Skip to content

Commit 34c4a01

Browse files
Merge pull request #275363 from deveshdama/main
Refer beta api version instead of alpha for istio ingress gateway articles
2 parents f316348 + d00d543 commit 34c4a01

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/aks/istio-deploy-ingress.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Applications aren't accessible from outside the cluster by default after enablin
4444

4545
```bash
4646
kubectl apply -f - <<EOF
47-
apiVersion: networking.istio.io/v1alpha3
47+
apiVersion: networking.istio.io/v1beta1
4848
kind: Gateway
4949
metadata:
5050
name: bookinfo-gateway-external
@@ -59,7 +59,7 @@ spec:
5959
hosts:
6060
- "*"
6161
---
62-
apiVersion: networking.istio.io/v1alpha3
62+
apiVersion: networking.istio.io/v1beta1
6363
kind: VirtualService
6464
metadata:
6565
name: bookinfo-vs-external
@@ -143,7 +143,7 @@ Applications aren't mapped to the Istio ingress gateway after enabling the ingre
143143

144144
```bash
145145
kubectl apply -f - <<EOF
146-
apiVersion: networking.istio.io/v1alpha3
146+
apiVersion: networking.istio.io/v1beta1
147147
kind: Gateway
148148
metadata:
149149
name: bookinfo-internal-gateway
@@ -158,7 +158,7 @@ spec:
158158
hosts:
159159
- "*"
160160
---
161-
apiVersion: networking.istio.io/v1alpha3
161+
apiVersion: networking.istio.io/v1beta1
162162
kind: VirtualService
163163
metadata:
164164
name: bookinfo-vs-internal

articles/aks/istio-secure-gateway.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Create a Kubernetes TLS secret for the ingress gateway; use [Azure Key Vault][ak
7575
3. Authorize the user-assigned managed identity of the add-on to access Azure Key Vault resource using access policy. Alternatively, if your Key Vault is using Azure RBAC for the permissions model, follow the instructions [here][akv-rbac-guide] to assign an Azure role of Key Vault for the add-on's user-assigned managed identity.
7676
7777
```bash
78-
OBJECT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.objectId' -o tsv)
78+
OBJECT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.objectId' -o tsv | tr -d '\r')
7979
CLIENT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER --query 'addonProfiles.azureKeyvaultSecretsProvider.identity.clientId')
8080
TENANT_ID=$(az keyvault show --resource-group $RESOURCE_GROUP --name $AKV_NAME --query 'properties.tenantId')
8181
@@ -185,7 +185,7 @@ Use the following manifest to deploy gateway and virtual service resources.
185185
186186
```bash
187187
cat <<EOF | kubectl apply -f -
188-
apiVersion: networking.istio.io/v1alpha3
188+
apiVersion: networking.istio.io/v1beta1
189189
kind: Gateway
190190
metadata:
191191
name: bookinfo-gateway
@@ -203,7 +203,7 @@ spec:
203203
hosts:
204204
- productpage.bookinfo.com
205205
---
206-
apiVersion: networking.istio.io/v1alpha3
206+
apiVersion: networking.istio.io/v1beta1
207207
kind: VirtualService
208208
metadata:
209209
name: productpage-vs
@@ -372,7 +372,7 @@ Extend your gateway definition to support mutual TLS.
372372
373373
```bash
374374
cat <<EOF | kubectl apply -f -
375-
apiVersion: networking.istio.io/v1alpha3
375+
apiVersion: networking.istio.io/v1beta1
376376
kind: Gateway
377377
metadata:
378378
name: bookinfo-gateway

0 commit comments

Comments
 (0)