mirror of https://github.com/istio/istio.io.git
Add istiod to the glossary page (#6899)
* Add istiod to the glossary page * Updated istio learning link. * adding gloss links to first term usage in page * Updated gloss links per review
This commit is contained in:
parent
e7f8c82451
commit
8ecc8fc10c
|
@ -162,7 +162,7 @@ Istio provides two types of authentication:
|
||||||
- [Google Auth](https://developers.google.com/identity/protocols/OpenIDConnect)
|
- [Google Auth](https://developers.google.com/identity/protocols/OpenIDConnect)
|
||||||
|
|
||||||
In all cases, Istio stores the authentication policies in the `Istio config
|
In all cases, Istio stores the authentication policies in the `Istio config
|
||||||
store` via a custom Kubernetes API. Istiod keeps them up-to-date for each proxy,
|
store` via a custom Kubernetes API. {{< gloss >}}Istiod{{< /gloss >}} keeps them up-to-date for each proxy,
|
||||||
along with the keys where appropriate. Additionally, Istio supports
|
along with the keys where appropriate. Additionally, Istio supports
|
||||||
authentication in permissive mode to help you understand how a policy change can
|
authentication in permissive mode to help you understand how a policy change can
|
||||||
affect your security posture before it is enforced.
|
affect your security posture before it is enforced.
|
||||||
|
|
|
@ -65,7 +65,7 @@ Next, run the following commands on each machine that you want to add to the mes
|
||||||
{{< /text >}}
|
{{< /text >}}
|
||||||
|
|
||||||
1. Add the IP address of Istio gateway to `/etc/hosts`. Revisit the [preparing the cluster](#preparing-the-kubernetes-cluster-for-vms) section to learn how to obtain the IP address.
|
1. Add the IP address of Istio gateway to `/etc/hosts`. Revisit the [preparing the cluster](#preparing-the-kubernetes-cluster-for-vms) section to learn how to obtain the IP address.
|
||||||
The following example updates the `/etc/hosts` file with the Istiod address:
|
The following example updates the `/etc/hosts` file with the {{< gloss >}}Istiod{{< /gloss >}} address:
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ echo "${GWIP} istiod.istio-system.svc" | sudo tee -a /etc/hosts
|
$ echo "${GWIP} istiod.istio-system.svc" | sudo tee -a /etc/hosts
|
||||||
|
|
|
@ -77,7 +77,7 @@ following commands on a machine with cluster admin privileges:
|
||||||
Alternatively, the user can create an explicit service of type `LoadBalancer` and use
|
Alternatively, the user can create an explicit service of type `LoadBalancer` and use
|
||||||
[internal load balancer](https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer)
|
[internal load balancer](https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer)
|
||||||
type. User can also deploy a separate ingress Gateway, with internal load balancer type for both mesh expansion and
|
type. User can also deploy a separate ingress Gateway, with internal load balancer type for both mesh expansion and
|
||||||
multicluster. The main requirement is for the exposed address to do TCP load balancing to the Istiod deployment,
|
multicluster. The main requirement is for the exposed address to do TCP load balancing to the {{< gloss >}}Istiod{{< /gloss >}} deployment,
|
||||||
and for the DNS name associated with the assigned load balancer address to match the certificate provisioned
|
and for the DNS name associated with the assigned load balancer address to match the certificate provisioned
|
||||||
into Istiod deployment, defaulting to `istiod.istio-system.svc`.
|
into Istiod deployment, defaulting to `istiod.istio-system.svc`.
|
||||||
|
|
||||||
|
|
|
@ -84,7 +84,7 @@ matching requests should flow through. If all requests continue to be denied, yo
|
||||||
|
|
||||||
1. Make sure there is no typo in your policy YAML file.
|
1. Make sure there is no typo in your policy YAML file.
|
||||||
|
|
||||||
1. Avoid enabling authorization for Istiod. Istio authorization policy is designed for authorizing access to workloads in Istio Mesh. Enabling it for Istiod may cause unexpected behavior.
|
1. Avoid enabling authorization for {{< gloss >}}Istiod{{< /gloss >}}. Istio authorization policy is designed for authorizing access to workloads in Istio Mesh. Enabling it for Istiod may cause unexpected behavior.
|
||||||
|
|
||||||
1. Make sure that your authorization policies are in the right namespace (as specified in `metadata/namespace` field).
|
1. Make sure that your authorization policies are in the right namespace (as specified in `metadata/namespace` field).
|
||||||
|
|
||||||
|
|
|
@ -47,7 +47,7 @@ reviews-v3-7b9b5fdfd6-4r52s.default SYNCED SYNCED SYN
|
||||||
If a proxy is missing from this list it means that it is not currently connected to a Istiod instance so will not be
|
If a proxy is missing from this list it means that it is not currently connected to a Istiod instance so will not be
|
||||||
receiving any configuration.
|
receiving any configuration.
|
||||||
|
|
||||||
* `SYNCED` means that Envoy has acknowledged the last configuration Istiod has sent to it.
|
* `SYNCED` means that Envoy has acknowledged the last configuration {{< gloss >}}Istiod{{< /gloss >}} has sent to it.
|
||||||
* `NOT SENT` means that Istiod hasn't sent anything to Envoy. This usually is because Istiod has nothing to send.
|
* `NOT SENT` means that Istiod hasn't sent anything to Envoy. This usually is because Istiod has nothing to send.
|
||||||
* `STALE` means that Istiod has sent an update to Envoy but has not received an acknowledgement. This usually indicates
|
* `STALE` means that Istiod has sent an update to Envoy but has not received an acknowledgement. This usually indicates
|
||||||
a networking issue between Envoy and Istiod or a bug with Istio itself.
|
a networking issue between Envoy and Istiod or a bug with Istio itself.
|
||||||
|
|
|
@ -0,0 +1,7 @@
|
||||||
|
---
|
||||||
|
title: Istiod
|
||||||
|
---
|
||||||
|
|
||||||
|
The Istiod component is the consolidated monolithic control plane binary that encapsulates the functions of Pilot, Citadel, Mixer, and Galley.
|
||||||
|
|
||||||
|
[Learn more about Istiod](/blog/2020/tradewinds-2020/#fewer-moving-parts).
|
|
@ -10,7 +10,7 @@ using [Chiron](/blog/2019/dns-cert/), a lightweight component linked with Istiod
|
||||||
using the Kubernetes CA APIs without maintaining its own private key.
|
using the Kubernetes CA APIs without maintaining its own private key.
|
||||||
Using this feature has the following advantages:
|
Using this feature has the following advantages:
|
||||||
|
|
||||||
* Unlike Istiod, this feature doesn't require maintaining a private signing key, which enhances security.
|
* Unlike {{< gloss >}}Istiod{{< /gloss >}}, this feature doesn't require maintaining a private signing key, which enhances security.
|
||||||
|
|
||||||
* Simplified root certificate distribution to TLS clients. Clients no longer need to wait for Istiod to generate and distribute its CA certificate.
|
* Simplified root certificate distribution to TLS clients. Clients no longer need to wait for Istiod to generate and distribute its CA certificate.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue