diff --git a/content/en/docs/reference/config/networking/virtual-service/index.html b/content/en/docs/reference/config/networking/virtual-service/index.html index 913b592b33..a9defbb23f 100644 --- a/content/en/docs/reference/config/networking/virtual-service/index.html +++ b/content/en/docs/reference/config/networking/virtual-service/index.html @@ -542,6 +542,11 @@ No HTTPRetry

Retry policy for HTTP requests.

+

Note: the default cluster-wide retry policy, if not specified, is:

+
attempts: 2
+retryOn: "connect-failure,refused-stream,unavailable,cancelled,503"
+
+

This can be customized in Mesh Config defaultHttpRetryPolicy.

@@ -2064,9 +2069,13 @@ No

Specifies the conditions under which retry takes place. One or more policies can be specified using a ‘,’ delimited list. -If retry_on specifies a valid HTTP status, it will be added to retriable_status_codes retry policy. See the retry policies and gRPC retry policies for more details.

+

In addition to the policies specified above, a list of HTTP status codes can be passed, such as retryOn: "503,reset". +Note these status codes refer to the actual responses received from the destination. +For example, if a connection is reset, Istio will translate this to 503 for it’s response. +However, the destination did not return a 503 error, so this would not match "503" (it would, however, match "reset").

+

If not specified, this defaults to connect-failure,refused-stream,unavailable,cancelled,503.

diff --git a/content/en/docs/reference/config/security/peer_authentication/index.html b/content/en/docs/reference/config/security/peer_authentication/index.html index 1ae5659180..cc33a191be 100644 --- a/content/en/docs/reference/config/security/peer_authentication/index.html +++ b/content/en/docs/reference/config/security/peer_authentication/index.html @@ -12,12 +12,15 @@ number_of_entries: 3 ---

PeerAuthentication

-

{{< warning >}} -Development of PeerAuthentication is currently frozen and likely to be replaced in Ambient. -{{< /warning >}} -PeerAuthentication defines how traffic will be tunneled (or not) to the sidecar.

+

PeerAuthentication defines mutual TLS (mTLS) requirements for incoming connections.

+

In sidecar mode, PeerAuthentication determines whether or not mTLS is allowed or required +for connections to an Envoy proxy sidecar.

+

In ambient mode, security is transparently enabled for a pod by the ztunnel node agent. +(Traffic between proxies uses the HBONE protocol, which includes encryption with mTLS.) +Because of this, DISABLE mode is not supported. +STRICT mode is useful to ensure that connections that bypass the mesh are not possible.

Examples:

-

Policy to allow mTLS traffic for all workloads under namespace foo:

+

Policy to require mTLS traffic for all workloads under namespace foo:

apiVersion: security.istio.io/v1
 kind: PeerAuthentication
 metadata:
diff --git a/content/zh/docs/reference/config/networking/virtual-service/index.html b/content/zh/docs/reference/config/networking/virtual-service/index.html
index 014f32bb39..1ceb9eea2b 100644
--- a/content/zh/docs/reference/config/networking/virtual-service/index.html
+++ b/content/zh/docs/reference/config/networking/virtual-service/index.html
@@ -542,6 +542,11 @@ No
 HTTPRetry
 
 

Retry policy for HTTP requests.

+

Note: the default cluster-wide retry policy, if not specified, is:

+
attempts: 2
+retryOn: "connect-failure,refused-stream,unavailable,cancelled,503"
+
+

This can be customized in Mesh Config defaultHttpRetryPolicy.

@@ -2064,9 +2069,13 @@ No

Specifies the conditions under which retry takes place. One or more policies can be specified using a ‘,’ delimited list. -If retry_on specifies a valid HTTP status, it will be added to retriable_status_codes retry policy. See the retry policies and gRPC retry policies for more details.

+

In addition to the policies specified above, a list of HTTP status codes can be passed, such as retryOn: "503,reset". +Note these status codes refer to the actual responses received from the destination. +For example, if a connection is reset, Istio will translate this to 503 for it’s response. +However, the destination did not return a 503 error, so this would not match "503" (it would, however, match "reset").

+

If not specified, this defaults to connect-failure,refused-stream,unavailable,cancelled,503.

diff --git a/content/zh/docs/reference/config/security/peer_authentication/index.html b/content/zh/docs/reference/config/security/peer_authentication/index.html index a3d773fcef..79ae4ef53b 100644 --- a/content/zh/docs/reference/config/security/peer_authentication/index.html +++ b/content/zh/docs/reference/config/security/peer_authentication/index.html @@ -12,12 +12,15 @@ number_of_entries: 3 ---

PeerAuthentication

-

{{< warning >}} -Development of PeerAuthentication is currently frozen and likely to be replaced in Ambient. -{{< /warning >}} -PeerAuthentication defines how traffic will be tunneled (or not) to the sidecar.

+

PeerAuthentication defines mutual TLS (mTLS) requirements for incoming connections.

+

In sidecar mode, PeerAuthentication determines whether or not mTLS is allowed or required +for connections to an Envoy proxy sidecar.

+

In ambient mode, security is transparently enabled for a pod by the ztunnel node agent. +(Traffic between proxies uses the HBONE protocol, which includes encryption with mTLS.) +Because of this, DISABLE mode is not supported. +STRICT mode is useful to ensure that connections that bypass the mesh are not possible.

Examples:

-

Policy to allow mTLS traffic for all workloads under namespace foo:

+

Policy to require mTLS traffic for all workloads under namespace foo:

apiVersion: security.istio.io/v1
 kind: PeerAuthentication
 metadata: