
kubectl delete clusterrole addon-istio-operator --ignore-not-found=true -
Label and annotate the resources being migrated for Helm to own those resources. Update the following shell script and remove the sections for resources that do not exist in the cluster, then run the script.
helm_ownership_of_resource() { release_name="${1}" kind="${2}" name="${3}" namespace="${4}" if [ -n "${namespace}" ]; then kubectl label "${kind}" "${name}" -n "${namespace}" app.kubernetes.io/managed-by=Helm || true kubectl annotate "${kind}" "${name}" -n "${namespace}" meta.helm.sh/release-name="${release_name}" || true kubectl annotate "${kind}" "${name}" -n "${namespace}" meta.helm.sh/release-namespace=istio-system || true else kubectl label "${kind}" "${name}" app.kubernetes.io/managed-by=Helm || true kubectl annotate "${kind}" "${name}" meta.helm.sh/release-name="${release_name}" || true kubectl annotate "${kind}" "${name}" meta.helm.sh/release-namespace=istio-system || true fi } echo "Each resource migrating to helm needs to be labled with app.kubernetes.io/managed-by=Helm, and annotationed with both meta.helm.sh/release-name=\$RELASE_NAME and meta.helm.sh/release-namespace=istio-system." echo echo "A resource that already has the app.kubernetes.io/managed-by=Helm, for example if this script previously executed, will log as not labeled when this script is run because the label already exists." echo echo "Start of istio-base chart objects" helm_ownership_of_resource istio-base ServiceAccount istio-reader-service-account istio-system helm_ownership_of_resource istio-base CustomResourceDefinition wasmplugins.extensions.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition destinationrules.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition envoyfilters.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition gateways.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition proxyconfigs.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition serviceentries.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition sidecars.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition virtualservices.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition workloadentries.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition workloadgroups.networking.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition authorizationpolicies.security.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition peerauthentications.security.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition requestauthentications.security.istio.io helm_ownership_of_resource istio-base CustomResourceDefinition telemetries.telemetry.istio.io helm_ownership_of_resource istio-base ValidatingWebhookConfiguration istiod-default-validator istio-system echo "Start of istiod chart objects" helm_ownership_of_resource istiod PodDisruptionBudget istiod istio-system helm_ownership_of_resource istiod ServiceAccount istiod istio-system helm_ownership_of_resource istiod ConfigMap istio istio-system helm_ownership_of_resource istiod ConfigMap istio-sidecar-injector istio-system helm_ownership_of_resource istiod ClusterRole istiod-clusterrole-istio-system helm_ownership_of_resource istiod ClusterRole istiod-gateway-controller-istio-system helm_ownership_of_resource istiod ClusterRole istio-reader-clusterrole-istio-system helm_ownership_of_resource istiod ClusterRoleBinding istiod-clusterrole-istio-system helm_ownership_of_resource istiod ClusterRoleBinding istiod-gateway-controller-istio-system helm_ownership_of_resource istiod ClusterRoleBinding istio-reader-clusterrole-istio-system helm_ownership_of_resource istiod Role istiod istio-system helm_ownership_of_resource istiod RoleBinding istiod istio-system helm_ownership_of_resource istiod Service istiod istio-system helm_ownership_of_resource istiod Deployment istiod istio-system helm_ownership_of_resource istiod HorizontalPodAutoscaler istiod istio-system helm_ownership_of_resource istiod MutatingWebhookConfiguration istio-sidecar-injector helm_ownership_of_resource istiod ValidatingWebhookConfiguration istio-validator-istio-system echo "Start of istio-ingressgateway chart objects" helm_ownership_of_resource istio-ingressgateway PodDisruptionBudget istio-ingressgateway istio-system helm_ownership_of_resource istio-ingressgateway ServiceAccount istio-ingressgateway-service-account istio-system helm_ownership_of_resource istio-ingressgateway Service istio-ingressgateway istio-system helm_ownership_of_resource istio-ingressgateway Deployment istio-ingressgateway istio-system helm_ownership_of_resource istio-ingressgateway HorizontalPodAutoscaler istio-ingressgateway istio-system helm_ownership_of_resource istio-ingressgateway Role istio-ingressgateway-sds istio-system helm_ownership_of_resource istio-ingressgateway RoleBinding istio-ingressgateway-sds istio-system echo "Start of istio-egressgateway chart objects" helm_ownership_of_resource istio-egressgateway PodDisruptionBudget istio-egressgateway istio-system helm_ownership_of_resource istio-egressgateway ServiceAccount istio-egressgateway-service-account istio-system helm_ownership_of_resource istio-egressgateway Service istio-egressgateway istio-system helm_ownership_of_resource istio-egressgateway Deployment istio-egressgateway istio-system helm_ownership_of_resource istio-egressgateway HorizontalPodAutoscaler istio-egressgateway istio-system helm_ownership_of_resource istio-egressgateway Role istio-egressgateway-sds istio-system helm_ownership_of_resource istio-egressgateway RoleBinding istio-egressgateway-sds istio-system -
Install
addon-istio1.24 by running theenablecommand.ibmcloud ks cluster addon enable istio -c $CLUSTER_ID --version 1.24 -
Verify that the Helm update was successful.
