Fix typo and layout in /setup/additional-setup/cni/ (#12376)

This commit is contained in:
Michael 2022-12-15 22:47:08 +08:00 committed by GitHub
parent 8e925453a9
commit 41dc2e30f7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 39 additions and 39 deletions

View File

@ -15,12 +15,12 @@ Follow this guide to install, configure, and use an Istio mesh using the Istio C
plugin. plugin.
By default Istio injects an init container, `istio-init`, in pods deployed in By default Istio injects an init container, `istio-init`, in pods deployed in
the mesh. The `istio-init` container sets up the pod network traffic the mesh. The `istio-init` container sets up the pod network traffic
redirection to/from the Istio sidecar proxy. This requires the user or redirection to/from the Istio sidecar proxy. This requires the user or
service-account deploying pods to the mesh to have sufficient Kubernetes RBAC service-account deploying pods to the mesh to have sufficient Kubernetes RBAC
permissions to deploy [containers with the `NET_ADMIN` and `NET_RAW` capabilities](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container). permissions to deploy [containers with the `NET_ADMIN` and `NET_RAW` capabilities](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container).
Requiring Istio users to have elevated Kubernetes RBAC permissions is Requiring Istio users to have elevated Kubernetes RBAC permissions is
problematic for some organizations' security compliance. The Istio CNI plugin problematic for some organizations' security compliance. The Istio CNI plugin
is a replacement for the `istio-init` container that performs the same is a replacement for the `istio-init` container that performs the same
networking functionality but without requiring Istio users to enable elevated networking functionality but without requiring Istio users to enable elevated
Kubernetes RBAC permissions. Kubernetes RBAC permissions.
@ -28,7 +28,7 @@ Kubernetes RBAC permissions.
The Istio CNI plugin identifies user application pods with sidecars requiring traffic redirection and The Istio CNI plugin identifies user application pods with sidecars requiring traffic redirection and
sets this up in the Kubernetes pod lifecycle's network sets this up in the Kubernetes pod lifecycle's network
setup phase, thereby removing the [requirement for the `NET_ADMIN` and `NET_RAW` capabilities](/docs/ops/deployment/requirements/) setup phase, thereby removing the [requirement for the `NET_ADMIN` and `NET_RAW` capabilities](/docs/ops/deployment/requirements/)
for users deploying pods into the Istio mesh. The Istio CNI plugin for users deploying pods into the Istio mesh. The Istio CNI plugin
replaces the functionality provided by the `istio-init` container. replaces the functionality provided by the `istio-init` container.
{{< tip >}} {{< tip >}}
@ -42,7 +42,7 @@ See [compatibility with other CNI plugins](#compatibility-with-other-cni-plugins
### Prerequisites ### Prerequisites
1. Install Kubernetes with the container runtime supporting CNI and `kubelet` configured 1. Install Kubernetes with the container runtime supporting CNI and `kubelet` configured
with the main [CNI](https://github.com/containernetworking/cni) plugin enabled via `--network-plugin=cni`. with the main [CNI](https://github.com/containernetworking/cni) plugin enabled via `--network-plugin=cni`.
* AWS EKS, Azure AKS, and IBM Cloud IKS clusters have this capability. * AWS EKS, Azure AKS, and IBM Cloud IKS clusters have this capability.
* Google Cloud GKE clusters have CNI enabled when any of the following features are enabled: * Google Cloud GKE clusters have CNI enabled when any of the following features are enabled:
[network policy](https://cloud.google.com/kubernetes-engine/docs/how-to/network-policy), [network policy](https://cloud.google.com/kubernetes-engine/docs/how-to/network-policy),
@ -96,39 +96,39 @@ Some platforms required special installation settings.
* Google Kubernetes Engine * Google Kubernetes Engine
{{< text yaml >}} {{< text yaml >}}
apiVersion: install.istio.io/v1alpha1 apiVersion: install.istio.io/v1alpha1
kind: IstioOperator kind: IstioOperator
spec: spec:
components: components:
cni: cni:
enabled: true enabled: true
namespace: kube-system namespace: kube-system
values: values:
cni: cni:
cniBinDir: /home/kubernetes/bin cniBinDir: /home/kubernetes/bin
{{< /text >}} {{< /text >}}
* Red Hat OpenShift 4.2+ * Red Hat OpenShift 4.2+
{{< text yaml >}} {{< text yaml >}}
apiVersion: install.istio.io/v1alpha1 apiVersion: install.istio.io/v1alpha1
kind: IstioOperator kind: IstioOperator
spec: spec:
components: components:
cni: cni:
enabled: true enabled: true
namespace: kube-system namespace: kube-system
values: values:
sidecarInjectorWebhook: sidecarInjectorWebhook:
injectedAnnotations: injectedAnnotations:
k8s.v1.cni.cncf.io/networks: istio-cni k8s.v1.cni.cncf.io/networks: istio-cni
cni: cni:
cniBinDir: /var/lib/cni/bin cniBinDir: /var/lib/cni/bin
cniConfDir: /etc/cni/multus/net.d cniConfDir: /etc/cni/multus/net.d
cniConfFileName: istio-cni.conf cniConfFileName: istio-cni.conf
chained: false chained: false
{{< /text >}} {{< /text >}}
## Operation details ## Operation details
@ -230,11 +230,11 @@ but also application container traffic. i.e. application traffic sent to the con
The Istio CNI plugin maintains compatibility with the same set of CNI plugins as the current The Istio CNI plugin maintains compatibility with the same set of CNI plugins as the current
`istio-init` container which requires the `NET_ADMIN` and `NET_RAW` capabilities. `istio-init` container which requires the `NET_ADMIN` and `NET_RAW` capabilities.
The Istio CNI plugin operates as a chained CNI plugin. This means its configuration is added to the existing The Istio CNI plugin operates as a chained CNI plugin. This means its configuration is added to the existing
CNI plugins configuration as a new configuration list element. See the CNI plugins configuration as a new configuration list element. See the
[CNI specification reference](https://github.com/containernetworking/cni/blob/master/SPEC.md#network-configuration-lists) for further details. [CNI specification reference](https://github.com/containernetworking/cni/blob/master/SPEC.md#network-configuration-lists) for further details.
When a pod is created or deleted, the container runtime invokes each plugin in the list in order. The Istio When a pod is created or deleted, the container runtime invokes each plugin in the list in order. The Istio
CNI plugin only performs actions to setup the application pod's traffic redirection to the injected Istio proxy CNI plugin only performs actions to set up the application pod's traffic redirection to the injected Istio proxy
sidecar (using `iptables` in the pod's network namespace). sidecar (using `iptables` in the pod's network namespace).
{{< warning >}} {{< warning >}}