Automator: update istio.io@ reference docs (#14179)

This commit is contained in:
Istio Automation 2023-11-17 07:01:07 -08:00 committed by GitHub
parent 81b6528445
commit ec490bcbdc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 24 additions and 22 deletions

View File

@ -1023,7 +1023,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1083,7 +1083,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1160,7 +1160,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `default`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1237,7 +1237,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1304,7 +1304,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1371,7 +1371,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1438,7 +1438,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1505,7 +1505,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1588,7 +1588,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1655,7 +1655,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>

View File

@ -724,7 +724,8 @@ No
<p>For gateways running on Kubernetes, the name of the secret that
holds the TLS certs including the CA certificates. Applicable
only on Kubernetes. An Opaque secret should contain the following
keys and values: <code>key: &lt;privateKey&gt;</code> and <code>cert: &lt;serverCert&gt;</code>.
keys and values: <code>tls.key: &lt;privateKey&gt;</code> and <code>tls.crt: &lt;serverCert&gt;</code> or
<code>key: &lt;privateKey&gt;</code> and <code>cert: &lt;serverCert&gt;</code>.
For mutual TLS, <code>cacert: &lt;CACertificate&gt;</code> and <code>crl: &lt;CertificateRevocationList&gt;</code>
can be provided in the same secret or a separate secret named <code>&lt;secret&gt;-cacert</code>.
A TLS secret for server certificates with an additional <code>tls.ocsp-staple</code> key

View File

@ -1023,7 +1023,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1083,7 +1083,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1160,7 +1160,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `default`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1237,7 +1237,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1304,7 +1304,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1371,7 +1371,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1438,7 +1438,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1505,7 +1505,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1588,7 +1588,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>
@ -1655,7 +1655,7 @@ istioctl d [flags]
<tr>
<td><code>--namespace &lt;string&gt;</code></td>
<td><code>-n</code></td>
<td>Namespace where the addon is running, if not specified, istio-system would be used (default `istio-system`)</td>
<td>Kubernetes namespace (default ``)</td>
</tr>
<tr>
<td><code>--port &lt;int&gt;</code></td>

View File

@ -724,7 +724,8 @@ No
<p>For gateways running on Kubernetes, the name of the secret that
holds the TLS certs including the CA certificates. Applicable
only on Kubernetes. An Opaque secret should contain the following
keys and values: <code>key: &lt;privateKey&gt;</code> and <code>cert: &lt;serverCert&gt;</code>.
keys and values: <code>tls.key: &lt;privateKey&gt;</code> and <code>tls.crt: &lt;serverCert&gt;</code> or
<code>key: &lt;privateKey&gt;</code> and <code>cert: &lt;serverCert&gt;</code>.
For mutual TLS, <code>cacert: &lt;CACertificate&gt;</code> and <code>crl: &lt;CertificateRevocationList&gt;</code>
can be provided in the same secret or a separate secret named <code>&lt;secret&gt;-cacert</code>.
A TLS secret for server certificates with an additional <code>tls.ocsp-staple</code> key