TLS Policy
Kiali uses one TLS policy for both its inbound server endpoint and every outbound client it creates—HTTP, gRPC, tracing exporters, and OpenID/OAuth HTTP flows. The policy is configured in deployment.tls_config in the Kiali CR. You decide whether the policy comes from the cluster (OpenShift TLSSecurityProfile) or from explicit settings.
Configuration Options
| Setting | Description |
|---|---|
source |
auto (OpenShift only: reads cluster TLSSecurityProfile) or config (use explicit settings) |
min_version |
Minimum TLS version: TLSv1.2 or TLSv1.3 |
max_version |
Maximum TLS version: TLSv1.2 or TLSv1.3 |
cipher_suites |
List of OpenSSL cipher names for TLS 1.2 (ignored for TLS 1.3) |
Platform Defaults
- OpenShift:
sourcedefaults toauto(uses cluster’s TLSSecurityProfile) - Non-OpenShift:
sourcedefaults toconfig(requires explicit configuration)
Examples
OpenShift: Auto-Discover TLS Policy
On OpenShift, set source: auto to have Kiali automatically read and enforce the cluster’s TLSSecurityProfile from APIServer/cluster:
spec:
deployment:
tls_config:
source: auto
With this configuration, Kiali reads the TLS settings from OpenShift’s API Server and enforces them for all connections. If the cluster profile changes, restart the Kiali pod to pick up the new settings.
Non-OpenShift: Explicit TLS 1.2 and 1.3
For non-OpenShift clusters, or when you want full control over TLS settings, use source: config with explicit values:
spec:
deployment:
tls_config:
source: config
min_version: TLSv1.2
max_version: TLSv1.3
cipher_suites:
- ECDHE-RSA-AES128-GCM-SHA256
- ECDHE-ECDSA-AES128-GCM-SHA256
- ECDHE-RSA-AES256-GCM-SHA384
- ECDHE-ECDSA-AES256-GCM-SHA384
This allows both TLS 1.2 and TLS 1.3 connections. The cipher suites apply only to TLS 1.2 connections; TLS 1.3 uses Go’s fixed cipher set.
TLS 1.3 Only
To enforce TLS 1.3 exclusively (highest security):
spec:
deployment:
tls_config:
source: config
min_version: TLSv1.3
When min_version is TLS 1.3, Kiali enforces TLS 1.3-only mode. The cipher_suites setting is ignored because TLS 1.3 cipher selection is managed by Go.
Secure Defaults (Minimal Configuration)
If you set source: config without specifying other values, Kiali applies secure defaults:
spec:
deployment:
tls_config:
source: config
This enforces TLS 1.2 or higher with Kiali’s secure default cipher list for TLS 1.2 connections:
ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-RSA-AES128-GCM-SHA256ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-RSA-AES256-GCM-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-CHACHA20-POLY1305
These ciphers use ECDHE for forward secrecy and support both ECDSA and RSA certificates with modern AEAD encryption (AES-GCM and ChaCha20-Poly1305).
Supported Values
TLS Versions
TLS 1.0 and 1.1 are not supported due to known security vulnerabilities. Attempting to use them will cause Kiali to fail at startup.
Supported version strings (case variations accepted):
TLSv1.2/TLS1.2/VersionTLS12TLSv1.3/TLS1.3/VersionTLS13
TLS 1.2 Cipher Suites
Specify cipher suites using OpenSSL names:
| Cipher Suite |
|---|
ECDHE-RSA-AES128-GCM-SHA256 |
ECDHE-ECDSA-AES128-GCM-SHA256 |
ECDHE-RSA-AES256-GCM-SHA384 |
ECDHE-ECDSA-AES256-GCM-SHA384 |
ECDHE-RSA-CHACHA20-POLY1305 |
ECDHE-ECDSA-CHACHA20-POLY1305 |
AES128-GCM-SHA256 |
AES256-GCM-SHA384 |
Unsupported cipher names will cause validation failure at startup.
Behavior
Fail-Fast Safety
Kiali refuses to start if:
- The
sourcevalue is invalid source=autois used on a non-OpenShift cluster- The OpenShift TLSSecurityProfile cannot be read
- An unsupported TLS version or cipher suite is specified
Enforcement Scope
The resolved TLS policy applies to:
- Kiali server’s inbound TLS configuration
- All outbound HTTP clients (Prometheus, Grafana, tracing exporters, auth flows)
- All outbound gRPC clients
Skip-Verify Behavior
Setting skip_verify: true on external services only bypasses certificate validation. TLS versions and cipher suites are still enforced according to the policy.
Policy Refresh
The TLS policy is resolved once at startup and cached for the lifetime of the Kiali process. When using source=auto, if the OpenShift TLSSecurityProfile changes, you must restart the Kiali pod for changes to take effect.
Logging
On startup, Kiali logs which TLS policy source is active and the resolved min/max versions and cipher count. Check these logs to verify the policy in effect or troubleshoot startup failures.