diff --git a/content/docs/reference/commands/galley/index.html b/content/docs/reference/commands/galley/index.html index c5df4e96e2..65458029b2 100644 --- a/content/docs/reference/commands/galley/index.html +++ b/content/docs/reference/commands/galley/index.html @@ -166,6 +166,10 @@ number_of_entries: 4 Name of authentication plugin to use for connection to sink server. (default ``) +--sinkMeta <stringSlice> +Comma-separated list of key=values to attach as metadata to outgoing sink connections. Ex: 'key=value,key2=value2' (default `[]`) + + --tlsCertFile <string> File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`) @@ -358,6 +362,10 @@ number_of_entries: 4 Name of authentication plugin to use for connection to sink server. (default ``) +--sinkMeta <stringSlice> +Comma-separated list of key=values to attach as metadata to outgoing sink connections. Ex: 'key=value,key2=value2' (default `[]`) + + --tlsCertFile <string> File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`) @@ -591,6 +599,11 @@ number_of_entries: 4 Name of authentication plugin to use for connection to sink server. (default ``) +--sinkMeta <stringSlice> + +Comma-separated list of key=values to attach as metadata to outgoing sink connections. Ex: 'key=value,key2=value2' (default `[]`) + + --tlsCertFile <string> File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`) diff --git a/content/docs/reference/commands/istioctl/index.html b/content/docs/reference/commands/istioctl/index.html index f16b1ca610..a72c26e025 100644 --- a/content/docs/reference/commands/istioctl/index.html +++ b/content/docs/reference/commands/istioctl/index.html @@ -176,10 +176,10 @@ istioctl authn tls-check

istioctl authn tls-check

-Requests Pilot to check for what authentication policy and destination rule it uses for each service in -service registry, and check if TLS settings are compatible between them. +Check what authentication policies and destination rules pilot uses to config a proxy instance, +and check if TLS settings are compatible between them.

-
istioctl authn tls-check [<service>] [flags]
+
istioctl authn tls-check <pod-name[.namespace]> [<service>] [flags]
 
@@ -262,11 +262,12 @@ service registry, and check if TLS settings are compatible between them.

Examples


-# Check settings for all known services in the service registry:
-istioctl authn tls-check
+# Check settings for pod "foo-656bd7df7c-5zp4s" in namespace default:
+istioctl authn tls-check 656bd7df7c-5zp4s.default
 
-# Check settings for a specific service
-istioctl authn tls-check foo.bar.svc.cluster.local
+# Check settings for pod "foo-656bd7df7c-5zp4s" in namespace default, filtered on destintation
+service "bar" :
+istioctl authn tls-check 656bd7df7c-5zp4s.default bar
 
 

istioctl deregister

diff --git a/content/docs/reference/config/istio.authentication.v1alpha1/index.html b/content/docs/reference/config/istio.authentication.v1alpha1/index.html index 12aa2f3395..33e58067d7 100644 --- a/content/docs/reference/config/istio.authentication.v1alpha1/index.html +++ b/content/docs/reference/config/istio.authentication.v1alpha1/index.html @@ -11,7 +11,7 @@ number_of_entries: 11

Jwt

JSON Web Token (JWT) token format for authentication as defined by -https://tools.ietf.org/html/rfc7519. See OAuth +RFC 7519. See OAuth 2.0 and OIDC 1.0 for how this is used in the whole authentication flow.

diff --git a/content/docs/reference/config/istio.mesh.v1alpha1/index.html b/content/docs/reference/config/istio.mesh.v1alpha1/index.html index 37d2a280d3..8ed809453a 100644 --- a/content/docs/reference/config/istio.mesh.v1alpha1/index.html +++ b/content/docs/reference/config/istio.mesh.v1alpha1/index.html @@ -93,7 +93,7 @@ distribution of traffic to endpoints based on the localities of where the traffic originates and where it will terminate. These localities are specified using arbitrary labels that designate a hierarchy of localities in {region}/{zone}/{sub-zone} form. For additional detail refer to -https://www.envoyproxy.io/docs/envoy/latest/intro/archoverview/loadbalancing/locality_weight +Locality Weight The following example shows how to setup locality weights mesh-wide.

Given a mesh with workloads and their service deployed to “us-west/zone1/” @@ -475,7 +475,7 @@ can be configured for a single control plane.

string

The trust domain corresponds to the trust root of a system. -Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain +Refer to SPIFEE-ID Fallback to old identity format(without trust domain) if not set.

diff --git a/content/docs/reference/config/istio.networking.v1alpha3/index.html b/content/docs/reference/config/istio.networking.v1alpha3/index.html index b63dad1da5..c198714f36 100644 --- a/content/docs/reference/config/istio.networking.v1alpha3/index.html +++ b/content/docs/reference/config/istio.networking.v1alpha3/index.html @@ -669,6 +669,16 @@ sizes, outlier detection).

