You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To enable Istio support for a domain, you need to add a
158
158
`domain.spec.configuration.istio` section to your domain custom resource YAML file,
159
-
as shown in the following example:
159
+
as shown in the following example:
160
160
161
161
```yaml
162
162
apiVersion: "weblogic.oracle/v8"
@@ -181,7 +181,7 @@ See the following description of each `spec.configuration.istio` attribute:
181
181
* `enabled`: To enable Istio support, you must include the `istio` section
182
182
and set `enabled: true` as shown.
183
183
* `readinessPort`: This attribute is optional
184
-
and defaults to `8888` if not provided; it is used for a readiness health check.
184
+
and defaults to `8888` if not provided; it is used for a readiness health check.
185
185
* `replicationChannelPort`: This attribute is optional and defaults to `4564` if not provided;
186
186
the operator will create a `T3` protocol WebLogic network access point on each WebLogic
187
187
Server that is part of a cluster with this port to handle EJB and servlet session state
@@ -197,7 +197,7 @@ See the following description of each `spec.configuration.istio` attribute:
197
197
Use `true` for Istio versions prior to 1.10 and set to `false` for versions 1.10 and later.
198
198
199
199
|Istio version|localhostBindingsEnabled|Notes|
200
-
|----|----|----|
200
+
|----|----|----|
201
201
|Pre-1.10|`true`|Supported. Note that `true` is the default.|
202
202
|Pre-1.10|`false`|Not supported.|
203
203
|1.10 and later|`true`|Not supported.|
@@ -515,7 +515,7 @@ Istio provides rich sets of security features that you can use to secure the Ist
515
515
516
516
##### Mutual TLS
517
517
518
-
By default, all traffic between the Istio sidecar proxies use mutual TLS within the mesh. However, service within the mesh can still be accessed by other pods outside the mesh. For example, you have `domain-1` deployed with sidecar injection, therefore within the mesh, and another domain, `domain-2`, deployed without sidecar injection, therefore outside of the mesh. Services within `domain-2` can still access the services within `domain-1`, however the traffic will be `Plain` unencrypted traffic. This is because by default, Istio configures the traffic using the `PERMISSIVE` mode, which means it can accept both `Plain` and `mutual TLS` traffic. You can restrict this behavior by allowing only `mutual TLS` traffic by locking down the entire mesh or by namespace within the mesh.
518
+
By default, all traffic between the Istio sidecar proxies use mutual TLS within the mesh. However, service within the mesh can still be accessed by other pods outside the mesh. For example, you have `domain-1` deployed with sidecar injection, therefore within the mesh, and another domain, `domain-2`, deployed without sidecar injection, therefore outside of the mesh. Services within `domain-2` can still access the services within `domain-1`, however the traffic will be `Plain` unencrypted traffic. This is because by default, Istio configures the traffic using the `PERMISSIVE` mode, which means it can accept both `Plain` and `mutual TLS` traffic. You can restrict this behavior by allowing only `mutual TLS` traffic by locking down the entire mesh or by namespace within the mesh.
519
519
520
520
For locking down the entire mesh, you can:
521
521
@@ -698,4 +698,4 @@ spec:
698
698
- 'regular-domain.org'
699
699
```
700
700
701
-
See Istio [Ingress](https://istio.io/latest/docs/tasks/traffic-management/ingress).
701
+
See Istio [Ingress](https://istio.io/latest/docs/tasks/traffic-management/ingress).
0 commit comments