Apply a policy and explore the UI
Apply a fault injection policy to the ratings service. Then, you can check out the policy and other Gloo resources in the Gloo UI.
Apply fault injection
Apply a fault injection policy to the ratings service to delay requests and simulate network issues or an overloaded service. A delay simulates an overloaded upstream service or network issues, and can help you build more resilient apps.
Verify that you can successfully send requests to the ratings app from within the mesh. Use the
kubectl debugcommand to create an ephemeral curl container in the deployment. This way, the curl container inherits any permissions from the app that you want to test.kubectl --context ${REMOTE_CONTEXT1} -n bookinfo debug -i pods/$(kubectl get pod --context ${REMOTE_CONTEXT1} -l app=ratings -A -o jsonpath='{.items[0].metadata.name}') --image=curlimages/curl -- curl http://ratings:9080/ratings/1Example output:
{"id":1,"ratings":{"Reviewer1":5,"Reviewer2":4}}If the output has an error about
EphemeralContainers, see Ephemeral containers don’t work when testing Bookinfo.Create a fault injection policy to delay responses from the ratings app by 10 seconds, and a route table specifically for testing access to the ratings app.
kubectl apply --context $MGMT_CONTEXT -f- <<EOF apiVersion: resilience.policy.gloo.solo.io/v2 kind: FaultInjectionPolicy metadata: name: faultinjection-basic-delay namespace: bookinfo spec: applyToRoutes: - route: labels: route: ratings config: delay: fixedDelay: 10s --- apiVersion: networking.gloo.solo.io/v2 kind: RouteTable metadata: name: ratings-rt namespace: bookinfo spec: hosts: - ratings http: - name: ratings forwardTo: destinations: - ref: name: ratings namespace: bookinfo labels: route: ratings workloadSelectors: - {} EOFSend another request to the ratings app by using the same method as in step 1. Note that this time, the app’s response is delayed due to the fault injection.
Explore the UI
Use the Gloo UI to evaluate the health and efficiency of your service mesh.
Open the Gloo UI. The Gloo UI is served from the
gloo-mesh-uiservice on port 8090. You can connect by using themeshctlorkubectlCLIs.- meshctl: For more information, see the CLI documentation.
meshctl dashboard - kubectl:
- Port-forward the
gloo-mesh-uiservice on 8090.kubectl port-forward -n gloo-mesh svc/gloo-mesh-ui 8090:8090 - Open your browser and connect to http://localhost:8090.
- Port-forward the
- meshctl: For more information, see the CLI documentation.
Review the Dashboard page, which presents an at-a-glance look at the health of workspaces and clusters that make up your Gloo setup.
- In the Workspaces pane, you can review the workspace that was automatically created for you in your Gloo setup.
- In the Clusters pane, you can review the workload clusters that are currently connected to your Gloo setup.

Figure: Overview UI screenshot 
Figure: Overview UI screenshot Verify the details of the fault injection policy that you created in the previous section.
- Click the Resources tab to open the Solo resources page.
- In the row for your policy,
faultinjection-basic-delay, click View Policy. - Review the details of the policy, such as the
ratingsroute that it applies to. - Click View YAML.
- Scroll to the end of the YAML output to verify that the policy has a
stateofACCEPTED.
Next steps
Now that you have Gloo Mesh (Gloo Platform APIs) and Istio up and running, check out some of the following resources to learn more about Gloo Mesh and expand your service mesh capabilities.
Gloo Mesh (Gloo Platform APIs):
- To see how Gloo Mesh helps you create a secure, multicluster service mesh, check out the multitenancy, federation, and isolation tutorial to configure Gloo Mesh for a multitenancy use case.
- Customize your Gloo Mesh installation with a Helm-based setup.
Istio: Now that you have Gloo Mesh (Gloo Platform APIs) and Istio installed, you can use Gloo to manage your Istio service mesh resources. You don’t need to directly configure any Istio resources going forward.
- Find out more about hardened Istio
n-4version support built into Solo distributions of Istio. - Review how Gloo Mesh (Gloo Platform APIs) custom resources are automatically translated into Istio resources.
- Monitor and observe your Istio environment with Gloo Mesh (Gloo Platform APIs)’s built-in telemetry tools.
- When it’s time to upgrade Istio, check out Upgrade managed service meshes.
Help and support:
- Talk to an expert to get advice or build out a proof of concept.
- Join the #gloo-mesh channel in the Solo.io community slack.
- Try out one of the Gloo workshops.
Cleanup
You can optionally remove the resources that you set up as part of this guide.
Delete the fault injection policy and testing route table.
kubectl delete FaultInjectionPolicy faultinjection-basic-delay -n bookinfo --context $MGMT_CONTEXT kubectl delete RouteTable ratings-rt -n bookinfo --context $MGMT_CONTEXTIf you no longer need this quick-start Gloo Mesh environment, you can follow the steps in the uninstall guide.