diff --git a/content/about/notes/0.8.md b/content/about/notes/0.8.md index 1d547666a9..5a4555486a 100644 --- a/content/about/notes/0.8.md +++ b/content/about/notes/0.8.md @@ -35,7 +35,7 @@ Istio telemetry pipeline, just like services in the mesh. Helm or `istioctl gen-deploy`, users can install only the features they want. For example, users can install Pilot only and enjoy traffic management functionality without dealing with Mixer or Citadel. Learn more about [customization through Helm](/docs/setup/kubernetes/helm-install/#customization-with-helm) -and about [`istioctl gen-deploy`](/docs/reference/commands/istioctl/#istioctl%20gen-deploy). +and about [`istioctl gen-deploy`](/docs/reference/commands/istioctl/#istioctl-gen-deploy). ## Mixer adapters diff --git a/content/blog/2018/v1alpha3-routing.md b/content/blog/2018/v1alpha3-routing.md index d33680befd..fd61c2ace6 100644 --- a/content/blog/2018/v1alpha3-routing.md +++ b/content/blog/2018/v1alpha3-routing.md @@ -22,7 +22,7 @@ traffic has proven to be woefully insufficient for our needs. To address these, and other concerns, a new traffic management API, a.k.a. `v1alpha3`, is being introduced, which will completely replace the previous API going forward. Although the `v1alpha3` model is fundamentally the same, it is not backward compatible and will require manual conversion from the old API. A -[conversion tool](/docs/reference/commands/istioctl/#istioctl%20experimental%20convert-networking-config) +[conversion tool](/docs/reference/commands/istioctl/#istioctl-experimental-convert-networking-config) is included in the next few releases of Istio to help with the transition. To justify this disruption, the `v1alpha3` API has gone through a long and painstaking community diff --git a/content/docs/guides/bookinfo.md b/content/docs/guides/bookinfo.md index ff6f8da9d3..538de20fe5 100644 --- a/content/docs/guides/bookinfo.md +++ b/content/docs/guides/bookinfo.md @@ -88,7 +88,7 @@ To start the application, follow the instructions below corresponding to your Is ``` The `istioctl kube-inject` command is used to manually modify the `bookinfo.yaml` - file before creating the deployments as documented [here](/docs/reference/commands/istioctl/#istioctl kube-inject). + file before creating the deployments as documented [here](/docs/reference/commands/istioctl/#istioctl-kube-inject). * If you are using a cluster with [automatic sidecar injection](/docs/setup/kubernetes/sidecar-injection/#automatic-sidecar-injection) diff --git a/content/docs/reference/commands/istio_ca.html b/content/docs/reference/commands/istio_ca.html index ecc4b428c4..918e304161 100644 --- a/content/docs/reference/commands/istio_ca.html +++ b/content/docs/reference/commands/istio_ca.html @@ -167,7 +167,7 @@ number_of_entries: 4 -
Check the liveness or readiness of a locally-running server
istio_ca probe [flags]
@@ -223,7 +223,7 @@ number_of_entries: 4
-Prints out build version information
istio_ca version [flags]
diff --git a/content/docs/reference/commands/istioctl.html b/content/docs/reference/commands/istioctl.html
index 5ba5518db1..c4428d0afc 100644
--- a/content/docs/reference/commands/istioctl.html
+++ b/content/docs/reference/commands/istioctl.html
@@ -22,6 +22,11 @@ system.
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
Create a kubeconfig file suitable for use with istioctl in a non kubernetes environment
istioctl context-create --api-server http://<ip>:<port> [flags]
@@ -107,7 +112,7 @@ system.
--context <string>
--istioNamespace <string>
--kubeconfig <string>
-c
--log_as_json
# Create a config file for the api server.
istioctl context-create --api-server http://127.0.0.1:8080
-Create policies and rules
istioctl create [flags]
@@ -193,6 +198,11 @@ istioctl context-create --api-server http://127.0.0.1:8080
--context <string>
--file <string>
-f
--kubeconfig <string>
-c
--log_as_json
istioctl create -f example-routing.yaml
-Delete policies or rules
istioctl delete <type> <name> [<name2> ... <nameN>] [flags]
@@ -279,6 +289,11 @@ istioctl context-create --api-server http://127.0.0.1:8080
--context <string>
--file <string>
-f
--kubeconfig <string>
-c
--log_as_json
# Delete a rule using the definition in example-routing.yaml.
istioctl delete -f example-routing.yaml
@@ -358,7 +373,7 @@ istioctl delete -f example-routing.yaml
istioctl delete virtualservice bookinfo
-De-registers a service instance
istioctl deregister <svcname> <ip> [flags]
@@ -370,6 +385,11 @@ istioctl delete virtualservice bookinfo
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
Experimental commands that may be modified or deprecated
--context <string> |
++ | The name of the kubeconfig context to use (default ``) | +|
--istioNamespace <string> |
-i |
Istio system namespace (default `istio-system`) | @@ -453,7 +478,7 @@ istioctl delete virtualservice bookinfo|
--kubeconfig <string> |
-c |
-Kubernetes configuration file (default `$KUBECONFIG else $HOME/.kube/config`) | +Kubernetes configuration file (default ``) |
--log_as_json |
@@ -512,7 +537,7 @@ istioctl delete virtualservice bookinfo
Converts sets of v1alpha1 configs to v1alpha3 equivalents on a best effort basis. The output should be considered a starting point for your v1alpha3 configs and probably require some minor modification. Warnings will (hopefully) be generated where configs cannot be converted perfectly, or in certain edge cases. The input must be the set of configs that would be in place in an environment at a given time. This allows the command to attempt to create and merge output configs intelligently.Output configs are given the namespace and domain of the first input config so it is recommended that input configs be part of the same namespace and domain.
