Update reference docs. (#3000)

This commit is contained in:
Martin Taillefer 2018-12-20 17:22:08 -08:00 committed by GitHub
parent 24e2e87d81
commit a7d8d61c19
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 26 additions and 26 deletions

View File

@ -15,11 +15,11 @@ number_of_entries: 4
<tbody>
<tr>
<td><code>--accessListFile &lt;string&gt;</code></td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/istio/config/accesslist.yaml`)</td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/config/accesslist.yaml`)</td>
</tr>
<tr>
<td><code>--caCertFile &lt;string&gt;</code></td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/istio/certs/root-cert.pem`)</td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/certs/root-cert.pem`)</td>
</tr>
<tr>
<td><code>--configPath &lt;string&gt;</code></td>
@ -111,7 +111,7 @@ number_of_entries: 4
</tr>
<tr>
<td><code>--meshConfigFile &lt;string&gt;</code></td>
<td>Path to the mesh config file (default `/etc/istio/mesh-config/mesh`)</td>
<td>Path to the mesh config file (default `/etc/mesh-config/mesh`)</td>
</tr>
<tr>
<td><code>--monitoringPort &lt;uint&gt;</code></td>
@ -147,11 +147,11 @@ number_of_entries: 4
</tr>
<tr>
<td><code>--tlsCertFile &lt;string&gt;</code></td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/istio/certs/cert-chain.pem`)</td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`)</td>
</tr>
<tr>
<td><code>--tlsKeyFile &lt;string&gt;</code></td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/istio/certs/key.pem`)</td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/certs/key.pem`)</td>
</tr>
<tr>
<td><code>--validation-port &lt;uint&gt;</code></td>
@ -179,11 +179,11 @@ number_of_entries: 4
<tbody>
<tr>
<td><code>--accessListFile &lt;string&gt;</code></td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/istio/config/accesslist.yaml`)</td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/config/accesslist.yaml`)</td>
</tr>
<tr>
<td><code>--caCertFile &lt;string&gt;</code></td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/istio/certs/root-cert.pem`)</td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/certs/root-cert.pem`)</td>
</tr>
<tr>
<td><code>--configPath &lt;string&gt;</code></td>
@ -279,7 +279,7 @@ number_of_entries: 4
</tr>
<tr>
<td><code>--meshConfigFile &lt;string&gt;</code></td>
<td>Path to the mesh config file (default `/etc/istio/mesh-config/mesh`)</td>
<td>Path to the mesh config file (default `/etc/mesh-config/mesh`)</td>
</tr>
<tr>
<td><code>--monitoringPort &lt;uint&gt;</code></td>
@ -319,11 +319,11 @@ number_of_entries: 4
</tr>
<tr>
<td><code>--tlsCertFile &lt;string&gt;</code></td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/istio/certs/cert-chain.pem`)</td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`)</td>
</tr>
<tr>
<td><code>--tlsKeyFile &lt;string&gt;</code></td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/istio/certs/key.pem`)</td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/certs/key.pem`)</td>
</tr>
<tr>
<td><code>--validation-port &lt;uint&gt;</code></td>
@ -353,12 +353,12 @@ number_of_entries: 4
<tr>
<td><code>--accessListFile &lt;string&gt;</code></td>
<td></td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/istio/config/accesslist.yaml`)</td>
<td>The access list yaml file that contains the allowd mTLS peer ids. (default `/etc/config/accesslist.yaml`)</td>
</tr>
<tr>
<td><code>--caCertFile &lt;string&gt;</code></td>
<td></td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/istio/certs/root-cert.pem`)</td>
<td>File containing the caBundle that signed the cert/key specified by --tlsCertFile and --tlsKeyFile. (default `/etc/certs/root-cert.pem`)</td>
</tr>
<tr>
<td><code>--configPath &lt;string&gt;</code></td>
@ -473,7 +473,7 @@ number_of_entries: 4
<tr>
<td><code>--meshConfigFile &lt;string&gt;</code></td>
<td></td>
<td>Path to the mesh config file (default `/etc/istio/mesh-config/mesh`)</td>
<td>Path to the mesh config file (default `/etc/mesh-config/mesh`)</td>
</tr>
<tr>
<td><code>--monitoringPort &lt;uint&gt;</code></td>
@ -528,12 +528,12 @@ number_of_entries: 4
<tr>
<td><code>--tlsCertFile &lt;string&gt;</code></td>
<td></td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/istio/certs/cert-chain.pem`)</td>
<td>File containing the x509 Certificate for HTTPS. (default `/etc/certs/cert-chain.pem`)</td>
</tr>
<tr>
<td><code>--tlsKeyFile &lt;string&gt;</code></td>
<td></td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/istio/certs/key.pem`)</td>
<td>File containing the x509 private key matching --tlsCertFile. (default `/etc/certs/key.pem`)</td>
</tr>
<tr>
<td><code>--validation-port &lt;uint&gt;</code></td>

