Skip to content

Commit 130a4ab

Browse files
authored
Merge pull request #36 from Namanv0509/html-warning
Removing HTML tags
2 parents dd74150 + cd3cff3 commit 130a4ab

File tree

19 files changed

+81
-91
lines changed

19 files changed

+81
-91
lines changed

content/challenges/11111111-1111-1111-1111-111111111111/cncf-observability-challenge-with/distributed-tracing-with-jaeger/content/getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,6 @@ Participants are ranked by score. Your score is determined by the number of test
2525

2626
### Can I participate in a sample challenge?
2727

28-
Yes, we recommend that you participate in our <a> sample challenge </a>.
28+
Yes, we recommend that you participate in our sample challenge .
2929

3030
This challenge enables you to understand how to participate in challenges on Meshery. It comprises detailed information about how questions should be attempted and details about the Meshery judge.

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-kubernetes-for-engineers/explore-dapr-with-meshery/dapr/conclusion/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ weight: 7
99

1010
Congratulations! You have reached the end of this course on understanding how Dapr works in a Kubernetes cluster, using Meshery as a visual guide. Throughout this course, you learned how to import Dapr, Redis, and application configuration files into Meshery and visualize the resources and their relationships.
1111

12-
You successfully created and configured a Dapr state store component using Meshery. You deployed the designs and visualized the deployed resources in the cluster using Operator mode. Additionally, you viewed the Dapr sidecars and observed the resources deployed in the <code>dapr-system</code> and <code>default</code> namespaces.
12+
You successfully created and configured a Dapr state store component using Meshery. You deployed the designs and visualized the deployed resources in the cluster using Operator mode. Additionally, you viewed the Dapr sidecars and observed the resources deployed in the `dapr-system` and `default` namespaces.
1313

1414
Finally, you streamed the logs and observed the API calls, gaining a deeper understanding of how Dapr's APIs, such as the state management API and service invocation API, work together to facilitate seamless inter-service communication and efficient management of application state.
1515

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-meshery/introduction-to-meshery/reviewing-designs/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You can add comments in two convenient ways:
4242

4343
![commenting-via-menu](commenting-via-menu.png)
4444

45-
#### <u>Tips for using Comments as a Design Review Tool</u>
45+
#### Tips for using Comments as a Design Review Tool
4646

4747
![comments-as-design-tool](comments-as-design-tool.png)
4848

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/conclusion/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ weight: 8
99
id: "conclusion"
1010
---
1111

12-
{{< chapterstyle >}}
1312

14-
<br />
13+
14+
1515

1616
### Congratulations!
1717

1818
##### You have successfully completed the course on **"Advanced concepts of service meshes - Hands on"** using _Istio_.
1919

20-
{{< /chapterstyle >}}
20+

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/deploy-an-application/_index.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight: 2
88
title: "Deploy a sample application"
99
---
1010

11-
{{< chapterstyle >}}
11+
1212

1313
To play with Istio and demonstrate some of it's capabilities, you will deploy the example BookInfo application, which is included the Istio package.
1414

@@ -41,9 +41,9 @@ If your environment **does NOT** supports either of these two APIs, then you may
4141

4242
As part of Istio deployment in [Previous chapter](./getting-started), you have deployed the sidecar injector.
4343

44-
<h2 class="chapter-sub-heading">
45-
<a name="auto"></a> Deploying Sample App with Automatic sidecar injection
46-
</h2>
44+
45+
### Deploying Sample App with Automatic sidecar injection
46+
4747

4848
Istio, deployed as part of this workshop, will also deploy the sidecar injector. Let us now
4949
verify sidecar injector deployment.
@@ -148,14 +148,12 @@ kubectl apply -f samples/bookinfo/platform/kube/bookinfo.yaml
148148
kubectl apply -f samples/bookinfo/networking/bookinfo-gateway.yaml
149149
```
150150

151-
<hr />
152151

153-
<h3>
154-
<a name="manual-sidecar-inj" />
155-
Manual Sidecar Injection
156-
</h3>
157152

158-
<p>Use this only when Automatic Sidecar injection doesn't work</p>
153+
### Manual Sidecar Injection
154+
155+
156+
Use this only when Automatic Sidecar injection doesn't work>
159157

160158
To do a manual sidecar injection we will be using `istioctl` command:
161159

@@ -185,4 +183,4 @@ kubectl apply -f <(curl https://raw.githubusercontent.com/istio/istio/master/sam
185183

186184
Now continue to [Verify Bookinfo deployment](#verify).
187185

188-
{{< /chapterstyle >}}
186+

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/expose-services/_index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ title: "Expose services through Istio Ingress Gateway"
88
id: "expose-services"
99
---
1010

11-
{{< chapterstyle >}}
11+
1212
The components deployed on the service mesh by default are not exposed outside the cluster. An Ingress Gateway is deployed as a Kubernetes service of type LoadBalancer (or NodePort). To make Bookinfo accessible external to the cluster, you have to create an `Istio Gateway` for the Bookinfo application and also define an `Istio VirtualService` with the routes we need.
1313

1414
### Inspecting the Istio Ingress Gateway
@@ -238,4 +238,3 @@ We can create a virtualservice & gateway for bookinfo app in the ingress gateway
238238
kubectl apply -f samples/bookinfo/networking/bookinfo-gateway.yaml
239239
```
240240