One or more named sets that represent individual versions of a service. Traffic policies can be overridden at subset level.

+ + + +exportTo +string[] + +

The resolution of a DestinationRule to apply to a service occurs in the +context of a hierarchy of namespaces. This rule controls whether those +namespaces are allowed to select this rule.

+ @@ -1855,7 +1865,7 @@ destination.

CorsPolicy

Cross-Origin Resource Sharing policy (CORS). Refer to -https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS +CORS for further details about cross origin resource sharing.

@@ -3230,7 +3240,7 @@ spec:

The following example demonstrates the use of a dedicated egress gateway through which all external service traffic is forwarded. -The ‘export_to’ field allows for control over the visibility of a service +The ‘exportTo’ field allows for control over the visibility of a service declaration to other namespaces in the mesh. By default a service is exported to all namespaces. The following example restricts the visibility to the current namespace, represented by “.”, so that it cannot be used by other @@ -3244,8 +3254,8 @@ metadata: spec: hosts: - httpbin.com - export_to: - - . + exportTo: + - "." location: MESH_EXTERNAL ports: - number: 80 @@ -3288,7 +3298,7 @@ metadata: spec: hosts: - httpbin.com - export_to: + exportTo: - * gateways: - mesh @@ -3494,6 +3504,29 @@ said port will be allowed (i.e. 0.0.0.0:).

One or more endpoints associated with the service.

+ + + +exportTo +string[] + +

A list of namespaces to which this service is exported. Exporting a service +allows it to used by sidecars, gateways and virtual services defined in +other namespaces. This feature provides a mechanism for service owners +and mesh administrators to control the visibility of services across +namespace boundaries.

+ +

If no namespaces are specified then the service is exported to all +namespaces by default.

+ +

The value “.” is reserved and defines an export to the same namespace that +the service is declared in, similarly the value “*” is reserved and +defines an export to all namespaces.

+ +

For a Kubernetes Service the equivalent effect can be achieved by setting +the annotation “networking.istio.io/exportTo” to a comma-separated list +of namespace names.

+ @@ -3728,7 +3761,7 @@ than one selector-less Sidecar resources exist in a given namespace. The behavior of the system is undefined if two or more Sidecar resources with a workload selector select the same workload.

-

The example below delcares a Sidecar resource in the prod-us1 namespace +

The example below declares a Sidecar resource in the prod-us1 namespace that configures the sidecars in the namespace to allow egress traffic to public services in the prod-us1, prod-apis, and the istio-system namespaces.

@@ -3746,7 +3779,7 @@ spec: - "istio-system/*"
-

The example below delcares a Sidecar resource in the prod-us1 namespace +

The example below declares a Sidecar resource in the prod-us1 namespace that accepts inbound HTTP traffic on port 9080 and forwards it to the attached workload listening on a unix domain socket. In the egress direction, in addition to the istio-system namespace, the sidecar @@ -4573,6 +4606,25 @@ traffic.

be applied to any port that is not a HTTP or TLS port. The first rule matching an incoming request is used.

+ + + +exportTo +string[] + +

A list of namespaces to which this virtual service is exported. Exporting a +virtual service allows it to used by sidecars and gateways defined in +other namespaces. This feature provides a mechanism for service owners +and mesh administrators to control the visibility of virtual services +across namespace boundaries.

+ +

If no namespaces are specified then the virtual service is exported to all +namespaces by default.

+ +

The value “.” is reserved and defines an export to the same namespace that +the virtual service is declared in, similarly the value “*” is reserved and +defines an export to all namespaces.

+ diff --git a/content/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/index.html b/content/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/index.html index 8f0e37473f..945156d22c 100644 --- a/content/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/index.html +++ b/content/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1/index.html @@ -1006,6 +1006,15 @@ default mixer certificates will be used.

verify the presented adapter certificates. By default mixer should already include Istio CA certificates and system certificates in cert pool.

+ + + +serverName +string + +

Indicates the name of adapter backend server which is useful for routing with +proxy-fronted backend.

+ @@ -1313,6 +1322,15 @@ key, etc).

Customized header key to hold access token, e.g. x-api-key. Token will be passed as what it is.

+ + + +serverName +string + +

Indicates the name of adapter backend which is useful for routing with +proxy-fronted backend.

+