You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Alternatives to $productName$ fall into three basic categories:
5
+
Alternatives to Emissary fall into three basic categories:
4
6
5
7
* Hosted API gateways, such as the [Amazon API gateway](https://aws.amazon.com/api-gateway/).
6
8
* Traditional API gateways, such as [Kong](https://konghq.org/).
@@ -12,8 +14,8 @@ Both hosted API gateways and traditional API gateways are:
12
14
* Not Kubernetes-native. They're typically configured using REST APIs, making it challenging to adopt cloud-native patterns such as GitOps and declarative configuration.
13
15
*[Designed for API management, rather than designed for microservices](../../topics/concepts/microservices-api-gateways).
14
16
15
-
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. $productName$ uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
17
+
A Layer 7 proxy can be used as an API gateway, but typically requires additional bespoke development to support microservices use cases. In fact, many API gateways package the additional features needed for an API gateway on top of an L7 proxy. Emissary uses Envoy, while Kong uses NGINX. If you're interested in deploying Envoy directly, we've written an [introductory tutorial](https://www.datawire.io/guide/traffic/getting-started-lyft-envoy-microservices-resilience/).
16
18
17
19
## Istio
18
20
19
-
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy $productName$ with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
21
+
[Istio](https://istio.io) is an open-source service mesh, built on Envoy. A service mesh is designed to manage East/West traffic (traffic between servers and your data center), while an API gateway manages North/South traffic (in and out of your data center). Documentation on how to deploy Emissary with Istio is [here](../../howtos/istio). In general, we've found that North/South traffic is quite different from East/West traffic (i.e., you don't control the client in the North/South use case).
Copy file name to clipboardexpand all lines: content/en/docs/3.6/about/changes-2.x.md
+29-30
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,27 @@
1
-
import Alert from '@material-ui/lab/Alert';
2
-
3
-
Major Changes in $productName$ 2.X
4
-
==================================
1
+
---
2
+
title: Major Changes in Emissary 2.X
3
+
---
5
4
6
-
The 2.X family introduces a number of changes to allow $productName$
5
+
The 2.X family introduces a number of changes to allow Emissary
7
6
to more gracefully handle larger installations, reduce global configuration to
8
7
better handle multitenant or multiorganizational installations, reduce memory
9
8
footprint, and improve performance. We welcome feedback!! Join us on
10
9
[Slack](http://a8r.io/slack) and let us know what you think.
11
10
12
-
While $productName$ 2 is functionally compatible with $productName$ 1.14, note
11
+
While Emissary 2 is functionally compatible with Emissary 1.14, note
13
12
that this is a **major version change** and there are important differences between
14
-
$productName$ 1.X and $productName$ $version$. For details, read on.
13
+
Emissary 1.X and Emissary $version$. For details, read on.
15
14
16
15
## 1. Configuration API Version `getambassador.io/v3alpha1`
17
16
18
-
$productName$ 2.0 introduced API version `getambassador.io/v3alpha1` to allow
17
+
Emissary 2.0 introduced API version `getambassador.io/v3alpha1` to allow
19
18
certain changes in configuration resources that are not backwards compatible with
20
-
$productName$ 1.X. The most notable example of change is the addition of the
19
+
Emissary 1.X. The most notable example of change is the addition of the
21
20
**mandatory**`Listener` resource; however, there are important changes
22
21
in `Host` and `Mapping` as well.
23
22
24
23
<Alertseverity="info">
25
-
$productName$ 2.X supports only API versions <code>getambassador.io/v2</code>
24
+
Emissary 2.X supports only API versions <code>getambassador.io/v2</code>
26
25
and <code>getambassador.io/v3alpha1</code>. If you are using any resources with
27
26
older API versions, you will need to upgrade them.
28
27
</Alert>
@@ -47,15 +46,15 @@ either a string or a list of strings is not allowed. Several such elements appea
47
46
48
47
## 2. `Listener`s, `Host`s, and `Mapping`s
49
48
50
-
$productName$ 2.0 introduced the new **mandatory**`Listener` CRD, and made some changes
49
+
Emissary 2.0 introduced the new **mandatory**`Listener` CRD, and made some changes
51
50
to the `Host` and `Mapping` resources.
52
51
53
52
### The `Listener` CRD
54
53
55
-
The new [`Listener` CRD](../../topics/running/listener) defines where and how $productName$ should listen for requests from the network, and which `Host` definitions should be used to process those requests.
54
+
The new [`Listener` CRD](../../topics/running/listener) defines where and how Emissary should listen for requests from the network, and which `Host` definitions should be used to process those requests.
56
55
57
-
**Note that `Listener`s are never created by $productName$, and must be defined by the user.** If you do not
58
-
define any `Listener`s, $productName$ will not listen anywhere for connections, and therefore won't do
56
+
**Note that `Listener`s are never created by Emissary, and must be defined by the user.** If you do not
57
+
define any `Listener`s, Emissary will not listen anywhere for connections, and therefore won't do
59
58
anything useful. It will log a `WARNING` to this effect.
