Update references to value files (#3412)

This commit is contained in:
John Howard 2019-03-05 10:47:07 -08:00 committed by Shriram Rajagopalan
parent 5c255e9618
commit 0dabe29b28
3 changed files with 4 additions and 4 deletions

View File

@ -62,7 +62,7 @@ on **each** Kubernetes cluster.
{{< text bash >}}
$ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \
-f @install/kubernetes/helm/istio/values-istio-multicluster-gateways.yaml@ > $HOME/istio.yaml
-f @install/kubernetes/helm/istio/example-values/values-istio-multicluster-gateways.yaml@ > $HOME/istio.yaml
{{< /text >}}
For further details and customization options, refer to the

View File

@ -27,7 +27,7 @@ requests to a testing Vault CA:
--name=istio \
--namespace=istio-system \
--set global.proxy.excludeIPRanges="35.233.249.249/32" \
--values install/kubernetes/helm/istio/values-istio-example-sds-vault.yaml \
--values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \
install/kubernetes/helm/istio >> istio-auth.yaml
$ kubectl create -f istio-auth.yaml
{{< /text >}}
@ -38,7 +38,7 @@ address `35.233.249.249`. The configuration
the testing Vault server, so that Envoy will not intercept the traffic from
Node Agent to Vault.
The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/values-istio-example-sds-vault.yaml)
The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml)
contains the configuration that enables SDS (secret discovery service) in Istio.
The Vault CA related configuration is set as environmental variables:

View File

@ -47,7 +47,7 @@ keywords: [kubernetes,multicluster,federation,gateway]
{{< text bash >}}
$ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \
-f install/kubernetes/helm/istio/values-istio-multicluster-gateways.yaml > $HOME/istio.yaml
-f install/kubernetes/helm/istio/example-values/values-istio-multicluster-gateways.yaml > $HOME/istio.yaml
$ kubectl create namespace istio-system
$ kubectl apply -f $HOME/istio.yaml
{{< /text >}}