Skip to content

Commit 8312d53

Browse files
authored
Merge pull request #68302 from mburke5678/service-mesh-fix-errors-2
Service Mesh docs fixes during ROSA review 2
2 parents 267f016 + 5e2e1c4 commit 8312d53

27 files changed

+258
-198
lines changed

modules/distr-tracing-upgrading-es5-es6.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ When updating from Elasticsearch 5 to 6, you must delete your {JaegerShortName}
1414
+
1515
[source,terminal]
1616
----
17-
$ oc get jaeger -n <istio-system>
17+
$ oc get jaeger -n istio-system
1818
----
1919
+
2020
You will see output similar to the following:
@@ -29,21 +29,21 @@ jaeger Running 1.24.1 production elasticsearch d21h
2929
+
3030
[source,terminal]
3131
----
32-
$ oc get jaeger jaeger -oyaml -n <istio-system> > /tmp/jaeger-cr.yaml
32+
$ oc get jaeger jaeger -oyaml -n istio-system > /tmp/jaeger-cr.yaml
3333
----
3434

3535
. Delete the {JaegerShortName} instance by running the following command:
3636
+
3737
[source,terminal]
3838
----
39-
$ oc delete jaeger jaeger -n <istio-system>
39+
$ oc delete jaeger jaeger -n istio-system
4040
----
4141

4242
. Recreate the {JaegerShortName} instance from your copy of the custom resource file by running the following command:
4343
+
4444
[source,terminal]
4545
----
46-
$ oc create -f /tmp/jaeger-cr.yaml -n <istio-system>
46+
$ oc create -f /tmp/jaeger-cr.yaml -n istio-system
4747
----
4848

4949
. Delete the copy of the generated custom resource file by running the following command:

modules/ossm-accessing-jaeger.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ search for the Jaeger route, which is the URL listed under *Location*.
2323
+
2424
[source,terminal]
2525
----
26-
$ export JAEGER_URL=$(oc get route -n istio-system jaeger -o jsonpath='{.spec.host}')
26+
$ oc get route -n istio-system jaeger -o jsonpath='{.spec.host}'
2727
----
2828
+
2929
. Launch a browser and navigate to ``\https://<JAEGER_URL>``, where `<JAEGER_URL>` is the route that you discovered in the previous step.

modules/ossm-cert-manager-installation.adoc

Lines changed: 21 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,7 @@ You can install the `cert-manager` tool to manage the lifecycle of TLS certifica
1212

1313
. Create the root cluster issuer:
1414
+
15-
[source,terminal]
16-
----
17-
$ oc apply -f cluster-issuer.yaml
18-
----
19-
+
20-
[source,terminal]
21-
----
22-
$ oc apply -n istio-system -f istio-ca.yaml
23-
----
15+
.. Create the `cluster-issuer` object as in the following example:
2416
+
2517
.Example `cluster-issuer.yaml`
2618
[source, yaml]
@@ -60,6 +52,20 @@ spec:
6052
secretName: root-ca
6153
----
6254
+
55+
====
56+
[NOTE]
57+
The namespace of the `selfsigned-root-issuer` issuer and `root-ca` certificate is `cert-manager` because `root-ca` is a cluster issuer, so the cert-manager looks for a referenced secret in its own namespace. The namespace is called `cert-manager` in the case of the {cert-manager-operator}.
58+
====
59+
60+
.. Create the object by using the following command:
61+
+
62+
[source,terminal]
63+
----
64+
$ oc apply -f cluster-issuer.yaml
65+
----
66+
67+
.. Create the `istio-ca` object as in the following example:
68+
+
6369
.Example `istio-ca.yaml`
6470
[source, yaml]
6571
----
@@ -90,11 +96,13 @@ spec:
9096
ca:
9197
secretName: istio-ca
9298
----
99+
100+
.. Use the following command to create the object:
93101
+
94-
====
95-
[NOTE]
96-
The namespace of the `selfsigned-root-issuer` issuer and `root-ca` certificate is `cert-manager` because `root-ca` is a cluster issuer, so the cert-manager looks for a referenced secret in its own namespace. Its own namespace is `cert-manager` in the case of the {cert-manager-operator}.
97-
====
102+
[source,terminal]
103+
----
104+
$ oc apply -n istio-system -f istio-ca.yaml
105+
----
98106

99107
. Install `istio-csr`:
100108
+

modules/ossm-federation-config-smcp.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -321,6 +321,13 @@ In the following example, the administrator is configuring the SMCP for federati
321321
.Sample SMCP for NodePort
322322
[source,yaml]
323323
----
324+
apiVersion: maistra.io/v2
325+
kind: ServiceMeshControlPlane
326+
metadata:
327+
name: green-mesh
328+
namespace: green-mesh-system
329+
spec:
330+
# ...
324331
gateways:
325332
additionalIngress:
326333
ingress-green-mesh:

modules/ossm-federation-create-export.adoc

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -103,22 +103,11 @@ $ oc create -n red-mesh-system -f export-to-green-mesh.yaml
103103
----
104104
+
105105
. Create additional `ExportedServiceSets` as needed for each mesh peer in your federated mesh.
106+
107+
.Verification
108+
106109
//TODO - Add sample output after the validation
107-
. To validate the services you've exported from `red-mesh` to share with `green-mesh`, run the following command:
108-
+
109-
[source,terminal]
110-
----
111-
$ oc get exportedserviceset <PeerMeshExportedTo> -o yaml
112-
----
113-
+
114-
For example:
115-
+
116-
[source,terminal]
117-
----
118-
$ oc get exportedserviceset green-mesh -o yaml
119-
----
120-
+
121-
. Run the following command to validate the services the red-mesh exports to share with green-mesh:
110+
* Run the following command to validate the services the red-mesh exports to share with green-mesh:
122111
+
123112
[source,terminal]
124113
----

modules/ossm-federation-create-import.adoc

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Follow this procedure to create an `ImportedServiceSet` with the web console. Th
4141
////
4242

