Skip to content

Commit 83bd2dc

Browse files
authored
Merge pull request #67896 from mburke5678/service-mesh-fix-errors
Service Mesh docs fixes during ROSA review
2 parents 6446217 + a0e90ac commit 83bd2dc

22 files changed

+119
-49
lines changed

_topic_maps/_topic_map.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3804,7 +3804,7 @@ Topics:
38043804
File: ossm-about
38053805
- Name: Service Mesh 2.x release notes
38063806
File: servicemesh-release-notes
3807-
- Name: Service Mesh architecture
3807+
- Name: Understanding Service Mesh
38083808
File: ossm-architecture
38093809
- Name: Service Mesh deployment models
38103810
File: ossm-deployment-models

modules/distr-tracing-config-security-ossm-cli.adoc

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,11 @@ $ oc login https://<HOSTNAME>:6443
3131
$ oc project istio-system
3232
----
3333
+
34-
. Run the following command to edit the Jaeger custom resource file, where `jaeger.yaml` is the name of your Jaeger custom resource.
34+
. Run the following command to edit the Jaeger custom resource file:
3535
+
3636
[source,terminal]
3737
----
38-
$ oc edit -n tracing-system -f jaeger.yaml
38+
$ oc edit -n openshift-distributed-tracing -f jaeger.yaml
3939
----
4040
+
4141
. Edit the `Jaeger` custom resource file to add the `htpasswd` configuration as shown in the following example.
@@ -78,16 +78,9 @@ spec:
7878
readOnly: true
7979
----
8080
+
81-
. Run the following command to apply your changes, where <jaeger.yaml> is the name of your Jaeger custom resource.
82-
+
83-
[source,terminal]
84-
----
85-
$ oc apply -n tracing-system -f <jaeger.yaml>
86-
----
87-
+
8881
. Run the following command to watch the progress of the pod deployment:
8982
+
9083
[source,terminal]
9184
----
92-
$ oc get pods -n tracing-system -w
85+
$ oc get pods -n openshift-distributed-tracing
9386
----

modules/distr-tracing-config-security-ossm-web.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ You can modify the Jaeger resource to configure {JaegerShortName} security for u
1919

2020
. Log in to the {product-title} web console as a user with the `cluster-admin` role.
2121

22-
. Navigate to OperatorsInstalled Operators.
22+
. Navigate to *Operators* -> *Installed Operators*.
2323

2424
. Click the *Project* menu and select the project where your `ServiceMeshControlPlane` resource is deployed from the list, for example `istio-system`.
2525

@@ -69,6 +69,7 @@ spec:
6969
- mountPath: /etc/pki/ca-trust/extracted/pem/
7070
name: trusted-ca-bundle
7171
readOnly: true
72+
# ...
7273
----
7374
+
7475
. Click *Save*.

modules/distr-tracing-config-storage.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -696,9 +696,9 @@ spec:
696696

697697
.Prerequisites
698698

699-
* {product-title} 4.7
700-
* {logging-title} 5.2
701-
* The Elasticsearch node and the Jaeger instances must be deployed in the same namespace. For example, `tracing-system`.
699+
* The {SMProductName} Operator is installed.
700+
* The {logging-title} is installed with default configuration in your cluster.
701+
* The Elasticsearch node and the Jaeger instances must be deployed in the same namespace. For example, `tracing-system`.
702702

703703
You enable certificate management by setting `spec.storage.elasticsearch.useCertManagement` to `true` in the Jaeger custom resource.
704704

modules/ossm-add-project-member-roll-resource-cli.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="ossm-add-project-member-roll-resource-cli_{context}"]
77
= Adding or removing projects from the mesh using ServiceMeshMemberRoll resource with the CLI
88

9-
You can add one or more projects to the mesh using the `ServiceMeshMemberRoll` resource with the CLI. You can add any number of projects, but a project can only belong to *one* mesh.
9+
You can add one or more projects to the mesh using the `ServiceMeshMemberRoll` resource with the CLI. You can add any number of projects, but a project can only belong to one mesh.
1010

1111
The `ServiceMeshMemberRoll` resource is deleted when its corresponding `ServiceMeshControlPlane` resource is deleted.
1212

@@ -29,7 +29,7 @@ The `ServiceMeshMemberRoll` resource is deleted when its corresponding `ServiceM
2929
$ oc edit smmr -n <controlplane-namespace>
3030
----
3131

32-
. Modify the YAML to add or remove projects as members. You can add any number of projects, but a project can only belong to *one* `ServiceMeshMemberRoll` resource.
32+
. Modify the YAML to add or remove projects as members. You can add any number of projects, but a project can only belong to one `ServiceMeshMemberRoll` resource.
3333
+
3434
.Example servicemeshmemberroll-default.yaml
3535
[source,yaml]

modules/ossm-add-project-member-roll-resource-console.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="ossm-add-project-member-roll-recourse-console_{context}"]
77
= Adding or removing projects from the mesh using the ServiceMeshMemberRoll resource with the web console
88

9-
You can add or remove projects from the mesh using the `ServiceMeshMemberRoll` resource with the {product-title} web console. You can add any number of projects, but a project can only belong to *one* mesh.
9+
You can add or remove projects from the mesh using the `ServiceMeshMemberRoll` resource with the {product-title} web console. You can add any number of projects, but a project can only belong to one mesh.
1010

1111
The `ServiceMeshMemberRoll` resource is deleted when its corresponding `ServiceMeshControlPlane` resource is deleted.
1212

