You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/distr-tracing-accessing-jaeger-console.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The *Location* column displays the linked address for each route.
37
37
38
38
.Procedure from the CLI
39
39
40
-
. Log in to the {product-title} CLI as a user with the `cluster-admin` role. If you use Red Hat OpenShift Dedicated, you must have an account with the `dedicated-admin` role.
40
+
. Log in to the {product-title} CLI as a user with the `cluster-admin` role. If you use {product-dedicated}, you must have an account with the `dedicated-admin` role.
Copy file name to clipboardExpand all lines: modules/ossm-about-collecting-ossm-data.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@
8
8
[id="ossm-about-collecting-ossm-data_{context}"]
9
9
= About collecting service mesh data
10
10
11
-
You can use the `oc adm must-gather` CLI command to collect information about your cluster, including features and objects associated with {ProductName}.
11
+
You can use the `oc adm must-gather` CLI command to collect information about your cluster, including features and objects associated with {SMProductName}.
12
12
13
13
.Prerequisites
14
14
@@ -18,14 +18,14 @@ You can use the `oc adm must-gather` CLI command to collect information about yo
18
18
19
19
.Precedure
20
20
21
-
. To collect {ProductName} data with `must-gather`, you must specify the {ProductName} image.
21
+
. To collect {SMProductName} data with `must-gather`, you must specify the {SMProductName} image.
. To collect {ProductName} data for a specific control plane namespace with `must-gather`, you must specify the {ProductName} image and namespace. In this example, replace `<namespace>` with your control plane namespace, such as `istio-system`.
28
+
. To collect {SMProductName} data for a specific control plane namespace with `must-gather`, you must specify the {SMProductName} image and namespace. In this example, replace `<namespace>` with your control plane namespace, such as `istio-system`.
Copy file name to clipboardExpand all lines: modules/ossm-architecture-1x.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,9 +3,9 @@
3
3
// -service_mesh/v1x/ossm-architecture.adoc
4
4
5
5
[id="ossm-architecture-1x_{context}"]
6
-
= {ProductName} Architecture
6
+
= {SMProductName} Architecture
7
7
8
-
{ProductName} is logically split into a data plane and a control plane:
8
+
{SMProductName} is logically split into a data plane and a control plane:
9
9
10
10
The *data plane* is a set of intelligent proxies deployed as sidecars. These proxies intercept and control all inbound and outbound network communication between microservices in the service mesh. Sidecar proxies also communicate with Mixer, the general-purpose policy and telemetry hub.
11
11
@@ -18,4 +18,4 @@ The *control plane* manages and configures proxies to route traffic, and configu
18
18
* *Citadel* issues and rotates certificates. Citadel provides strong service-to-service and end-user authentication with built-in identity and credential management. You can use Citadel to upgrade unencrypted traffic in the service mesh. Operators can enforce policies based on service identity rather than on network controls using Citadel.
19
19
* *Galley* ingests the service mesh configuration, then validates, processes, and distributes the configuration. Galley protects the other service mesh components from obtaining user configuration details from {product-title}.
20
20
21
-
{ProductName} also uses the *istio-operator* to manage the installation of the control plane. An _Operator_ is a piece of software that enables you to implement and automate common activities in your {product-title} cluster. It acts as a controller, allowing you to set or change the desired state of objects in your cluster.
21
+
{SMProductName} also uses the *istio-operator* to manage the installation of the control plane. An _Operator_ is a piece of software that enables you to implement and automate common activities in your {product-title} cluster. It acts as a controller, allowing you to set or change the desired state of objects in your cluster.
At a high level, {ProductName} consists of a data plane and a control plane
12
+
At a high level, {SMProductName} consists of a data plane and a control plane
13
13
14
14
The *data plane* is a set of intelligent proxies, running alongside application containers in a pod, that intercept and control all inbound and outbound network communication between microservices in the service mesh.
15
15
The data plane is implemented in such a way that it intercepts all inbound (ingress) and outbound (egress) network traffic. The Istio data plane is composed of Envoy containers running along side application containers in a pod. The Envoy container acts as a proxy, controlling all network communication into and out of the pod.
@@ -32,20 +32,20 @@ The *control plane* manages and configures the proxies that make up the data pla
32
32
33
33
** Istiod is responsible for injecting sidecar proxy containers into workloads deployed to an OpenShift cluster.
34
34
35
-
{ProductName} uses the *istio-operator* to manage the installation of the control plane. An _Operator_ is a piece of software that enables you to implement and automate common activities in your OpenShift cluster. It acts as a controller, allowing you to set or change the desired state of objects in your cluster, in this case, a {ProductName} installation.