4343

44-
.Procedure from the CLI
44+
.Procedure
4545

4646
Follow this procedure to create an `ImportedServiceSet` from the command line.
4747

@@ -96,29 +96,19 @@ $ oc create -n green-mesh-system -f import-from-red-mesh.yaml
9696
----
9797
+
9898
. Create additional `ImportedServiceSet` resources as needed for each mesh peer in your federated mesh.
99+
100+
.Verification
101+
99102
//TODO - Add sample output after the validation
100-
. To validate the services you've imported into `green-mesh`, run the following command:
101-
+
102-
[source,terminal]
103-
----
104-
$ oc get importedserviceset <PeerMeshImportedInto> -o yaml
105-
----
106-
+
107-
For example:
108-
+
109-
[source,terminal]
110-
----
111-
$ oc get importedserviceset green-mesh -o yaml
112-
----
113-
+
114-
. Run the following command to validate the services imported into a mesh.
103+
104+
* Run the following command to verify that the services were imported into `green-mesh`:
115105
+
116106
[source,terminal]
117107
----
118108
$ oc get importedserviceset <PeerMeshImportedInto> -o yaml
119109
----
120110
+
121-
.Example validating that the services exported from the red mesh have been imported into the green mesh using the status section of the `importedserviceset/red-mesh' object in the 'green-mesh-system` namespace:
111+
.Example verifying that the services exported from the red mesh have been imported into the green mesh using the status section of the `importedserviceset/red-mesh' object in the 'green-mesh-system` namespace:
122112
+
123113
[source,terminal]
124114
----

modules/ossm-jaeger-accessing-console.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ $ oc login --username=<NAMEOFUSER> https://<HOSTNAME>:6443
5050
+
5151
[source,terminal]
5252
----
53-
$ export JAEGER_URL=$(oc get route -n istio-system jaeger -o jsonpath='{.spec.host}')
53+
$ oc get route -n istio-system jaeger -o jsonpath='{.spec.host}'
5454
----
5555
+
5656
. Launch a browser and navigate to ``\https://<JAEGER_URL>``, where `<JAEGER_URL>` is the route that you discovered in the previous step.

modules/ossm-mixer-policy-1x.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ In previous versions of {SMProductName}, Mixer's policy enforcement was enabled
1313
1414
[NOTE]
1515
====
16-
The examples use `<istio-system>` as the control plane namespace. Replace this value with the namespace where you deployed the Service Mesh Control Plane (SMCP).
16+
The examples use `istio-system` as the control plane namespace. Replace this value with the namespace where you deployed the Service Mesh Control Plane (SMCP).
1717
====
1818

1919
.Procedure
@@ -24,14 +24,14 @@ The examples use `<istio-system>` as the control plane namespace. Replace this v
2424
+
2525
[source,terminal]
2626
----
27-
$ oc get cm -n <istio-system> istio -o jsonpath='{.data.mesh}' | grep disablePolicyChecks
27+
$ oc get cm -n istio-system istio -o jsonpath='{.data.mesh}' | grep disablePolicyChecks
2828
----
2929

3030
. If `disablePolicyChecks: true`, edit the {SMProductShortName} ConfigMap:
3131
+
3232
[source,terminal]
3333
----
34-
$ oc edit cm -n <istio-system> istio
34+
$ oc edit cm -n istio-system istio
3535
----
3636

3737
. Locate `disablePolicyChecks: true` within the ConfigMap and change the value to `false`.

modules/ossm-mixer-policy.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ In previous versions of {SMProductName}, Mixer's policy enforcement was enabled
1313
1414
[NOTE]
1515
====
16-
The examples use `<istio-system>` as the {SMProductShortName} control plane namespace. Replace this value with the namespace where you deployed the Service Mesh Control Plane (SMCP).
16+
The examples use `istio-system` as the {SMProductShortName} control plane namespace. Replace this value with the namespace where you deployed the Service Mesh Control Plane (SMCP).
1717
====
1818

1919
.Procedure
@@ -24,14 +24,14 @@ The examples use `<istio-system>` as the {SMProductShortName} control plane name
2424
+
2525
[source,terminal]
2626
----
27-
$ oc get cm -n <istio-system> istio -o jsonpath='{.data.mesh}' | grep disablePolicyChecks
27+
$ oc get cm -n istio-system istio -o jsonpath='{.data.mesh}' | grep disablePolicyChecks
2828
----
2929

3030
. If `disablePolicyChecks: true`, edit the {SMProductShortName} ConfigMap:
3131
+
3232
[source,terminal]
3333
----
34-
$ oc edit cm -n <istio-system> istio
34+
$ oc edit cm -n istio-system istio
3535
----
3636

3737
. Locate `disablePolicyChecks: true` within the ConfigMap and change the value to `false`.

modules/ossm-recommended-resources.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,4 +76,6 @@ spec:
7676
+
7777
.. Click *Save*.
7878

79-
. Click *Reload* to verify the `ServiceMeshControlPlane` resource was configured correctly.
79+
.Verification
80+
81+
* Click *Reload* to verify that the `ServiceMeshControlPlane` resource was configured correctly.

0 commit comments

Comments
 (0)