Skip to content

Commit 75ba64c

Browse files
committed
Format fixes and rerognization
Misc edits
1 parent cb169ef commit 75ba64c

File tree

2 files changed

+53
-58
lines changed

2 files changed

+53
-58
lines changed

docs/snippets/no-dns.md

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -2,42 +2,42 @@
22
- install/operator/knative-with-operators.md
33
- install/yaml-install/serving/install-serving-with-yaml.md
44
-->
5-
=== "No DNS"
6-
7-
If you are using `curl` to access [the sample applications](/docs/getting-started/first-service/), or your own Knative app, and are unable to use the "Magic DNS (sslip.io)" or "Real DNS" methods, you can evaluate Knative without altering your DNS configuration. You might have this need if minikube locally or IPv6 clusters.
8-
9-
To access your application using `curl` using this method:
10-
11-
1. Configure Knative to use a domain reachable from outside the cluster:
12-
13-
```bash
14-
kubectl patch configmap/config-domain \
15-
--namespace knative-serving \
16-
--type merge \
17-
--patch '{"data":{"example.com":""}}'
18-
```
19-
20-
1. After starting your application, get the URL of your application:
21-
22-
```bash
23-
kubectl get ksvc
24-
```
25-
The output should be similar to:
26-
```bash
27-
NAME URL LATESTCREATED LATESTREADY READY REASON
28-
helloworld-go http://helloworld-go.default.example.com helloworld-go-vqjlf helloworld-go-vqjlf True
29-
```
30-
31-
1. Instruct `curl` to connect to the External IP or CNAME defined by the
32-
networking layer mentioned in section 3, and use the `-H "Host:"` command-line
33-
option to specify the Knative application's host name.
34-
For example, if the networking layer defines your External IP and port to be `http://192.168.39.228:32198` and you wish to access the `helloworld-go` application mentioned earlier, use:
35-
36-
```bash
37-
curl -H "Host: helloworld-go.default.example.com" http://192.168.39.228:32198
38-
```
39-
In the case of the provided `helloworld-go` sample application, using the default configuration, the output is:
40-
```
41-
Hello Go Sample v1!
42-
```
43-
Refer to the "Real DNS" method for a permanent solution.
5+
If you are using `curl` to access [the sample applications](/docs/getting-started/first-service/), or your own Knative app, and are unable to use the "Magic DNS (sslip.io)" or "Real DNS" methods, you can evaluate Knative without altering your DNS configuration. You might have this need if minikube locally or IPv6 clusters.
6+
7+
To access your application using `curl` using this method:
8+
9+
1. Configure Knative to use a domain reachable from outside the cluster:
10+
11+
```bash
12+
kubectl patch configmap/config-domain \
13+
--namespace knative-serving \
14+
--type merge \
15+
--patch '{"data":{"example.com":""}}'
16+
```
17+
18+
1. After starting your application, get the URL of your application:
19+
20+
```bash
21+
kubectl get ksvc
22+
```
23+
24+
The output should be similar to:
25+
26+
```bash
27+
NAME URL LATESTCREATED LATESTREADY READY REASON
28+
helloworld-go http://helloworld-go.default.example.com helloworld-go-vqjlf helloworld-go-vqjlf True
29+
```
30+
31+
1. Instruct `curl` to connect to the External IP or CNAME defined by the networking layer mentioned in section 3, and use the `-H "Host:"` command-line option to specify the Knative application's host name. For example, if the networking layer defines your External IP and port to be `http://192.168.39.228:32198` and you wish to access the `helloworld-go` application mentioned earlier, use:
32+
33+
```bash
34+
curl -H "Host: helloworld-go.default.example.com" http://192.168.39.228:32198
35+
```
36+
37+
In the case of the provided `helloworld-go` sample application, using the default configuration, the output is:
38+
39+
```bash
40+
Hello Go Sample v1!
41+
```
42+
43+
Refer to the "Real DNS" method for a permanent solution.

docs/versioned/serving/config-network-adapters.md

Lines changed: 14 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,19 +15,6 @@ For installation instructions, see [Install serving with YAML](../install/yaml-i
1515

