Some traffic management doc fixes (#8673)

This commit is contained in:
Frank Budinsky 2020-12-16 11:41:55 -05:00 committed by GitHub
parent 3e71d5a314
commit 4fac23cf3d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 7 additions and 7 deletions

View File

@ -102,7 +102,7 @@ in one namespace and then reuse them in other namespaces, if they are exported
to those namespaces.
Istio exports all traffic management resources to all namespaces by default,
but you can override the visibility with the `exportTo` field.
For example, only clients in the same namespace can use the following virtual service:
For example, only requests from workloads in the same namespace can be affected by the following virtual service:
{{< text yaml >}}
apiVersion: networking.istio.io/v1alpha3
@ -131,7 +131,7 @@ on the destination rule lookup path:
1. client namespace
1. service namespace
1. Istio configuration root (`istio-system` by default)
1. the configured `meshconfig.rootNamespace` namespace (`istio-system` by default)
For example, consider the following destination rule:
@ -275,19 +275,19 @@ caveats with this feature that must be considered carefully when using it.
the cross-resource order is UNDEFINED. In other words, there is no guaranteed order of evaluation
for rules across the fragment configurations, so it will only have predictable behavior if there
are no conflicting rules or order dependency between rules across fragments.
1. There should only be one "catch-all" rule (i.e., a rule that matches any request path or header) in the fragments.
1. There should only be one "catch-all" rule (i.e., a rule without a `match` field) in the fragments.
All such "catch-all" rules will be moved to the end of the list in the merged configuration, but
since they catch all requests, whichever is applied first will essentially override and disable any others.
1. A `VirtualService` can only be fragmented this way if it is bound to a gateway.
Host merging is not supported in sidecars.
A `DestinationRule` can also be fragmented with similar merge semantic and restrictions.
A `DestinationRule` can also be fragmented with similar merge semantics and restrictions.
1. There should only be one definition of any given subset across multiple destination rules for the same host.
If there is more than one with the same name, the first definition is used and any following duplicates are discarded.
No merging of subset content is supported.
1. There should only be one top-level `trafficPolicy` for the same host.
When top-level traffic policies are defined in multiple destination rules, the first one will be used.
When top-level traffic policies are defined in multiple destination rules, the first one processed will be used.
Any following top-level `trafficPolicy` configuration is discarded.
1. Unlike virtual service merging, destination rule merging works in both sidecars and gateways.

View File

@ -12,7 +12,7 @@ test: yes
Because all outbound traffic from an Istio-enabled pod is redirected to its sidecar proxy by default,
accessibility of URLs outside of the cluster depends on the configuration of the proxy.
By default, Istio configures the Envoy proxy to passthrough requests for unknown services.
By default, Istio configures the Envoy proxy to pass through requests for unknown services.
Although this provides a convenient way to get started with Istio, configuring
stricter control is usually preferable.
@ -24,7 +24,7 @@ This task shows you how to access external services in three different ways:
## Before you begin
* Setup Istio by following the instructions in the [Installation guide](/docs/setup/).
* Set up Istio by following the instructions in the [Installation guide](/docs/setup/).
Use the `demo` [configuration profile](/docs/setup/additional-setup/config-profiles/) or otherwise
[enable Envoys access logging](/docs/tasks/observability/logs/access-log/#enable-envoy-s-access-logging).