Skip to content

Commit 5990cc1

Browse files
authored
Merge pull request #9 from ppeble/3.6-updates
Fix metadata for 3.6 navigation
2 parents 9a69d3e + 2d36673 commit 5990cc1

File tree

189 files changed

+1883
-3907
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

189 files changed

+1883
-3907
lines changed

content/en/docs/3.6/about/_index.md

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
title: "About"
3+
weight: 10
4+
---
+6-4
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1-
# $productName$ vs. other software
1+
---
2+
title: "Alternatives"
3+
---
24

3-
Alternatives to $productName$ fall into three basic categories:
5+
Alternatives to Emissary fall into three basic categories:
46

57
* Hosted API gateways, such as the [Amazon API gateway](https://aws.amazon.com/api-gateway/).
68
* Traditional API gateways, such as [Kong](https://konghq.org/).
@@ -12,8 +14,8 @@ Both hosted API gateways and traditional API gateways are:
1214
* Not Kubernetes-native. They're typically configured using REST APIs, making it challenging to adopt cloud-native patterns such as GitOps and declarative configuration.
1315
* [Designed for API management, rather than designed for microservices](../../topics/concepts/microservices-api-gateways).
1416

15-
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. $productName$ uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
17+
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
1618

1719
## Istio
1820

19-
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy $productName$ with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
21+
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).

content/en/docs/3.6/about/changes-2.x.md

+29-30
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,27 @@
1-
import Alert from '@material-ui/lab/Alert';
2-
3-
Major Changes in $productName$ 2.X
4-
==================================
1+
---
2+
title: Major Changes in Emissary 2.X
3+
---
54

6-
The 2.X family introduces a number of changes to allow $productName$
5+
The 2.X family introduces a number of changes to allow Emissary
76
to more gracefully handle larger installations, reduce global configuration to
87
better handle multitenant or multiorganizational installations, reduce memory
98
footprint, and improve performance. We welcome feedback!! Join us on
109
[Slack](http://a8r.io/slack) and let us know what you think.
1110

12-
While $productName$ 2 is functionally compatible with $productName$ 1.14, note
11+
While Emissary 2 is functionally compatible with Emissary 1.14, note
1312
that this is a **major version change** and there are important differences between
14-
$productName$ 1.X and $productName$ $version$. For details, read on.
13+
Emissary 1.X and Emissary $version$. For details, read on.
1514

1615
## 1. Configuration API Version `getambassador.io/v3alpha1`
1716

18-
$productName$ 2.0 introduced API version `getambassador.io/v3alpha1` to allow
17+
Emissary 2.0 introduced API version `getambassador.io/v3alpha1` to allow
1918
certain changes in configuration resources that are not backwards compatible with
20-
$productName$ 1.X. The most notable example of change is the addition of the
19+
Emissary 1.X. The most notable example of change is the addition of the
2120
**mandatory** `Listener` resource; however, there are important changes
2221
in `Host` and `Mapping` as well.
2322

2423
<Alert severity="info">
25-
$productName$ 2.X supports only API versions <code>getambassador.io/v2</code>
24+
Emissary 2.X supports only API versions <code>getambassador.io/v2</code>
2625
and <code>getambassador.io/v3alpha1</code>. If you are using any resources with
2726
older API versions, you will need to upgrade them.
2827
</Alert>
@@ -47,15 +46,15 @@ either a string or a list of strings is not allowed. Several such elements appea
4746

4847
## 2. `Listener`s, `Host`s, and `Mapping`s
4948

50-
$productName$ 2.0 introduced the new **mandatory** `Listener` CRD, and made some changes
49+
Emissary 2.0 introduced the new **mandatory** `Listener` CRD, and made some changes
5150
to the `Host` and `Mapping` resources.
5251

5352
### The `Listener` CRD
5453

55-
The new [`Listener` CRD](../../topics/running/listener) defines where and how $productName$ should listen for requests from the network, and which `Host` definitions should be used to process those requests.
54+
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary should listen for requests from the network, and which `Host` definitions should be used to process those requests.
5655

57-
**Note that `Listener`s are never created by $productName$, and must be defined by the user.** If you do not
58-
define any `Listener`s, $productName$ will not listen anywhere for connections, and therefore won't do
56+
**Note that `Listener`s are never created by Emissary, and must be defined by the user.** If you do not
57+
define any `Listener`s, Emissary will not listen anywhere for connections, and therefore won't do
5958
anything useful. It will log a `WARNING` to this effect.
6059

