@@ -48,7 +48,6 @@ spire-agent-92q5m 3/3 Running 0 37d
48
48
spire-agent-jhgwf 3/3 Running 0 37d
49
49
spire-agent-sm8gt 3/3 Running 0 37d
50
50
spire-server-574474c7dc-gbzl6 2/2 Running 1 (11d ago) 37d
51
-
52
51
```
53
52
54
53
``` shellsession
@@ -127,7 +126,6 @@ Cluster1:~ # kubectl get po -n istio-system
127
126
NAME READY STATUS RESTARTS AGE
128
127
istio-ingressgateway-5d77cdd9d-gh9w4 1/1 Running 0 37d
129
128
istiod-d5bc8669c-4bdvh 1/1 Running 0 37d
130
-
131
129
```
132
130
133
131
``` shellsession
@@ -161,7 +159,6 @@ NAME TYPE CLUSTER-IP EXTERN
161
159
spire-controller-manager-webhook-service ClusterIP 10.111.48.177 <none> 443/TCP 37d
162
160
spire-server NodePort 10.106.72.102 <none> 8081:30256/TCP 37d
163
161
spire-server-bundle-endpoint LoadBalancer 10.99.0.208 172.16.17.9 8443:30889/TCP 37d
164
-
165
162
```
166
163
167
164
``` shellsession
@@ -170,7 +167,6 @@ NAME TYPE CLUSTER-IP EXTERN
170
167
spire-controller-manager-webhook-service ClusterIP 10.97.108.123 <none> 443/TCP 37d
171
168
spire-server NodePort 10.104.109.247 <none> 8081:30256/TCP 37d
172
169
spire-server-bundle-endpoint LoadBalancer 10.104.151.184 172.16.17.3 8443:30889/TCP 37d
173
-
174
170
```
175
171
176
172
## 3.2 Create cluster federated trust domain
@@ -439,7 +435,7 @@ kubectl exec -n spire -c spire-server deployment/spire-server -- /opt/spire/bin/
439
435
440
436
* Note: Copy the ca cert under the cluster2.demo section into a new file bookinfo.ca.cert.*
441
437
442
- 4.7 Visualize using Service Mesh:
438
+ ## 4.7 Visualize using Service Mesh:
443
439
444
440
Using the Kiali dashboard, observing the graphs of generated traffic.
445
441
0 commit comments