fix additional broken in-doc header links (#15640)

* fix additional broken in-doc header links

Signed-off-by: Faseela K <faseela.k@est.tech>

* fix lint

Signed-off-by: Faseela K <faseela.k@est.tech>

* fix lint

Signed-off-by: Faseela K <faseela.k@est.tech>

---------

Signed-off-by: Faseela K <faseela.k@est.tech>
This commit is contained in:
Faseela K 2024-09-04 06:40:25 +05:30 committed by GitHub
parent efea7576fe
commit 7c2892d97f
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
8 changed files with 13 additions and 13 deletions

View File

@ -108,7 +108,7 @@ An exception to this is for protocols declared as HTTP, which will match traffic
{{< warning >}}
Without Istio, the `ports` field of a headless service is not strictly required because requests go directly to pod IPs, which can accept traffic on all ports.
However, with Istio the port must be declared in the Service, or it will [not be matched](#unmatched-traffic).
However, with Istio the port must be declared in the Service, or it will [not be matched](/docs/ops/configuration/traffic-management/traffic-routing/#unmatched-traffic).
{{< /warning >}}
### ExternalName Services

View File

@ -21,7 +21,7 @@ To make debugging easier, the CNI plugin also sends its log to the `istio-cni-no
The default log level for the CNI plugin is `info`. To get more detailed log output, you can change the level by editing the `values.cni.logLevel` installation option and restarting the CNI DaemonSet pod.
The Istio CNI DaemonSet pod log also provides information about CNI plugin installation,
and [race condition repairing](/docs/setup/additional-setup/cni/#race-condition-mitigation).
and [race condition repairing](/docs/setup/additional-setup/cni/#race-condition--mitigation).
## Monitoring
@ -38,7 +38,7 @@ You can also track CNI installation readiness via the `istio_cni_install_ready`
## Race condition repair
By default, the Istio CNI DaemonSet has [race condition mitigation](/docs/setup/additional-setup/cni/#race-condition-mitigation) enabled,
By default, the Istio CNI DaemonSet has [race condition mitigation](/docs/setup/additional-setup/cni/#race-condition--mitigation) enabled,
which will evict a pod that was started before the CNI plugin was ready.
To understand which pods were evicted, look for log lines like the following:
@ -79,5 +79,5 @@ search the `istio-cni-node` for the pod ID.
Another symptom of a malfunctioned CNI plugin is that the application pod is continuously evicted at start-up time.
This is typically because the plugin is not properly installed, thus pod traffic redirection cannot be set up.
CNI [race repair logic](/docs/setup/additional-setup/cni/#race-condition-mitigation) considers the pod is broken due to the race condition and evicts the pod continuously.
CNI [race repair logic](/docs/setup/additional-setup/cni/#race-condition--mitigation) considers the pod is broken due to the race condition and evicts the pod continuously.
When running into this issue, check the CNI DaemonSet log for information on why the plugin could not be properly installed.

View File

@ -130,7 +130,7 @@ There is a time gap between a node becomes schedulable and the Istio CNI plugin
If an application pod starts up during this time, it is possible that traffic redirection is not properly set up and traffic would be able to bypass the Istio sidecar.
This race condition is mitigated for the sidecar data plane mode by a "detect and repair" method.
Please take a look at [race condition & mitigation](#race-condition--mitigation) section to understand the implication of this mitigation, and for configuration instructions.
Please take a look at [race condition & mitigation](/docs/setup/additional-setup/cni/#race-condition--mitigation) section to understand the implication of this mitigation, and for configuration instructions.
{{< /tip >}}
### Handling init container injection for revisions

View File

@ -45,10 +45,10 @@ $ istioctl install --set values.pilot.traceSampling=0.1
{{< /text >}}
Helm values can also be set in an `IstioOperator` CR (YAML file) as described in
[Customize Istio settings using the Helm API](#customize-istio-settings-using-the-helm-api), below.
[Customize Istio settings using the Helm API](/docs/setup/additional-setup/customize-installation/#customize-istio-settings-using-the-helm-api), below.
If you want to set Kubernetes resource settings, use the `IstioOperator` API as described in
[Customize Kubernetes settings](#customize-kubernetes-settings).
[Customize Kubernetes settings](/docs/setup/additional-setup/customize-installation/#customize-kubernetes-settings).
{{< /tip >}}
### Identify an Istio component