6160
A `Listener` specifically defines
@@ -82,7 +81,7 @@ spec:
8281
from: ALL
8382
```
8483
85-
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by $productName$.
84+
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary.
8685

8786
Note also that there is no limit on how many `Listener`s may be created, and as such no limit on the number of ports to which a `Host` may be associated.
8887

@@ -93,11 +92,11 @@ Note also that there is no limit on how many `Listener`s may be created, and as
9392

9493
### Wildcard `Host`s No Longer Created
9594

96-
In $productName$ 1.X, $productName$ would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
97-
$productName$ 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
95+
In Emissary 1.X, Emissary would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96+
Emissary 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
9897
a `Host` with a hostname of `"*"`.
9998

100-
Of particular note is that $productName$ **will not** respond to queries to an IP address unless a wildcard
99+
Of particular note is that Emissary **will not** respond to queries to an IP address unless a wildcard
101100
`Host` is present. If `foo.example.com` resolves to `10.11.12.13`, and the only `Host` has a
102101
`hostname` of `foo.example.com`, then:
103102

@@ -114,7 +113,7 @@ Adding a `Host` with a `hostname` of `"*"` will allow the second query to work.
114113

115114
The [`Host` CRD](../../topics/running/host-crd) continues to define information about hostnames, TLS certificates, and how to handle requests that are "secure" (using HTTPS) or "insecure" (using HTTP). The [`Mapping` CRD](../../topics/using/intro-mappings) continues to define how to map the URL space to upstream services.
116115

117-
However, as of $productName$ 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
116+
However, as of Emissary 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
118117

119118
- The `Mapping` specifies a `hostname` attribute that matches the `Host` in question.
120119

@@ -145,7 +144,7 @@ Each `Host` can specify its `requestPolicy.insecure.action` independently of any
145144

146145
### `Host`, `TLSContext`, and TLS Termination
147146

148-
As of $productName$ 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
147+
As of Emissary 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
149148

150149
The minimal setup for TLS termination is therefore a Kubernetes `Secret` of type `kubernetes.io/tls`, and a `Host` that uses it:
151150

@@ -168,7 +167,7 @@ spec:
168167
name: minimal-secret
169168
```
170169

171-
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring $productName$ Communications](../../howtos/configure-communications).
170+
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
172171

173172
<Alert severity="info">
174173
<a href="../../topics/running/host-crd">Learn more about <code>Host</code></a>.<br/>
@@ -197,23 +196,23 @@ for compatibility with Kubernetes 1.22.
197196

198197
### Envoy V3 API by Default
199198

200-
By default, $productName$ 2.X will configure Envoy using the
201-
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In $productName$
199+
By default, Emissary 2.X will configure Envoy using the
200+
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary
202201
$version$, you may switch back to Envoy V2 by setting the `AMBASSADOR_ENVOY_API_VERSION`
203-
environment variable to "V2"; in $productName$ 2.2.0, support for the Envoy V2 API (and
202+
environment variable to "V2"; in Emissary 2.2.0, support for the Envoy V2 API (and
204203
the `AMBASSADOR_ENVOY_API_VERSION` environment variable) will be removed.
205204

206205
### More Performant Reconfiguration by Default
207206

208-
In $productName$ 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code $productName$ uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
207+
In Emissary 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary uses to validate and generate Envoy configuration. In Emissary 2.X, this higher-performance mode is always enabled.
209208

210209
### Changes to the `ambassador` `Module`, and the `tls` `Module`
211210

212211
It is no longer possible to configure TLS using the `tls` element of the `ambassador` `Module` or using the `tls` `Module`. Both of these cases are correctly covered by the `TLSContext` resource.
213212

214213
With the introduction of the `Listener` resource, a few settings have moved from the `Module` to the `Listener`.
215214

216-
Configuration for the `PROXY` protocol is part of the `Listener` resource in $productName$ 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
215+
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
217216

218217
`xff_num_trusted_hops` has been removed from the `Module`, and its functionality has been moved to the `l7Depth` setting in the `Listener` resource.
219218

@@ -223,16 +222,16 @@ Configuration for the `PROXY` protocol is part of the `Listener` resource in $pr
223222

224223
### `TLSContext` `redirect_cleartext_from` and `Host` `insecure.additionalPort`
225224

226-
`redirect_cleartext_from` has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring $productName$ Communications](../../howtos/configure-communications).
225+
`redirect_cleartext_from` has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
227226

