How to configure Kiali to fit your needs.

Authentication Strategies

Choosing and configuring the appropriate authentication strategy.

Custom Dashboards

Configuring additional, non-default dashboards.

Distributed Tracing / Jaeger

Configuring Kiali’s Jaeger integration.

Namespace Management

Configuring the namespaces accessible and visible to Kiali.

Role-based access control

Configuring RBAC based on the authentication strategy.

Traffic Health

Customizing Health for Request Traffic.

Virtual Machine workloads

Ensuring Kiali can visualize a VM WorkloadEntry.