istioctl experimental convert-networking-config [flags]
@@ -524,6 +549,11 @@ istioctl delete virtualservice bookinfo
--context <string>
--filenames <stringSlice>
-f
--kubeconfig <string>
-c
--log_as_json
istioctl experimental convert-networking-config -f v1alpha1/default-route.yaml -f v1alpha1/header-delay.yaml
-Prints the metrics for the specified service(s) when running in Kubernetes.
This command finds a Prometheus pod running in the specified istio system @@ -626,6 +656,11 @@ calculated over a time interval of 1 minute.
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
# Retrieve service metrics for productpage service
istioctl experimental metrics productpage
@@ -701,7 +736,7 @@ istioctl experimental metrics productpage
istioctl experimental metrics productpage.foo reviews.bar ratings.baz
-A group of commands used to interact with Istio RBAC policies. For example, Query whether a specific request is allowed or denied under the current Istio RBAC policies.
@@ -713,6 +748,11 @@ request is allowed or denied under the current Istio RBAC policies.--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
# Query if user test is allowed to GET /v1/health of service rating.
istioctl experimental rbac can -u test GET rating /v1/health
-This command lets you query whether a specific request will be allowed or denied under current Istio RBAC policies. It constructs a fake request with the custom subject and action specified in the command @@ -806,6 +846,11 @@ is being taken on. PATH is the HTTP path within the service.
--context <string>
--groups <string>
-g
--kubeconfig <string>
-c
--log_as_json
# Query if user test is allowed to GET /v1/health of service rating.
istioctl experimental rbac can -u test GET rating /v1/health
# Query if service product-page is allowed to POST to /data of service rating with label version=dev.
istioctl experimental rbac can -s service=product-page POST rating /data -a version=dev
-istioctl gen-deploy produces deployment files to run the Istio.
istioctl gen-deploy [flags]
@@ -906,6 +951,11 @@ istioctl experimental rbac can -s service=product-page POST rating /data -a vers
--context <string>
--debug
--kubeconfig <string>
-c
--log_as_json
istioctl gen-deploy --values myvalues.yaml
-Retrieve policies and rules
istioctl get <type> [<name>] [flags]
@@ -1017,6 +1067,16 @@ istioctl experimental rbac can -s service=product-page POST rating /data -a vers
--all-namespaces
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
# List all virtual services
istioctl get virtualservices
@@ -1099,7 +1159,7 @@ istioctl get destinationrules
istioctl get virtualservice bookinfo
-kube-inject manually injects envoy sidecar into kubernetes workloads. Unsupported resources are left unmodified so it is safe to @@ -1129,6 +1189,11 @@ file/configmap created with a new Istio release.
--context <string>
--filename <string>
-f
--kubeconfig <string>
-c
--log_as_json
# Update resources on the fly before applying.
kubectl apply -f <(istioctl kube-inject -f <resource.yaml>)
@@ -1242,7 +1307,7 @@ kubectl get deployment -o yaml | istioctl kube-inject -f - | kubectl apply -f -
istioctl kube-inject -f deployment.yaml -o deployment-injected.yaml --injectConfigMapName istio-inject
-Retrieves proxy configuration for the specified pod from the endpoint proxy or Pilot when running in Kubernetes. It is also able to retrieve the state of the entire mesh by using mesh instead of <pod-name>. This is only available when querying Pilot.
@@ -1262,6 +1327,11 @@ It is also able to retrieve the state of the entire mesh by using mesh instead o--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
# Retrieve all config for productpage-v1-bb8d5cbc7-k7qbm pod from the endpoint proxy
istioctl proxy-config endpoint productpage-v1-bb8d5cbc7-k7qbm
@@ -1341,7 +1411,7 @@ istioctl proxy-config pilot mesh ads
# Retrieve static config for productpage-v1-bb8d5cbc7-k7qbm pod in the application namespace from the endpoint proxy
istioctl proxy-config endpoint -n application productpage-v1-bb8d5cbc7-k7qbm static
-Registers a service instance (e.g. VM) joining the mesh
istioctl register <svcname> <ip> [name1:]port1 [name2:]port2 ... [flags]
@@ -1358,6 +1428,11 @@ istioctl proxy-config endpoint -n application productpage-v1-bb8d5cbc7-k7qbm sta
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--labels <stringSlice>
Replace existing policies and rules
istioctl replace [flags]
@@ -1446,6 +1521,11 @@ istioctl proxy-config endpoint -n application productpage-v1-bb8d5cbc7-k7qbm sta
--context <string>
--file <string>
-f
--kubeconfig <string>
-c
--log_as_json
istioctl replace -f example-routing.yaml
-Prints out build version information
istioctl version [flags]
@@ -1532,6 +1612,11 @@ istioctl proxy-config endpoint -n application productpage-v1-bb8d5cbc7-k7qbm sta
--context <string>
--istioNamespace <string>
-i
--kubeconfig <string>
-c
--log_as_json
This command lets you interact with a running instance of Mixer. Note that you need a pretty good understanding of Mixer's API in order to use this command.