228227
### Service Preview No Longer Supported
229228

230-
Service Preview is no longer supported as of $productName$ 2.X, as its use cases are supported by Telepresence.
229+
Service Preview is no longer supported as of Emissary 2.X, as its use cases are supported by Telepresence.
231230

232231
### Edge Policy Console No Longer Supported
233232

234-
The Edge Policy Console has been removed as of $productName$ 2.X, in favor of Ambassador Cloud.
233+
The Edge Policy Console has been removed as of Emissary 2.X, in favor of Ambassador Cloud.
235234

236235
### `Project` CRD No Longer Supported
237236

238-
The `Project` CRD has been removed as of $productName$ 2.X, in favor of Argo.
237+
The `Project` CRD has been removed as of Emissary 2.X, in favor of Argo.

content/en/docs/3.6/about/changes-3.y.md

+9-10
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,23 @@
1-
import Alert from '@material-ui/lab/Alert';
1+
---
2+
title: Major Changes in Emissary 3.X
3+
---
24

3-
Major Changes in $productName$ 3.X
4-
==================================
5-
6-
The 3.X family introduces a number of changes to ensure $productName$
5+
The 3.X family introduces a number of changes to ensure Emissary
76
keeps up with latest Envoy versions and to support new features such as HTTP/3.
87
We welcome feedback! Join us on [Slack](http://a8r.io/slack) and let us know what you think.
98

10-
$productName$ 3 is functionally compatible with $productName$ 2.x, but with any major upgrade there are some changes to consider. Such as, Envoy removing support for V2 Transport Protocol features. Below we will outline some of these changes and things to consider when upgrading.
9+
Emissary 3 is functionally compatible with Emissary 2.x, but with any major upgrade there are some changes to consider. Such as, Envoy removing support for V2 Transport Protocol features. Below we will outline some of these changes and things to consider when upgrading.
1110

1211
## 1. Envoy Upgraded to 1.22
1312

14-
$productName$ 3.X has been upgraded from Envoy 1.17.X to Envoy **1.22** which keeps $productName$ up-to-date with
13+
Emissary 3.X has been upgraded from Envoy 1.17.X to Envoy **1.22** which keeps Emissary up-to-date with
1514
the latest security fixes, bug fixes, performance improvements and feature enhancements provided by Envoy Proxy. Most of the changes are under the hood but the most notable change to developers is the removal of support for Envoy V2 Transport Protocol. This means all AuthServices and LogServices must be updated to use the V3 Protocol.
1615

1716
This also means some of the v2 runtime bootstrap flags have been removed as well:
1817

1918
```yaml
2019
# No longer necessary because this was removed from Envoy
21-
# $productName$ already was converted to use the compressor API
20+
# Emissary already was converted to use the compressor API
2221
# https://www.envoyproxy.io/docs/envoy/v1.22.0/configuration/http/http_filters/compressor_filter#config-http-filters-compressor
2322
"envoy.deprecated_features.allow_deprecated_gzip_http_filter": true,
2423

@@ -40,13 +39,13 @@ This also means some of the v2 runtime bootstrap flags have been removed as well
4039
## 2. Envoy V2 Protocol Support Removed
4140
4241
With the upgrade to Envoy **1.22**, the V2 Envoy Transport Protocol is no longer supported.
43-
$productName$ 3.X **only** supports [V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api).
42+
Emissary 3.X **only** supports [V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api).
4443
4544
<Alert severity="warn">
4645
The environment variable <code>AMBASSADOR_ENVOY_API_VERSION</code> has been removed and will no longer have the affect
4746
of changing the transport protocol.
4847
</Alert>
4948
5049
<Alert severity="warn">
51-
The setting of <code>transport_protocol</code> to <code>v2</code> is no longer supported within CRDS (AuthService, etc...). An error will now be logged and $productName$ will not configure envoy correctly. You should remove this field from your CRD's or convert it to <code>v3</code> the only supported version at this time.
50+
The setting of <code>transport_protocol</code> to <code>v2</code> is no longer supported within CRDS (AuthService, etc...). An error will now be logged and Emissary will not configure envoy correctly. You should remove this field from your CRD's or convert it to <code>v3</code> the only supported version at this time.
5251
</Alert>

content/en/docs/3.6/about/aes-emissary-eol.md content/en/docs/3.6/about/emissary-eol.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
# $productName$ End of Life Policy
1+
---
2+
title: Emissary End of Life Policy
3+
---
24

35
This document describes the End of Life policy and maintenance windows for Ambassador Edge Stack, and to the open source project Emissary-ingress.
46

0 commit comments

Comments
 (0)