Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion Makefile.core.mk
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ export NETLIFY_URL


# Which branch of the Istio source code do we fetch stuff from
export SOURCE_BRANCH_NAME ?= master
export SOURCE_BRANCH_NAME ?= release-1.28

site:
@scripts/gen_site.sh
Expand Down
2 changes: 1 addition & 1 deletion content/en/boilerplates/gateway-api-install-crds.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,5 +5,5 @@ installed before using the Gateway API:

{{< text syntax=bash snip_id=install_crds >}}
$ kubectl get crd gateways.gateway.networking.k8s.io &> /dev/null || \
kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/{{< k8s_gateway_api_version >}}/standard-install.yaml
kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/{{< k8s_gateway_api_version >}}/experimental-install.yaml
{{< /text >}}
2 changes: 1 addition & 1 deletion content/en/boilerplates/gateway-api-remove-crds.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,5 +3,5 @@
Remove the Kubernetes Gateway API CRDs:

{{< text syntax=bash snip_id=remove_crds >}}
$ kubectl delete -f https://github.com/kubernetes-sigs/gateway-api/releases/download/{{< k8s_gateway_api_version >}}/standard-install.yaml
$ kubectl delete -f https://github.com/kubernetes-sigs/gateway-api/releases/download/{{< k8s_gateway_api_version >}}/experimental-install.yaml
{{< /text >}}
2 changes: 1 addition & 1 deletion content/en/boilerplates/snips/args.sh
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
####################################################################################################

! IFS=$'\n' read -r -d '' bpsnip_args_gateway_api_version <<\ENDSNIP
v1.3.0
v1.4.0
ENDSNIP

! IFS=$'\n' read -r -d '' bpsnip_args_istio_previous_version <<\ENDSNIP
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
####################################################################################################

bpsnip_gateway_api_gamma_experimental_install_experimental_crds() {
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd/experimental?ref=v1.3.0" | kubectl apply -f -
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd/experimental?ref=v1.4.0" | kubectl apply -f -
}

bpsnip_gateway_api_gamma_experimental_enable_alpha_crds() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,5 +22,5 @@

bpsnip_gateway_api_install_crds_install_crds() {
kubectl get crd gateways.gateway.networking.k8s.io &> /dev/null || \
kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.3.0/standard-install.yaml
kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.4.0/experimental-install.yaml
}
2 changes: 1 addition & 1 deletion content/en/boilerplates/snips/gateway-api-remove-crds.sh
Original file line number Diff line number Diff line change
Expand Up @@ -21,5 +21,5 @@
####################################################################################################

bpsnip_gateway_api_remove_crds_remove_crds() {
kubectl delete -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.3.0/standard-install.yaml
kubectl delete -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.4.0/experimental-install.yaml
}
4 changes: 2 additions & 2 deletions content/en/docs/ambient/upgrade/helm/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -190,15 +190,15 @@ $ kubectl get mutatingwebhookconfigurations -l 'istio.io/tag' -L istio\.io/tag,i
For each tag, you can upgrade the tag by running the following command, replacing `$MYTAG` with your tag name, and `$REVISION` with your revision name:

{{< text syntax=bash snip_id=upgrade_tag >}}
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{$MYTAG}" --set revision="$REVISION" -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{$MYTAG}" --set revision="$REVISION" -n istio-system | kubectl apply -f -
{{< /text >}}

This will upgrade all objects referencing that tag, except for those using [manual gateway deployment mode](/docs/tasks/traffic-management/ingress/gateway-api/#manual-deployment), which are dealt with below, and sidecars, which are not used in ambient mode.

It is recommended that you closely monitor the health of applications using the upgraded data plane before upgrading the next tag. If you detect a problem, you can rollback a tag, resetting it to point to the name of your old revision:

{{< text syntax=bash snip_id=rollback_tag >}}
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{$MYTAG}" --set revision="$OLD_REVISION" -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{$MYTAG}" --set revision="$OLD_REVISION" -n istio-system | kubectl apply -f -
{{< /text >}}

### Upgrade manually deployed gateways (optional)
Expand Down
4 changes: 2 additions & 2 deletions content/en/docs/ambient/upgrade/helm/snips.sh
Original file line number Diff line number Diff line change
Expand Up @@ -70,11 +70,11 @@ kubectl get mutatingwebhookconfigurations -l 'istio.io/tag' -L istio\.io/tag,ist
}

snip_upgrade_tag() {
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{$MYTAG}" --set revision="$REVISION" -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{$MYTAG}" --set revision="$REVISION" -n istio-system | kubectl apply -f -
}

snip_rollback_tag() {
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{$MYTAG}" --set revision="$OLD_REVISION" -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{$MYTAG}" --set revision="$OLD_REVISION" -n istio-system | kubectl apply -f -
}

snip_upgrade_gateway() {
Expand Down
2 changes: 1 addition & 1 deletion content/en/docs/examples/virtual-machines/snips.sh
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ sudo systemctl restart mysql
}

