All Products
Search
Document Center

Alibaba Cloud Service Mesh:Default parameter settings in ASM

Last Updated:Mar 11, 2026

Alibaba Cloud Service Mesh (ASM) is a fully managed service mesh compatible with open-source Istio. ASM adjusts several Istio defaults to optimize startup ordering, resource efficiency, and graceful shutdown in managed environments.

The following tables compare default values in ASM against the Istio demo installation profile (version 1.17). Use these tables when migrating from self-managed Istio to ASM or troubleshooting unexpected workload behavior.

Note: Istio provides multiple installation profiles (default, demo, minimal, remote, empty), each with different parameter values. This comparison uses the demo profile: Profile files are in the manifests/profiles directory of each Istio release. If your Istio installation uses a different profile, some baseline values may differ.
./istioctl install --set profile=demo -y

Differences at a glance

The following parameters have different defaults in ASM compared to Istio 1.17 (demo profile). All other parameters retain the same defaults.

ParameterComponentIstio defaultASM defaultImpact
holdApplicationUntilProxyStartsProxyfalsetrueThe sidecar proxy starts before application containers, preventing startup race conditions.
proxyMetadataProxy{}{EXIT_ON_ZERO_ACTIVE_CONNECTIONS: "true"}Enables graceful sidecar shutdown when no active connections remain.
proxyStatsMatcherProxyN/AinclusionRegexps: [.*adaptive_concurrency.*]Reports adaptive concurrency metrics from Envoy.
Init container resources (requests)Proxycpu: 100m, memory: 128Micpu: 10m, memory: 10MiReduces resource overhead for the sidecar init container.
clusterDomainProxycluster.localSpecified at instance creationMust match the Kubernetes cluster domain on the data plane.
Tracing (Zipkin address)Proxyzipkin.istio-system:9411N/AASM does not enable tracing by default. Configure Tracing Analysis separately in the ASM console.
ISTIO_META_DNS_CAPTUREMeshConfigtruefalseDNS proxy is disabled by default.
BOOTSTRAP_XDS_AGENTMeshConfigtruefalseThe pilot-agent process does not dynamically fetch bootstrap configuration before starting Envoy.
enablePrometheusMergeMeshConfigtruefalseIstio Agent does not merge public metrics of an application with Envoy and agent metrics.
extensionProvidersMeshConfigConfigured per installed addonsConfigured in the ASM consoleConfigure providers for Log Service, Tracing Analysis, and metric monitoring through the ASM console.

Configuration override levels

You can override ASM default parameters at three levels. A more specific level takes precedence over a broader one:

LevelScopeMethod
Mesh-wideAll workloads in the meshMeshConfig in the ASM console
NamespaceAll workloads in a namespaceProxyConfig custom resource
Per-workloadA single workloadproxy.istio.io/config pod annotation

When a ProxyConfig custom resource and a pod annotation both apply to the same workload, the pod annotation takes precedence for overlapping fields.

Proxy parameters

These parameters control sidecar proxy injection, traffic interception, resource allocation, and runtime behavior.

