Skip to content

Commit dddfbf2

Browse files
authored
Merge pull request #48432 from JStickler/OSSMDOC-640
OSSMDOC-640: [DDF]Clarify versioning of doc set.
2 parents 86e5a69 + ba74e6a commit dddfbf2

13 files changed

+39
-31
lines changed

modules/ossm-config-enabling-controlplane.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@
77

88
Secure connections are always used when proxies communicate with the control plane regardless of the `spec.security.controlPlane.mtls` setting. If Mixer telemetry or policies are part of your configuration, set `spec.security.controlPlane.mtls` to `true` in your `ServiceMeshControlPlane` resource to enable strict mTLS.
99

10-
[source,yaml]
10+
[source,yaml, subs="attributes,verbatim"]
1111
----
1212
apiVersion: maistra.io/v2
1313
kind: ServiceMeshControlPlane
1414
spec:
15-
version: v2.1
15+
version: v{MaistraVersion}
1616
security:
1717
controlPlane:
1818
mtls: true

modules/ossm-config-sec-mtls-mesh.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@
88

99
If your workloads do not communicate with outside services, you can quickly enable mTLS across your mesh without communication interruptions. You can enable it by setting `spec.security.dataPlane.mtls` to `true` in the `ServiceMeshControlPlane` resource. The Operator creates the required resources.
1010

11-
[source,yaml]
11+
[source,yaml, subs="attributes,verbatim"]
1212
----
1313
apiVersion: maistra.io/v2
1414
kind: ServiceMeshControlPlane
1515
spec:
16-
version: v2.1
16+
version: v{MaistraVersion}
1717
security:
1818
dataPlane:
1919
mtls: true

modules/ossm-control-plane-cli.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,16 +31,16 @@ $ oc new-project istio-system
3131
+
3232
. Create a `ServiceMeshControlPlane` file named `istio-installation.yaml` using the following example. The version of the control plane determines the features available regardless of the version of the Operator.
3333
+
34-
.Example version 2.1 istio-installation.yaml
35-
[source,yaml]
34+
.Example version {MaistraVersion} istio-installation.yaml
35+
[source,yaml, subs="attributes,verbatim"]
3636
----
3737
apiVersion: maistra.io/v2
3838
kind: ServiceMeshControlPlane
3939
metadata:
4040
name: basic
4141
namespace: istio-system
4242
spec:
43-
version: v2.1
43+
version: v{MaistraVersion}
4444
tracing:
4545
type: Jaeger
4646
sampling: 10000

modules/ossm-cr-example.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,13 +138,14 @@ The following table lists the specifications for the `ServiceMeshControlPlane` r
138138
This example `ServiceMeshControlPlane` definition contains all of the supported parameters.
139139

140140
.Example `ServiceMeshControlPlane` resource
141-
[source,yaml]
141+
[source,yaml, subs="attributes,verbatim"]
142142
----
143143
apiVersion: maistra.io/v2
144144
kind: ServiceMeshControlPlane
145145
metadata:
146146
name: basic
147147
spec:
148+
version: v{MaistraVersion}
148149
proxy:
149150
runtime:
150151
container:

modules/ossm-cr-tracing.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@
88
The following example illustrates the `spec.tracing` parameters for the `ServiceMeshControlPlane` object, and a description of the available parameters with appropriate values.
99

1010
.Example tracing parameters
11-
[source,yaml]
11+
[source,yaml, subs="attributes,verbatim"]
1212
----
1313
apiVersion: maistra.io/v2
1414
kind: ServiceMeshControlPlane
1515
metadata:
1616
name: basic
1717
spec:
18-
version: v2.1
18+
version: v{MaistraVersion}
1919
tracing:
2020
sampling: 100
2121
type: Jaeger

modules/ossm-deploying-jaeger.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ The streaming strategy requires an additional Red Hat subscription for AMQ Strea
3131
If you do not specify Jaeger configuration options, the `ServiceMeshControlPlane` resource will use the `allInOne` Jaeger deployment strategy by default. When using the default `allInOne` deployment strategy, set `spec.addons.jaeger.install.storage.type` to `Memory`. You can accept the defaults or specify additional configuration options under `install`.
3232

3333
.Control plane default Jaeger parameters (Memory)
34-
[source,yaml]
34+
[source,yaml, subs="attributes,verbatim"]
3535
----
3636
apiVersion: maistra.io/v2
3737
kind: ServiceMeshControlPlane
3838
metadata:
3939
name: basic
4040
spec:
41-
version: v2.1
41+
version: v{MaistraVersion}
4242
tracing:
4343
sampling: 10000
4444
type: Jaeger
@@ -56,14 +56,14 @@ spec:
5656
To use the default settings for the `production` deployment strategy, set `spec.addons.jaeger.install.storage.type` to `Elasticsearch` and specify additional configuration options under `install`. Note that the SMCP only supports configuring Elasticsearch resources and image name.
5757

5858
.Control plane default Jaeger parameters (Elasticsearch)
59-
[source,yaml]
59+
[source,yaml, subs="attributes"]
6060
----
6161
apiVersion: maistra.io/v2
6262
kind: ServiceMeshControlPlane
6363
metadata:
6464
name: basic
6565
spec:
66-
version: v2.1
66+
version: v{MaistraVersion}
6767
tracing:
6868
sampling: 10000
6969
type: Jaeger
@@ -91,14 +91,14 @@ The SMCP supports only minimal Elasticsearch parameters. To fully customize your
9191
Create and configure your Jaeger instance and set `spec.addons.jaeger.name` to the name of the Jaeger instance, in this example: `MyJaegerInstance`.
9292

9393
.Control plane with linked Jaeger production CR
94-
[source,yaml]
94+
[source,yaml, subs="attributes"]
9595
----
9696
apiVersion: maistra.io/v2
9797
kind: ServiceMeshControlPlane
9898
metadata:
9999
name: basic
100100
spec:
101-
version: v2.1
101+
version: v{MaistraVersion}
102102
tracing:
103103
sampling: 1000
104104
type: Jaeger
@@ -118,14 +118,14 @@ spec:
118118
To use the `streaming` deployment strategy, you create and configure your Jaeger instance first, then set `spec.addons.jaeger.name` to the name of the Jaeger instance, in this example: `MyJaegerInstance`.
119119

120120
.Control plane with linked Jaeger streaming CR
121-
[source,yaml]
121+
[source,yaml, subs="attributes"]
122122
----
123123
apiVersion: maistra.io/v2
124124
kind: ServiceMeshControlPlane
125125
metadata:
126126
name: basic
127127
spec:
128-
version: v2.1
128+
version: v{MaistraVersion}
129129
tracing:
130130
sampling: 1000
131131
type: Jaeger

modules/ossm-enabling-jaeger.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@
99
You enable distributed tracing by specifying a tracing type and a sampling rate in the `ServiceMeshControlPlane` resource.
1010

1111
.Default `all-in-one` Jaeger parameters
12-
[source,yaml]
12+
[source,yaml, subs="attributes,verbatim"]
1313
----
1414
apiVersion: maistra.io/v2
1515
kind: ServiceMeshControlPlane
1616
metadata:
1717
name: basic
1818
spec:
19-
version: v2.1
19+
version: v{MaistraVersion}
2020
tracing:
2121
sampling: 100
2222
type: Jaeger

modules/ossm-federation-config-smcp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ Before a mesh can be federated, you must configure the `ServiceMeshControlPlane`
1212
In the following example, the administrator for the `red-mesh` is configuring the SMCP for federation with both the `green-mesh` and the `blue-mesh`.
1313

1414
.Sample SMCP for red-mesh
15-
[source,yaml]
15+
[source,yaml, subs="attributes,verbatim"]
1616
----
1717
apiVersion: maistra.io/v2
1818
kind: ServiceMeshControlPlane
1919
metadata:
2020
name: red-mesh
2121
namespace: red-mesh-system
2222
spec:
23-
version: v2.1
23+
version: v{MaistraVersion}
2424
runtime:
2525
defaults:
2626
container:

modules/ossm-install-rosa.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ You must create a new namespace, for example `istio-system`, when installing {SM
2020
The default configuration in the `ServiceMeshControlPlane` file does not work on a ROSA cluster. You must modify the default SMCP and set `spec.security.identity.type=ThirdParty` when installing on Red Hat OpenShift Service on AWS.
2121

2222
.Example `ServiceMeshControlPlane` resource for ROSA
23-
[source,yaml]
23+
[source,yaml, subs="attributes,verbatim"]
2424
----
2525
apiVersion: maistra.io/v2
2626
kind: ServiceMeshControlPlane
2727
metadata:
2828
name: basic
2929
namespace: istio-system
3030
spec:
31-
version: v2.1
31+
version: v{MaistraVersion}
3232
security:
3333
identity:
3434
type: ThirdParty #required setting for ROSA

modules/ossm-recommended-resources.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,16 +25,16 @@ The settings in the following example are based on 1,000 services and 1,000 requ
2525
+
2626
.. Set the values for `spec.proxy.runtime.container.resources.requests.cpu` and `spec.proxy.runtime.container.resources.requests.memory` in your `ServiceMeshControlPlane` resource.
2727
+
28-
.Example version 2.1 ServiceMeshControlPlane
29-
[source,yaml]
28+
.Example version {MaistraVersion} ServiceMeshControlPlane
29+
[source,yaml, subs="attributes,verbatim"]
3030
----
3131
apiVersion: maistra.io/v2
3232
kind: ServiceMeshControlPlane
3333
metadata:
3434
name: basic
3535
namespace: istio-system
3636
spec:
37-
version: v2.1
37+
version: v{MaistraVersion}
3838
proxy:
3939
runtime:
4040
container:

0 commit comments

Comments
 (0)