60
59
61
60
A `Listener` specifically defines
@@ -82,7 +81,7 @@ spec:
82
81
from: ALL
83
82
```
84
83
85
-
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by $productName$.
84
+
A `Listener` that has no associated `Host`s will be logged as a `WARNING`, and will not be included in the Envoy configuration generated by Emissary.
86
85
87
86
Note also that there is no limit on how many `Listener`s may be created, and as such no limit on the number of ports to which a `Host` may be associated.
88
87
@@ -93,11 +92,11 @@ Note also that there is no limit on how many `Listener`s may be created, and as
93
92
94
93
### Wildcard `Host`s No Longer Created
95
94
96
-
In $productName$ 1.X, $productName$ would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
97
-
$productName$ 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
95
+
In Emissary 1.X, Emissary would make sure that a wildcard `Host`, with a `hostname` of `"*"`, was always present.
96
+
Emissary 2.X does **not** force a wildcard `Host`: if you need the wildcard behavior, you will need to create
98
97
a `Host` with a hostname of `"*"`.
99
98
100
-
Of particular note is that $productName$ **will not** respond to queries to an IP address unless a wildcard
99
+
Of particular note is that Emissary **will not** respond to queries to an IP address unless a wildcard
101
100
`Host`is present. If `foo.example.com` resolves to `10.11.12.13`, and the only `Host` has a
102
101
`hostname` of `foo.example.com`, then:
103
102
@@ -114,7 +113,7 @@ Adding a `Host` with a `hostname` of `"*"` will allow the second query to work.
114
113
115
114
The [`Host` CRD](../../topics/running/host-crd) continues to define information about hostnames, TLS certificates, and how to handle requests that are "secure" (using HTTPS) or "insecure" (using HTTP). The [`Mapping` CRD](../../topics/using/intro-mappings) continues to define how to map the URL space to upstream services.
116
115
117
-
However, as of $productName$ 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
116
+
However, as of Emissary 2.0, a `Mapping` will not be associated with a `Host` unless at least one of the following is true:
118
117
119
118
- The `Mapping` specifies a `hostname` attribute that matches the `Host` in question.
120
119
@@ -145,7 +144,7 @@ Each `Host` can specify its `requestPolicy.insecure.action` independently of any
145
144
146
145
### `Host`, `TLSContext`, and TLS Termination
147
146
148
-
As of $productName$ 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
147
+
As of Emissary 2.0, **`Host`s are required for TLS termination**. It is no longer sufficient to create a [`TLSContext`](../../topics/running/tls/#tlscontext) by itself; the [`Host`](../../topics/running/host-crd) is required.
149
148
150
149
The minimal setup for TLS termination is therefore a Kubernetes `Secret` of type `kubernetes.io/tls`, and a `Host` that uses it:
151
150
@@ -168,7 +167,7 @@ spec:
168
167
name: minimal-secret
169
168
```
170
169
171
-
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring $productName$ Communications](../../howtos/configure-communications).
170
+
It is **not** necessary to explicitly state a `TLSContext` in the `Host`: setting `tlsSecret` is enough. Of course, `TLSContext` is still the ideal way to share TLS configuration between more than one `Host`. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
172
171
173
172
<Alert severity="info">
174
173
<a href="../../topics/running/host-crd">Learn more about <code>Host</code></a>.<br/>
@@ -197,23 +196,23 @@ for compatibility with Kubernetes 1.22.
197
196
198
197
### Envoy V3 API by Default
199
198
200
-
By default, $productName$ 2.X will configure Envoy using the
201
-
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In $productName$
199
+
By default, Emissary 2.X will configure Envoy using the
200
+
[V3 Envoy API](https://www.envoyproxy.io/docs/envoy/latest/api-v3/api). In Emissary
202
201
$version$, you may switch back to Envoy V2 by setting the `AMBASSADOR_ENVOY_API_VERSION`
203
-
environment variable to "V2"; in $productName$ 2.2.0, support for the Envoy V2 API (and
202
+
environment variable to "V2"; in Emissary 2.2.0, support for the Envoy V2 API (and
204
203
the `AMBASSADOR_ENVOY_API_VERSION` environment variable) will be removed.
205
204
206
205
### More Performant Reconfiguration by Default
207
206
208
-
In $productName$ 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code $productName$ uses to validate and generate Envoy configuration. In $productName$ 2.X, this higher-performance mode is always enabled.
207
+
In Emissary 1.X, the environment variable `AMBASSADOR_FAST_RECONFIGURE` could be used to enable a higher performance implementation of the code Emissary uses to validate and generate Envoy configuration. In Emissary 2.X, this higher-performance mode is always enabled.
209
208
210
209
### Changes to the `ambassador` `Module`, and the `tls` `Module`
211
210
212
211
It is no longer possible to configure TLS using the `tls` element of the `ambassador` `Module` or using the `tls` `Module`. Both of these cases are correctly covered by the `TLSContext` resource.