ParameterIstio defaultASM defaultDescription
clusterDomaincluster.localSpecified at instance creationCluster-local domain name. Must match the Kubernetes cluster domain on the data plane.
enableCoreDumpfalseSame as IstioEnables core dumps for the injected sidecar proxy, used for debugging.
excludeInboundPorts""Same as IstioInbound ports excluded from redirection to the sidecar proxy.
includeInboundPorts"*"Same as IstioInbound ports whose traffic is redirected to the sidecar proxy.
includeIPRanges"*"Same as IstioIP ranges (CIDR) whose traffic is redirected to the sidecar proxy.
excludeIPRanges""Same as IstioIP ranges (CIDR) excluded from redirection to the sidecar proxy.
includeOutboundPorts""Same as IstioOutbound ports whose traffic is redirected to the sidecar proxy.
excludeOutboundPorts""Same as IstioOutbound ports excluded from redirection to the sidecar proxy.
logLevelwarningSame as IstioSidecar proxy log level.
readinessFailureThreshold30Same as IstioConsecutive probe failures before the sidecar is marked unready.
readinessInitialDelaySeconds1Same as IstioSeconds before the first readiness probe runs.
readinessPeriodSeconds2Same as IstioInterval between readiness probes, in seconds.
resourcesrequests: cpu: 100m, memory: 128Mi; limits: cpu: 2000m, memory: 1024MiSame as IstioResource requests and limits for the sidecar proxy container.
holdApplicationUntilProxyStartsfalsetrueWhen true, the sidecar proxy container must be ready before application containers start. Prevents race conditions where the application sends traffic before the proxy is ready.
concurrency2Same as IstioNumber of Envoy worker threads. If set to 0, Envoy uses all CPU cores regardless of resource limits, which may cause high CPU consumption. Leave this at the default unless you have a specific reason to change it.
interceptionModeREDIRECTSame as IstioMode used by the sidecar proxy to intercept traffic.
tracingzipkin: {address: zipkin.istio-system:9411}N/AASM does not enable Tracing Analysis by default. Configure tracing in the ASM console.
proxyMetadata{}{EXIT_ON_ZERO_ACTIVE_CONNECTIONS: "true"}Environment variables added to the sidecar proxy container. ASM enables graceful shutdown when all connections have drained.
terminationDrainDuration5sSame as IstioTime allowed for existing connections to complete when the sidecar proxy terminates.
proxyStatsMatcherN/AinclusionRegexps: [.*adaptive_concurrency.*]Custom Envoy metrics to report. ASM enables adaptive concurrency metrics by default.
Init container resourcesrequests: cpu: 100m, memory: 128Mi; limits: cpu: 2, memory: 1Girequests: cpu: 10m, memory: 10Mi; limits: cpu: 2, memory: 1GiResource requests and limits for the sidecar proxy init container. ASM uses lower resource requests to reduce scheduling overhead.
OutboundTrafficPolicyALLOW_ANYSame as IstioPolicy for outbound traffic to external services. ALLOW_ANY permits traffic to destinations outside the mesh.

Pilot (control plane) parameters

ParameterIstio defaultASM defaultDescription
jwtPolicythird-party-jwtSame as IstioJWT-based authentication policy. Valid values: third-party-jwt, first-party-jwt.

MeshConfig parameters

These parameters control mesh-wide settings including DNS proxy, access logging, metrics merging, and telemetry providers.

ParameterSub-fieldIstio defaultASM defaultDescription
proxyMetadataISTIO_META_DNS_CAPTUREtruefalseEnables or disables DNS proxy.
proxyMetadataBOOTSTRAP_XDS_AGENTtruefalseWhen enabled, the pilot-agent process dynamically fetches the bootstrap configuration before starting Envoy.
accessLogFile-/dev/stdoutSame as IstioFile path for access logs.
enablePrometheusMerge-truefalseWhen enabled, Istio Agent merges public metrics of an application with Envoy and Istio Agent metrics.
extensionProviders-Configured per installed addonsConfigured in the ASM consoleTelemetry backend providers. Configure providers for Log Service, Tracing Analysis, and metric monitoring through the ASM console.

Telemetry parameters

ParameterSub-fieldIstio defaultASM defaultDescription
prometheuswasmEnabledfalseSame as IstioEnables or disables WebAssembly (Wasm) runtimes for stats filters.
metadataExchangewasmEnabledfalseSame as IstioEnables or disables Wasm runtimes for metadata exchange filters.

Common misconfiguration warnings

ParameterMisconfigurationImpactRecommendation
concurrencySet to 0Envoy uses all CPU cores, ignoring resource limits. This can cause high CPU consumption and affect other workloads on the node.Leave at the default value (2).
holdApplicationUntilProxyStartsSet to false in ASMApplication containers may start before the sidecar proxy is ready, causing failed requests during startup.Keep the ASM default (true) unless startup latency is a specific concern.
accessLogFileLeft at /dev/stdout in high-traffic environmentsAccess logs consume disk I/O and storage. In high-traffic environments, this may affect performance.Disable access logging or route logs to a dedicated logging service when running at scale.