@@ -181,7 +181,7 @@ <h2 id="Policy">Policy</h2>
181
181
name: mTLS-enable
182
182
namespace: frod
183
183
spec:
184
- match :
184
+ destinations :
185
185
peers:
186
186
- mtls: {}
187
187
</ code > </ pre >
@@ -194,7 +194,7 @@ <h2 id="Policy">Policy</h2>
194
194
name: mTLS-enable
195
195
namespace: frod
196
196
spec:
197
- match :
197
+ destinations :
198
198
- name: productpage
199
199
port:
200
200
number: 9000
@@ -221,7 +221,7 @@ <h2 id="Policy">Policy</h2>
221
221
< tbody >
222
222
< tr id ="Policy.destinations ">
223
223
< td > < code > destinations</ code > </ td >
224
- < td > < code > < a href ="#istio.routing.v1alpha2 .Destination "> istio.routing.v1alpha2 .Destination[]</ a > </ code > </ td >
224
+ < td > < code > < a href ="#istio.networking.v1alpha3 .Destination "> istio.networking.v1alpha3 .Destination[]</ a > </ code > </ td >
225
225
< td >
226
226
< p > List of destinations (workloads) that the policy should be applied on.
227
227
If empty, policy will be used on all destinations in the same namespace.</ p >
@@ -252,7 +252,7 @@ <h2 id="Policy">Policy</h2>
252
252
</ tbody >
253
253
</ table >
254
254
</ section >
255
- < h2 id ="istio.routing.v1alpha2 .Destination "> istio.routing.v1alpha2 .Destination</ h2 >
255
+ < h2 id ="istio.networking.v1alpha3 .Destination "> istio.networking.v1alpha3 .Destination</ h2 >
256
256
< section >
257
257
< p > Destination indicates the network addressable service to which the
258
258
request/connection will be sent after processing a routing rule. The
@@ -280,14 +280,14 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
280
280
for details.</ p > </ li >
281
281
</ ol >
282
282
283
- < p > For example, the following rule routes all traffic by default to pods of
284
- reviews service with label “version: v1” on a subset named v1 , and some
283
+ < p > The following example routes all traffic by default to pods of the
284
+ reviews service with label “version: v1” (i.e., subset v1) , and some
285
285
to subset v2, in a kubernetes environment.</ p >
286
286
287
- < pre > < code > apiVersion: config .istio.io/v1alpha2
288
- kind: RouteRule
287
+ < pre > < code > apiVersion: networking .istio.io/v1alpha3
288
+ kind: VirtualService
289
289
metadata:
290
- name: my-rule
290
+ name: reviews-route
291
291
spec:
292
292
hosts:
293
293
- reviews # namespace is same as the client/caller's namespace
@@ -311,10 +311,10 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
311
311
312
312
< p > And the associated DestinationRule</ p >
313
313
314
- < pre > < code > apiVersion: config .istio.io/v1alpha2
314
+ < pre > < code > apiVersion: networking .istio.io/v1alpha3
315
315
kind: DestinationRule
316
316
metadata:
317
- name: my -destination-rule
317
+ name: reviews -destination
318
318
spec:
319
319
name: reviews
320
320
subsets:
@@ -326,14 +326,14 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
326
326
version: v2
327
327
</ code > </ pre >
328
328
329
- < p > The following rule sets a timeout of 5s for all calls to
329
+ < p > The following VirtualService sets a timeout of 5s for all calls to
330
330
productpage.prod service. Notice that there are no subsets defined in
331
331
this rule. Istio will fetch all instances of productpage.prod service
332
332
from the service registry and populate the sidecar’s load balancing
333
333
pool.</ p >
334
334
335
- < pre > < code > apiVersion: config .istio.io/v1alpha2
336
- kind: RouteRule
335
+ < pre > < code > apiVersion: networking .istio.io/v1alpha3
336
+ kind: VirtualService
337
337
metadata:
338
338
name: my-productpage-rule
339
339
spec:
@@ -346,11 +346,11 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
346
346
name: productpage.prod
347
347
</ code > </ pre >
348
348
349
- < p > The following rule sets a timeout of 5s for all calls to the external
349
+ < p > The following sets a timeout of 5s for all calls to the external
350
350
service wikipedia.org, as there is no internal service of that name.</ p >
351
351
352
- < pre > < code > apiVersion: config .istio.io/v1alpha2
353
- kind: RouteRule
352
+ < pre > < code > apiVersion: networking .istio.io/v1alpha3
353
+ kind: VirtualService
354
354
metadata:
355
355
name: my-wiki-rule
356
356
spec:
@@ -372,7 +372,7 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
372
372
</ tr >
373
373
</ thead >
374
374
< tbody >
375
- < tr id ="istio.routing.v1alpha2 .Destination.name ">
375
+ < tr id ="istio.networking.v1alpha3 .Destination.name ">
376
376
< td > < code > name</ code > </ td >
377
377
< td > < code > string</ code > </ td >
378
378
< td >
@@ -381,10 +381,10 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
381
381
address.</ p >
382
382
383
383
< p > If short names are used, the FQDN of the service will be resolved in a
384
- platform specific manner. For example in Kubernetes, when a rule with
384
+ platform specific manner. For example in Kubernetes, when a route with
385
385
a short name “reviews” in the destination is applied to a client in
386
386
the “bookinfo” namespace, the final destination is resolved to
387
- reviews.bookinfo.svc.cluster.local. If the rule refers to the
387
+ reviews.bookinfo.svc.cluster.local. If the route refers to the
388
388
destination as “reviews.sales”, the resolution process first looks for
389
389
a “reviews” service in the “sales” namespace. In both cases, the
390
390
sidecar will route to the IP addresses of the pods constituting the
@@ -395,19 +395,19 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
395
395
396
396
</ td >
397
397
</ tr >
398
- < tr id ="istio.routing.v1alpha2 .Destination.subset ">
398
+ < tr id ="istio.networking.v1alpha3 .Destination.subset ">
399
399
< td > < code > subset</ code > </ td >
400
400
< td > < code > string</ code > </ td >
401
401
< td >
402
402
< p > The name of a subset within the service. Applicable only to services
403
- within the mesh. The subset must be defined in the corresponding
403
+ within the mesh. The subset must be defined in a corresponding
404
404
DestinationRule.</ p >
405
405
406
406
</ td >
407
407
</ tr >
408
- < tr id ="istio.routing.v1alpha2 .Destination.port ">
408
+ < tr id ="istio.networking.v1alpha3 .Destination.port ">
409
409
< td > < code > port</ code > </ td >
410
- < td > < code > < a href ="#istio.routing.v1alpha2 .PortSelector "> istio.routing.v1alpha2 .PortSelector</ a > </ code > </ td >
410
+ < td > < code > < a href ="#istio.networking.v1alpha3 .PortSelector "> istio.networking.v1alpha3 .PortSelector</ a > </ code > </ td >
411
411
< td >
412
412
< p > Specifies the port on the destination. Many services only expose a
413
413
single port or label ports with the protocols they support, in these
0 commit comments