View File

@ -379,7 +379,7 @@ After updating the `istio-sidecar-injector` configuration, it affects all
future application pod deployments.
{{< warning >}}
Unlike [Envoy passthrough to external services](#envoy-passthrough-to-external-services),
Unlike [Envoy passthrough to external services](/docs/tasks/traffic-management/egress/egress-control/#envoy-passthrough-to-external-services),
which uses the `ALLOW_ANY` traffic policy to instruct the Istio sidecar proxy to
passthrough calls to unknown services,
this approach completely bypasses the sidecar, essentially disabling all of Istio's features

View File

@ -129,7 +129,7 @@ Istio 支持这些服务类型,并且与标准的 `ClusterIP` 服务具有完
{{< warning >}}
在没有 Istio 的情况下,无头服务的 `ports` 字段不是严格必需的,
因为请求直接发送到 Pod IP该 IP 可以在所有端口上接受流量。
但是,在使用 Istio 时,必须在服务中声明端口,否则将[不会被匹配](#unmatched-traffic)。
但是,在使用 Istio 时,必须在服务中声明端口,否则将[不会被匹配](/zh/docs/ops/configuration/traffic-management/traffic-routing/#unmatched-traffic)。
{{< /warning >}}
### ExternalName 服务 {#externalname-services}

View File

@ -22,7 +22,7 @@ CNI 插件的默认日志级别是 `info`。要获得更详细的日志输出,
`values.cni.logLevel` 安装选项并重新启动 CNI DaemonSet Pod 来更改级别。
Istio CNI DaemonSet Pod 日志还提供了有关 CNI
插件安装的信息以及[竞争条件和缓解措施](/zh/docs/setup/additional-setup/cni/#race-condition-mitigation)。
插件安装的信息以及[竞争条件和缓解措施](/zh/docs/setup/additional-setup/cni/#race-condition--mitigation)。
## 监控 {#monitoring}
@ -40,7 +40,7 @@ CNI DaemonSet 的就绪表明 Istio CNI 插件已被正确安装和配置。
## 竞争条件和缓解措施 {#race-condition-repair}
Istio CNI DaemonSet 默认启用[竞争条件和缓解措施](/zh/docs/setup/additional-setup/cni/#race-condition-mitigation)
Istio CNI DaemonSet 默认启用[竞争条件和缓解措施](/zh/docs/setup/additional-setup/cni/#race-condition--mitigation)
这将驱逐在 CNI 插件准备就绪之前启动的 Pod。要了解哪些 Pod 被驱逐,请查找如下所示的日志行:
{{< text plain >}}
@ -77,6 +77,6 @@ $ kubectl logs POD_NAME -n POD_NAMESPACE -c istio-validation
CNI 插件出现故障的另一个症状是,应用程序 Pod 在启动时不断被逐出。
这通常是因为插件没有被正确安装,因此无法设置 Pod 流量重定向。
CNI 的[竞争条件和缓解措施逻辑](/zh/docs/setup/additional-setup/cni/#race-condition-mitigation)
CNI 的[竞争条件和缓解措施逻辑](/zh/docs/setup/additional-setup/cni/#race-condition--mitigation)
认为由于竞争条件引起的问题导致 Pod 损坏,并连续逐出 Pod。遇到此问题时请检查 CNI DaemonSet 日志,
以获取为什么插件未被正确安装的信息。

View File

@ -151,7 +151,7 @@ $ helm install istiod istio/istiod -n istio-system --set pilot.cni.enabled=true
则可能未正确设置流量重定向,流量将能够绕过 Istio Sidecar。
对于 Sidecar 数据平面模式,此竞争条件可通过“检测和修复”方法缓解。
请参阅[竞争条件和缓解](#race-condition-mitigation)部分以了解此缓解措施的含义以及配置说明。
请参阅[竞争条件和缓解](/zh/docs/setup/additional-setup/cni/#race-condition--mitigation)部分以了解此缓解措施的含义以及配置说明。
{{< /tip >}}
### 处理修订的 Init 容器注入 {#handling-init-container-injection-for-revisions}