Skip to content

Commit 654a11b

Browse files
Istio addon - address acrolinx and blocked configs
1 parent 39fb1c1 commit 654a11b

File tree

3 files changed

+12
-6
lines changed

3 files changed

+12
-6
lines changed

articles/aks/istio-about.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This service mesh add-on uses and builds on top of open-source Istio. The add-on
3636

3737
* Istio versions are tested and verified to be compatible with supported versions of Azure Kubernetes Service.
3838
* Scaling of Istio control plane configured and handled by Microsoft.
39-
* Adjust configuration of AKS components like `coredns` when Istio is enabled.
39+
* Adjust scaling of AKS components like `coredns` when Istio is enabled.
4040
* Verified external and internal ingress set-up.
4141
* Verified to work with [Azure Monitor managed service for Prometheus][managed-prometheus-overview] and [Azure Managed Grafana][managed-grafana-overview].
4242
* Official Azure support provided for the add-on.
@@ -49,6 +49,7 @@ Istio-based service mesh add-on for AKS has the following limitations:
4949
* The add-on doesn't work on AKS clusters that are using [Open Service Mesh addon for AKS][open-service-mesh-about].
5050
* The add-on doesn't work on AKS clusters that have Istio installed on them already outside the add-on installation.
5151
* Istio doesn't support Windows Server containers.
52+
* Customization of mesh based on the following custom resources is blocked for now - `EnvoyFilter, ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`
5253

5354
## Next steps
5455

articles/aks/istio-deploy-addon.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ az extension update --name aks-preview
4646

4747
### Register the _AzureServiceMeshPreview_ feature flag
4848

49-
Register the `AzureServiceMeshPreview` feature flag by using the [az feature register][az-feature-register] command below:
49+
Register the `AzureServiceMeshPreview` feature flag by using the [az feature register][az-feature-register] command:
5050

5151
```azurecli-interactive
5252
az feature register --namespace "Microsoft.ContainerService" --name "AzureServiceMeshPreview"
@@ -212,9 +212,9 @@ az aks mesh disable --resource-group ${RESOURCE_GROUP} --name ${CLUSTER}
212212
> [!CAUTION]
213213
> Disabling the service mesh addon will completely remove the Istio control plane from the cluster.
214214
215-
Note that Istio CRDs will not be deleted by default. To clean up CRDs, use:
215+
Istio `CustomResourceDefintion`s (CRDs) won't be deleted by default. To clean them up, use:
216216

217-
```azurecli-interactive
217+
```bash
218218
kubectl delete crd $(kubectl get crd -A | grep "istio.io" | awk '{print $1}')
219219
```
220220

articles/aks/istio-deploy-ingress.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Use `kubectl get svc` to check the service mapped to the ingress gateway:
3131
kubectl get svc aks-istio-ingressgateway-external -n aks-istio-ingress
3232
```
3333

34-
Check the external IP address of the service in the output:
34+
Observe from the output that the external IP address of the service is a publicly accessible one:
3535

3636
```
3737
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
@@ -109,6 +109,11 @@ Navigate to the URL from the output of the previous command and confirm that the
109109
curl -s "http://${GATEWAY_URL_EXTERNAL}/productpage" | grep -o "<title>.*</title>"
110110
```
111111

112+
Confirm that the sample application's product page is accessible. The expected output is:
113+
114+
```html
115+
<title>Simple Bookstore App</title>
116+
```
112117

113118
## Enable internal ingress gateway
114119

@@ -125,7 +130,7 @@ Use `kubectl get svc` to check the service mapped to the ingress gateway:
125130
kubectl get svc aks-istio-ingressgateway-internal -n aks-istio-ingress
126131
```
127132

128-
Check value of the external IP address of the service. For example:
133+
Observe from the output that the external IP address of the service isn't a publicly accessible one and is instead only locally accessible:
129134

130135
```
131136
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE

0 commit comments

Comments
 (0)