Fix typo and layout in /setup/additional-setup/cni/ (#12376)

This commit is contained in:
Michael 2022-12-15 22:47:08 +08:00 committed by GitHub
parent 8e925453a9
commit 41dc2e30f7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 39 additions and 39 deletions

View File

@ -96,10 +96,10 @@ Some platforms required special installation settings.
* Google Kubernetes Engine
{{< text yaml >}}
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
spec:
{{< text yaml >}}
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
spec:
components:
cni:
enabled: true
@ -107,14 +107,14 @@ spec:
values:
cni:
cniBinDir: /home/kubernetes/bin
{{< /text >}}
{{< /text >}}
* Red Hat OpenShift 4.2+
{{< text yaml >}}
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
spec:
{{< text yaml >}}
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
spec:
components:
cni:
enabled: true
@ -128,7 +128,7 @@ spec:
cniConfDir: /etc/cni/multus/net.d
cniConfFileName: istio-cni.conf
chained: false
{{< /text >}}
{{< /text >}}
## Operation details
@ -234,7 +234,7 @@ The Istio CNI plugin operates as a chained CNI plugin. This means its configura
CNI plugins configuration as a new configuration list element. See the
[CNI specification reference](https://github.com/containernetworking/cni/blob/master/SPEC.md#network-configuration-lists) for further details.
When a pod is created or deleted, the container runtime invokes each plugin in the list in order. The Istio
CNI plugin only performs actions to setup the application pod's traffic redirection to the injected Istio proxy
CNI plugin only performs actions to set up the application pod's traffic redirection to the injected Istio proxy
sidecar (using `iptables` in the pod's network namespace).
{{< warning >}}