Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion modules/ossm-multitenant.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Whereas upstream Istio takes a single tenant approach, {SMProductName} supports
[id="ossm-mt-vs-clusterwide_{context}"]
== Multitenancy versus cluster-wide installations

The main difference between a multitenant installation and a cluster-wide installation is the scope of privileges used by the control plane deployments, for example, Galley and Pilot. The components no longer use cluster-scoped Role Based Access Control (RBAC) resource `ClusterRoleBinding`.
The main difference between a multitenant installation and a cluster-wide installation is the scope of privileges used by istod. The components no longer use cluster-scoped Role Based Access Control (RBAC) resource `ClusterRoleBinding`.

Every project in the `ServiceMeshMemberRoll` `members` list will have a `RoleBinding` for each service account associated with the control plane deployment and each control plane deployment will only watch those member projects. Each member project has a `maistra.io/member-of` label added to it, where the `member-of` value is the project containing the control plane installation.

Expand Down
27 changes: 25 additions & 2 deletions modules/ossm-vs-istio.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -85,11 +85,15 @@ spec:

{SMProductName} replaces BoringSSL with OpenSSL. OpenSSL is a software library that contains an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. The {SMProductName} Proxy binary dynamically links the OpenSSL libraries (libssl and libcrypto) from the underlying Red Hat Enterprise Linux operating system.


[id="ossm-external-workloads_{context}"]
== External workloads

{SMProductName} does not support external workloads (virtual machines).
{SMProductName} does not support external workloads, such as virtual machines running outside OpenShift on bare metal servers.

[id="ossm-virtual-machine-support_{context}"]
== Virtual Machine Support

You can deploy virtual machines to OpenShift using OpenShift Virtualization. Then, you can apply a mesh policy, such as mTLS or AuthorizationPolicy, to these virtual machines, just like any other pod that is part of a mesh.

[id="ossm-component-modifications_{context}"]
== Component modifications
Expand All @@ -115,6 +119,25 @@ spec:

{SMProductName} includes CNI plug-in, which provides you with an alternate way to configure application pod networking. The CNI plug-in replaces the `init-container` network configuration eliminating the need to grant service accounts and projects access to security context constraints (SCCs) with elevated privileges.

[id="ossm-global-mtls_{context}"]
== Global mTLS settings
{SMProductName} creates a `PeerAuthentication` resource that enables or disables Mutual TLS authentication (mTLS) within the mesh.

[id="ossm-gateways_{context}"]
== Gateways

{SMProductName} installs ingress and egress gateways by default. You can disable this in the SMCP using `spec.gateways.ingress.enabled=false` or `spec.gateways.egress.enabled=false`.

[id="ossm-multicluster-configuration_{context}"]
== Multicluster configurations

{SMProductName} does not provide support for multicluster configurations.

[id="ossm-certificate-signing-request_{context}"]
== Custom Certificate Signing Requests (CSR)

You cannot configure {SMProductName} to process CSRs through the Kubernetes certificate authority (CA).

[id="ossm-routes-gateways_{context}"]
== Routes for Istio Gateways

Expand Down