View File

@ -115,12 +115,12 @@ nexus for policy evaluation and telemetry reporting.</p>
<tr>
<td><code>--caCertFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the certificate file for the root certificate authority (default `/etc/istio/certs/root-cert.pem`)</td>
<td>The location of the certificate file for the root certificate authority (default `/etc/certs/root-cert.pem`)</td>
</tr>
<tr>
<td><code>--certFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the certificate file for mutual TLS (default `/etc/istio/certs/cert-chain.pem`)</td>
<td>The location of the certificate file for mutual TLS (default `/etc/certs/cert-chain.pem`)</td>
</tr>
<tr>
<td><code>--configDefaultNamespace &lt;string&gt;</code></td>
@ -145,7 +145,7 @@ nexus for policy evaluation and telemetry reporting.</p>
<tr>
<td><code>--keyFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the key file for mutual TLS (default `/etc/istio/certs/key.pem`)</td>
<td>The location of the key file for mutual TLS (default `/etc/certs/key.pem`)</td>
</tr>
<tr>
<td><code>--latencySampleHalflife &lt;duration&gt;</code></td>

View File

@ -84,12 +84,12 @@ number_of_entries: 5
<tr>
<td><code>--caCertFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the certificate file for the root certificate authority (default `/etc/istio/certs/root-cert.pem`)</td>
<td>The location of the certificate file for the root certificate authority (default `/etc/certs/root-cert.pem`)</td>
</tr>
<tr>
<td><code>--certFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the certificate file for mutual TLS (default `/etc/istio/certs/cert-chain.pem`)</td>
<td>The location of the certificate file for mutual TLS (default `/etc/certs/cert-chain.pem`)</td>
</tr>
<tr>
<td><code>--clusterRegistriesNamespace &lt;string&gt;</code></td>
@ -159,7 +159,7 @@ number_of_entries: 5
<tr>
<td><code>--keyFile &lt;string&gt;</code></td>
<td></td>
<td>The location of the key file for mutual TLS (default `/etc/istio/certs/key.pem`)</td>
<td>The location of the key file for mutual TLS (default `/etc/certs/key.pem`)</td>
</tr>
<tr>
<td><code>--kubeconfig &lt;string&gt;</code></td>

View File

@ -347,7 +347,7 @@ access. Serialized into Access-Control-Expose-Headers header.</p>
<td><code>maxAge</code></td>
<td><code><a href="https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#duration">google.protobuf.Duration</a></code></td>
<td>
<p>Specifies how long the the results of a preflight request can be
<p>Specifies how long the results of a preflight request can be
cached. Translates to the Access-Control-Max-Age header.</p>
</td>
@ -2121,8 +2121,8 @@ to the caller</p>
<td><code>add</code></td>
<td><code>map&lt;string,&nbsp;string&gt;</code></td>
<td>
<p>Apppend the given values to the the headers specified by keys
(will create a comma seperated list of values)</p>
<p>Append the given values to the headers specified by keys
(will create a comma-separated list of values)</p>
</td>
</tr>
@ -2976,7 +2976,7 @@ compute the sidecar configuration for every workload in the namespace.</p>
same namespace, set defaultServiceDependency.importMode to SAME_NAMESPACE
in the mesh global config map (in values.yaml).</p>
<p>NOTE 2: To facilitate incremental pruning of the the sidecar
<p>NOTE 2: To facilitate incremental pruning of the` sidecar
configuration, the default import mode for the mesh is set to
ALL_NAMESPACES. In other words, every workload will be able to reach
every other workload. Adding a ServiceDependency resource in a namespace will
@ -2985,7 +2985,7 @@ namespace.</p>
<p>The following examples illustrate a few specific use cases of ServiceDependency.</p>
<p>The example below delcares a ServiceDependency resource in the prod-us1
<p>The example below declares a ServiceDependency resource in the prod-us1
namespace that specifies that workloads in the namespace will be able to
reach the services in the prod-apis namespace only.</p>