213
212
214
213
With the introduction of the `Listener` resource, a few settings have moved from the `Module` to the `Listener`.
215
214
216
-
Configuration for the `PROXY` protocol is part of the `Listener` resource in $productName$ 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
215
+
Configuration for the `PROXY` protocol is part of the `Listener` resource in Emissary 2.X, so the `use_proxy_protocol` element of the `ambassador` `Module` is no longer supported. Note that the `Listener` resource can configure `PROXY` resource per-`Listener`, rather than having a single global setting. For further information, see the [`Listener` documentation](../../topics/running/listener).
217
216
218
217
`xff_num_trusted_hops`has been removed from the `Module`, and its functionality has been moved to the `l7Depth` setting in the `Listener` resource.
219
218
@@ -223,16 +222,16 @@ Configuration for the `PROXY` protocol is part of the `Listener` resource in $pr
223
222
224
223
### `TLSContext` `redirect_cleartext_from` and `Host` `insecure.additionalPort`
225
224
226
-
`redirect_cleartext_from`has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring $productName$ Communications](../../howtos/configure-communications).
225
+
`redirect_cleartext_from`has been removed from the `TLSContext` resource; `insecure.additionalPort` has been removed from the `Host` CRD. Both of these cases are covered by adding additional `Listener`s. For further examples, see [Configuring Emissary Communications](../../howtos/configure-communications).
227
226
228
227
### Service Preview No Longer Supported
229
228
230
-
Service Preview is no longer supported as of $productName$ 2.X, as its use cases are supported by Telepresence.
229
+
Service Preview is no longer supported as of Emissary 2.X, as its use cases are supported by Telepresence.
231
230
232
231
### Edge Policy Console No Longer Supported
233
232
234
-
The Edge Policy Console has been removed as of $productName$ 2.X, in favor of Ambassador Cloud.
233
+
The Edge Policy Console has been removed as of Emissary 2.X, in favor of Ambassador Cloud.
235
234
236
235
### `Project` CRD No Longer Supported
237
236
238
-
The `Project` CRD has been removed as of $productName$ 2.X, in favor of Argo.
237
+
The `Project` CRD has been removed as of Emissary 2.X, in favor of Argo.
Copy file name to clipboardexpand all lines: content/en/docs/3.6/about/changes-3.y.md
+9-10
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,23 @@
1
-
import Alert from '@material-ui/lab/Alert';
1
+
---
2
+
title: Major Changes in Emissary 3.X
3
+
---
2
4
3
-
Major Changes in $productName$ 3.X
4
-
==================================
5
-
6
-
The 3.X family introduces a number of changes to ensure $productName$
5
+
The 3.X family introduces a number of changes to ensure Emissary
7
6
keeps up with latest Envoy versions and to support new features such as HTTP/3.
8
7
We welcome feedback! Join us on [Slack](http://a8r.io/slack) and let us know what you think.
9
8
10
-
$productName$ 3 is functionally compatible with $productName$ 2.x, but with any major upgrade there are some changes to consider. Such as, Envoy removing support for V2 Transport Protocol features. Below we will outline some of these changes and things to consider when upgrading.
9
+
Emissary 3 is functionally compatible with Emissary 2.x, but with any major upgrade there are some changes to consider. Such as, Envoy removing support for V2 Transport Protocol features. Below we will outline some of these changes and things to consider when upgrading.
11
10
12
11
## 1. Envoy Upgraded to 1.22
13
12
14
-
$productName$ 3.X has been upgraded from Envoy 1.17.X to Envoy **1.22** which keeps $productName$ up-to-date with
13
+
Emissary 3.X has been upgraded from Envoy 1.17.X to Envoy **1.22** which keeps Emissary up-to-date with
15
14
the latest security fixes, bug fixes, performance improvements and feature enhancements provided by Envoy Proxy. Most of the changes are under the hood but the most notable change to developers is the removal of support for Envoy V2 Transport Protocol. This means all AuthServices and LogServices must be updated to use the V3 Protocol.
16
15
17
16
This also means some of the v2 runtime bootstrap flags have been removed as well:
18
17
19
18
```yaml
20
19
# No longer necessary because this was removed from Envoy
21
-
#$productName$ already was converted to use the compressor API
20
+
#Emissary already was converted to use the compressor API
The environment variable <code>AMBASSADOR_ENVOY_API_VERSION</code> has been removed and will no longer have the affect
47
46
of changing the transport protocol.
48
47
</Alert>
49
48
50
49
<Alert severity="warn">
51
-
The setting of <code>transport_protocol</code> to <code>v2</code> is no longer supported within CRDS (AuthService, etc...). An error will now be logged and $productName$ will not configure envoy correctly. You should remove this field from your CRD's or convert it to <code>v3</code> the only supported version at this time.
50
+
The setting of <code>transport_protocol</code> to <code>v2</code> is no longer supported within CRDS (AuthService, etc...). An error will now be logged and Emissary will not configure envoy correctly. You should remove this field from your CRD's or convert it to <code>v3</code> the only supported version at this time.
0 commit comments