mirror of https://github.com/istio/istio.io.git
Prune a few things that shouldn't have been in the dictionary. (#3622)
This commit is contained in:
parent
13078d97cd
commit
fbd2b162fb
10
.spelling
10
.spelling
|
|
@ -81,7 +81,6 @@ base64
|
|||
BigQuery
|
||||
bitpipe
|
||||
BluePerf
|
||||
BluePerf
|
||||
boilerplates
|
||||
Bookinfo
|
||||
boolean
|
||||
|
|
@ -206,7 +205,6 @@ HTTP2
|
|||
http2
|
||||
httpbin
|
||||
httpbin.org
|
||||
httpReqTimeout
|
||||
https
|
||||
hyperkube
|
||||
Hystrix
|
||||
|
|
@ -276,9 +274,7 @@ macOS
|
|||
Mandar
|
||||
Manolache
|
||||
memcached
|
||||
memcached
|
||||
memcached-2's
|
||||
memquota
|
||||
MeshPolicy
|
||||
Mesos
|
||||
mesos-dns
|
||||
|
|
@ -293,14 +289,11 @@ misconfigured
|
|||
misordered
|
||||
MongoDB
|
||||
mongodb
|
||||
MSG_PEEK
|
||||
Multicloud
|
||||
multicloud
|
||||
Multicluster
|
||||
multicluster
|
||||
mutatingwebhookconfiguration
|
||||
mutual-tls
|
||||
mTLS
|
||||
myapp
|
||||
MySQL
|
||||
mysql
|
||||
|
|
@ -425,7 +418,8 @@ SLOs
|
|||
Snell-Feikema
|
||||
SNI
|
||||
SolarWinds
|
||||
spiffe
|
||||
SPIFFE
|
||||
SPIFFE-compliant
|
||||
SREs
|
||||
Stackdriver
|
||||
Statsd
|
||||
|
|
|
|||
|
|
@ -92,7 +92,7 @@ across heterogeneous environments.
|
|||
|
||||
Istio and SPIFFE share the same identity document: [SVID](https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md) (SPIFFE Verifiable Identity Document).
|
||||
For example, in Kubernetes, the X.509 certificate has the URI field in the format of
|
||||
"spiffe://\<domain\>/ns/\<namespace\>/sa/\<serviceaccount\>".
|
||||
`spiffe://\<domain\>/ns/\<namespace\>/sa/\<serviceaccount\>`.
|
||||
This enables Istio services to establish and accept connections with other SPIFFE-compliant systems.
|
||||
|
||||
Istio security and [SPIRE](https://spiffe.io/spire/), which is the implementation of SPIFFE, differ in the PKI implementation details.
|
||||
|
|
|
|||
|
|
@ -117,7 +117,7 @@ running in a second cluster.
|
|||
|
||||
The configurations above will result in all traffic in `cluster1` for
|
||||
`httpbin.bar.global` on *any port* to be routed to the endpoint
|
||||
`<IPofCluster2IngressGateway>:15443` over an mTLS connection.
|
||||
`<IPofCluster2IngressGateway>:15443` over a mutual TLS connection.
|
||||
|
||||
The gateway for port 15443 is a special SNI-aware Envoy
|
||||
preconfigured and installed as part of the multicluster Istio installation step
|
||||
|
|
|
|||
|
|
@ -169,7 +169,7 @@ with `kubectl edit mutatingwebhookconfiguration
|
|||
istio-sidecar-injector`.
|
||||
|
||||
{{< warning >}}
|
||||
The sidecar injector pod(s) should be restarted after modifying the mutatingwebhookconfiguration.
|
||||
The sidecar injector pod(s) should be restarted after modifying the `mutatingwebhookconfiguration`.
|
||||
{{< /warning >}}
|
||||
|
||||
The `istio-sidecar-injector` ConfigMap in the `istio-system` namespace has the default
|
||||
|
|
|
|||
|
|
@ -55,7 +55,7 @@ This permits customization of Istio to operator specific requirements.
|
|||
{{< tabset cookie-name="profile" >}}
|
||||
|
||||
{{% tab name="permissive mTLS" cookie-value="permissive" %}}
|
||||
When using the mTLS permissive mode, all services accept both plain text and
|
||||
When using the permissive mutual TLS mode, all services accept both plain text and
|
||||
mutual TLS traffic. Clients send plain text traffic unless configured for
|
||||
[mutual migration](/docs/tasks/security/mtls-migration/#configure-clients-to-send-mutual-tls-traffic).
|
||||
Visit our [mutual TLS permissive mode page](/docs/concepts/security/#permissive-mode)
|
||||
|
|
@ -188,7 +188,7 @@ The uninstall deletes the RBAC permissions, the `istio-system` namespace, and
|
|||
all resources hierarchically under it. It is safe to ignore errors for
|
||||
non-existent resources because they may have been deleted hierarchically.