-The Check method is used to perform precondition checks and quota allocations. Mixer expects a set of attributes as input, which it uses, along with its configuration, to determine which adapters to invoke and with @@ -98,7 +98,7 @@ which parameters in order to perform the checks and allocations.
The Report method is used to produce telemetry. Mixer expects a set of attributes as input, which it uses, along with its configuration, to determine which adapters to invoke and with @@ -184,7 +184,7 @@ which parameters in order to output the telemetry.
-Prints out build version information
mixc version [flags]
diff --git a/content/docs/reference/commands/mixs.html b/content/docs/reference/commands/mixs.html
index 25d963f1a6..0ded754b94 100644
--- a/content/docs/reference/commands/mixs.html
+++ b/content/docs/reference/commands/mixs.html
@@ -6,21 +6,21 @@ number_of_entries: 9
---
Mixer is Istio's point of integration with infrastructure backends and is the nexus for policy evaluation and telemetry reporting.
-CRDs (CustomResourceDefinition) available in Mixer
-List CRDs for available adapters
mixs crd adapter [flags]
-List all CRDs
mixs crd all [flags]
-List CRDs for available instance kinds (mesh functions)
mixs crd instance [flags]
-Check the liveness or readiness of a locally-running server
mixs probe [flags]
@@ -76,7 +76,7 @@ nexus for policy evaluation and telemetry reporting.
-Starts Mixer as a server
mixs server [flags]
@@ -234,7 +234,7 @@ nexus for policy evaluation and telemetry reporting.
-Prints out build version information
mixs version [flags]
diff --git a/content/docs/reference/commands/node_agent.html b/content/docs/reference/commands/node_agent.html
index ff870cf574..ced421714d 100644
--- a/content/docs/reference/commands/node_agent.html
+++ b/content/docs/reference/commands/node_agent.html
@@ -87,7 +87,7 @@ number_of_entries: 3
-Prints out build version information
node_agent version [flags]
diff --git a/content/docs/reference/commands/pilot-agent.html b/content/docs/reference/commands/pilot-agent.html
index 3a88bf452d..eb90c969ef 100644
--- a/content/docs/reference/commands/pilot-agent.html
+++ b/content/docs/reference/commands/pilot-agent.html
@@ -49,7 +49,7 @@ number_of_entries: 5
-Debug local envoy
pilot-agent debug <configuration-type> [flags]
@@ -97,7 +97,7 @@ number_of_entries: 5
-Envoy proxy agent
pilot-agent proxy [flags]
@@ -221,7 +221,7 @@ number_of_entries: 5
--serviceregistry <string>
--statsdUdpAddress <string>
Prints out build version information
pilot-agent version [flags]
diff --git a/content/docs/reference/commands/pilot-discovery.html b/content/docs/reference/commands/pilot-discovery.html
index b36864ed3f..c42f936a25 100644
--- a/content/docs/reference/commands/pilot-discovery.html
+++ b/content/docs/reference/commands/pilot-discovery.html
@@ -57,7 +57,7 @@ number_of_entries: 5
-Retrieve the configuration for the specified proxy
pilot-discovery debug <proxyID> <configuration-type> [flags]
@@ -113,7 +113,7 @@ number_of_entries: 5
-Start Istio proxy discovery service
pilot-discovery discovery [flags]
@@ -195,6 +195,11 @@ number_of_entries: 5
--httpAddr <string>
--kubeconfig <string>
--monitoringPort <int>
--monitoringAddr <string>
--namespace <string>
--port <int>
--profile
--registries <stringSlice>
--resync <duration>
Prints out build version information
pilot-discovery version [flags]
diff --git a/content/docs/reference/commands/sidecar-injector.html b/content/docs/reference/commands/sidecar-injector.html
index 32ec07e5f4..b922f6746d 100644
--- a/content/docs/reference/commands/sidecar-injector.html
+++ b/content/docs/reference/commands/sidecar-injector.html
@@ -95,7 +95,7 @@ number_of_entries: 4
-Check the liveness or readiness of a locally-running server
sidecar-injector probe [flags]
@@ -195,7 +195,7 @@ number_of_entries: 4
-Prints out build version information
sidecar-injector version [flags]
diff --git a/content/docs/reference/config/istio.networking.v1alpha3.html b/content/docs/reference/config/istio.networking.v1alpha3.html
index 369fbb68fd..9ab9d37985 100644
--- a/content/docs/reference/config/istio.networking.v1alpha3.html
+++ b/content/docs/reference/config/istio.networking.v1alpha3.html
@@ -4,7 +4,7 @@ description: Configuration affecting traffic routing
location: https://istio.io/docs/reference/config/istio.networking.v1alpha3.html
layout: protoc-gen-docs
generator: protoc-gen-docs
-number_of_entries: 39
+number_of_entries: 38
---
Configuration affecting traffic routing. Here are a few terms useful to define in the context of traffic routing.
@@ -68,17 +68,17 @@ spec: -tcp
ConnectionPoolSettings.TCPSettings
ConnectionPoolSettings.TCPSettings
Settings common to both HTTP and TCP upstream connections.
http
ConnectionPoolSettings.HTTPSettings
ConnectionPoolSettings.HTTPSettings
HTTP connection pool settings.