@@ -33,7 +33,7 @@ The `ServiceMeshMemberRoll` resource is deleted when its corresponding `ServiceM
3333

3434
. Click the YAML tab.
3535

36-
. Modify the YAML to add projects as members (or delete them to remove existing members). You can add any number of projects, but a project can only belong to *one* `ServiceMeshMemberRoll` resource.
36+
. Modify the YAML to add projects as members (or delete them to remove existing members). You can add any number of projects, but a project can only belong to one `ServiceMeshMemberRoll` resource.
3737
+
3838
.Example servicemeshmemberroll-default.yaml
3939
[source,yaml]

modules/ossm-adding-project-using-smm-resource-cli.adoc

Lines changed: 34 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,43 @@ spec:
4040
$ oc apply -f <file-name>
4141
----
4242

43-
. After creating the `ServiceMeshMember` resource, verify that the namespace is part of the mesh. Confirm the that the value `True` appears in the `READY` column when you run the following command:
43+
.Verification
44+
45+
* Verify that the namespace is part of the mesh by running the following command. Confirm the that the value `True` appears in the `READY` column.
4446
+
4547
[source,terminal]
4648
----
4749
$ oc get smm default -n my-application
4850
----
4951
+
50-
Alternatively, if you can access the `ServiceMeshMemberRoll` resource, you can also confirm that the `my-application` namespace is displayed in the `status.members` and `status.configuredMembers` fields of the `ServiceMeshMemberRoll` resource.
52+
.Example output
53+
[source,terminal]
54+
----
55+
NAME CONTROL PLANE READY AGE
56+
default istio-system/basic True 2m11s
57+
----
58+
59+
* Alternatively, view the `ServiceMeshMemberRoll` resource to confirm that the `my-application` namespace is displayed in the `status.members` and `status.configuredMembers` fields of the `ServiceMeshMemberRoll` resource.
60+
+
61+
[source,terminal]
62+
----
63+
$ oc describe smmr default -n istio-system
64+
----
65+
+
66+
.Example output
67+
[source,terminal]
68+
----
69+
Name: default
70+
Namespace: istio-system
71+
Labels: <none>
72+
# ...
73+
Status:
74+
# ...
75+
Configured Members:
76+
default
77+
my-application
78+
# ...
79+
Members:
80+
default
81+
my-application
82+
----

modules/ossm-adding-project-using-smm-resource-console.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,4 +38,12 @@ You can add one or more projects to the mesh using the `ServiceMeshMember` resou
3838

3939
. Click *Create*.
4040

41-
. Confirm the `ServiceMeshMember` resource was created, and that the project was added to the mesh. Click the resource name; for example, `default`. View the *Conditions* section shown at the end of the screen. Confirm that the `Status` of the `Reconciled` and `Ready` conditions is `True`. If the `Status` is `False`, see the `Reason` and `Message` columns for more information.
41+
.Verification
42+
43+
. Confirm the `ServiceMeshMember` resource was created and that the project was added to the mesh by using the following steps:
44+
45+
.. Click the resource name, for example, `default`.
46+
.. View the *Conditions* section shown at the end of the screen.
47+
.. Confirm that the `Status` of the `Reconciled` and `Ready` conditions is `True`.
48+
+
49+
If the `Status` is `False`, see the `Reason` and `Message` columns for more information.

modules/ossm-architecture.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ image::ossm-architecture.png[Service Mesh architecture image]
1212
At a high level, {SMProductName} consists of a data plane and a control plane
1313

1414
The *data plane* is a set of intelligent proxies, running alongside application containers in a pod, that intercept and control all inbound and outbound network communication between microservices in the service mesh.
15-
The data plane is implemented in such a way that it intercepts all inbound (ingress) and outbound (egress) network traffic. The Istio data plane is composed of Envoy containers running along side application containers in a pod. The Envoy container acts as a proxy, controlling all network communication into and out of the pod.
15+
The data plane is implemented in such a way that it intercepts all inbound (ingress) and outbound (egress) network traffic. The Istio data plane consists of Envoy containers running along side application containers in a pod. The Envoy container acts as a proxy, controlling all network communication into and out of the pod.
1616

1717
* *Envoy proxies* are the only Istio components that interact with data plane traffic. All incoming (ingress) and outgoing (egress) network traffic between services flows through the proxies. The Envoy proxy also collects all metrics related to services traffic within the mesh. Envoy proxies are deployed as sidecars, running in the same pod as services. Envoy proxies are also used to implement mesh gateways.
1818

modules/ossm-config-operator-infrastructure-node.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,14 @@ $ oc -n openshift-operators edit subscription <name> <1>
3737
+
3838
[source,yaml]
3939
----
40+
apiVersion: operators.coreos.com/v1alpha1
41+
kind: Subscription
42+
metadata:
43+
labels:
44+
operators.coreos.com/servicemeshoperator.openshift-operators: ""
45+
name: servicemeshoperator
46+
namespace: openshift-operators
47+
# ...
4048
spec:
4149
config:
4250
nodeSelector: <1>
@@ -50,4 +58,4 @@ spec:
5058
value: reserved
5159
----
5260
<1> Ensures that the operator pod is only scheduled on an infrastructure node.
53-
<2> Ensures that the pod is accepted by the infrastructure node.
61+
<2> Ensures that the pod is accepted by the infrastructure node.

0 commit comments

Comments
 (0)