|
||||
|
||||
* Uninstall the `demo profile` corresponding to the mTLS mode you enabled:
|
||||
* Uninstall the `demo profile` corresponding to the mutual TLS mode you enabled:
|
||||
|
||||
{{< tabset cookie-name="profile" >}}
|
||||
|
||||
|
|
|
|||
|
|
@ -52,10 +52,10 @@ so the configuration to enable rate limiting on both adapters is the same.
|
|||
* `QuotaSpecBinding` conditionally associates `QuotaSpec` with one or more services.
|
||||
* Mixer Side
|
||||
* `quota instance` defines how quota is dimensioned by Mixer.
|
||||
* `memquota adapter` defines memquota adapter configuration.
|
||||
* `quota rule` defines when quota instance is dispatched to the memquota adapter.
|
||||
* `memquota adapter` defines `memquota` adapter configuration.
|
||||
* `quota rule` defines when quota instance is dispatched to the `memquota` adapter.
|
||||
|
||||
Run the following command to enable rate limits using memquota:
|
||||
Run the following command to enable rate limits using `memquota`:
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl apply -f @samples/bookinfo/policy/mixer-rule-productpage-ratelimit.yaml@
|
||||
|
|
|
|||
|
|
@ -16,14 +16,14 @@ operator-specified root certificate. This task demonstrates an example to plug c
|
|||
* Set up Istio by following the instructions in the
|
||||
[quick start](/docs/setup/kubernetes/install/kubernetes/) with global mutual TLS enabled:
|
||||
|
||||
Follow the [installation instructions](/docs/setup/kubernetes/install/kubernetes/#installation-steps) install Istio with the **strict mTLS mode** enabled.
|
||||
Follow the [installation instructions](/docs/setup/kubernetes/install/kubernetes/#installation-steps) install Istio with the **strict mutual TLS mode** enabled.
|
||||
|
||||
_**OR**_
|
||||
|
||||
Using [Helm](/docs/setup/kubernetes/install/helm/) with mutual TLS enabled.
|
||||
|
||||
{{< tip >}}
|
||||
Starting with Istio 0.7, you can use [authentication policy](/docs/concepts/security/#authentication-policies) to configure mutual TLS for all/selected services in a namespace (repeated for all namespaces to get global setting). See [authentication policy task](/docs/tasks/security/authn-policy/)
|
||||
You can use [authentication policy](/docs/concepts/security/#authentication-policies) to configure mutual TLS for all/selected services in a namespace (repeated for all namespaces to get global setting). See [authentication policy task](/docs/tasks/security/authn-policy/)
|
||||
{{< /tip >}}
|
||||
|
||||
## Plugging in the existing certificate and key
|
||||
|
|
|
|||
|
|
@ -167,7 +167,7 @@ Warning FailedCreate 3m (x17 over 8m) replicaset-controller Error creating:
|
|||
`x509: certificate signed by unknown authority` errors are typically
|
||||
caused by an empty `caBundle` in the webhook configuration.
|
||||
|
||||
Verify the `caBundle` in the mutatingwebhookconfiguration matches the
|
||||
Verify the `caBundle` in the `mutatingwebhookconfiguration` matches the
|
||||
root certificate mounted in the `istio-sidecar-injector` pod.