@@ -87,7 +87,7 @@ spec:Settings applicable to HTTP1.1/HTTP2/GRPC connections.
@@ -100,7 +100,7 @@ spec: -http1MaxPendingRequests
int32
http2MaxRequests
int32
maxRequestsPerConnection
int32
maxRetries
int32
Settings common to both HTTP and TCP upstream connections.
@@ -150,7 +150,7 @@ cluster at a given time. Defaults to 3. -maxConnections
int32
connectTimeout
google.protobuf.Duration
allowOrigin
string[]
allowMethods
string[]
allowHeaders
string[]
exposeHeaders
string[]
maxAge
google.protobuf.Duration
allowCredentials
google.protobuf.BoolValue
host
string
subset
string
port
PortSelector
host
string
trafficPolicy
TrafficPolicy
subsets
Subset[]
destination
Destination
weight
int32
servers
Server[]
selector
map<string, string>
delay
HTTPFaultInjection.Delay
HTTPFaultInjection.Delay
Delay requests before forwarding, emulating various failures such as network issues, overloaded upstream service, etc.
abort
HTTPFaultInjection.Abort
HTTPFaultInjection.Abort
Abort Http request attempts and return error codes back to downstream service, giving the impression that the upstream service is faulty.
@@ -877,7 +877,7 @@ service, giving the impression that the upstream service is faulty.Abort specification is used to prematurely abort a request with a pre-specified error code. The following example will return an HTTP @@ -915,7 +915,7 @@ not specified, all requests are aborted.
-percent
int32
httpStatus
int32 (oneof)
Delay specification is used to inject latency into the request forwarding path. The following example will introduce a 5 second delay @@ -976,7 +976,7 @@ unspecified, all request will be delayed.
-percent
int32
fixedDelay
google.protobuf.Duration (oneof)
uri
StringMatch
scheme
StringMatch
method
StringMatch
authority
StringMatch
headers
map<string, StringMatch>
port
uint32
sourceLabels
map<string, string>
gateways
string[]
uri
string
authority
string
attempts
int32
perTryTimeout
google.protobuf.Duration
uri
string
authority
string
match
HTTPMatchRequest[]
route
DestinationWeight[]
redirect
HTTPRedirect
rewrite
HTTPRewrite
websocketUpgrade
bool
timeout
google.protobuf.Duration
retries
HTTPRetry
fault
HTTPFaultInjection
mirror
Destination
corsPolicy
CorsPolicy
appendHeaders
map<string, string>
destinationSubnet
string
port
uint32
sourceSubnet
string
sourceLabels
map<string, string>
gateways
string[]
simple
LoadBalancerSettings.SimpleLB (oneof)
LoadBalancerSettings.SimpleLB (oneof)
consistentHash
LoadBalancerSettings.ConsistentHashLB (oneof)
LoadBalancerSettings.ConsistentHashLB (oneof)
Consistent hashing (ketama hash) based load balancer for even load -distribution/redistribution when the connection pool changes. This -load balancing policy is applicable only for HTTP-based -connections. A user specified HTTP header is used as the key with -xxHash hashing.
- - -Standard load balancing algorithms that require no tuning.
@@ -1635,14 +1592,14 @@ single virtual node. -ROUND_ROBIN
Round Robin policy. Default
LEAST_CONN
The least request load balancer uses an O(1) algorithm which selects @@ -1651,7 +1608,7 @@ requests.
RANDOM
The random load balancer selects a random healthy host. The random @@ -1660,7 +1617,7 @@ checking policy is configured.
PASSTHROUGH
This option will forward the connection to the original IP address @@ -1677,11 +1634,12 @@ Envoy for further details.
A Circuit breaker implementation that tracks the status of each -individual host in the upstream service. While currently applicable to -only HTTP services, future versions will support opaque TCP services as -well. For HTTP services, hosts that continually return errors for API -calls are ejected from the pool for a pre-defined period of time. See -Envoy’s outlier +individual host in the upstream service. Applicable to both HTTP and +TCP services. For HTTP services, hosts that continually return 5xx +errors for API calls are ejected from the pool for a pre-defined period +of time. For TCP services, connection timeouts or connection +failures to a given host counts as an error when measuring the +consecutive errors metric. See Envoy’s outlier detection for more details.
@@ -1705,10 +1663,9 @@ spec: http2MaxRequests: 1000 maxRequestsPerConnection: 10 outlierDetection: - http: - consecutiveErrors: 7 - interval: 5m - baseEjectionTime: 15m + consecutiveErrors: 7 + interval: 5m + baseEjectionTime: 15mOutlier detection settings for HTTP1.1/HTTP2/GRPC connections.
@@ -1744,7 +1743,7 @@ spec:consecutiveErrors
int32
interval
google.protobuf.Duration
baseEjectionTime
google.protobuf.Duration
maxEjectionPercent
int32
number
uint32
protocol
string
name
string
number
uint32 (oneof)
port
Port
hosts
string[]
tls
Server.TLSOptions
Server.TLSOptions
Set of TLS related options that govern the server’s behavior. Use these options to control if all http requests should be redirected to @@ -1966,7 +1965,7 @@ https, and the TLS modes to use.