snip_running_mysql_on_the_vm_3() {
curl -LO https://raw.githubusercontent.com/istio/istio/master/samples/bookinfo/src/mysql/mysqldb-init.sql
curl -LO https://raw.githubusercontent.com/istio/istio/release-1.28/samples/bookinfo/src/mysql/mysqldb-init.sql
mysql -u root -ppassword < mysqldb-init.sql
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
generator: protoc-gen-docs
schema: istio.networking.v1alpha3.EnvoyFilter
aliases: [/docs/reference/config/networking/v1alpha3/envoy-filter]
number_of_entries: 22
number_of_entries: 18
---
<p><code>EnvoyFilter</code> provides a mechanism to customize the Envoy
configuration generated by istiod. Use EnvoyFilter to modify
Expand Down Expand Up @@ -983,139 +983,6 @@ <h4 id="EnvoyFilter-ListenerMatch-SubFilterMatch">SubFilterMatch</h4>
<td>
<p>The filter name to match on.</p>

</td>
</tr>
</tbody>
</table>
</section>
<h3 id="EnvoyFilter-WaypointMatch">WaypointMatch</h3>
<section>
<table class="message-fields">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr id="EnvoyFilter-WaypointMatch-port_number">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-port_number">portNumber</a></code></div>
<div class="type">uint32</div>
</div></td>
<td>
<p>The service port to match on.
If not specified, matches all ports.</p>

</td>
</tr>
<tr id="EnvoyFilter-WaypointMatch-route">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-route">route</a></code></div>
<div class="type"><a href="#EnvoyFilter-WaypointMatch-RouteMatch">RouteMatch</a></div>
</div></td>
<td>
<p>Match a specific route.</p>

</td>
</tr>
<tr id="EnvoyFilter-WaypointMatch-filter">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-filter">filter</a></code></div>
<div class="type"><a href="#EnvoyFilter-WaypointMatch-FilterMatch">FilterMatch</a></div>
</div></td>
<td>
<p>The name of a specific filter to apply the patch to.
Set this to <code>envoy.filters.network.http_connection_manager</code>
to add a filter or apply a patch to the HTTP connection manager.</p>

</td>
</tr>
</tbody>
</table>
</section>
<h4 id="EnvoyFilter-WaypointMatch-RouteMatch">RouteMatch</h4>
<section>
<p>Conditions specified in <code>RouteMatch</code> must be met for the patch
to be applied to a route.</p>

<table class="message-fields">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr id="EnvoyFilter-WaypointMatch-RouteMatch-name">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-RouteMatch-name">name</a></code></div>
<div class="type">string</div>
</div></td>
<td>
<p>The Route objects generated by default are named as
default. Route objects generated using a virtual service
will carry the name used in the virtual service&rsquo;s HTTP
routes.</p>

</td>
</tr>
</tbody>
</table>
</section>
<h4 id="EnvoyFilter-WaypointMatch-FilterMatch">FilterMatch</h4>
<section>
<p>Conditions to match a specific filter within a filter chain.</p>

<table class="message-fields">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr id="EnvoyFilter-WaypointMatch-FilterMatch-name">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-FilterMatch-name">name</a></code></div>
<div class="type">string</div>
</div></td>
<td>
<p>The filter name to match on.
For standard Envoy filters, <a href="https://www.envoyproxy.io/docs/envoy/latest/version_history/v1.14.0#deprecated">canonical filter</a>
names should be used.</p>

</td>
</tr>
<tr id="EnvoyFilter-WaypointMatch-FilterMatch-sub_filter">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-FilterMatch-sub_filter">subFilter</a></code></div>
<div class="type"><a href="#EnvoyFilter-WaypointMatch-FilterMatch-SubFilterMatch">SubFilterMatch</a></div>
</div></td>
<td>
<p>The next level filter within this filter to match on.
Typically used for HTTP Connection Manager filters.</p>

</td>
</tr>
</tbody>
</table>
</section>
<h5 id="EnvoyFilter-WaypointMatch-FilterMatch-SubFilterMatch">SubFilterMatch</h5>
<section>
<p>Conditions to match a specific filter within another
filter. This field is typically useful to match a HTTP filter
inside the <code>envoy.filters.network.http_connection_manager</code> network filter.</p>

<table class="message-fields">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr id="EnvoyFilter-WaypointMatch-FilterMatch-SubFilterMatch-name">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-WaypointMatch-FilterMatch-SubFilterMatch-name">name</a></code></div>
<div class="type">string</div>
</div></td>
<td>
<p>The filter name to match on.</p>

</td>
</tr>
</tbody>
Expand Down Expand Up @@ -1380,16 +1247,6 @@ <h3 id="EnvoyFilter-EnvoyConfigObjectMatch">EnvoyConfigObjectMatch</h3>
<td>
<p>Match on envoy cluster attributes.</p>