35
+
{SMProductName} uses the *istio-operator* to manage the installation of the control plane. An _Operator_ is a piece of software that enables you to implement and automate common activities in your OpenShift cluster. It acts as a controller, allowing you to set or change the desired state of objects in your cluster, in this case, a {SMProductName} installation.
36
36
37
-
{ProductName} also bundles the following Istio add-ons as part of the product:
37
+
{SMProductName} also bundles the following Istio add-ons as part of the product:
38
38
39
-
* *Kiali* - Kiali is the management console for {ProductName}. It provides dashboards, observability, and robust configuration and validation capabilities. It shows the structure of your service mesh by inferring traffic topology and displays the health of your mesh. Kiali provides detailed metrics, powerful validation, access to Grafana, and strong integration with the {JaegerShortName}.
39
+
* *Kiali* - Kiali is the management console for {SMProductName}. It provides dashboards, observability, and robust configuration and validation capabilities. It shows the structure of your service mesh by inferring traffic topology and displays the health of your mesh. Kiali provides detailed metrics, powerful validation, access to Grafana, and strong integration with the {JaegerShortName}.
40
40
41
-
* *Prometheus* - {ProductName} uses Prometheus to store telemetry information from services. Kiali depends on Prometheus to obtain metrics, health status, and mesh topology.
41
+
* *Prometheus* - {SMProductName} uses Prometheus to store telemetry information from services. Kiali depends on Prometheus to obtain metrics, health status, and mesh topology.
42
42
43
-
* *Jaeger* - {ProductName} supports the {JaegerShortName}. Jaeger is an open source traceability server that centralizes and displays traces associated with a single request between multiple services. Using the {JaegerShortName} you can monitor and troubleshoot your microservices-based distributed systems.
43
+
* *Jaeger* - {SMProductName} supports the {JaegerShortName}. Jaeger is an open source traceability server that centralizes and displays traces associated with a single request between multiple services. Using the {JaegerShortName} you can monitor and troubleshoot your microservices-based distributed systems.
44
44
45
45
* *Elasticsearch* - Elasticsearch is an open source, distributed, JSON-based search and analytics engine. The {JaegerShortName} uses Elasticsearch for persistent storage.
46
46
47
47
* *Grafana* - Grafana provides mesh administrators with advanced query and metrics analysis and dashboards for Istio data. Optionally, Grafana can be used to analyze service mesh metrics.
48
48
49
-
The following Istio integrations are supported with {ProductName}:
49
+
The following Istio integrations are supported with {SMProductName}:
50
50
51
51
* *3scale* - Istio provides an optional integration with Red Hat 3scale API Management solutions. For versions prior to 2.1, this integration was achieved via the 3scale Istio adapter. For version 2.1 and later, the 3scale integration is achieved via a WebAssembly module.
Copy file name to clipboardExpand all lines: modules/ossm-auto-route-1x.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@ This TASK module included in the following assemblies:
6
6
[id="ossm-auto-route-1x_{context}"]
7
7
= Automatic route creation
8
8
9
-
OpenShift routes for Istio Gateways are automatically managed in {ProductName}. Every time an Istio Gateway is created, updated or deleted inside the service mesh, an OpenShift route is created, updated or deleted.
9
+
OpenShift routes for Istio Gateways are automatically managed in {SMProductName}. Every time an Istio Gateway is created, updated or deleted inside the service mesh, an OpenShift route is created, updated or deleted.
10
10
11
11
[id="ossm-auto-route-enable_{context}"]
12
12
== Enabling Automatic Route Creation
13
-
A {ProductName} control plane component called Istio OpenShift Routing (IOR) synchronizes the gateway route. Enable IOR as part of the control plane deployment.
13
+
A {SMProductName} control plane component called Istio OpenShift Routing (IOR) synchronizes the gateway route. Enable IOR as part of the control plane deployment.
14
14
15
15
If the Gateway contains a TLS section, the OpenShift Route will be configured to support TLS.
16
16
@@ -36,7 +36,7 @@ spec:
36
36
[id="ossm-auto-route-subdomains_{context}"]
37
37
== Subdomains
38
38
39
-
{ProductName} creates the route with the subdomain, but {product-title} must be configured to enable it. Subdomains, for example `*.domain.com`, are supported but not by default. Configure an {product-title} wildcard policy before configuring a wildcard host Gateway. For more information, see the "Links" section.
39
+
{SMProductName} creates the route with the subdomain, but {product-title} must be configured to enable it. Subdomains, for example `*.domain.com`, are supported but not by default. Configure an {product-title} wildcard policy before configuring a wildcard host Gateway. For more information, see the "Links" section.
0 commit comments