TLS modes enforced by the proxy
@@ -2048,7 +2047,7 @@ certificate presented by the client. -PASSTHROUGH
Forward the connection to the upstream server selected based on @@ -2056,14 +2055,14 @@ the SNI string presented by the client.
SIMPLE
Secure connections with standard TLS semantics.
MUTUAL
Secure connections to the upstream using mutual TLS by presenting @@ -2227,7 +2226,7 @@ https://uk.foo.bar.com/baz.
hosts
string[]
addresses
string[]
ports
Port[]
location
ServiceEntry.Location
ServiceEntry.Location
Specify whether the service should be considered external to the mesh or part of the mesh.
resolution
ServiceEntry.Resolution
ServiceEntry.Resolution
Service discovery mode for the hosts. If not set, Istio will attempt to infer the discovery mode based on the value of hosts and endpoints.
endpoints
ServiceEntry.Endpoint[]
ServiceEntry.Endpoint[]
One or more endpoints associated with the service.
@@ -2300,7 +2299,7 @@ to infer the discovery mode based on the value of hosts and endpoints.Endpoint defines a network address (IP or hostname) associated with the mesh service.
@@ -2314,7 +2313,7 @@ the mesh service. -address
string
ports
map<string, uint32>
labels
map<string, string>
Location specifies whether the service is part of Istio mesh or outside the mesh. Location determines the behavior of several @@ -2363,7 +2362,7 @@ performed on the client-side as opposed to server-side.
-MESH_EXTERNAL
Signifies that the service is external to the mesh. Typically used @@ -2371,7 +2370,7 @@ to indicate external services consumed through APIs.
MESH_INTERNAL
Signifies that the service is part of the mesh. Typically used to @@ -2384,7 +2383,7 @@ Kubernetes based service mesh).
Resolution determines how the proxy will resolve the IP addresses of the network endpoints associated with the service, so that it can @@ -2404,7 +2403,7 @@ talk to these services.
-NONE
Assume that incoming connections have already been resolved (to a @@ -2416,7 +2415,7 @@ connection was bound.
STATIC
Use the static IP addresses specified in endpoints (see below) as the @@ -2424,7 +2423,7 @@ backing instances associated with the service.
DNS
Attempt to resolve the IP address by querying the ambient DNS, @@ -2454,7 +2453,7 @@ case-sensitive.
exact
string (oneof)
prefix
string (oneof)
regex
string (oneof)
name
string
labels
map<string, string>
trafficPolicy
TrafficPolicy
match
L4MatchAttributes[]
route
DestinationWeight[]
mode
TLSSettings.TLSmode
TLSSettings.TLSmode
REQUIRED: Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced.
clientCertificate
string
ISTIO_MUTUAL
.
privateKey
string
ISTIO_MUTUAL
.
caCertificates
string
ISTIO_MUTUAL
.
subjectAltNames
string[]
ISTIO_MUTUAL
.
sni
string
ISTIO_MUTUAL
.
TLS connection mode
@@ -2748,21 +2747,21 @@ Should be empty if mode isISTIO_MUTUAL
.
-DISABLE
Do not setup a TLS connection to the upstream endpoint.
SIMPLE
Originate a TLS connection to the upstream endpoint.
MUTUAL
Secure connections to the upstream using mutual TLS by presenting @@ -2770,7 +2769,7 @@ client certificates for authentication.
ISTIO_MUTUAL
Secure connections to the upstream using mutual TLS by presenting @@ -2798,7 +2797,7 @@ destination ports. See DestinationRule for examples.
loadBalancer
LoadBalancerSettings
connectionPool
ConnectionPoolSettings
outlierDetection
OutlierDetection
tls
TLSSettings
portLevelSettings
TrafficPolicy.PortTrafficPolicy[]
TrafficPolicy.PortTrafficPolicy[]
Traffic policies specific to individual ports. Note that port level settings will override the destination-level settings. Traffic @@ -2845,7 +2844,7 @@ to fields omitted in port-level traffic policies.
Traffic policies that apply to specific ports of the service
@@ -2858,7 +2857,7 @@ to fields omitted in port-level traffic policies. -port
PortSelector
loadBalancer
LoadBalancerSettings
connectionPool
ConnectionPoolSettings
outlierDetection
OutlierDetection
tls
TLSSettings
hosts
string[]
gateways
string[]
mesh
as one of the gateway names.
http
HTTPRoute[]
tcp
TCPRoute[]
services
string[]
paths
string[]
methods
string[]
constraints
AccessRule.Constraint[]
AccessRule.Constraint[]
Optional. Extra constraints in the ServiceRole specification. The above ServiceRole examples shows an example of constraint “version”.
@@ -153,7 +153,7 @@ The above ServiceRole examples shows an example of constraint “version&rdqDefinition of a custom constraint. The key of a custom constraint must match one of the “properties” in the “action” part of the “authorization” template @@ -168,7 +168,7 @@ one of the “properties” in the “action” part of the &ldq
-key
string
values
string[]
mode
RbacConfig.Mode
RbacConfig.Mode
Istio RBAC mode.
inclusion
RbacConfig.Target
RbacConfig.Target
A list of services or namespaces that should be enforced by Istio RBAC policies. Note: This field have effect only when mode is ONWITHINCLUSION and will be ignored for any other modes.
exclusion
RbacConfig.Target
RbacConfig.Target
A list of services or namespaces that should not be enforced by Istio RBAC policies. Note: This field have effect only when mode is ONWITHEXCLUSION and will be ignored for any other modes.
