Skip to content

Commit

Permalink
Merge branch 'main' into alpeb/grafana-authpolicy
Browse files Browse the repository at this point in the history
  • Loading branch information
alpeb authored Aug 17, 2023
2 parents a7c444c + b20ce42 commit 9c1bf04
Show file tree
Hide file tree
Showing 217 changed files with 1,350 additions and 6,802 deletions.
45 changes: 0 additions & 45 deletions linkerd.io/.forestry/front_matter/templates/blog-detail-page.yml

This file was deleted.

23 changes: 0 additions & 23 deletions linkerd.io/.forestry/front_matter/templates/dashboard.yml

This file was deleted.

27 changes: 0 additions & 27 deletions linkerd.io/.forestry/front_matter/templates/hero.yml

This file was deleted.

15 changes: 0 additions & 15 deletions linkerd.io/.forestry/front_matter/templates/related-content.yml

This file was deleted.

47 changes: 0 additions & 47 deletions linkerd.io/.forestry/front_matter/templates/schema-faq.yml

This file was deleted.

62 changes: 0 additions & 62 deletions linkerd.io/.forestry/front_matter/templates/schema-video.yml

This file was deleted.

61 changes: 0 additions & 61 deletions linkerd.io/.forestry/settings.yml

This file was deleted.

1 change: 0 additions & 1 deletion linkerd.io/.forestry/snippets/asciinema.snippet

This file was deleted.

1 change: 0 additions & 1 deletion linkerd.io/.forestry/snippets/twitter.snippet

This file was deleted.

1 change: 0 additions & 1 deletion linkerd.io/.forestry/snippets/youtube.snippet

This file was deleted.

6 changes: 4 additions & 2 deletions linkerd.io/content/2-edge/tasks/distributed-tracing.md
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,8 @@ extension specifying the service exposing the Jaeger UI. By default, this would
be something like this:

```bash
linkerd viz install --set jaegerUrl=jaeger.linkerd-jaeger:16686
linkerd viz install --set jaegerUrl=jaeger.linkerd-jaeger:16686 \
| kubectl apply -f -
```

## Cleanup
Expand Down Expand Up @@ -186,7 +187,8 @@ collector:
exporters:
jaeger:
endpoint: my-jaeger-collector.my-jaeger-ns:14250
insecure: true
tls:
insecure: true
service:
extensions: [health_check]
pipelines:
Expand Down
2 changes: 1 addition & 1 deletion linkerd.io/content/2-edge/tasks/linkerd-smi.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ linkerd inject https://raw.githubusercontent.com/linkerd/linkerd2/main/test/inte
```

This installs a simple client, and two server deployments.
One of the server deployments i.e `faling-svc` always returns a 500 error,
One of the server deployments i.e `failing-svc` always returns a 500 error,
and the other one i.e `backend-svc` always returns a 200.

```bash
Expand Down
2 changes: 1 addition & 1 deletion linkerd.io/content/2.10/tasks/linkerd-smi.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ linkerd inject https://raw.githubusercontent.com/linkerd/linkerd2/main/test/inte
```

This installs a simple client, and two server deployments.
One of the server deployments i.e `faling-svc` always returns a 500 error,
One of the server deployments i.e `failing-svc` always returns a 500 error,
and the other one i.e `backend-svc` always returns a 200.

```bash
Expand Down
2 changes: 1 addition & 1 deletion linkerd.io/content/2.11/tasks/linkerd-smi.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ linkerd inject https://raw.githubusercontent.com/linkerd/linkerd2/main/test/inte
```

This installs a simple client, and two server deployments.
One of the server deployments i.e `faling-svc` always returns a 500 error,
One of the server deployments i.e `failing-svc` always returns a 500 error,
and the other one i.e `backend-svc` always returns a 200.

```bash
Expand Down
2 changes: 1 addition & 1 deletion linkerd.io/content/2.12/tasks/linkerd-smi.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ linkerd inject https://raw.githubusercontent.com/linkerd/linkerd2/main/test/inte
```

This installs a simple client, and two server deployments.
One of the server deployments i.e `faling-svc` always returns a 500 error,
One of the server deployments i.e `failing-svc` always returns a 500 error,
and the other one i.e `backend-svc` always returns a 200.

```bash
Expand Down
8 changes: 4 additions & 4 deletions linkerd.io/content/2.13/features/cni.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,10 @@ every meshed pod to its proxy. (See the
without the application being aware.

By default, this rewiring is done with an [Init
Container](../../reference/architecture/#linkerd-init-container) that uses iptables
to install routing rules for the pod, at pod startup time. However, this requires
the `CAP_NET_ADMIN` capability; and in some clusters, this capability is not
granted to pods.
Container](../../reference/architecture/#linkerd-init-container) that uses
iptables to install routing rules for the pod, at pod startup time. However,
this requires the `CAP_NET_ADMIN` capability; and in some clusters, this
capability is not granted to pods.

To handle this, Linkerd can optionally run these iptables rules in a [CNI
plugin](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/)
Expand Down
26 changes: 13 additions & 13 deletions linkerd.io/content/2.13/features/http-grpc.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,18 +4,18 @@ description = "Linkerd will automatically enable advanced features (including me
weight = 1
+++

Linkerd can proxy all TCP connections, and will automatically enable advanced
features (including metrics, load balancing, retries, and more) for HTTP,
HTTP/2, and gRPC connections. (See
[TCP Proxying and Protocol Detection](../protocol-detection/) for details of how
this detection happens).
Linkerd can proxy all TCP connections. For HTTP connections (including HTTP/1.0,
HTTP/1.1, HTTP/2, and gRPC connections), it will automatically enable advanced
L7 features including [request-level metrics](../telemetry/), [latency-aware
load balancing](../load-balancing/), [retries](../retries-and-timeouts/), and
more.

## Notes
(See [TCP Proxying and Protocol Detection](../protocol-detection/) for details of
how this detection happens automatically, and how it can sometimes fail.)

* gRPC applications that use [grpc-go][grpc-go] must use version 1.3 or later due
to a [bug](https://github.com/grpc/grpc-go/issues/1120) in earlier versions.
* gRPC applications that use [@grpc/grpc-js][grpc-js] must use version 1.1.0 or later
due to a [bug](https://github.com/grpc/grpc-node/issues/1475) in earlier versions.

[grpc-go]: https://github.com/grpc/grpc-go
[grpc-js]: https://github.com/grpc/grpc-node/tree/master/packages/grpc-js
Note that while Linkerd does [zero-config mutual TLS](../automatic-mtls/), it
cannot decrypt TLS connections initiated by the outside world. For example, if
you have a TLS connection from outside the cluster, or if your application does
HTTP/2 plus TLS, Linkerd will treat these connections as raw TCP streams. To
take advantage of Linkerd's full array of L7 features, communication between
meshed pods must be TLS'd by Linkerd, not by the application itself.
Loading

0 comments on commit 9c1bf04

Please sign in to comment.