Skip to content

Commit 2226973

Browse files
authored
Merge pull request #4 from ppeble/emissary-ingress-38
Update 3.8 docs to use only Emissary instead of Emissary-ingress
2 parents 3f877cd + 82922fe commit 2226973

39 files changed

+358
-358
lines changed

content/en/docs/3.8/_index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ simple_list: true
1010
weight: -380 # Weight for doc version vX.Y should be -XY0
1111
---
1212

13-
These docs cover everything from setting up and running Emissary-ingress to its operation and usage.
13+
These docs cover everything from setting up and running Emissary to its operation and usage.

content/en/docs/3.8/about/alternatives.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Alternatives"
33
---
44

5-
Alternatives to Emissary-ingress fall into three basic categories:
5+
Alternatives to Emissary fall into three basic categories:
66

77
* Hosted API gateways, such as the [Amazon API gateway](https://aws.amazon.com/api-gateway/).
88
* Traditional API gateways, such as [Kong](https://konghq.org/).
@@ -14,8 +14,8 @@ Both hosted API gateways and traditional API gateways are:
1414
* Not Kubernetes-native. They're typically configured using REST APIs, making it challenging to adopt cloud-native patterns such as GitOps and declarative configuration.
1515
* [Designed for API management, rather than designed for microservices](../../topics/concepts/microservices-api-gateways).
1616

17-
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary-ingress uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
17+
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
1818

1919
## Istio
2020

21-
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary-ingress with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
21+
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).

content/en/docs/3.8/about/changes-2.x.md

+27-27
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: Major Changes in Emissary-ingress 2.X
2+
title: Major Changes in Emissary 2.X
33
---
44

5-
The 2.X family introduces a number of changes to allow Emissary-ingress
5+
The 2.X family introduces a number of changes to allow Emissary
66
to more gracefully handle larger installations, reduce global configuration to
77
better handle multitenant or multiorganizational installations, reduce memory
88
footprint, and improve performance. We welcome feedback!! Join us on
99
[Slack](http://a8r.io/slack) and let us know what you think.
1010

11-
While Emissary-ingress 2 is functionally compatible with Emissary-ingress 1.14, note
11+
While Emissary 2 is functionally compatible with Emissary 1.14, note
1212
that this is a **major version change** and there are important differences between
13-
Emissary-ingress 1.X and Emissary-ingress $version$. For details, read on.
13+
Emissary 1.X and Emissary $version$. For details, read on.
1414

1515
## 1. Configuration API Version `getambassador.io/v3alpha1`
1616

17-
Emissary-ingress 2.0 introduced API version `getambassador.io/v3alpha1` to allow
17+
Emissary 2.0 introduced API version `getambassador.io/v3alpha1` to allow
1818
certain changes in configuration resources that are not backwards compatible with
19-
Emissary-ingress 1.X. The most notable example of change is the addition of the
19+
Emissary 1.X. The most notable example of change is the addition of the
2020
**mandatory** `Listener` resource; however, there are important changes
2121
in `Host` and `Mapping` as well.
2222

2323
<Alert severity="info">
24-
Emissary-ingress 2.X supports only API versions <code>getambassador.io/v2</code>
24+
Emissary 2.X supports only API versions <code>getambassador.io/v2</code>
2525
and <code>getambassador.io/v3alpha1</code>. If you are using any resources with
2626
older API versions, you will need to upgrade them.
2727
</Alert>
@@ -46,15 +46,15 @@ either a string or a list of strings is not allowed. Several such elements appea
4646

4747
## 2. `Listener`s, `Host`s, and `Mapping`s
4848

49-
Emissary-ingress 2.0 introduced the new **mandatory** `Listener` CRD, and made some changes
49+
Emissary 2.0 introduced the new **mandatory** `Listener` CRD, and made some changes
5050
to the `Host` and `Mapping` resources.
5151

5252
### The `Listener` CRD
5353

54-
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary-ingress should listen for requests from the network, and which `Host` definitions should be used to process those requests.
54+
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary should listen for requests from the network, and which `Host` definitions should be used to process those requests.
5555

56-
**Note that `Listener`s are never created by Emissary-ingress, and must be defined by the user.** If you do not
57-
define any `Listener`s, Emissary-ingress will not listen anywhere for connections, and therefore won't do
56+
**Note that `Listener`s are never created by Emissary, and must be defined by the user.** If you do not
57+
define any `Listener`s, Emissary will not listen anywhere for connections, and therefore won't do
5858
anything useful. It will log a `WARNING` to this effect.
5959

