You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/en/docs/3.8/about/alternatives.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: "Alternatives"
3
3
---
4
4
5
-
Alternatives to Emissary-ingress fall into three basic categories:
5
+
Alternatives to Emissary fall into three basic categories:
6
6
7
7
* Hosted API gateways, such as the [Amazon API gateway](https://aws.amazon.com/api-gateway/).
8
8
* Traditional API gateways, such as [Kong](https://konghq.org/).
@@ -14,8 +14,8 @@ Both hosted API gateways and traditional API gateways are:
14
14
* Not Kubernetes-native. They're typically configured using REST APIs, making it challenging to adopt cloud-native patterns such as GitOps and declarative configuration.
15
15
*[Designed for API management, rather than designed for microservices](../../topics/concepts/microservices-api-gateways).
16
16
17
-
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary-ingress uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
17
+
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
18
18
19
19
## Istio
20
20
21
-
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary-ingress with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
21
+
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
Copy file name to clipboardexpand all lines: content/en/docs/3.8/about/changes-2.x.md
+27-27
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,27 @@
1
1
---
2
-
title: Major Changes in Emissary-ingress 2.X
2
+
title: Major Changes in Emissary 2.X
3
3
---
4
4
5
-
The 2.X family introduces a number of changes to allow Emissary-ingress
5
+
The 2.X family introduces a number of changes to allow Emissary
6
6
to more gracefully handle larger installations, reduce global configuration to
7
7
better handle multitenant or multiorganizational installations, reduce memory
8
8
footprint, and improve performance. We welcome feedback!! Join us on
9
9
[Slack](http://a8r.io/slack) and let us know what you think.
10
10
11
-
While Emissary-ingress 2 is functionally compatible with Emissary-ingress 1.14, note
11
+
While Emissary 2 is functionally compatible with Emissary 1.14, note
12
12
that this is a **major version change** and there are important differences between
13
-
Emissary-ingress 1.X and Emissary-ingress $version$. For details, read on.
13
+
Emissary 1.X and Emissary $version$. For details, read on.
14
14
15
15
## 1. Configuration API Version `getambassador.io/v3alpha1`
16
16
17
-
Emissary-ingress 2.0 introduced API version `getambassador.io/v3alpha1` to allow
17
+
Emissary 2.0 introduced API version `getambassador.io/v3alpha1` to allow
18
18
certain changes in configuration resources that are not backwards compatible with
19
-
Emissary-ingress 1.X. The most notable example of change is the addition of the
19
+
Emissary 1.X. The most notable example of change is the addition of the
20
20
**mandatory**`Listener` resource; however, there are important changes
21
21
in `Host` and `Mapping` as well.
22
22
23
23
<Alertseverity="info">
24
-
Emissary-ingress 2.X supports only API versions <code>getambassador.io/v2</code>
24
+
Emissary 2.X supports only API versions <code>getambassador.io/v2</code>
25
25
and <code>getambassador.io/v3alpha1</code>. If you are using any resources with
26
26
older API versions, you will need to upgrade them.
27
27
</Alert>
@@ -46,15 +46,15 @@ either a string or a list of strings is not allowed. Several such elements appea
46
46
47
47
## 2. `Listener`s, `Host`s, and `Mapping`s
48
48
49
-
Emissary-ingress 2.0 introduced the new **mandatory**`Listener` CRD, and made some changes
49
+
Emissary 2.0 introduced the new **mandatory**`Listener` CRD, and made some changes
50
50
to the `Host` and `Mapping` resources.
51
51
52
52
### The `Listener` CRD
53
53
54
-
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary-ingress should listen for requests from the network, and which `Host` definitions should be used to process those requests.
54
+
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary should listen for requests from the network, and which `Host` definitions should be used to process those requests.
55
55
56
-
**Note that `Listener`s are never created by Emissary-ingress, and must be defined by the user.** If you do not
57
-
define any `Listener`s, Emissary-ingress will not listen anywhere for connections, and therefore won't do
56
+
**Note that `Listener`s are never created by Emissary, and must be defined by the user.** If you do not
57
+
define any `Listener`s, Emissary will not listen anywhere for connections, and therefore won't do
58
58
anything useful. It will log a `WARNING` to this effect.
59
59
60
60
A `Listener` specifically defines
@@ -81,7 +81,7 @@ spec:
81
81
from: ALL
82
82
```
83
83
84
-
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary-ingress.
84
+
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary.
85
85
86
86
Note also that there is no limit on how many `Listener`s may be created, and as such no limit on the number of ports to which a `Host` may be associated.
87
87
@@ -92,11 +92,11 @@ Note also that there is no limit on how many `Listener`s may be created, and as
92
92
93
93
### Wildcard `Host`s No Longer Created
94
94
95
-
In Emissary-ingress 1.X, Emissary-ingress would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96
-
Emissary-ingress 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
95
+
In Emissary 1.X, Emissary would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96
+
Emissary 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
97
97
a `Host` with a hostname of `"*"`.
98
98
99
-
Of particular note is that Emissary-ingress **will not** respond to queries to an IP address unless a wildcard
99
+
Of particular note is that Emissary **will not** respond to queries to an IP address unless a wildcard
100
100
`Host`is present. If `foo.example.com` resolves to `10.11.12.13`, and the only `Host` has a
101
101
`hostname` of `foo.example.com`, then:
102
102
@@ -113,7 +113,7 @@ Adding a `Host` with a `hostname` of `"*"` will allow the second query to work.