kubectl get cm -n ibm-operatorsExample output:
NAME DATA AGE istio-ca-root-cert 1 2d kube-root-ca.crt 1 2d managed-istio-base-control-plane-values 2 2d managed-istio-custom 2 2d managed-istio-egressgateway-values 2 2d managed-istio-ingressgateway-values 2 2d managed-istio-istiod-control-plane-values 2 2dThe cluster updater created four ConfigMaps in the
ibm-operatorsnamespace and Helm's upgrade commands were run on the fourvalue.yamlfiles in those ConfigMaps. The Helm response is stored in thevalues.yaml.helm.resultkey in each ConfigMap.If the labels and annotations were all applied, then Helm accepts ownership of those resources and upgrades
addon-istioto Istio 1.24 with a defaultistio-ingressgatewayandistio-egressgateway.Run the following command to view the Helm responses.
kubectl get cm -n ibm-operators managed-istio-ingressgateway-values -o json | jq -r .data.\"values.yaml.helm.result\"Successful result:
This success message includes a timestamp of the most recent Helm upgrade cycle. This timestamp can be used to confirm whether a Helm upgrade cycle completed after a config change was made.
Tue, 26 Aug 2025 19:13:03 GMT HELM_SUCCESS: Release "istio-ingressgateway" has been upgraded. Happy Helming! NAME: istio-ingressgateway LAST DEPLOYED: Tue Aug 26 19:12:57 2025 NAMESPACE: istio-system STATUS: deployed REVISION: 2840 TEST SUITE: None NOTES: "istio-ingressgateway" successfully installed! To learn more about the release, try: $ helm status istio-ingressgateway -n istio-system $ helm get all istio-ingressgateway -n istio-system Next steps: * Deploy an HTTP Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ * Deploy an HTTPS Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/Unsuccessful result:
This unsuccessful message can display when one of the resources is not properly labeled and annotated. In this example, the label is missing and both annotations are missing. The error can be fixed by applying the missing label and annotations.
HELM_ERROR: Pulled: icr.io/ext/istio/helm-charts/gateway:1.24.0 Digest: sha256:d34b44d25c4d809fc9bb99bc83f38b213ff29aed9abf4b7fbf362f254d9a8168 Error: Unable to continue with install: PodDisruptionBudget "istio-ingressgateway" in namespace "istio-system" exists and cannot be imported into the current release: invalid ownership metadata; label validation error: missing key "app.kubernetes.io/managed-by": must be set to "Helm"; annotation validation error: missing key "meta.helm.sh/release-name": must be set to "istio-ingressgateway"; annotation validation error: missing key "meta.helm.sh/release-namespace": must be set to "istio-system" -
Test the data plane configuration and verify that the traffic is working. Use the following command to debug errors.
istioctl analyze -A -
Update the Istio sidecars for the app to match the Istio version of the add-on. This step might already be completed as part of the data plane testing above.
-
For any custom gateways, amend the
values.yamlin the new default gateways as needed. -
Decide what to do with the
istio-ingressgateway-public-2oristio-ingressgateway-public-3resources. Because only one default gateway is supported in version 1.24, these deployments are not migrated for you.-
To keep these deployments, you can set them up as an additional gateway.
-
To remove these deployments, see Removing gateway deployments.
-
Updating to 1.23 and earlier minor versions of the Istio add-on
Before you begin:
Review the prerequisites that apply to all version updates.
To update the minor version of the Istio add-on:
-
Review the current version of your Istio add-on.
kubectl get iop managed-istio -n ibm-operators -o jsonpath='{.metadata.annotations.version}' -
Review the available Istio add-on versions.
ibmcloud ks addon-versions -
Review the changes that are in each version in the Istio add-on change log.
