Automator: update istio.io@release-1.6 reference docs (#7292)

This commit is contained in:
Istio Automation 2020-05-13 05:59:24 -07:00 committed by GitHub
parent 5576157ca4
commit 32393453e3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 141 additions and 1 deletions

View File

@ -4,7 +4,7 @@ source_repo: https://github.com/istio/istio
title: istioctl
description: Istio control interface.
generator: pkg-collateral-docs
number_of_entries: 77
number_of_entries: 78
max_toc_level: 2
remove_toc_prefix: 'istioctl '
---
@ -2307,6 +2307,137 @@ THIS COMMAND IS STILL UNDER ACTIVE DEVELOPMENT AND NOT READY FOR PRODUCTION USE.
<h3 id="istioctl-experimental-remove-from-mesh-service Examples">Examples</h3>
<pre class="language-bash"><code>istioctl experimental remove-from-mesh service productpage
</code></pre>
<h2 id="istioctl-experimental-sidecar-bootstrap">istioctl experimental sidecar-bootstrap</h2>
<p>Takes in one or more WorkloadEntries generates identities for them, and copies to
the particular identities to the workloads over SSH. Optionally allowing for saving the certificates locally
for use in CI like environments, and starting istio-proxy where no special configuration is needed.
This allows for workloads to participate in the Istio mesh.</p>
<p>To autenticate to a remote node you can use either SSH Keys, or SSH Passwords. If using passwords you
must have a TTY for you to be asked your password, we do not accept an argument for it so it
cannot be left inside your shell history.</p>
<p>Copying is performed with scp, and as such is required if you&#39;d like to copy a file over.
If SCP is not at the standard path &#34;/usr/bin/scp&#34;, you should provide it&#39;s location with
the &#34;--remote-scp-path&#34; option.</p>
<p>In order to start Istio on the remote node you must have docker installed on the remote node.
Istio will be started on the host network as a docker container in capture mode.</p>
<pre class="language-bash"><code>istioctl experimental sidecar-bootstrap &lt;workloadEntry&gt;.&lt;namespace&gt; [flags]
</code></pre>
<table class="command-flags">
<thead>
<tr>
<th>Flags</th>
<th>Shorthand</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>--all</code></td>
<td><code>-a</code></td>
<td>attempt to bootstrap all workload entries </td>
</tr>
<tr>
<td><code>--context &lt;string&gt;</code></td>
<td></td>
<td>The name of the kubeconfig context to use (default ``)</td>
</tr>
<tr>
<td><code>--duration &lt;duration&gt;</code></td>
<td></td>
<td>(experimental) duration the certificates generated are valid for. (default `8760h0m0s`)</td>
</tr>
<tr>
<td><code>--ignore-host-keys</code></td>
<td></td>
<td>(experimental) ignore host keys on the remote host </td>
</tr>
<tr>
<td><code>--istio-image &lt;string&gt;</code></td>
<td></td>
<td>(experimental) the Istio proxy image to start up when starting Istio (default `istio/proxyv2:latest`)</td>
</tr>
<tr>
<td><code>--istioNamespace &lt;string&gt;</code></td>
<td><code>-i</code></td>
<td>Istio system namespace (default `istio-system`)</td>
</tr>
<tr>
<td><code>--kubeconfig &lt;string&gt;</code></td>
<td><code>-c</code></td>
<td>Kubernetes configuration file (default ``)</td>
</tr>
<tr>
<td><code>--local-dir &lt;string&gt;</code></td>
<td><code>-d</code></td>
<td>directory to place certs in locally as opposed to copying (default ``)</td>
</tr>
<tr>
<td><code>--mutual-tls</code></td>
<td></td>
<td>(experimental) enable mutual TLS if starting Istio-Proxy. </td>
</tr>
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Config namespace (default ``)</td>
</tr>
<tr>
<td><code>--organization &lt;string&gt;</code></td>
<td><code>-o</code></td>
<td>(experimental) the organization to use on the certificate, defaults to the same as the root cert. (default ``)</td>
</tr>
<tr>
<td><code>--remote-directory &lt;string&gt;</code></td>
<td></td>
<td>(experimental) the directory to create on the remote machine. (default `/var/run/istio`)</td>
</tr>
<tr>
<td><code>--remote-scp-path &lt;string&gt;</code></td>
<td></td>
<td>(experimental) the scp binary location on the target machine if not at /usr/bin/scp (default `/usr/bin/scp`)</td>
</tr>
<tr>
<td><code>--spiffe-trust-domain &lt;string&gt;</code></td>
<td></td>
<td>(experimental) the SPIFFE trust domain for the generated certs (default ``)</td>
</tr>
<tr>
<td><code>--ssh-key &lt;string&gt;</code></td>
<td><code>-k</code></td>
<td>(experimental) the location of the SSH key (default ``)</td>
</tr>
<tr>
<td><code>--ssh-port &lt;int&gt;</code></td>
<td></td>
<td>(experimental) the port to SSH to the machine on (default `22`)</td>
</tr>
<tr>
<td><code>--ssh-user &lt;string&gt;</code></td>
<td><code>-u</code></td>
<td>(experimental) the user to SSH as, defaults to the current user (default ``)</td>
</tr>
<tr>
<td><code>--start-istio-proxy</code></td>
<td></td>
<td>start Istio proxy on a remote host after copying certs </td>
</tr>
<tr>
<td><code>--timeout &lt;duration&gt;</code></td>
<td></td>
<td>(experimental) the timeout for copying certificates (default `1m0s`)</td>
</tr>
</tbody>
</table>
<h3 id="istioctl-experimental-sidecar-bootstrap Examples">Examples</h3>
<pre class="language-bash"><code> # Copy certificates to a WorkloadEntry named &#34;we&#34; in the &#34;ns&#34; namespace:
istioctl x sidecar-bootstrap we.ns
# Copy certificates, and start istio to a WorkloadEntry named &#34;we&#34; in the &#34;ns&#34; namespace:
istioctl x sidecar-bootstrap we.ns --start-istio-proxy
# Generate Certs locally, but do not copy them to a WorkloadEntry named &#34;we&#34; in the &#34;ns&#34; namespace:
istioctl x sidecar-bootstrap we.ns --local-dir path/where/i/want/certs/
</code></pre>
<h2 id="istioctl-experimental-upgrade">istioctl experimental upgrade</h2>
<p>The upgrade command checks for upgrade version eligibility and, if eligible, upgrades the Istio control plane components in-place. Warning: traffic may be disrupted during upgrade. Please ensure PodDisruptionBudgets are defined to maintain service continuity.</p>
<pre class="language-bash"><code>istioctl experimental upgrade [flags]

View File

@ -1898,6 +1898,15 @@ No
No
</td>
</tr>
<tr id="IstioComponentSetSpec-istiod_remote">
<td><code>istiodRemote</code></td>
<td><code><a href="#ComponentSpec">ComponentSpec</a></code></td>
<td>
</td>
<td>
No
</td>
</tr>
<tr id="IstioComponentSetSpec-ingress_gateways">
<td><code>ingressGateways</code></td>
<td><code><a href="#GatewaySpec">GatewaySpec[]</a></code></td>