Skip to content

Commit 0f968f1

Browse files
committed
refer beta api versions instead of alpha
1 parent de3ad6c commit 0f968f1

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/aks/istio-deploy-ingress.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Applications aren't accessible from outside the cluster by default after enablin
4545

4646
```bash
4747
kubectl apply -f - <<EOF
48-
apiVersion: networking.istio.io/v1alpha3
48+
apiVersion: networking.istio.io/v1beta1
4949
kind: Gateway
5050
metadata:
5151
name: bookinfo-gateway-external
@@ -60,7 +60,7 @@ spec:
6060
hosts:
6161
- "*"
6262
---
63-
apiVersion: networking.istio.io/v1alpha3
63+
apiVersion: networking.istio.io/v1beta1
6464
kind: VirtualService
6565
metadata:
6666
name: bookinfo-vs-external
@@ -144,7 +144,7 @@ Applications aren't mapped to the Istio ingress gateway after enabling the ingre
144144

145145
```bash
146146
kubectl apply -f - <<EOF
147-
apiVersion: networking.istio.io/v1alpha3
147+
apiVersion: networking.istio.io/v1beta1
148148
kind: Gateway
149149
metadata:
150150
name: bookinfo-internal-gateway
@@ -159,7 +159,7 @@ spec:
159159
hosts:
160160
- "*"
161161
---
162-
apiVersion: networking.istio.io/v1alpha3
162+
apiVersion: networking.istio.io/v1beta1
163163
kind: VirtualService
164164
metadata:
165165
name: bookinfo-vs-internal

articles/aks/istio-secure-gateway.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Create a Kubernetes TLS secret for the ingress gateway; use [Azure Key Vault][ak
7575
3. Authorize the user-assigned managed identity of the add-on to access Azure Key Vault resource using access policy. Alternatively, if your Key Vault is using Azure RBAC for the permissions model, follow the instructions [here][akv-rbac-guide] to assign an Azure role of Key Vault for the add-on's user-assigned managed identity.
7676
7777
```bash
78-
OBJECT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.objectId' -o tsv)
78+
OBJECT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.objectId' -o tsv | tr -d '\r')
7979
CLIENT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.clientId')
8080
TENANT_ID=$(az keyvault show --resource-group $RESOURCE_GROUP --name $AKV_NAME --query 'properties.tenantId')
8181
@@ -185,7 +185,7 @@ Use the following manifest to deploy gateway and virtual service resources.
185185
186186
```bash
187187
cat <<EOF | kubectl apply -f -
188-
apiVersion: networking.istio.io/v1alpha3
188+
apiVersion: networking.istio.io/v1beta1
189189
kind: Gateway
190190
metadata:
191191
name: bookinfo-gateway
@@ -203,7 +203,7 @@ spec:
203203
hosts:
204204
- productpage.bookinfo.com
205205
---
206-
apiVersion: networking.istio.io/v1alpha3
206+
apiVersion: networking.istio.io/v1beta1
207207
kind: VirtualService
208208
metadata:
209209
name: productpage-vs
@@ -372,7 +372,7 @@ Extend your gateway definition to support mutual TLS.
372372
373373
```bash
374374
cat <<EOF | kubectl apply -f -
375-
apiVersion: networking.istio.io/v1alpha3
375+
apiVersion: networking.istio.io/v1beta1
376376
kind: Gateway
377377
metadata:
378378
name: bookinfo-gateway

0 commit comments

Comments
 (0)