Overview
Use the Gloo UI to get an at-a-glance view of the configuration, health, and compliance status of your Gloo Mesh Enterprise components and Istio workloads.


About the Gloo UI
By default, the Gloo UI is deployed in the gloo-mesh
namespace of your management cluster. The deployment is exposed with a ClusterIP service so that no one can access it from outside the cluster. You can review the gloo-mesh-ui
resources with the following command.
kubectl get all -A -l app=gloo-mesh-ui
No authentication or authorization is applied by default. Anyone that can access the management cluster can open the Gloo UI and review all of the Gloo custom resources and configurations in your setup.
To control access:
- Give only administrators access to the management cluster.
- Control user access to the Gloo UI service in the management cluster with Kubernetes RBAC.
- Optionally [set up an OIDC provider]( /gloo-mesh-enterprise/main//observability/tools/ui/auth/) for the Gloo UI.
HTTPS configuration
By default, the Gloo UI is exposed within the cluster only and configured to accept incoming HTTP traffic. To make the Gloo UI accessible to external users, you can expose the Gloo UI by using a public load balancer. Note that while traffic to the load balancer is encrypted, the traffic between the load balancer and the Gloo UI is not encrypted by default. To protect the Gloo UI and its data, it is a common practice to configure the Gloo UI for HTTPS traffic so that all data is secured and encrypted at all times.
Externally exposing the Gloo UI via a load balancer and configuring the Gloo UI to accept only HTTPS traffic provides the following key advantages:
- Data encryption: All data that is exchanged between the client browser and Gloo UI is encrypted. This approach helps to meet regulatory requirements and to protect sensitive information.
- User privacy: All communication between the client and the Gloo UI is private.
- Compliance: Configuring the Gloo UI for HTTPS traffic helps to comply with modern security standards and to provider a better experience to your users by avoiding security warnings in the client browser.
For more information, see [Configure the UI for HTTPS]( /gloo-mesh-enterprise/main//observability/tools/ui/tls/).
External authentication
To further protect the Gloo UI from unauthorized users, set up authentication and authorization (AuthN/AuthZ) for the Gloo UI by using OpenID Connect (OIDC) and Kubernetes role-based access control (RBAC). The Gloo UI supports OpenID Connect (OIDC) authentication from common providers such as Google, Okta, and Auth0. For more information, see [Set up external auth]( /gloo-mesh-enterprise/main//observability/tools/ui/auth/).
Monitored metrics
The Gloo UI monitors and visualizes the following metrics from the built-in Prometheus server for the workloads in your cluster. You can see and work with these metrics by using the [Gloo UI Graph]( /gloo-mesh-enterprise/main//observability/tools/ui/explore/#graph).
istio_requests_total
: This metric is used to determine the number of total requests, successful and failed requests that passed the ingress gateway or that were sent to your workloads in the service mesh.istio_request_duration_milliseconds_bucket
: To determine the latency between microservices, the Gloo UI monitors the milliseconds it takes for a request to be routed from the gateway or client in the service mesh to its destination.
To learn more about the built-in Prometheus server and the metrics that are available to you, see the [Prometheus overview]( /gloo-mesh-enterprise/main//observability/tools/prometheus/overview/).