Skip to content

Commit

Permalink
docs: Add documentation about the new config format (knative-extensio…
Browse files Browse the repository at this point in the history
  • Loading branch information
pastequo committed Feb 8, 2024
1 parent 708e6d3 commit b488336
Showing 1 changed file with 61 additions and 0 deletions.
61 changes: 61 additions & 0 deletions config/400-config-istio.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,13 +41,40 @@ data:
# this example block and unindented to be in the data block
# to actually change the configuration.
# Documentation below explicits both new and old format.
# The new format, functionally equivalent to the old one, is more flexible and should be preferred.
# If both formats are defined, the old one is ignored.
# A gateway and Istio service to serve external traffic.
#
##############
# NEW FORMAT #
##############
# The configuration format should be
# ```
# external-gateways: |
# - name: {{gateway_name}}
# namespace: {{gateway_namespace}}
# service: {{ingress_name}}.{{ingress_namespace}}.svc.cluster.local
# ```
# name, namespace & service are mandatory and can't be empty.
external-gateways: |
- name: knative-ingress-gateway
namespace: knative-serving
service: istio-ingressgateway.istio-system.svc.cluster.local
#
##############
# OLD FORMAT #
##############
# The configuration format should be
# `gateway.{{gateway_namespace}}.{{gateway_name}}: "{{ingress_name}}.{{ingress_namespace}}.svc.cluster.local"`.
# The {{gateway_namespace}} is optional; when it is omitted, the system will search for
# the gateway in the serving system namespace `knative-serving`
gateway.knative-serving.knative-ingress-gateway: "istio-ingressgateway.istio-system.svc.cluster.local"
# A cluster local gateway to allow pods outside of the mesh to access
# Services and Routes not exposing through an ingress. If the users
# do have a service mesh setup, this isn't required and can be removed.
Expand All @@ -56,10 +83,44 @@ data:
# sidecar injection (like Knative's istio-ci-no-mesh.yaml). Since every pod
# is outside of the service mesh in that case, a cluster-local service
# will need to be exposed to a cluster-local gateway to be accessible.
#
##############
# NEW FORMAT #
##############
# The configuration format should be
# ```
# local-gateways: |
# - name: {{local_gateway_name}}
# namespace: {{local_gateway_namespace}}
# service: {{cluster_local_gateway_name}}.{{cluster_local_gateway_namespace}}.svc.cluster.local
# ```
# name, namespace & service are mandatory and can't be empty.
# Only one local gateway can be specified.
local-gateways: |
- name: knative-local-gateway
namespace: knative-serving
service: knative-local-gateway.istio-system.svc.cluster.local
#
##############
# OLD FORMAT #
##############
# The configuration format should be `local-gateway.{{local_gateway_namespace}}.
# {{local_gateway_name}}: "{{cluster_local_gateway_name}}.
# {{cluster_local_gateway_namespace}}.svc.cluster.local"`. The
# {{local_gateway_namespace}} is optional; when it is omitted, the system
# will search for the local gateway in the serving system namespace
# `knative-serving`
local-gateway.knative-serving.knative-local-gateway: "knative-local-gateway.istio-system.svc.cluster.local"
# If no values are specified for the external traffic, it will default to:
# external-gateways: |
# - name: knative-ingress-gateway
# namespace: {{serving_system_namespace}}
# service: istio-ingressgateway.istio-system.{{cluster_domain}}
#
# If no values are specified for the local traffic, it will default to:
# local-gateways: |
# - name: knative-local-gateway
# namespace: {{serving_system_namespace}}
# service: knative-local-gateway.istio-system.{{cluster_domain}}

0 comments on commit b488336

Please sign in to comment.