Configure OpenTelemetry tracing with Istio

Istio 1.22+

An important part in tracing is to have a stable, single point in your architecture where trace initialization, such as starting new or continuing existing traces using context propagation, is guaranteed. With network requests first arriving at the network edge, this is the ideal place to ensure that.

In a Kubernetes environment, this can be achieved with Istio and the automatic deployment of HTTP proxy services. The following configuration uses the Istio OpenTelemetry extension provider to automatically deploy and configure HTTP proxies to export OpenTelemetry traces to Dynatrace.

Why migrate?

Envoy deprecated and removed OpenTracing with Envoy 1.30 (Istio 1.22). As the Dynatrace Envoy code-module is based on OpenTracing, it is only available until Envoy 1.29 (Istio 1.21). Starting with Envoy 1.30 / Istio 1.22, we recommend to follow this configuration guide and use the Istio OpenTelemetry trace configuration including Dynatrace resource detection and sampling.

Licensing impact

The migration from an Dynatrace Envoy code-module to the new OpenTelemetry based approach might have an impact on your license consumption, depending on the sampling configuration and the Kubernetes deployment approach you use:

Get configuration entries

  1. In Dynatrace Hub, search for Istio.
  2. Filter by the category Technology.
  3. Select the Hub entry Istio Service Mesh.
  4. Select Set up.
  5. Configure the API token.
  6. Use the provided and pre-configured snippets to deploy the following items in the next steps:
    • the Mesh configuration
    • the service entry
    • the telemetry API

Apply the Mesh configuration to your Istio installation

Save the Mesh configuration snippet you obtained in step 1 under meshconfig.yaml and configure Istio with the following command:

istioctl install -f meshconfig.yaml
Existing Mesh configuration

If you already use your own, custom Mesh configuration, you need to merge its content with the provided snippet. Otherwise, you can use the snippet as-is.

Deploy the service entry

Next, you need to deploy the Istio service entry manifest you obtained in step 1 using kubectl. Save it to service_entry.yaml and run the following command:

kubectl apply -n istio-system -f service_entry.yaml

Enable tracing provider

As last configuration step, use the Istio telemetry API to enable the tracing provider.

Save the telemetry API manifest you obtained in step 1 to tracing.yaml and use kubectl to apply the configuration to the desired namespace.

kubectl apply -n istio-system -f tracing.yaml

Verify the setup

Once the setup is complete and you have ingested your first data, you can verify if the traces show up in Dynatrace.

trace