You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-federation-config-smcp.adoc
+11-11Lines changed: 11 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -200,15 +200,15 @@ To avoid naming conflicts between meshes, you must create separate egress and in
200
200
|spec:
201
201
gateways:
202
202
additionalEgress:
203
-
<egressName>:
203
+
<egress_name>:
204
204
|Define an additional egress gateway for _each_ mesh peer in the federation.
205
205
|
206
206
|
207
207
208
208
|spec:
209
209
gateways:
210
210
additionalEgress:
211
-
<egressName>:
211
+
<egress_name>:
212
212
enabled:
213
213
|This parameter enables or disables the federation egress.
214
214
|`true`/`false`
@@ -217,7 +217,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
217
217
|spec:
218
218
gateways:
219
219
additionalEgress:
220
-
<egressName>:
220
+
<egress_name>:
221
221
requestedNetworkView:
222
222
|Networks associated with exported services.
223
223
|Set to the value of `spec.cluster.network` in the SMCP for the mesh, otherwise use <ServiceMeshPeer-name>-network. For example, if the `ServiceMeshPeer` resource for that mesh is named `west`, then the network would be named `west-network`.
@@ -226,7 +226,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
226
226
|spec:
227
227
gateways:
228
228
additionalEgress:
229
-
<egressName>:
229
+
<egress_name>:
230
230
service:
231
231
metadata:
232
232
labels:
@@ -238,7 +238,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
238
238
|spec:
239
239
gateways:
240
240
additionalEgress:
241
-
<egressName>:
241
+
<egress_name>:
242
242
service:
243
243
ports:
244
244
|Used to specify the `port:` and `name:` used for TLS and service discovery. Federation traffic consists of raw encrypted TCP for service traffic.
@@ -255,7 +255,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
255
255
|spec:
256
256
gateways:
257
257
additionalIgress:
258
-
<ingressName>:
258
+
<ingress_name>:
259
259
enabled:
260
260
|This parameter enables or disables the federation ingress.
261
261
|`true`/`false`
@@ -265,7 +265,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
265
265
|spec:
266
266
gateways:
267
267
additionalIngress:
268
-
<ingressName>:
268
+
<ingress_name>:
269
269
service:
270
270
type:
271
271
|The ingress gateway service must be exposed through a load balancer that operates at Layer 4 of the OSI model and is publicly available.
@@ -275,7 +275,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
275
275
|spec:
276
276
gateways:
277
277
additionalIngress:
278
-
<ingressName>:
278
+
<ingress_name>:
279
279
service:
280
280
type:
281
281
|If the cluster does not support `LoadBalancer` services, the ingress gateway service can be exposed through a `NodePort` service.
@@ -285,7 +285,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
285
285
|spec:
286
286
gateways:
287
287
additionalIngress:
288
-
<ingressName>:
288
+
<ingress_name>:
289
289
service:
290
290
metadata:
291
291
labels:
@@ -297,7 +297,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
297
297
|spec:
298
298
gateways:
299
299
additionalIngress:
300
-
<ingressName>:
300
+
<ingress_name>:
301
301
service:
302
302
ports:
303
303
|Used to specify the `port:` and `name:` used for TLS and service discovery. Federation traffic consists of raw encrypted TCP for service traffic. Federation traffic consists of HTTPS for discovery.
@@ -307,7 +307,7 @@ To avoid naming conflicts between meshes, you must create separate egress and in
0 commit comments