You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-config-enabling-controlplane.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,12 @@
7
7
8
8
Secure connections are always used when proxies communicate with the control plane regardless of the `spec.security.controlPlane.mtls` setting. If Mixer telemetry or policies are part of your configuration, set `spec.security.controlPlane.mtls` to `true` in your `ServiceMeshControlPlane` resource to enable strict mTLS.
Copy file name to clipboardExpand all lines: modules/ossm-config-sec-mtls-mesh.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,12 +8,12 @@
8
8
9
9
If your workloads do not communicate with outside services, you can quickly enable mTLS across your mesh without communication interruptions. You can enable it by setting `spec.security.dataPlane.mtls` to `true` in the `ServiceMeshControlPlane` resource. The Operator creates the required resources.
Copy file name to clipboardExpand all lines: modules/ossm-control-plane-cli.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,16 +31,16 @@ $ oc new-project istio-system
31
31
+
32
32
. Create a `ServiceMeshControlPlane` file named `istio-installation.yaml` using the following example. The version of the control plane determines the features available regardless of the version of the Operator.
33
33
+
34
-
.Example version 2.1 istio-installation.yaml
35
-
[source,yaml]
34
+
.Example version {MaistraVersion} istio-installation.yaml
Copy file name to clipboardExpand all lines: modules/ossm-cr-tracing.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,14 +8,14 @@
8
8
The following example illustrates the `spec.tracing` parameters for the `ServiceMeshControlPlane` object, and a description of the available parameters with appropriate values.
Copy file name to clipboardExpand all lines: modules/ossm-deploying-jaeger.adoc
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,14 +31,14 @@ The streaming strategy requires an additional Red Hat subscription for AMQ Strea
31
31
If you do not specify Jaeger configuration options, the `ServiceMeshControlPlane` resource will use the `allInOne` Jaeger deployment strategy by default. When using the default `allInOne` deployment strategy, set `spec.addons.jaeger.install.storage.type` to `Memory`. You can accept the defaults or specify additional configuration options under `install`.
32
32
33
33
.Control plane default Jaeger parameters (Memory)
34
-
[source,yaml]
34
+
[source,yaml, subs="attributes,verbatim"]
35
35
----
36
36
apiVersion: maistra.io/v2
37
37
kind: ServiceMeshControlPlane
38
38
metadata:
39
39
name: basic
40
40
spec:
41
-
version: v2.1
41
+
version: v{MaistraVersion}
42
42
tracing:
43
43
sampling: 10000
44
44
type: Jaeger
@@ -56,14 +56,14 @@ spec:
56
56
To use the default settings for the `production` deployment strategy, set `spec.addons.jaeger.install.storage.type` to `Elasticsearch` and specify additional configuration options under `install`. Note that the SMCP only supports configuring Elasticsearch resources and image name.
@@ -91,14 +91,14 @@ The SMCP supports only minimal Elasticsearch parameters. To fully customize your
91
91
Create and configure your Jaeger instance and set `spec.addons.jaeger.name` to the name of the Jaeger instance, in this example: `MyJaegerInstance`.
92
92
93
93
.Control plane with linked Jaeger production CR
94
-
[source,yaml]
94
+
[source,yaml, subs="attributes"]
95
95
----
96
96
apiVersion: maistra.io/v2
97
97
kind: ServiceMeshControlPlane
98
98
metadata:
99
99
name: basic
100
100
spec:
101
-
version: v2.1
101
+
version: v{MaistraVersion}
102
102
tracing:
103
103
sampling: 1000
104
104
type: Jaeger
@@ -118,14 +118,14 @@ spec:
118
118
To use the `streaming` deployment strategy, you create and configure your Jaeger instance first, then set `spec.addons.jaeger.name` to the name of the Jaeger instance, in this example: `MyJaegerInstance`.
Copy file name to clipboardExpand all lines: modules/ossm-install-rosa.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,15 +20,15 @@ You must create a new namespace, for example `istio-system`, when installing {SM
20
20
The default configuration in the `ServiceMeshControlPlane` file does not work on a ROSA cluster. You must modify the default SMCP and set `spec.security.identity.type=ThirdParty` when installing on Red Hat OpenShift Service on AWS.
21
21
22
22
.Example `ServiceMeshControlPlane` resource for ROSA
Copy file name to clipboardExpand all lines: modules/ossm-recommended-resources.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,16 +25,16 @@ The settings in the following example are based on 1,000 services and 1,000 requ
25
25
+
26
26
.. Set the values for `spec.proxy.runtime.container.resources.requests.cpu` and `spec.proxy.runtime.container.resources.requests.memory` in your `ServiceMeshControlPlane` resource.
27
27
+
28
-
.Example version 2.1 ServiceMeshControlPlane
29
-
[source,yaml]
28
+
.Example version {MaistraVersion} ServiceMeshControlPlane
0 commit comments