-
Couldn't load subscription status.
- Fork 1.6k
Enhance Istio Ingress explanations #1023
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
vadimeisenbergibm
commented
Feb 22, 2018
- Clarify Istio Ingress vs. Kubernetes Ingress
- Remove "Controller", which is a Kubernetes term, it does not add anything to understanding the concept of Istio Ingress
- Minor fixes
controller is a Kubernetes term, it does not serve here any purpose
fixed cardinality
| cluster. However, the Ingress Resource specification is very minimal, | ||
| allowing users to specify just hosts, paths and their backing services. | ||
| The following are the known limitations of Istio ingress: | ||
| cluster. It allows defining a backend service per virtual host and path. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It allows one to define a backend ...
| `kubernetes.io/ingress.class: istio` will be ignored. | ||
| 2. Regular expressions in paths are not supported. | ||
| 3. Fault injection at the Ingress is not supported. | ||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` pod. This allows applying Istio features, for example, monitoring and route rules, on the into-the-cluster traffic. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
directed through the istio-ingress service.
| `kubernetes.io/ingress.class: istio` will be ignored. | ||
| 2. Regular expressions in paths are not supported. | ||
| 3. Fault injection at the Ingress is not supported. | ||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` pod. This allows applying Istio features, for example, monitoring and route rules, on the into-the-cluster traffic. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/. This allows applying Istio ... traffic./, so that Istio features, for example, monitoring and route rules, can be applied to the into-the-cluster traffic/
| 3. Fault injection at the Ingress is not supported. | ||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` pod. This allows applying Istio features, for example, monitoring and route rules, on the into-the-cluster traffic. | ||
|
|
||
| Istio Ingress specification is based on the standard [Kubernetes Ingress Resource](https://kubernetes.io/docs/concepts/services-networking/ingress/) specification, with the following differences: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The Istio Ingress specification ...
|
|
||
| 2. All other annotations are ignored. | ||
|
|
||
| The following are the known limitations of Istio Ingress: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/the known/known/
|
thanks @frankbu ! |
|
Thanks @frankbu ! I have applied your comments. |
| `kubernetes.io/ingress.class: istio` will be ignored. | ||
| 2. Regular expressions in paths are not supported. | ||
| 3. Fault injection at the Ingress is not supported. | ||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` service, so that Istio features, for example, monitoring and route rules, can be applied to the into-the-cluster traffic. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"can be applied to traffic entering the cluster" reads a bit better IMO.
|
@ZackButcher thanks for your comment, I have fixed it. |
|
@geeknoid what is the procedure in this repository - should the merge be done manually for the approved PRs or it is done automatically as in istio/istio? Who should perform the merge manually? |
| cluster. It allows one to define a backend service per virtual host and path. | ||
|
|
||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` service, so that Istio features, for example, monitoring and route rules, can be applied to the into-the-cluster traffic. | ||
| Once the Istio Ingress specification is defined, the into-the-cluster traffic is directed through the `istio-ingress` service, so that Istio features, for example, monitoring and route rules, can be applied to the traffic entering the cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should you change both into-the-cluster or neither?
|
@ldemailly Good catch. I have renamed the second appearance of "into-the-cluster" traffic and split the sentence it appears in. |
|
To answer the question, this repo doesn't have a robot, so merging is done
manually. If you see a green button, go ahead and merge...
…On Mon, Feb 26, 2018 at 12:04 PM Laurent Demailly ***@***.***> wrote:
***@***.**** approved this pull request.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1023 (review)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AVucHYlfVWUXlVmBDFQTDQ6aK14cMjQOks5tYwyEgaJpZM4SPXiw>
.
|