Skip to content

Commit ca2b0f2

Browse files
authored
Update istio-add-on-egress-gateway.md
1 parent d303d2f commit ca2b0f2

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

support/azure/azure-kubernetes/extensions/istio-add-on-egress-gateway.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Make sure that the `StaticGatewayConfiguration` resource for the Istio add-on eg
9494

9595
### Step 2: Make sure that an egressIpPrefix is provisioned for the StaticGatewayConfiguration
9696

97-
If the Istio egress gateway pods are stuck in `ContainerCreating`, the `kube-egress-gateway-cni-manager` pod might prevent the `istio-proxy` container from being created because the `StaticGatewayConfiguration` resource doesn't have an `egressIpPrefix` assigned to it yet. To verify whether it's assigned an `egressIpPrefix`, check the `status` value of `StaticGatewayConfiguration` for that Istio egress gateway. To determine whether any errors affect the `egressIpPrefix` provisioning, run the `kubectl describe` command against `StaticGatewayConfiguration`.
97+
If the Istio egress gateway pods are stuck in `ContainerCreating`, the `kube-egress-gateway-cni-manager` pod might prevent the `istio-proxy` container from being created because the `StaticGatewayConfiguration` resource doesn't have an `egressIpPrefix` assigned to it yet. To verify whether an `egressIpPrefix` is assigned to the resource, check the `status` value of `StaticGatewayConfiguration` for that Istio egress gateway. To determine whether any errors affect the `egressIpPrefix` provisioning, run the `kubectl describe` command against `StaticGatewayConfiguration`.
9898
9999
> [!NOTE]
100100
> The process to assign an `egressIpPrefix` to a Static Egress Gateway `StaticGatewayConfiguration` can take up to five minutes.
@@ -104,7 +104,7 @@ kubectl get staticgatewayconfiguration $ISTIO_SGC_NAME -n $ISTIO_EGRESS_NAMESPAC
104104
kubectl describe staticgatewayconfiguration $ISTIO_SGC_NAME -n $ISTIO_EGRESS_NAMESPACE
105105
```
106106
107-
You can also check the logs of the `kube-egress-gateway-cni-manager` podthat runs on the node of the failing Istio egress pod. If any issues affect `egressIpPrefix` provisioning, or if an IP prefix still isn't assigned after approximately five minutes, you might have to further [debug the Static Egress Gateway](#step-8-debug-the-static-egress-gateway).
107+
You can also check the logs of the `kube-egress-gateway-cni-manager` pod that runs on the node of the failing Istio egress pod. If any issues affect `egressIpPrefix` provisioning, or if an IP prefix still isn't assigned after approximately five minutes, you might have to further [debug the Static Egress Gateway](#step-8-debug-the-static-egress-gateway).
108108

109109
### Step 3: Make sure that the StaticGatewayConfiguration references a valid gateway agent pool
110110

@@ -217,7 +217,7 @@ If you try to configure the Istio egress gateway to perform mutual TLS (mTLS) or
217217

218218
### Step 6: Make sure that applications send plaintext HTTP requests for egress gateway TLS origination and authorization policies
219219

220-
To originate TLS and apply authorization policies at the egress gateway, workloads in the mesh must send HTTP requests. The sidecar proxies can then use mTLS when they forward requests to the egress gateway. The egress gateway terminate the mTLS connection, and it originate a TLS/HTTPS connection to the destination host.
220+
To originate TLS and apply authorization policies at the egress gateway, workloads in the mesh must send HTTP requests. The sidecar proxies can then use mTLS when they forward requests to the egress gateway. The egress gateway terminates the mTLS connection, and it originate a TLS/HTTPS connection to the destination host.
221221

222222
[!INCLUDE [Third-party information disclaimer](../../../includes/third-party-disclaimer.md)]
223223

0 commit comments

Comments
 (0)