241-
{{< /chapterstyle >}}

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/getting-started/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight: 1
88
title: "Getting Started with Istio"
99
---
1010

11-
{{< chapterstyle >}}
11+
1212

1313
### Setup Istio
1414

@@ -105,4 +105,4 @@ Istio is deployed in a separate Kubernetes namespace `istio-system`. To check if
105105
kubectl get all -n istio-system
106106
```
107107

108-
{{< /chapterstyle >}}
108+

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/observability/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ id: "observability"
88
title: "Observability with Istio"
99
---
1010

11-
{{< chapterstyle >}}
11+
1212

1313
### Install Telemetry Add-ons
1414

@@ -169,7 +169,7 @@ To do this the application collects and propagates the following headers from th
169169

170170
Istio add-on services are deployed by default as `ClusterIP` type services. We can expose the services outside the cluster by either changing the Kubernetes service type to `NodePort` or `LoadBalancer` or by port-forwarding or by configuring Kubernetes Ingress. In this lab, we will briefly demonstrate the `NodePort` and port-forwarding ways of exposing services.
171171

172-
<h5 class="chapter-alt-heading"> Option 1: Expose services with NodePort</h5>
172+
##### Option 1: Expose services with NodePort
173173

174174
To expose them using NodePort service type, we can edit the services and change the service type from `ClusterIP` to `NodePort`
175175

@@ -207,4 +207,4 @@ kubectl -n istio-system get svc tracing
207207

208208
You can click on the link at the top of the page which maps to the right port and it will open Jaeger UI in a new tab.
209209

210-
{{< /chapterstyle >}}
210+

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/service-security-capabilities/_index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ id: "service-security-capabilities"
88
title: "Service Security Capabilities of Istio"
99
---
1010

11-
{{< chapterstyle >}}
11+
1212

1313
### Access Control
1414

@@ -272,4 +272,3 @@ spec:
272272
# mode: DISABLE
273273
```
274274

275-
{{< /chapterstyle >}}

content/learning-paths/11111111-1111-1111-1111-111111111111/mastering-service-meshes-for-developers/advance-concepts-of-service-meshes/webassembly-and-intelligent-data-planes/_index.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ id: "webassembly-and-intelligent-data-planes"
99
title: "WebAssembly and Intelligent Data Planes"
1010
---
1111

12-
{{< chapterstyle >}}
12+
1313

1414
In this lab, you will use the sample application [Image Hub](https://github.com/layer5io/image-hub). This version of the Image Hub filter has been simplified for your lab. To self-study deeper functionality, try the other version of the Image Hub filter that is available in the Image Hub repo.
1515

@@ -22,8 +22,8 @@ In the Istio management page:
2222
1. Type default into the namespace field.
2323
2. Click the (+) icon on the Manage Sample Application Lifecycle card and select Image Hub Application to install the latest version of Image Hub
2424

25-
<br />
26-
<br />
25+
26+
2727

2828
### Load the filter
2929

@@ -36,11 +36,11 @@ In the Istio management page:
3636
1. Type default into the namespace field.
3737
2. Click the (+) icon on the Apply Service Mesh Configuration card and select Envoy Filter for Image Hub to deploy the custom filter.
3838

39-
<br />
40-
<br />
39+
40+
4141
## Send traffic
42-
<br />
43-
## Analyze behavior
42+
43+
### Analyze behavior
4444

4545
Alternative, manual installation steps are provided for reference below. No need to execute these if you have performed the steps above.
4646

@@ -137,4 +137,4 @@ Manually patch the Image Hub Deployment.
137137

138138
A future version of Meshery will allow you to deploy any filter from the [wasm-filters](https://github.com/layer5io/wasm-filters) repo. PR the repo to upload your custom filter and have Meshery deploy it.
139139

140-
{{< /chapterstyle >}}
140+

0 commit comments

Comments
 (0)