-
If you are upgrading from version 1.11 to version 1.12 and your Istio components were provisioned at version 1.10 or earlier:
-
Run the command to get the details of your mutating webhook configurations.
kubectl get mutatingwebhookconfigurationsExample output
NAME WEBHOOKS AGE istio-sidecar-injector 5 32m -
In the output, find the
istio-sidecar-injectorand review the WEBHOOKS column. If there are 5 or more webhooks, run the following command to delete the additional webhooks.kubectl delete mutatingwebhookconfigurations istio-sidecar-injector && kubectl rollout restart deploy addon-istio-operator -n ibm-operatorsExample output
mutatingwebhookconfiguration.admissionregistration.k8s.io "istio-sidecar-injector" deleted -
Check that the additional webhooks were deleted. Get the details of your mutating webhook configurations and verify that there are 4
istio-sidecar-injectorwebhooks.kubectl get mutatingwebhookconfigurationsExample output
NAME WEBHOOKS AGE istio-sidecar-injector 4 60s -
Run the command to get the details of your validating webhook configuration.
kubectl get validatingwebhookconfigurationsExample output
NAME WEBHOOKS AGE istio-validator-istio-system 2 66s istiod-istio-system 1 31m -
Review the output. If the
istiod-istio-systemwebhook is listed, run the following command to delete it.kubectl delete ValidatingWebhookConfiguration istiod-istio-systemExample output
validatingwebhookconfiguration.admissionregistration.k8s.io "istiod-istio-system" deleted -
Verify that the
istiod-istio-systemwebhook is no longer listed.kubectl get validatingwebhookconfigurationsExample output
NAME WEBHOOKS AGE istio-validator-istio-system 2 2m
-
-
Update the Istio add-on.
ibmcloud ks cluster addon update istio --version <version> -c <cluster_name_or_ID> -
Before you proceed, verify that the update is complete.
The update process can take up to 20 minutes to complete.
-
Ensure that the Istio add-on's Health State is
normaland the Health Status isAddon Ready. If the state isupdating, the update is not yet complete.ibmcloud ks cluster addon ls --cluster <cluster_name_or_ID> -
Ensure that the control plane component pods in the
istio-systemnamespace have a STATUS ofRunning.kubectl get pods -n istio-systemNAME READY STATUS RESTARTS AGE istio-system istio-egressgateway-6d4667f999-gjh94 1/1 Running 0 61m istio-system istio-egressgateway-6d4667f999-txh56 1/1 Running 0 61m istio-system istio-ingressgateway-7bbf8d885-b9xgp 1/1 Running 0 61m istio-system istio-ingressgateway-7bbf8d885-xhkv6 1/1 Running 0 61m istio-system istiod-5b9b5bfbb7-jvcjz 1/1 Running 0 60m istio-system istiod-5b9b5bfbb7-khcht 1/1 Running 0 60m
-
Updating the istioctl client and sidecars
Whenever the Istio managed add-on is updated, update your istioctl client and the Istio sidecars for your app.
For example, the patch version of your add-on might be updated automatically by IBM Cloud Kubernetes Service, or you might update the minor version of your add-on. In either case, update your istioctl client and your app's existing Istio sidecars to match the Istio version of the add-on.
-
Get the version of your
istioctlclient and the Istio add-on control plane components.istioctl version --short=falseExample output
client version: version.BuildInfo{Version:"1.11.2"} pilot version: version.BuildInfo{Version:1.24.6} pilot version: version.BuildInfo{Version:1.24.6} data plane version: version.ProxyInfo{ID:"istio-egressgateway-77bf75c5c-vp97p.istio-system", IstioVersion:1.24.6} data plane version: version.ProxyInfo{ID:"istio-egressgateway-77bf75c5c-qkhgm.istio-system", IstioVersion:1.24.6} data plane version: version.ProxyInfo{ID:"istio-ingressgateway-6dcb67b64d-dffhq.istio-system", IstioVersion:1.24.6} data plane version: version.ProxyInfo{ID:"httpbin-74fb669cc6-svc8x.default", IstioVersion:1.24.6} data plane version: version.ProxyInfo{ID:"istio-ingressgateway-6dcb67b64d-cs9r9.istio-system", IstioVersion:1.24.6} ... -
In the output, compare the
client version(istioctl) to the version of the Istio control plane components, such as thepilot version. If theclient versionand control plane component versions don't match:-
Download the
istioctlclient of the same version as the control plane components.curl -L https://istio.io/downloadIstio | ISTIO_VERSION=1.24.6 sh - -
Navigate to the Istio package directory.
cd istio-1.24.6 -
Linux and macOS users: Add the
istioctlclient to yourPATHsystem variable.export PATH=$PWD/bin:$PATH
-
-
In the output of step 1, compare the
pilot versionto thedata plane versionfor each data plane pod.- If the
pilot versionand thedata plane versionmatch, no further updates are required. - If the
pilot versionand thedata plane versiondon't match, restart your deployments for the data plane pods that run the old version. The pod name and namespace are listed in each entry asdata plane version: version.ProxyInfo{ID:"<pod_name>.<namespace>", IstioVersion:"1.8.4"}.
kubectl rollout restart deployment <deployment> -n <namespace> - If the
Updating from an unsupported version of the Istio add-on
Update your Istio components to the latest patch version that is supported by IBM Cloud Kubernetes Service.