From 1e75e9ee3468f34506c852f11d430c9689e03bef Mon Sep 17 00:00:00 2001 From: Istio Automation Date: Mon, 11 Jan 2021 18:10:32 -0800 Subject: [PATCH] Automator: update istio.io@ reference docs (#8764) --- .../reference/commands/istioctl/index.html | 5 + .../docs/reference/config/labels/index.html | 112 ++++++++++++++++++ 2 files changed, 117 insertions(+) create mode 100644 content/en/docs/reference/config/labels/index.html diff --git a/content/en/docs/reference/commands/istioctl/index.html b/content/en/docs/reference/commands/istioctl/index.html index f83f4b5d34..07e75f1460 100644 --- a/content/en/docs/reference/commands/istioctl/index.html +++ b/content/en/docs/reference/commands/istioctl/index.html @@ -1487,6 +1487,11 @@ or release tar URL (e.g. https://github.com/istio/istio/releases/download/1.9.0/ Config namespace (default ``) +--server <string> + +The address and port of the Kubernetes API server. (default ``) + + --service-account <string> Create a secret with this service account's credentials. Use "istio-reader-service-account" as default value if --type is "remote", use "istiod-service-account" as default value if --type is "config". (default ``) diff --git a/content/en/docs/reference/config/labels/index.html b/content/en/docs/reference/config/labels/index.html new file mode 100644 index 0000000000..769ffac451 --- /dev/null +++ b/content/en/docs/reference/config/labels/index.html @@ -0,0 +1,112 @@ +--- +WARNING: THIS IS AN AUTO-GENERATED FILE, DO NOT EDIT. PLEASE MODIFY THE ORIGINAL SOURCE IN THE 'https://github.com/istio/api' REPO +source_repo: https://github.com/istio/api +title: Resource Labels +description: Resource labels used by Istio. +location: https://istio.io/docs/reference/config/labels/ +weight: 60 +--- +

+This page presents the various resource labels that +Istio supports to control its behavior. +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Label NameFeature StatusResource TypesDescription
istio.io/revAlpha[Namespace]Istio control plane revision associated with the resource; e.g. `canary`
service.istio.io/canonical-nameAlpha[Pod]Istio Canonical Service for a workload instance.
service.istio.io/canonical-revisionAlpha[Pod]Istio Canonical Service revision for a workload instance.
topology.istio.io/clusterAlpha[Pod]A workload label that indicates the name of the cluster that contains the workload. This is typically configured during control plane installation, using either an auto-generated or admin-specified value. Setting this allows workload selection by cluster. For example, a service owner could create a DestinationRule containing a subset per cluster and then use these subsets to control traffic flow to each cluster independently.
topology.istio.io/networkAlpha[Namespace Pod Service]A label used to identify the network for one or more pods. This is used
internally by Istio to group pods resident in the same L3 domain/network.
Istio assumes that pods in the same network are directly reachable from
one another. When pods are in different networks, an Istio Gateway
(e.g. east-west gateway) is typically used to establish connectivity
(with AUTO_PASSTHROUGH mode). This label can be applied to the following
resources to help automate Istio's multi-network configuration.

* Istio System Namespace: Applying this label to the system namespace
establishes a default network for pods managed by the control plane.
This is typically configured during control plane installation using an
admin-specified value.

* Pod: Applying this label to a pod allows overriding the default network
on a per-pod basis. This is typically applied to the pod via webhook
injection, but can also be manually specified on the pod by the service
owner. The Istio installation in each cluster configures webhook injection
using an admin-specified value.

* Gateway Service: Applying this label to the Service for an Istio Gateway,
indicates that Istio should use this service as the gateway for the
network, when configuring cross-network traffic. Istio will configure
pods residing outside of the network to access the Gateway service
via `spec.externalIPs`, `status.loadBalancer.ingress[].ip`, or in the case
of a NodePort service, the Node's address. The label is configured when
installing the gateway (e.g. east-west gateway) and should match either
the default network for the control plane (as specified by the Istio System
Namespace label) or the network of the targeted pods.
topology.istio.io/subzoneAlpha[Node]User-provided node label for identifying the locality subzone of a workload. This allows admins to specify a more granular level of locality than what is offered by default with Kubernetes regions and zones.