@@ -251,7 +251,7 @@ effect only when mode is ONWITHEXCLUSION and will be ignored for any otOFF |
Disable Istio RBAC completely, any other config in RbacConfig will be ignored and Istio RBAC policies @@ -269,14 +269,14 @@ will not be enforced. |
ON |
Enable Istio RBAC for all services and namespaces. |
ON_WITH_INCLUSION |
Enable Istio RBAC only for services and namespaces specified in the inclusion field. Any other @@ -284,7 +284,7 @@ services and namespaces not in the inclusion field will not be enforced by Istio |
ON_WITH_EXCLUSION |
Enable Istio RBAC for all services and namespaces except those specified in the exclusion field. Any other @@ -295,7 +295,7 @@ services and namespaces not in the exclusion field will be enforced by Istio RBA |
Target defines a list of services or namespaces.
@@ -308,7 +308,7 @@ services and namespaces not in the exclusion field will be enforced by Istio RBA -services
string[]
namespaces
string[]
kind
string
name
string
rules
AccessRule[]
subjects
Subject[]
roleRef
RoleRef
user
string
group
string
properties
map<string, string>
simpleCb
CircuitBreaker.SimpleCircuitBreakerPolicy (oneof)
CircuitBreaker.SimpleCircuitBreakerPolicy (oneof)
custom
google.protobuf.Any (oneof)
A simple circuit breaker can be set based on a number of criteria such as connection and request limits. For example, the following destination @@ -131,7 +131,7 @@ spec:
-maxConnections
int32
httpMaxPendingRequests
int32
httpMaxRequests
int32
sleepWindow
google.protobuf.Duration
httpConsecutiveErrors
int32
httpDetectionInterval
google.protobuf.Duration
httpMaxRequestsPerConnection
int32
httpMaxEjectionPercent
int32
httpMaxRetries
int32
allowOrigin
string[]
allowMethods
string[]
allowHeaders
string[]
exposeHeaders
string[]
maxAge
google.protobuf.Duration
allowCredentials
google.protobuf.BoolValue
destination
IstioService
source
IstioService
loadBalancing
LoadBalancing
circuitBreaker
CircuitBreaker
custom
google.protobuf.Any
destination
IstioService
labels
map<string, string>
weight
int32
destination
IstioService
ports
EgressRule.Port[]
EgressRule.Port[]
REQUIRED: list of ports on which the external service is available.
useEgressProxy
bool
Port describes the properties of a specific TCP port of an external service.
@@ -592,7 +592,7 @@ These dedicated egress nodes could then be more closely monitored for security v -port
int32
protocol
string
delay
HTTPFaultInjection.Delay
HTTPFaultInjection.Delay
Delay requests before forwarding, emulating various failures such as network issues, overloaded upstream service, etc.
abort
HTTPFaultInjection.Abort
HTTPFaultInjection.Abort
Abort Http request attempts and return error codes back to downstream service, giving the impression that the upstream service is faulty.
@@ -653,7 +653,7 @@ service, giving the impression that the upstream service is faulty.Abort specification is used to prematurely abort a request with a pre-specified error code. The following example will return an HTTP @@ -687,7 +687,7 @@ not specified, all requests are aborted.
-percent
float
grpcStatus
string (oneof)
http2Error
string (oneof)
httpStatus
int32 (oneof)
overrideHeaderName
string
Delay specification is used to inject latency into the request forwarding path. The following example will introduce a 5 second delay @@ -762,7 +762,7 @@ unspecified, all request will be delayed.
-percent
float
fixedDelay
google.protobuf.Duration (oneof)
exponentialDelay
google.protobuf.Duration (oneof)
overrideHeaderName
string
uri
string
authority
string
simpleRetry
HTTPRetry.SimpleRetryPolicy (oneof)
HTTPRetry.SimpleRetryPolicy (oneof)
custom
google.protobuf.Any (oneof)
Abruptly reset (terminate) the Tcp connection after it has been established, emulating remote server crash or link failure.
@@ -1283,7 +1283,7 @@ established, emulating remote server crash or link failure. -percent
float
terminateAfterPeriod
google.protobuf.Duration
Bandwidth throttling for Tcp and Udp connections
@@ -1316,7 +1316,7 @@ express time interval related configs. -percent
float
downstreamLimitBps
int64
upstreamLimitBps
int64
throttleAfterPeriod
google.protobuf.Duration (oneof)
throttleAfterBytes
double (oneof)
throttleForPeriod
google.protobuf.Duration
sourceSubnet
string[]
destinationSubnet
string[]
name
LoadBalancing.SimpleLBPolicy (oneof)
LoadBalancing.SimpleLBPolicy (oneof)
Load balancing policy name (as defined in SimpleLBPolicy below)
custom
google.protobuf.Any (oneof)
Load balancing algorithms supported by Envoy.
@@ -1465,14 +1465,14 @@ spec: -ROUND_ROBIN
Simple round robin policy.
LEAST_CONN
The least request load balancer uses an O(1) algorithm which selects @@ -1481,7 +1481,7 @@ requests.