|
||||
|
||||
{{< text bash >}}
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ $ sidecar-injector [选项]
|
|||
| `--port <int>` | Webhook 端口(默认为 `443`) |
|
||||
| `--tlsCertFile <string>` | HTTPS x509 证书文件(默认为 `/etc/istio/certs/cert-chain.pem`) |
|
||||
| `--tlsKeyFile <string>` | 和 `--tlsCertFile` 匹配的 x509 私钥文件(默认为 `/etc/istio/certs/key.pem`) |
|
||||
| `--webhookConfigName <string>` | Kubernetes mutatingwebhookconfiguration 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookConfigName <string>` | Kubernetes `mutatingwebhookconfiguration` 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookName <string>` | webhook 配置中 webhook 项名(默认为 `sidecar-injector.istio.io`) |
|
||||
|
||||
## sidecar-injector probe
|
||||
|
|
@ -65,7 +65,7 @@ $ sidecar-injector probe [选项]
|
|||
| `--probe-path <string>` | 检查可用性的文件路径(默认为 `''`) |
|
||||
| `--tlsCertFile <string>` | HTTPS x509 证书文件(默认为 `/etc/istio/certs/cert-chain.pem`) |
|
||||
| `--tlsKeyFile <string>` | 和 `--tlsCertFile` 匹配的 x509 私钥文件(默认为 `/etc/istio/certs/key.pem`) |
|
||||
| `--webhookConfigName <string>` | Kubernetes mutatingwebhookconfiguration 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookConfigName <string>` | Kubernetes `mutatingwebhookconfiguration` 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookName <string>` | webhook 配置中 webhook 项名(默认为 `sidecar-injector.istio.io`) |
|
||||
|
||||
## sidecar-injector version
|
||||
|
|
@ -97,5 +97,5 @@ $ sidecar-injector version [选项]
|
|||
| `--short` | `-s` | 显示版本信息的短格式 |
|
||||
| `--tlsCertFile <string>` | | HTTPS x509 证书文件(默认为 `/etc/istio/certs/cert-chain.pem`) |
|
||||
| `--tlsKeyFile <string>` | | 和 `--tlsCertFile` 匹配的 x509 私钥文件(默认为 `/etc/istio/certs/key.pem`) |
|
||||
| `--webhookConfigName <string>` | | Kubernetes mutatingwebhookconfiguration 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookConfigName <string>` | | Kubernetes `mutatingwebhookconfiguration` 资源名(默认为 `istio-sidecar-injector`) |
|
||||
| `--webhookName <string>` | | webhook 配置中,webhook 项的名字(默认为 `sidecar-injector.istio.io`) |
|
||||
|
|
|
|||
|
|
@ -142,7 +142,7 @@ sleep-776b7bcdcd-gmvnr 1/1 Running 0 2s
|
|||
被 Kubernetes 调用 Webhook 时,[admissionregistration.k8s.io/v1beta1#MutatingWebhookConfiguration](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#mutatingwebhookconfiguration-v1beta1-admissionregistration-k8s-io) 会进行配置。Istio 提供的缺省配置,会在带有 `istio-injection=enabled` 标签的命名空间中选择 Pod。使用 `kubectl edit mutatingwebhookconfiguration istio-sidecar-injector` 命令可以编辑目标命名空间的范围。
|
||||
|
||||
{{< warning >}}
|
||||
修改 mutatingwebhookconfiguration 之后,应该重新启动已经被注入 Sidecar 的 Pod。
|
||||
修改 `mutatingwebhookconfiguration` 之后,应该重新启动已经被注入 Sidecar 的 Pod。
|
||||
{{< /warning >}}
|
||||
|
||||
`istio-system` 命名空间中的 ConfigMap `istio-sidecar-injector` 中包含了缺省的注入策略以及 Sidecar 的注入模板。
|
||||
|
|
|
|||
|
|
@ -44,9 +44,9 @@ keywords: [kubernetes]
|
|||
|
||||
{{< tabset cookie-name="profile" >}}
|
||||
|
||||
{{% tab name="宽容模式的 mTLS" cookie-value="permissive" %}}
|
||||
{{% tab name="宽容模式的 mutual TLS" cookie-value="permissive" %}}
|
||||
|
||||
如果使用 mTLS 的宽容模式,所有的服务会同时允许明文和双向 TLS 的流量。在没有明确[配置客户端进行双向 TLS 通信](/zh/docs/tasks/security/mtls-migration/#配置客户端进行双向-tls-通信)的情况下,客户端会发送明文流量。可以进一步阅读了解[双向 TLS 中的宽容模式](/docs/concepts/security/#permissive-mode)的相关内容。
|
||||
如果使用 mutual TLS 的宽容模式,所有的服务会同时允许明文和双向 TLS 的流量。在没有明确[配置客户端进行双向 TLS 通信](/zh/docs/tasks/security/mtls-migration/#配置客户端进行双向-tls-通信)的情况下,客户端会发送明文流量。可以进一步阅读了解[双向 TLS 中的宽容模式](/docs/concepts/security/#permissive-mode)的相关内容。
|
||||
|
||||
这种方式的适用场景:
|
||||
|
||||
|
|
@ -64,7 +64,7 @@ $ kubectl apply -f install/kubernetes/istio-demo.yaml
|
|||
|
||||
{{% /tab %}}
|
||||
|
||||
{{% tab name="严格模式的 mTLS" cookie-value="strict" %}}
|
||||
{{% tab name="严格模式的 mutual TLS" cookie-value="strict" %}}
|
||||
这种方案会在所有的客户端和服务器之间使用
|
||||
[双向 TLS](/zh/docs/concepts/security/#双向-tls-认证)。
|
||||
|
||||
|
|
@ -146,11 +146,11 @@ $ istioctl kube-inject -f <your-app-spec>.yaml | kubectl apply -f -
|
|||
|
||||
删除 RBAC 权限、`istio-system` 命名空间及其所有资源。因为有些资源会被级联删除,因此会出现一些无法找到资源的提示,可以忽略。
|
||||
|
||||
* 根据启用的 mTLS 模式进行删除:
|
||||
* 根据启用的 mutual TLS 模式进行删除:
|
||||
|
||||
{{< tabset cookie-name="profile" >}}
|
||||
|
||||
{{% tab name="宽容模式的 mTLS" cookie-value="permissive" %}}
|
||||
{{% tab name="宽容模式的 mutual TLS" cookie-value="permissive" %}}
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl delete -f install/kubernetes/istio-demo.yaml
|
||||
|
|
@ -158,7 +158,7 @@ $ kubectl delete -f install/kubernetes/istio-demo.yaml
|
|||
|
||||
{{% /tab %}}
|
||||
|
||||
{{% tab name="严格模式的 mTLS" cookie-value="strict" %}}
|
||||
{{% tab name="严格模式的 mutual TLS" cookie-value="strict" %}}
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl delete -f install/kubernetes/istio-demo-auth.yaml
|
||||
|
|
|
|||
|
|
@ -31,7 +31,7 @@ keywords: [policies,quotas]
|
|||
|
||||
在此任务中,您将 Istio 配置为根据 IP 地址将流量限制到访问 `productpage` 的用户。您将使用 `X-Forwarded-For` 请求 http header 作为客户端 IP 地址。您还将使用免除登录用户的条件速率限制。
|
||||
|
||||
为方便起见,您可以配置 [memquota](/zh/docs/reference/config/policy-and-telemetry/adapters/memquota/) 适配器启用速率限制。但是,在生产系统上,你需要 [`Redis`](http://redis.io/) ,然后配置 [`redisquota`](/zh/docs/reference/config/policy-and-telemetry/adapters/redisquota/) 适配器。 `memquota` 和 `redisquota` 适配器都支持 [quota template](/zh/docs/reference/config/policy-and-telemetry/templates/quota/),因此,在两个适配器上启用速率限制的配置是相同的。
|
||||
为方便起见,您可以配置 [`memquota`](/zh/docs/reference/config/policy-and-telemetry/adapters/memquota/) 适配器启用速率限制。但是,在生产系统上,你需要 [`Redis`](http://redis.io/) ,然后配置 [`redisquota`](/zh/docs/reference/config/policy-and-telemetry/adapters/redisquota/) 适配器。 `memquota` 和 `redisquota` 适配器都支持 [quota template](/zh/docs/reference/config/policy-and-telemetry/templates/quota/),因此,在两个适配器上启用速率限制的配置是相同的。
|
||||
|
||||
1. 速率限制配置分为两部分。
|
||||
* 客户端
|
||||
|
|
@ -39,10 +39,10 @@ keywords: [policies,quotas]
|
|||
* `QuotaSpecBinding` 有条件地将 `QuotaSpec` 与一个或多个服务相关联。
|
||||
* Mixer 端
|
||||
* `quota instance` 定义了 Mixer 如何确定配额的大小。
|
||||
* `memquota adapter` 定义了 memquota 适配器配置。
|
||||
* `quota rule` 定义何时将配额实例分派给 memquota 适配器。
|
||||
* `memquota adapter` 定义了 `memquota` 适配器配置。
|
||||
* `quota rule` 定义何时将配额实例分派给 `memquota` 适配器。
|
||||
|
||||
运行以下命令以使用 memquota 启用速率限制:
|
||||
运行以下命令以使用 `memquota` 启用速率限制:
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl apply -f @samples/bookinfo/policy/mixer-rule-productpage-ratelimit.yaml@
|
||||
|
|
@ -338,7 +338,7 @@ spec:
|
|||
|
||||
`memquota` 适配器使用一个为亚秒级分辨率的滑动窗口来实现速率限制。
|
||||
|
||||
适配器配置中的 `maxAmount` 设置了关联到 Quota 实例中的所有计数器的缺省限制。如果所有 `overrides` 条目都无法匹配到一个请求,就只能使用 `maxAmount` 限制了。Memquota 会选择适合请求的第一条 `override`。`override` 条目无需定义所有 quota dimension, 例如例子中的 `0.2 qps` 条目在 4 条 quota dimensions 中只选用了三条。
|
||||
适配器配置中的 `maxAmount` 设置了关联到 Quota 实例中的所有计数器的缺省限制。如果所有 `overrides` 条目都无法匹配到一个请求,就只能使用 `maxAmount` 限制了。`memquota` 会选择适合请求的第一条 `override`。`override` 条目无需定义所有 quota dimension, 例如例子中的 `0.2 qps` 条目在 4 条 quota dimensions 中只选用了三条。
|
||||
|
||||
如果要把上面的策略应用到某个命名空间而非整个 Istio 网格,可以把所有 `istio-system` 替换成为给定的命名空间。
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue