diff --git a/networking/v1alpha3/gateway.pb.go b/networking/v1alpha3/gateway.pb.go index 67268e2d5a1..26114de0354 100644 --- a/networking/v1alpha3/gateway.pb.go +++ b/networking/v1alpha3/gateway.pb.go @@ -37,6 +37,12 @@ // on these ports, it is the responsibility of the user to ensure that // external traffic to these ports are allowed into the mesh. // +// Ports 9443 and 2379 must exist on the ingress-gateway, `my-gateway-controller` in the example below. +// By default only ports 80 and 443 (http) are configured. +// The available ports are shown in the Service for the ingress-gateway, in the istio-system namespace. +// If a port requested by a `Gateway` resource does not exist on the ingress-gateway, +// `istioctl analyze` will report "The gateway refers to a port that is not exposed on the workload". +// // {{}} // {{}} // ```yaml @@ -149,11 +155,14 @@ // {{}} // {{}} // -// The Gateway specification above describes the L4-L6 properties of a load -// balancer. A `VirtualService` can then be bound to a gateway to control +// The `Gateway` specification above describes the L4-L6 properties of a load +// balancer. A `VirtualService` can then be bound to a `Gateway` to control // the forwarding of traffic arriving at a particular host or gateway port. // -// For example, the following VirtualService splits traffic for +// For a non-http `Gateway` port, you must create the `VirtualService` resource first, then the `Gateway`. +// If you attempt to create the `Gateway` first, it will fail. istiod will log "must have more than 0 chains in listener". +// +// The following VirtualService splits traffic for // `https://uk.bookinfo.com/reviews`, `https://eu.bookinfo.com/reviews`, // `http://uk.bookinfo.com:9080/reviews`, // `http://eu.bookinfo.com:9080/reviews` into two versions (prod and qa) of diff --git a/networking/v1alpha3/gateway.pb.html b/networking/v1alpha3/gateway.pb.html index 9736f865768..8587d280d24 100644 --- a/networking/v1alpha3/gateway.pb.html +++ b/networking/v1alpha3/gateway.pb.html @@ -18,6 +18,11 @@ applied to the proxy running on a pod with labels app: my-gateway-controller. While Istio will configure the proxy to listen on these ports, it is the responsibility of the user to ensure that external traffic to these ports are allowed into the mesh.

+

Ports 9443 and 2379 must exist on the ingress-gateway, my-gateway-controller in the example below. +By default only ports 80 and 443 (http) are configured. +The available ports are shown in the Service for the ingress-gateway, in the istio-system namespace. +If a port requested by a Gateway resource does not exist on the ingress-gateway, +istioctl analyze will report “The gateway refers to a port that is not exposed on the workload”.

{{}} {{}}

apiVersion: networking.istio.io/v1alpha3
@@ -126,10 +131,12 @@
 

{{}} {{}}

-

The Gateway specification above describes the L4-L6 properties of a load -balancer. A VirtualService can then be bound to a gateway to control +

The Gateway specification above describes the L4-L6 properties of a load +balancer. A VirtualService can then be bound to a Gateway to control the forwarding of traffic arriving at a particular host or gateway port.

-

For example, the following VirtualService splits traffic for +

For a non-http Gateway port, you must create the VirtualService resource first, then the Gateway. +If you attempt to create the Gateway first, it will fail. istiod will log “must have more than 0 chains in listener”.

+

The following VirtualService splits traffic for https://uk.bookinfo.com/reviews, https://eu.bookinfo.com/reviews, http://uk.bookinfo.com:9080/reviews, http://eu.bookinfo.com:9080/reviews into two versions (prod and qa) of diff --git a/networking/v1alpha3/gateway.proto b/networking/v1alpha3/gateway.proto index 86f81006270..88abc617aee 100644 --- a/networking/v1alpha3/gateway.proto +++ b/networking/v1alpha3/gateway.proto @@ -35,6 +35,12 @@ import "google/api/field_behavior.proto"; // on these ports, it is the responsibility of the user to ensure that // external traffic to these ports are allowed into the mesh. // +// Ports 9443 and 2379 must exist on the ingress-gateway, `my-gateway-controller` in the example below. +// By default only ports 80 and 443 (http) are configured. +// The available ports are shown in the Service for the ingress-gateway, in the istio-system namespace. +// If a port requested by a `Gateway` resource does not exist on the ingress-gateway, +// `istioctl analyze` will report "The gateway refers to a port that is not exposed on the workload". +// // {{}} // {{}} // ```yaml @@ -147,11 +153,14 @@ import "google/api/field_behavior.proto"; // {{}} // {{}} // -// The Gateway specification above describes the L4-L6 properties of a load -// balancer. A `VirtualService` can then be bound to a gateway to control +// The `Gateway` specification above describes the L4-L6 properties of a load +// balancer. A `VirtualService` can then be bound to a `Gateway` to control // the forwarding of traffic arriving at a particular host or gateway port. // -// For example, the following VirtualService splits traffic for +// For a non-http `Gateway` port, you must create the `VirtualService` resource first, then the `Gateway`. +// If you attempt to create the `Gateway` first, it will fail. istiod will log "must have more than 0 chains in listener". +// +// The following VirtualService splits traffic for // `https://uk.bookinfo.com/reviews`, `https://eu.bookinfo.com/reviews`, // `http://uk.bookinfo.com:9080/reviews`, // `http://eu.bookinfo.com:9080/reviews` into two versions (prod and qa) of diff --git a/networking/v1beta1/gateway.pb.go b/networking/v1beta1/gateway.pb.go index 649715af0da..b24c276a7e3 100644 --- a/networking/v1beta1/gateway.pb.go +++ b/networking/v1beta1/gateway.pb.go @@ -38,6 +38,12 @@ // on these ports, it is the responsibility of the user to ensure that // external traffic to these ports are allowed into the mesh. // +// Ports 9443 and 2379 must exist on the ingress-gateway, `my-gateway-controller` in the example below. +// By default only ports 80 and 443 (http) are configured. +// The available ports are shown in the Service for the ingress-gateway, in the istio-system namespace. +// If a port requested by a `Gateway` resource does not exist on the ingress-gateway, +// `istioctl analyze` will report "The gateway refers to a port that is not exposed on the workload". +// // {{}} // {{}} // ```yaml @@ -150,11 +156,14 @@ // {{}} // {{}} // -// The Gateway specification above describes the L4-L6 properties of a load -// balancer. A `VirtualService` can then be bound to a gateway to control +// The `Gateway` specification above describes the L4-L6 properties of a load +// balancer. A `VirtualService` can then be bound to a `Gateway` to control // the forwarding of traffic arriving at a particular host or gateway port. // -// For example, the following VirtualService splits traffic for +// For a non-http `Gateway` port, you must create the `VirtualService` resource first, then the `Gateway`. +// If you attempt to create the `Gateway` first, it will fail. istiod will log "must have more than 0 chains in listener". +// +// The following VirtualService splits traffic for // `https://uk.bookinfo.com/reviews`, `https://eu.bookinfo.com/reviews`, // `http://uk.bookinfo.com:9080/reviews`, // `http://eu.bookinfo.com:9080/reviews` into two versions (prod and qa) of diff --git a/networking/v1beta1/gateway.proto b/networking/v1beta1/gateway.proto index 54a919f4d4c..e4131e84b0c 100644 --- a/networking/v1beta1/gateway.proto +++ b/networking/v1beta1/gateway.proto @@ -36,6 +36,12 @@ import "google/api/field_behavior.proto"; // on these ports, it is the responsibility of the user to ensure that // external traffic to these ports are allowed into the mesh. // +// Ports 9443 and 2379 must exist on the ingress-gateway, `my-gateway-controller` in the example below. +// By default only ports 80 and 443 (http) are configured. +// The available ports are shown in the Service for the ingress-gateway, in the istio-system namespace. +// If a port requested by a `Gateway` resource does not exist on the ingress-gateway, +// `istioctl analyze` will report "The gateway refers to a port that is not exposed on the workload". +// // {{}} // {{}} // ```yaml @@ -148,11 +154,14 @@ import "google/api/field_behavior.proto"; // {{}} // {{}} // -// The Gateway specification above describes the L4-L6 properties of a load -// balancer. A `VirtualService` can then be bound to a gateway to control +// The `Gateway` specification above describes the L4-L6 properties of a load +// balancer. A `VirtualService` can then be bound to a `Gateway` to control // the forwarding of traffic arriving at a particular host or gateway port. // -// For example, the following VirtualService splits traffic for +// For a non-http `Gateway` port, you must create the `VirtualService` resource first, then the `Gateway`. +// If you attempt to create the `Gateway` first, it will fail. istiod will log "must have more than 0 chains in listener". +// +// The following VirtualService splits traffic for // `https://uk.bookinfo.com/reviews`, `https://eu.bookinfo.com/reviews`, // `http://uk.bookinfo.com:9080/reviews`, // `http://eu.bookinfo.com:9080/reviews` into two versions (prod and qa) of