6060
A `Listener` specifically defines
@@ -81,7 +81,7 @@ spec:
8181
from: ALL
8282
```
8383
84-
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary-ingress.
84+
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary.
8585

8686
Note also that there is no limit on how many `Listener`s may be created, and as such no limit on the number of ports to which a `Host` may be associated.
8787

@@ -92,11 +92,11 @@ Note also that there is no limit on how many `Listener`s may be created, and as
9292

9393
### Wildcard `Host`s No Longer Created
9494

95-
In Emissary-ingress 1.X, Emissary-ingress would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96-
Emissary-ingress 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
95+
In Emissary 1.X, Emissary would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96+
Emissary 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
9797
a `Host` with a hostname of `"*"`.
9898

99-
Of particular note is that Emissary-ingress **will not** respond to queries to an IP address unless a wildcard
99+
Of particular note is that Emissary **will not** respond to queries to an IP address unless a wildcard
100100
`Host` is present. If `foo.example.com` resolves to `10.11.12.13`, and the only `Host` has a
101101
`hostname` of `foo.example.com`, then:
102102

@@ -113,7 +113,7 @@ Adding a `Host` with a `hostname` of `"*"` will allow the second query to work.
113113

114114
The [`Host` CRD](../../topics/running/host-crd) continues to define information about hostnames, TLS certificates, and how to handle requests that are "secure" (using HTTPS) or "insecure" (using HTTP). The [`Mapping` CRD](../../topics/using/intro-mappings) continues to define how to map the URL space to upstream services.
115115

116-
However, as of Emissary-ingress 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
116+
However, as of Emissary 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
117117

118118
- The `Mapping` specifies a `hostname` attribute that matches the `Host` in question.
119119

@@ -144,7 +144,7 @@ Each `Host` can specify its `requestPolicy.insecure.action` independently of any
144144

145145
### `Host`, `TLSContext`, and TLS Termination
146146

147-
As of Emissary-ingress 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
147+
As of Emissary 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
148148

149149
The minimal setup for TLS termination is therefore a Kubernetes `Secret` of type `kubernetes.io/tls`, and a `Host` that uses it:
150150

@@ -167,7 +167,7 @@ spec:
167167
name: minimal-secret
168168
```
169169

170-
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary-ingress Communications](../../howtos/configure-communications).
170+
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
171171

172172
<Alert severity="info">
173173
<a href="../../topics/running/host-crd">Learn more about <code>Host</code></a>.<br/>
@@ -196,23 +196,23 @@ for compatibility with Kubernetes 1.22.
196196

197197
### Envoy V3 API by Default
198198

199-
By default, Emissary-ingress 2.X will configure Envoy using the
200-
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary-ingress
199+
By default, Emissary 2.X will configure Envoy using the
200+
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary
201201
$version$, you may switch back to Envoy V2 by setting the `AMBASSADOR_ENVOY_API_VERSION`
202-
environment variable to "V2"; in Emissary-ingress 2.2.0, support for the Envoy V2 API (and
202+
environment variable to "V2"; in Emissary 2.2.0, support for the Envoy V2 API (and
203203
the `AMBASSADOR_ENVOY_API_VERSION` environment variable) will be removed.
204204

205205
### More Performant Reconfiguration by Default
206206

207-
In Emissary-ingress 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary-ingress uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
207+
In Emissary 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
208208

209209
### Changes to the `ambassador` `Module`, and the `tls` `Module`
210210

211211
It is no longer possible to configure TLS using the `tls` element of the `ambassador` `Module` or using the `tls` `Module`. Both of these cases are correctly covered by the `TLSContext` resource.
212212

213213
With the introduction of the `Listener` resource, a few settings have moved from the `Module` to the `Listener`.
214214

215-
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary-ingress 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
215+
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
216216

217217
`xff_num_trusted_hops` has been removed from the `Module`, and its functionality has been moved to the `l7Depth` setting in the `Listener` resource.
218218

@@ -222,16 +222,16 @@ Configuration for the `PROXY` protocol is part of the `Listener` resource in Emi
222222

223223
### `TLSContext` `redirect_cleartext_from` and `Host` `insecure.additionalPort`
224224

225-
`redirect_cleartext_from` has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary-ingress Communications](../../howtos/configure-communications).
225+
`redirect_cleartext_from` has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
226226

227227
### Service Preview No Longer Supported
228228

229-
Service Preview is no longer supported as of Emissary-ingress 2.X, as its use cases are supported by Telepresence.
229+
Service Preview is no longer supported as of Emissary 2.X, as its use cases are supported by Telepresence.
230230

231231
### Edge Policy Console No Longer Supported
232232

233-
The Edge Policy Console has been removed as of Emissary-ingress 2.X, in favor of Ambassador Cloud.
233+
The Edge Policy Console has been removed as of Emissary 2.X, in favor of Ambassador Cloud.
234234

235235
### `Project` CRD No Longer Supported
236236

237-
The `Project` CRD has been removed as of Emissary-ingress 2.X, in favor of Argo.
237+
The `Project` CRD has been removed as of Emissary 2.X, in favor of Argo.

content/en/docs/3.8/about/changes-3.y.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Major Changes in Emissary-ingress 3.X
2+
title: Major Changes in Emissary 3.X
33
---
44

55
The 3.X family introduces a number of changes to ensure $productName$

content/en/docs/3.8/about/emissary-eol.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Emissary-ingress End of Life Policy
2+
title: Emissary End of Life Policy
33
---
44

5-
This document describes the End of Life policy and maintenance windows for the open source project Emissary-ingress.
5+
This document describes the End of Life policy and maintenance windows for the open source project Emissary.
66

77
## Supported Versions
88

9-
Emissary-ingress versions are expressed as **x.y.z**, where **x** is the major version, **y** is the minor version, and **z** is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
9+
Emissary versions are expressed as **x.y.z**, where **x** is the major version, **y** is the minor version, and **z** is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
1010

1111
**X-series (Major Versions)**
1212

@@ -45,7 +45,7 @@ Maintenance refers to the previous X-series release, including security and Sev1
4545
4646
### When we say support with “defect patches”, what do we mean?
4747

48-
- We will fix security issues in our Emissary-ingress
48+
- We will fix security issues in our Emissary
4949
- We will pick up security fixes from dependencies as they are made available
5050
- We will not maintain forks of our major dependencies
5151
- We will not attempt our own back ports of critical fixes to dependencies which are out of support from their own communities

0 commit comments

Comments
 (0)