Skip to content

Commit 6ce0369

Browse files
committed
Update docs
Signed-off-by: nshankar <[email protected]>
1 parent e894bea commit 6ce0369

File tree

3 files changed

+14
-14
lines changed

3 files changed

+14
-14
lines changed

articles/aks/istio-about.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -50,19 +50,16 @@ Istio-based service mesh add-on for AKS currently has the following limitations:
5050
* The add-on doesn't support adding pods associated with virtual nodes to be added under the mesh.
5151
* The add-on doesn't support egress gateways for outbound traffic control.
5252
* The add-on doesn't support the sidecar-less Ambient dataplane mode.
53-
* The add-on doesn't support multi-cluster, multi-mesh, multi-cloud, or hybrid deployments.
54-
* The add-on restricts mesh-wide configuration options for the [Istio meshconfig][istio-meshconfig].
55-
* The add-on doesn't support static IP address, port, or other customizations for the [Istio add-on ingress gateways][istio-ingress].
53+
* The add-on doesn't support multi-cluster deployments.
5654
* Istio doesn't support Windows Server containers.
57-
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`. For `EnvoyFilter`, the add-on only supports customization of Lua script filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`) - other `EnvoyFilter` types are currently blocked.
58-
59-
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon.
55+
* Customization of mesh through the following custom resources is blocked for now - `ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin`. For `EnvoyFilter`, the add-on only supports customization of Lua filters (`type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua`) - other `EnvoyFilter` types are currently blocked.
56+
* Gateway API for Istio ingress gateway or managing mesh traffic (GAMMA) are currently not yet supported with Istio addon. It's planned to allow customizations such as Static IP address in the Gateway API Istio implementation as part of the Istio add-on in future.
6057

6158
## Next steps
6259

6360
### Feedback and Feature Requests
6461

65-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with and add the `mesh` label.
62+
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with the `mesh` label.
6663

6764
* [Deploy Istio-based service mesh add-on][istio-deploy-addon]
6865
* [Troubleshoot Istio-based service mesh add-on][istio-troubleshooting]

articles/aks/istio-deploy-addon.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -242,12 +242,11 @@ az group delete --name ${RESOURCE_GROUP} --yes --no-wait
242242

243243
### Feedback and Feature Requests
244244

245-
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue with and add the `mesh` label.
245+
Feedback and feature requests for the Istio-based service mesh add-on should be raised as a new issue in the [AKS github repository][aks-gh-issues]. Please open a new issue and add the `mesh` label.
246246

247247
* [Deploy external or internal ingresses for Istio service mesh add-on][istio-deploy-ingress]
248248
* [Scale istiod and ingress gateway HPA][istio-scaling-guide]
249249

250-
251250
<!--- External Links --->
252251
[install-aks-cluster-istio-bicep]: https://github.com/Azure-Samples/aks-istio-addon-bicep
253252
[uninstall-istio-oss]: https://istio.io/latest/docs/setup/install/istioctl/#uninstall-istio

articles/aks/istio-deploy-ingress.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article shows you how to deploy external or internal ingresses for Istio se
1717
1818
## Prerequisites
1919

20-
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy a sample application and set environment variables.
20+
This guide assumes you followed the [documentation][istio-deploy-addon] to enable the Istio add-on on an AKS cluster, deploy sample applications, and set environment variables.
2121

2222
## Enable external ingress gateway
2323

@@ -41,8 +41,7 @@ aks-istio-ingressgateway-external LoadBalancer 10.0.10.249 <EXTERNAL_IP>
4141
```
4242

4343
> [!NOTE]
44-
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45-
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
44+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress specifications are reverted back by the Istio add-on. It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
4645
4746
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
4847

@@ -129,7 +128,6 @@ Use `az aks mesh enable-ingress-gateway` to enable an internal Istio ingress on
129128
az aks mesh enable-ingress-gateway --resource-group $RESOURCE_GROUP --name $CLUSTER --ingress-gateway-type internal
130129
```
131130

132-
133131
Use `kubectl get svc` to check the service mapped to the ingress gateway:
134132

135133
```bash
@@ -143,7 +141,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
143141
aks-istio-ingressgateway-internal LoadBalancer 10.0.182.240 <IP> 15021:30764/TCP,80:32186/TCP,443:31713/TCP 87s
144142
```
145143

146-
Applications aren't mapped to the Istio ingress gateway after enabling the ingress gateway. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
144+
After enabling the ingress gateway, applications need to be exposed through the gateway and routing rules need to be configured accordingly. Use the following manifest to map the sample deployment's ingress to the Istio ingress gateway:
147145

148146
```bash
149147
kubectl apply -f - <<EOF
@@ -228,6 +226,12 @@ Confirm that the sample application's product page is accessible. The expected o
228226

229227
## Delete resources
230228

229+
If you want to clean up the Istio external or internal ingresses, but leave the mesh enabled on the cluster, run the following command:
230+
231+
```azure-cli-interactive
232+
az aks mesh disable-ingress-gateway --ingress-gateway-type <external/internal> --resource-group ${RESOURCE_GROUPS}
233+
```
234+
231235
If you want to clean up the Istio service mesh and the ingresses (leaving behind the cluster), run the following command:
232236

233237
```azurecli-interactive

0 commit comments

Comments
 (0)