Update references to value files (#3412)

This commit is contained in:
John Howard 2019-03-05 10:47:07 -08:00 committed by Shriram Rajagopalan
parent 5c255e9618
commit 0dabe29b28
3 changed files with 4 additions and 4 deletions

View File

@ -62,7 +62,7 @@ on **each** Kubernetes cluster.
{{< text bash >}} {{< text bash >}}
$ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \ $ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \
-f @install/kubernetes/helm/istio/values-istio-multicluster-gateways.yaml@ > $HOME/istio.yaml -f @install/kubernetes/helm/istio/example-values/values-istio-multicluster-gateways.yaml@ > $HOME/istio.yaml
{{< /text >}} {{< /text >}}
For further details and customization options, refer to the For further details and customization options, refer to the

View File

@ -27,7 +27,7 @@ requests to a testing Vault CA:
--name=istio \ --name=istio \
--namespace=istio-system \ --namespace=istio-system \
--set global.proxy.excludeIPRanges="35.233.249.249/32" \ --set global.proxy.excludeIPRanges="35.233.249.249/32" \
--values install/kubernetes/helm/istio/values-istio-example-sds-vault.yaml \ --values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \
install/kubernetes/helm/istio >> istio-auth.yaml install/kubernetes/helm/istio >> istio-auth.yaml
$ kubectl create -f istio-auth.yaml $ kubectl create -f istio-auth.yaml
{{< /text >}} {{< /text >}}
@ -38,7 +38,7 @@ address `35.233.249.249`. The configuration
the testing Vault server, so that Envoy will not intercept the traffic from the testing Vault server, so that Envoy will not intercept the traffic from
Node Agent to Vault. Node Agent to Vault.
The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/values-istio-example-sds-vault.yaml) The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml)
contains the configuration that enables SDS (secret discovery service) in Istio. contains the configuration that enables SDS (secret discovery service) in Istio.
The Vault CA related configuration is set as environmental variables: The Vault CA related configuration is set as environmental variables:

View File

@ -47,7 +47,7 @@ keywords: [kubernetes,multicluster,federation,gateway]
{{< text bash >}} {{< text bash >}}
$ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \ $ helm template install/kubernetes/helm/istio --name istio --namespace istio-system \
-f install/kubernetes/helm/istio/values-istio-multicluster-gateways.yaml > $HOME/istio.yaml -f install/kubernetes/helm/istio/example-values/values-istio-multicluster-gateways.yaml > $HOME/istio.yaml
$ kubectl create namespace istio-system $ kubectl create namespace istio-system
$ kubectl apply -f $HOME/istio.yaml $ kubectl apply -f $HOME/istio.yaml
{{< /text >}} {{< /text >}}