1616
Review the tabbed content in this section to determine the optimal networking layer for your cluster. If you already have one of the ingress controllers installed in your cluster, we recommend using your existing installation. For most users without a supported ingress, the Kourier ingress controller is sufficient. You can expand your capabilities with the Contour ingress, a full-feature service mesh with Istio, and the Kubernetes Gateway API.
1717

18-
The Knative tested ingress controllers (Contour, Istio, and Kourier) have the following common configurations:
19-
20-
- Certificate management: Configurable secrets for TLS encrypted traffic. See [Using a custom TLS certificate for DomainMapping](./services/custom-tls-certificate-domain-mapping.md).
21-
- Timeout policies: Controls for idle, and response stream timeouts. To review timeout settings, see [Configuring the Defaults ConfigMap](./configuration/config-defaults.md).
22-
- Traffic visibility: Mechanisms to expose services externally or cluster-locally. See [Traffic management](./traffic-management.md).
23-
- The mapping of Route objects to `networking.internal.knative.dev` objects is common to these controllers.
24-
25-
The Knative `networking.internal.knative.dev` Ingress type is generally referred to as KIngress objects.
26-
27-
In scenarios where there are multiple networking implementations, you can create a custom ingress class to specify different ingress class annotations for each service. For more information, see [Configuring Services custom ingress class](./services/ingress-class.md).
28-
29-
There are also third-party Knative networking options and Knative products available but are not tested or managed by the Knative community. For more information, see [Knative offerings](../install/knative-offerings.md).
30-
3118
=== "Kourier"
3219

3320
Knative Serving network layer architecture:
@@ -134,12 +121,7 @@ There are also third-party Knative networking options and Knative products avail
134121

135122
The Contour ingress controller, `net-contour`, bridges Knative's KIngress resources to Contour's HTTPProxy resources. Contour is a good choice for clusters that already run non-Knative apps, are already using a Contour envoy, or don't need a full-feature service mesh.
136123

137-
Contour provides the following additional configuration options:
138-
139-
- CORS policy configuration.
140-
- Direct visibility classes for external and internal traffic.
141-
142-
Contour also supports several cluster-wide configuration options. For more information see the [Contour Configuration Reference](https://projectcontour.io/docs/1.33/configuration/).
124+
You can include the full native Contour configuration as described in the [Contour Configuration Reference](https://projectcontour.io/docs/1.33/configuration/). Capabilities include CORS policy configuration, direct visibility classes for external and internal traffic, and several cluster-wide configuration options.
143125

144126
=== "Istio"
145127

@@ -237,6 +219,15 @@ There are also third-party Knative networking options and Knative products avail
237219

238220
## Ingress configurations
239221

222+
The Knative tested ingress controllers (Contour, Istio, and Kourier) have the following common configurations:
223+
224+
- Certificate management: Configurable secrets for TLS encrypted traffic. See [Using a custom TLS certificate for DomainMapping](./services/custom-tls-certificate-domain-mapping.md).
225+
- Timeout policies: Controls for idle, and response stream timeouts. To review timeout settings, see [Configuring the Defaults ConfigMap](./configuration/config-defaults.md).
226+
- Traffic visibility: Mechanisms to expose services externally or cluster-locally. See [Traffic management](./traffic-management.md).
227+
- The mapping of Route objects to `networking.internal.knative.dev` objects is common to these controllers.
228+
229+
The Knative `networking.internal.knative.dev` Ingress type is generally referred to as KIngress objects.
230+
240231
Use the following command to determine which ingress controllers are installed and their status.
241232

242233
``` bash
@@ -280,6 +271,10 @@ kubectl patch configmap config-network -n knative-serving \
280271

281272
If you want to install a new controller, see [Install serving with YAML](../install/yaml-install/serving/install-serving-with-yaml.md). Be aware that changing the Ingress class of an existing Route may result in undefined behavior.
282273

274+
In scenarios where there are multiple networking implementations, you can create a custom ingress class to specify different ingress class annotations for each service. For more information, see [Configuring Services custom ingress class](./services/ingress-class.md).
275+
276+
There are also third-party Knative networking options and Knative products available but are not tested or managed by the Knative community. For more information, see [Knative offerings](../install/knative-offerings.md).
277+
283278
## Gateway configurations
284279

285280
Knative assumes two gateways in the cluster:

0 commit comments

Comments
 (0)