Build OCI Service Mesh virtual service configurations with mTLS and traffic routing.
Last verified: May 2026
Build OCI Service Mesh virtual service configurations with mTLS, traffic routing, ingress gateways, and access policies.
Required Fields
compartmentIddisplayNamemesh.displayNamevirtualServicesOutput will appear here...Build OCI Service Mesh virtual service configurations with mTLS and traffic routing. This tool helps OCI engineers generate valid configurations quickly without consulting documentation, reducing errors and accelerating infrastructure deployment. All processing runs in your browser with no data sent to external servers.
Your team's microservices on OKE communicate via plain HTTP — no mTLS, no observability, manual traffic management. The builder generates an OCI Service Mesh config: mesh enabled cluster-wide, virtual services for each microservice with mTLS auto-enabled, virtual deployments for canary versions, ingress gateway for external traffic. Within a week, all service-to-service traffic is mTLS-encrypted, distributed traces flow into OCI APM for debugging, and the team can do canary deployments by manipulating traffic policies (no code changes needed).
OCI Service Mesh is Istio-based but managed by Oracle — you get Istio's traffic management, mTLS, and observability without operating Istio yourself. For Kubernetes workloads on OKE, this is dramatically easier than self-managing Istio.
Always enable mTLS by default. The performance overhead is negligible (modern CPU AES-NI handles this fast); the security improvement is enormous. Without mTLS, service-to-service traffic is plaintext within your cluster — visible to anyone with cluster network access.
Virtual Service traffic policies enable canary deployments at the network layer. Route 95% of traffic to v1, 5% to v2 based on header conditions or random splits. Monitor v2's metrics for 30 minutes; if healthy, shift traffic. Without service mesh, this requires application-layer logic; with it, the mesh handles routing.
The builder constructs OCI Service Mesh configurations: mesh resource (compartment, name), virtual services (each representing a microservice with its routing policies, mTLS settings, and traffic targets), virtual deployments (representing service versions for canary/blue-green patterns), ingress gateways for external traffic entry, and mesh-wide policies (logging, tracing). Output is generated as oci service-mesh commands and Terraform oci_service_mesh_* resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.