</td>
</tr>
<tr id="EnvoyFilter-EnvoyConfigObjectMatch-waypoint" class="oneof">
<td><div class="field"><div class="name"><code><a href="#EnvoyFilter-EnvoyConfigObjectMatch-waypoint">waypoint</a></code></div>
<div class="type"><a href="#EnvoyFilter-WaypointMatch">WaypointMatch (oneof)</a></div>
</div></td>
<td>
<p>Match on waypoint attributes.
Only work when patch context is WAYPOINT.</p>

</td>
</tr>
</tbody>
Expand Down Expand Up @@ -1589,13 +1446,6 @@ <h3 id="EnvoyFilter-PatchContext">PatchContext</h3>
<td>
<p>Gateway listener/route/cluster.</p>

</td>
</tr>
<tr id="EnvoyFilter-PatchContext-WAYPOINT">
<td><code><a href="#EnvoyFilter-PatchContext-WAYPOINT">WAYPOINT</a></code></td>
<td>
<p>Waypoint listener/route/cluster.</p>

</td>
</tr>
</tbody>
Expand Down
6 changes: 3 additions & 3 deletions content/en/docs/setup/getting-started/snips.sh
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ ENDSNIP

snip_install_the_kubernetes_gateway_api_crds_1() {
kubectl get crd gateways.gateway.networking.k8s.io &> /dev/null || \
{ kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.3.0" | kubectl apply -f -; }
{ kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.4.0" | kubectl apply -f -; }
}

snip_deploy_the_sample_application_1() {
Expand Down Expand Up @@ -159,9 +159,9 @@ kubectl label namespace default istio-injection-
}

snip_uninstall_4() {
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd/experimental?ref=v1.3.0" | kubectl delete -f -
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd/experimental?ref=v1.4.0" | kubectl delete -f -
}

snip_uninstall_5() {
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.3.0" | kubectl delete -f -
kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.4.0" | kubectl delete -f -
}
Original file line number Diff line number Diff line change
Expand Up @@ -416,7 +416,7 @@ ENDSNIP

snip_install_crds() {
kubectl get crd gateways.gateway.networking.k8s.io --context="${CTX_REMOTE_CLUSTER}" &> /dev/null || \
{ kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.3.0" | kubectl apply -f - --context="${CTX_REMOTE_CLUSTER}"; }
{ kubectl kustomize "github.com/kubernetes-sigs/gateway-api/config/crd?ref=v1.4.0" | kubectl apply -f - --context="${CTX_REMOTE_CLUSTER}"; }
}

snip_configure_and_test_an_ingress_gateway_3() {
Expand Down
2 changes: 1 addition & 1 deletion content/en/docs/setup/install/helm/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ installed above.

If you decide to continue using the old control plane, instead of completing the update,
you can uninstall the newer revision and its tag by first issuing
`helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags={prod-canary} --set revision=canary -n istio-system | kubectl delete -f -`.
`helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags={prod-canary} --set revision=canary -n istio-system | kubectl delete -f -`.
You must then uninstall the revision of Istio that it pointed to by following the uninstall procedure above.

If you installed the gateway(s) for this revision using in-place upgrades, you must also reinstall the gateway(s) for the previous revision manually.
Expand Down
8 changes: 4 additions & 4 deletions content/en/docs/setup/upgrade/helm/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,8 +108,8 @@ primary and canary installations.
{{< boilerplate revision-tags-usage >}}

{{< text bash >}}
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-stable}" --set revision={{< istio_previous_version_revision >}}-1 -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-canary}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-stable}" --set revision={{< istio_previous_version_revision >}}-1 -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-canary}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
{{< /text >}}

{{< warning >}}
Expand All @@ -120,7 +120,7 @@ below to uninstall revision tags.
{{< boilerplate revision-tags-middle >}}

{{< text bash >}}
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-stable}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-stable}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
{{< /text >}}

{{< boilerplate revision-tags-prologue >}}
Expand All @@ -130,7 +130,7 @@ $ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisi
{{< boilerplate revision-tags-default-intro >}}

{{< text bash >}}
$ helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{default}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
$ helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{default}" --set revision={{< istio_full_version_revision >}} -n istio-system | kubectl apply -f -
{{< /text >}}

{{< boilerplate revision-tags-default-outro >}}
Expand Down
8 changes: 4 additions & 4 deletions content/en/docs/setup/upgrade/helm/snips.sh
Original file line number Diff line number Diff line change
Expand Up @@ -78,16 +78,16 @@ helm upgrade istio-base istio/base --set defaultRevision=canary -n istio-system
}

snip_usage_1() {
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-stable}" --set revision=1-27-1 -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-canary}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-stable}" --set revision=1-27-1 -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-canary}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
}

snip_usage_2() {
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{prod-stable}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{prod-stable}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
}

snip_default_tag_1() {
helm template istiod istio/istiod -s templates/revision-tags.yaml --set revisionTags="{default}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
helm template istiod istio/istiod -s templates/revision-tags-mwc.yaml --set revisionTags="{default}" --set revision=1-28-0 -n istio-system | kubectl apply -f -
}

snip_in_place_upgrade_1() {
Expand Down
Loading