Skip to content

Commit 9335e0e

Browse files
committed
Sync documentation
1 parent 54d42b2 commit 9335e0e

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

documentation/3.4/content/userguide/istio/istio.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ These instructions assume that you are using a Kubernetes cluster with
3535
[Istio](https://istio.io/latest/docs/setup/install/) installed and configured already. The operator will not install
3636
Istio for you.
3737

38-
For Red Hat OpenShift Service Mesh, which has its own implementation of Istio, refer to the correct version of the documentation for installation.
38+
For Red Hat OpenShift Service Mesh, which has its own implementation of Istio, refer to the correct version of the documentation for installation.
3939
[OpenShift Service Mesh installation 4.10](https://docs.openshift.com/container-platform/4.10/service_mesh/v2x/installing-ossm.html)
4040

4141
{{% /notice %}}
@@ -53,7 +53,7 @@ sample application to familiarize yourself with the mesh and verify that it is w
5353

5454

5555
To learn more about Istio,
56-
see [What is Istio](https://istio.io/latest/docs/concepts/what-is-istio/).
56+
see [What is Istio](https://istio.io/latest/docs/concepts/what-is-istio/).
5757

5858
For Redhat OpenShift Service Mesh, see
5959

@@ -78,7 +78,7 @@ The current support for Istio has these limitations:
7878
does not have an `EXTERNAL-IP` defined and
7979
you would like to externally run WLST commands,
8080
then see
81-
[Use WLST]({{< relref "/userguide/managing-domains/accessing-the-domain/wlst.md" >}}).
81+
[Use WLST]({{< relref "/userguide/managing-domains/accessing-the-domain/wlst.md" >}}).
8282

8383
#### Determining the Istio version
8484

@@ -156,7 +156,7 @@ $ kubectl label namespace domain1 istio-injection=enabled
156156

157157
To enable Istio support for a domain, you need to add a
158158
`domain.spec.configuration.istio` section to your domain custom resource YAML file,
159-
as shown in the following example:
159+
as shown in the following example:
160160

161161
```yaml
162162
apiVersion: "weblogic.oracle/v8"
@@ -181,7 +181,7 @@ See the following description of each `spec.configuration.istio` attribute:
181181
* `enabled`: To enable Istio support, you must include the `istio` section
182182
and set `enabled: true` as shown.
183183
* `readinessPort`: This attribute is optional
184-
and defaults to `8888` if not provided; it is used for a readiness health check.
184+
and defaults to `8888` if not provided; it is used for a readiness health check.
185185
* `replicationChannelPort`: This attribute is optional and defaults to `4564` if not provided;
186186
the operator will create a `T3` protocol WebLogic network access point on each WebLogic
187187
Server that is part of a cluster with this port to handle EJB and servlet session state
@@ -197,7 +197,7 @@ See the following description of each `spec.configuration.istio` attribute:
197197
Use `true` for Istio versions prior to 1.10 and set to `false` for versions 1.10 and later.
198198

199199
|Istio version|localhostBindingsEnabled|Notes|
200-
|----|----|----|
200+
|----|----|----|
201201
|Pre-1.10|`true`|Supported. Note that `true` is the default.|
202202
|Pre-1.10|`false`|Not supported.|
203203
|1.10 and later|`true`|Not supported.|
@@ -515,7 +515,7 @@ Istio provides rich sets of security features that you can use to secure the Ist
515515

516516
##### Mutual TLS
517517

518-
By default, all traffic between the Istio sidecar proxies use mutual TLS within the mesh. However, service within the mesh can still be accessed by other pods outside the mesh. For example, you have `domain-1` deployed with sidecar injection, therefore within the mesh, and another domain, `domain-2`, deployed without sidecar injection, therefore outside of the mesh. Services within `domain-2` can still access the services within `domain-1`, however the traffic will be `Plain` unencrypted traffic. This is because by default, Istio configures the traffic using the `PERMISSIVE` mode, which means it can accept both `Plain` and `mutual TLS` traffic. You can restrict this behavior by allowing only `mutual TLS` traffic by locking down the entire mesh or by namespace within the mesh.
518+
By default, all traffic between the Istio sidecar proxies use mutual TLS within the mesh. However, service within the mesh can still be accessed by other pods outside the mesh. For example, you have `domain-1` deployed with sidecar injection, therefore within the mesh, and another domain, `domain-2`, deployed without sidecar injection, therefore outside of the mesh. Services within `domain-2` can still access the services within `domain-1`, however the traffic will be `Plain` unencrypted traffic. This is because by default, Istio configures the traffic using the `PERMISSIVE` mode, which means it can accept both `Plain` and `mutual TLS` traffic. You can restrict this behavior by allowing only `mutual TLS` traffic by locking down the entire mesh or by namespace within the mesh.
519519

520520
For locking down the entire mesh, you can:
521521

@@ -698,4 +698,4 @@ spec:
698698
- 'regular-domain.org'
699699
```
700700

701-
See Istio [Ingress](https://istio.io/latest/docs/tasks/traffic-management/ingress).
701+
See Istio [Ingress](https://istio.io/latest/docs/tasks/traffic-management/ingress).

documentation/3.4/content/userguide/prerequisites/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ weight: 2
77

88
For the current production release {{< latestVersion >}}:
99

10-
* Kubernetes 1.19.15+, 1.20.11+, 1.21.5+, 1.22.5+, 1.23.4+, and 1.24.0+ (check with `kubectl version`).
10+
* Kubernetes 1.19.15+, 1.20.11+, 1.21.5+, 1.22.5+, and 1.23.4+ (check with `kubectl version`).
1111
* Flannel networking v0.13.0-amd64 or later (check with `docker images | grep flannel`), Calico networking v3.16.1 or later,
1212
*or* OpenShift SDN on OpenShift 4.3 systems.
1313
* Docker 19.03.1+ (check with `docker version`) *or* CRI-O 1.20.2+ (check with `crictl version | grep RuntimeVersion`).

0 commit comments

Comments
 (0)