RANDOM
The random load balancer selects a random healthy host. The random @@ -1535,7 +1535,7 @@ request header must be specified.
source
IstioService
tcp
L4MatchAttributes
udp
L4MatchAttributes
request
MatchRequest
headers
map<string, StringMatch>
destination
IstioService
precedence
int32
match
MatchCondition
route
DestinationWeight[]
redirect
HTTPRedirect
rewrite
HTTPRewrite
websocketUpgrade
bool
httpReqTimeout
HTTPTimeout
httpReqRetries
HTTPRetry
httpFault
HTTPFaultInjection
l4Fault
L4FaultInjection
mirror
IstioService
corsPolicy
CorsPolicy
appendHeaders
map<string, string>
exact
string (oneof)
prefix
string (oneof)
regex
string (oneof)
Default: 5 minutes
-clusterDomainName
string
Configures the cluster domain name to use for service name normalization.
- -Default: svc.cluster.local
- -podLabelForService
string
In order to extract the service associated with a source, destination, or -origin, this adapter relies on pod labels. In particular, it looks for -the value of a specific label, as specified by this parameter.
- -Default: app
- -podLabelForIstioComponentService
string
In order to extract the service associated with a source, destination, or -origin, this adapter relies on pod labels. In particular, it looks for -the value of a specific label for istio component services, as specified -by this parameter.
- -Default: istio
- -lookupIngressSourceAndOriginValues
bool
Default: false
- -fullyQualifiedIstioIngressServiceName
string
Istio ingress service string. This is used to identify the -ingress service in requests.
- -Default: “ingress.istio-system.svc.cluster.local”
-The stackdriver
adapter enables Istio to deliver log and metric data to the
-Stackdriver logging and monitoring backend.
The stackdriver
adapter enables Istio to deliver log, metric and traces to the
+Stackdriver backend.
This adapter supports the metric template, -and the logentry template.
+This adapter supports the metric template and +the logentry template.
./testdata/my-test-account-creds.json
.
A map of Istio LogEntry name to Stackdriver log info.
+trace
Params.Trace
Stackdriver Trace configuration.
+Lower bound of the first bucket.
+Details of Stackdriver Trace configuration for tracespan template.
+ +AttributeInfo describes the schema of an Istio Attribute
.
Istio uses attributes
to describe runtime activities of Istio services.
An Istio attribute carries a specific piece of information about an activity,
@@ -130,7 +130,7 @@ functionality by collecting, generating, and operating on attributes.
For example, the proxy collects the error code attribute, and the logging
stores it into a log.
Each Istio attribute must conform to an AttributeInfo
in an
AttributeManifest
in the current Istio deployment at runtime. An
@@ -144,7 +144,7 @@ specification, because passing attribute using JSON, XML, or Protocol Buffers
does not change the semantics of the attribute. Different implementations
can choose different representations based on their needs.
Because many systems already have REST APIs, it makes sense to define a standard HTTP mapping for Istio attributes that are compatible with typical @@ -161,7 +161,7 @@ encoding scheme will be decided later.
-description
string
valueType
ValueType
address
string
An instance field of type DNSName denotes that the expression for the field must evalaute to -ValueType.DNS_NAME
+ValueType.DNS_NAMEObjects of type DNSName are also passed to the adapters during request-time for the instance fields of type DNSName
@@ -222,7 +222,7 @@ type DNSNamevalue
string
An instance field of type Duration denotes that the expression for the field must evalaute to -ValueType.DURATION
+ValueType.DURATIONObjects of type Duration are also passed to the adapters during request-time for the instance fields of type Duration
@@ -250,7 +250,7 @@ type Durationvalue
google.protobuf.Duration
DO NOT USE !! Under Development An instance field of type EmailAddress denotes that the expression for the field must evalaute to -ValueType.EMAIL_ADDRESS
+ValueType.EMAIL_ADDRESSObjects of type EmailAddress are also passed to the adapters during request-time for the instance fields of type EmailAddress
@@ -279,7 +279,7 @@ type EmailAddressvalue
string
name
string
Required. Must be unique in the entire mixer configuration. Used by Actions +
Required. Must be unique in the entire mixer configuration. Used by Actions to refer to this handler.
adapter
compiledAdapter
string
Required. The name of a specific adapter implementation. An adapter’s -implementation name is typically a constant in its code.
+Required. The name of the compiled in adapter this handler instantiates. For referencing non compiled-in
+adapters, use the adapter
field instead.
The value must match the name of the available adapter Mixer is built with. An adapter’s name is typically a +constant in its code.
adapter
string
Required. The name of a specific adapter implementation. For referencing compiled-in
+adapters, use the compiled_adapter
field instead.
An adapter’s implementation name is typically a constant in its code.
+ +params
google.protobuf.Struct
connection
Connection
An instance field of type IPAddress denotes that the expression for the field must evalaute to -ValueType.IP_ADDRESS
+ValueType.IP_ADDRESSObjects of type IPAddress are also passed to the adapters during request-time for the instance fields of type IPAddress
@@ -408,7 +422,7 @@ type IPAddressvalue
bytes
name
string
template
compiledTemplate
string
Required. The name of the template this instance creates instances for. -The value must match the name of the available template in scope.
+Required. The name of the compiled in template this instance creates instances for. For referencing non compiled-in
+templates, use the template
field instead.
The value must match the name of the available template Mixer is built with.
template
string
Required. The name of the template this instance creates instances for. For referencing compiled-in
+templates, use the compiled_template
field instead.
The value must match the name of the available template in scope.
+ +params
google.protobuf.Struct
match
string
actions
Action[]
An instance field of type TimeStamp denotes that the expression for the field must evalaute to -ValueType.TIMESTAMP
+ValueType.TIMESTAMPObjects of type TimeStamp are also passed to the adapters during request-time for the instance fields of type TimeStamp
@@ -554,7 +581,7 @@ type TimeStampvalue
google.protobuf.Timestamp
DO NOT USE !! Under Development An instance field of type Uri denotes that the expression for the field must evalaute to -ValueType.URI
+ValueType.URIObjects of type Uri are also passed to the adapters during request-time for the instance fields of type Uri
@@ -583,7 +610,7 @@ type Urivalue
string
Value
is populated by Mixer and passe
stringValue
string (oneof)
Value
is populated by Mixer and passe
int64Value
int64 (oneof)
Value
is populated by Mixer and passe
doubleValue
double (oneof)
Value
is populated by Mixer and passe
boolValue
bool (oneof)
Value
is populated by Mixer and passe
ipAddressValue
IPAddress (oneof)
Value
is populated by Mixer and passe
timestampValue
TimeStamp (oneof)
Value
is populated by Mixer and passe
durationValue
Duration (oneof)
Value
is populated by Mixer and passe
emailAddressValue
EmailAddress (oneof)
Value
is populated by Mixer and passe
dnsNameValue
DNSName (oneof)
Value
is populated by Mixer and passe
uriValue
Uri (oneof)
VALUE_TYPE_UNSPECIFIED
Invalid, default value.
STRING
An undiscriminated variable-length string.
INT64
An undiscriminated 64-bit signed integer.
DOUBLE
An undiscriminated 64-bit floating-point value.
BOOL
An undiscriminated boolean value.
TIMESTAMP
A point in time.
IP_ADDRESS
An IP address.
EMAIL_ADDRESS
An email address.
URI
A URI.
DNS_NAME
A DNS name.
DURATION
A span between two points in time.
STRING_MAP
A map string -> string, typically used by headers.
diff --git a/content/docs/reference/config/policy-and-telemetry/templates/kubernetes.html b/content/docs/reference/config/policy-and-telemetry/templates/kubernetes.html index cb751502c8..77ec1e6794 100644 --- a/content/docs/reference/config/policy-and-telemetry/templates/kubernetes.html +++ b/content/docs/reference/config/policy-and-telemetry/templates/kubernetes.html @@ -81,14 +81,6 @@ to assign values to the generated attributes using the$out.<field name
Refers to source pod namespace. attributebindings can refer to this field using $out.sourcenamespace
-
-
sourceService
string
Refers to source service. attributebindings can refer to this field using $out.sourceservice
-$out.<field name
Refers to source pod host ip address. attributebindings can refer to this field using $out.sourcehost_ip
+
+
sourceWorkloadUid
string
Refers to the Istio workload identifier for the source pod. Attributebindings can refer to this field using $out.sourceworkload_uid
+ +sourceWorkloadName
string
Refers to the Istio workload name for the source pod. Attributebindings can refer to this field using $out.sourceworkload_name
+ +sourceWorkloadNamespace
string
Refers to the Istio workload namespace for the source pod. Attributebindings can refer to this field using $out.sourceworkload_namespace
+ +sourceOwner
string
Refers to the (controlling) owner of the source pod. Attributebindings can refer to this field using $out.sourceowner
+$out.<field name
Refers to destination pod namespace. attributebindings can refer to this field using $out.destinationnamespace
-
-
destinationService
string
Refers to destination service. attributebindings can refer to this field using $out.destinationservice
-$out.<field name
originPodIp
istio.policy.v1beta1.IPAddress
Refers to origin pod ip address. attributebindings can refer to this field using $out.originpod_ip
- -originPodName
destinationOwner
string
Refers to origin pod name. attributebindings can refer to this field using $out.originpod_name
+Refers to the (controlling) owner of the destination pod. Attributebindings can refer to this field using $out.destinationowner
originLabels
map<string, string>
Refers to origin pod labels. attributebindings can refer to this field using $out.originlabels
- -originNamespace
destinationWorkloadUid
string
Refers to origin pod namespace. attributebindings can refer to this field using $out.originnamespace
+Refers to the Istio workload identifier for the destination pod. Attributebindings can refer to this field using $out.destinationworkload_uid
originService
destinationWorkloadName
string
Refers to origin service. attributebindings can refer to this field using $out.originservice
+Refers to the Istio workload name for the destination pod. Attributebindings can refer to this field using $out.destinationworkload_name
originServiceAccountName
destinationWorkloadNamespace
string
Refers to origin pod service account name. attributebindings can refer to this field using $out.originserviceaccountname
- -originHostIp
istio.policy.v1beta1.IPAddress
Refers to origin pod host ip address. attributebindings can refer to this field using $out.originhost_ip
+Refers to the Istio workload name for the destination pod. Attributebindings can refer to this field using $out.destinationworkload_namespace
Destination pod’s ip.
-originUid
string
Origin pod’s uid. Must be of the form: “kubernetes://pod.namespace”
- -originIp
istio.policy.v1beta1.IPAddress
Origin pod’s ip.
-