113
113
114
114
The [`Host` CRD](../../topics/running/host-crd) continues to define information about hostnames, TLS certificates, and how to handle requests that are "secure" (using HTTPS) or "insecure" (using HTTP). The [`Mapping` CRD](../../topics/using/intro-mappings) continues to define how to map the URL space to upstream services.
115
115
116
-
However, as of Emissary-ingress 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
116
+
However, as of Emissary 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
117
117
118
118
- The `Mapping` specifies a `hostname` attribute that matches the `Host` in question.
119
119
@@ -144,7 +144,7 @@ Each `Host` can specify its `requestPolicy.insecure.action` independently of any
144
144
145
145
### `Host`, `TLSContext`, and TLS Termination
146
146
147
-
As of Emissary-ingress 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
147
+
As of Emissary 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
148
148
149
149
The minimal setup for TLS termination is therefore a Kubernetes `Secret` of type `kubernetes.io/tls`, and a `Host` that uses it:
150
150
@@ -167,7 +167,7 @@ spec:
167
167
name: minimal-secret
168
168
```
169
169
170
-
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary-ingress Communications](../../howtos/configure-communications).
170
+
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
171
171
172
172
<Alert severity="info">
173
173
<a href="../../topics/running/host-crd">Learn more about <code>Host</code></a>.<br/>
@@ -196,23 +196,23 @@ for compatibility with Kubernetes 1.22.
196
196
197
197
### Envoy V3 API by Default
198
198
199
-
By default, Emissary-ingress 2.X will configure Envoy using the
200
-
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary-ingress
199
+
By default, Emissary 2.X will configure Envoy using the
200
+
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary
201
201
$version$, you may switch back to Envoy V2 by setting the `AMBASSADOR_ENVOY_API_VERSION`
202
-
environment variable to "V2"; in Emissary-ingress 2.2.0, support for the Envoy V2 API (and
202
+
environment variable to "V2"; in Emissary 2.2.0, support for the Envoy V2 API (and
203
203
the `AMBASSADOR_ENVOY_API_VERSION` environment variable) will be removed.
204
204
205
205
### More Performant Reconfiguration by Default
206
206
207
-
In Emissary-ingress 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary-ingress uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
207
+
In Emissary 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
208
208
209
209
### Changes to the `ambassador` `Module`, and the `tls` `Module`
210
210
211
211
It is no longer possible to configure TLS using the `tls` element of the `ambassador` `Module` or using the `tls` `Module`. Both of these cases are correctly covered by the `TLSContext` resource.
212
212
213
213
With the introduction of the `Listener` resource, a few settings have moved from the `Module` to the `Listener`.
214
214
215
-
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary-ingress 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
215
+
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
216
216
217
217
`xff_num_trusted_hops`has been removed from the `Module`, and its functionality has been moved to the `l7Depth` setting in the `Listener` resource.
218
218
@@ -222,16 +222,16 @@ Configuration for the `PROXY` protocol is part of the `Listener` resource in Emi
222
222
223
223
### `TLSContext` `redirect_cleartext_from` and `Host` `insecure.additionalPort`
224
224
225
-
`redirect_cleartext_from`has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary-ingress Communications](../../howtos/configure-communications).
225
+
`redirect_cleartext_from`has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
226
226
227
227
### Service Preview No Longer Supported
228
228
229
-
Service Preview is no longer supported as of Emissary-ingress 2.X, as its use cases are supported by Telepresence.
229
+
Service Preview is no longer supported as of Emissary 2.X, as its use cases are supported by Telepresence.
230
230
231
231
### Edge Policy Console No Longer Supported
232
232
233
-
The Edge Policy Console has been removed as of Emissary-ingress 2.X, in favor of Ambassador Cloud.
233
+
The Edge Policy Console has been removed as of Emissary 2.X, in favor of Ambassador Cloud.
234
234
235
235
### `Project` CRD No Longer Supported
236
236
237
-
The `Project` CRD has been removed as of Emissary-ingress 2.X, in favor of Argo.
237
+
The `Project` CRD has been removed as of Emissary 2.X, in favor of Argo.
Copy file name to clipboardexpand all lines: content/en/docs/3.8/about/emissary-eol.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Emissary-ingress End of Life Policy
2
+
title: Emissary End of Life Policy
3
3
---
4
4
5
-
This document describes the End of Life policy and maintenance windows for the open source project Emissary-ingress.
5
+
This document describes the End of Life policy and maintenance windows for the open source project Emissary.
6
6
7
7
## Supported Versions
8
8
9
-
Emissary-ingress versions are expressed as **x.y.z**, where **x** is the major version, **y** is the minor version, and **z** is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
9
+
Emissary versions are expressed as **x.y.z**, where **x** is the major version, **y** is the minor version, and **z** is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
10
10
11
11
**X-series (Major Versions)**
12
12
@@ -45,7 +45,7 @@ Maintenance refers to the previous X-series release, including security and Sev1
45
45
46
46
### When we say support with “defect patches”, what do we mean?
47
47
48
-
- We will fix security issues in our Emissary-ingress
48
+
- We will fix security issues in our Emissary
49
49
- We will pick up security fixes from dependencies as they are made available
50
50
- We will not maintain forks of our major dependencies
51
51
- We will not attempt our own back ports of critical fixes to dependencies which are out of support from their own communities
0 commit comments