From d4cd6b2c897c43d48e505bf5d5804c431eda497e Mon Sep 17 00:00:00 2001 From: Istio Automation Date: Wed, 12 Jan 2022 18:51:14 -0800 Subject: [PATCH] Automator: update istio.io@ reference docs (#10780) --- .../config/networking/sidecar/index.html | 80 +++++++++++++++++++ data/features.yaml | 8 ++ 2 files changed, 88 insertions(+) diff --git a/content/en/docs/reference/config/networking/sidecar/index.html b/content/en/docs/reference/config/networking/sidecar/index.html index c5b44c10ce..499f8aba5a 100644 --- a/content/en/docs/reference/config/networking/sidecar/index.html +++ b/content/en/docs/reference/config/networking/sidecar/index.html @@ -399,6 +399,86 @@ spec:

{{}} {{}}

+

The following example declares a Sidecar configuration in the +prod-us1 namespace for all pods with labels app: ratings +belonging to the ratings.prod-us1 service. The service accepts +inbound HTTPS traffic on port 8443 and the sidecar proxy terminates +one way TLS using the given server certificates. +The traffic is then forwarded to the attached workload instance +listening on a Unix domain socket. +It is expected that PeerAuthentication policy would be configured +in order to set mTLS mode to “DISABLE” on specific +ports. +In this example, the mTLS mode is disabled on PORT 80. +This feature is currently experimental.

+ +

{{}} +{{}}

+ +
apiVersion: networking.istio.io/v1alpha3
+kind: Sidecar
+metadata:
+  name: ratings
+  namespace: prod-us1
+spec:
+  workloadSelector:
+    labels:
+      app: ratings
+  ingress:
+  - port:
+      number: 80
+      protocol: HTTPS
+      name: somename
+    defaultEndpoint: unix:///var/run/someuds.sock
+    tls:
+      mode: SIMPLE
+      privateKey: "/etc/certs/privatekey.pem"
+      serverCertificate: "/etc/certs/servercert.pem"
+
+ +

{{}}

+ +

{{}}

+ +
apiVersion: v1
+kind: Service
+metadata:
+  name: ratings
+  labels:
+    app: ratings
+    service: ratings
+spec:
+  ports:
+  - port: 8443
+    name: https
+    targetPort: 80
+  selector:
+    app: ratings
+
+ +

{{}}

+ +

{{}}

+ +
apiVersion: security.istio.io/v1beta1
+kind: PeerAuthentication
+metadata:
+  name: ratings-peer-auth
+  namespace: prod-us1
+spec:
+  selector:
+    matchLabels:
+      app: ratings
+  mtls:
+    mode: STRICT
+  portLevelMtls:
+    80:
+      mode: DISABLE
+
+ +

{{}} +{{}}

+

Sidecar

Sidecar describes the configuration of the sidecar proxy that mediates diff --git a/data/features.yaml b/data/features.yaml index b98ed37913..bb027b5592 100644 --- a/data/features.yaml +++ b/data/features.yaml @@ -362,3 +362,11 @@ features: nextExpectedPromotion: "" area: Core id: "core.revision_tags" + - name: "Configurable Telemetry Production" + area: Observability + id: "observability.api" + link: "https://istio.io/latest/docs/tasks/observability/telemetry/" + level: + checklist: features/telemetry_api.md + maturity: Experimental + nextExpectedPromotion: "1.13"