Skip to content

Commit 5903a20

Browse files
committed
Fix linter errors
Signed-off-by: Sridhar Gaddam <[email protected]>
1 parent 2a3cdc5 commit 5903a20

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

.spelling

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -662,12 +662,15 @@ IOPs
662662
ip
663663
ipallocate
664664
ipBlocks
665+
ipBlock
665666
IPs
666667
IPsec
667668
ipsets
668669
iptables
669670
IPv4
670671
IPv6
672+
fd16:9254:7127:1337:ffff:ffff:ffff:ffff
673+
fd16:9254:7127:1337:ffff:ffff:ffff:ffff/128
671674
ip_address
672675
Istio
673676
istio

content/en/docs/ambient/usage/networkpolicy/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ In Istio ambient, this problem is solved by using a combination of iptables rule
6666

6767
This behavior is transparently enabled when you add pods to the ambient mesh, and by default ambient uses the link-local addresses 169.254.7.127 (IPv4) and fd16:9254:7127:1337:ffff:ffff:ffff:ffff (IPv6) to identify and correctly allow kubelet health probe packets.
6868

69-
Note: If your workload, namespace, or cluster enforces Kubernetes `NetworkPolicy`, you must allow both the IPv4 and IPv6 addresses used by Ambient mode. Depending on your CNI, packets with these addresses may otherwise be blocked, which will cause application pod health probes to fail once they join the ambient mesh.
69+
Note: If your workload, namespace, or cluster enforces Kubernetes `NetworkPolicy`, you must allow both the IPv4 and IPv6 addresses used by ambient mode. Depending on your CNI, packets with these addresses may otherwise be blocked, which will cause application pod health probes to fail once they join the ambient mesh.
7070

7171
For instance, applying the following `NetworkPolicy` in a namespace would block all traffic (Istio or otherwise) to the `my-app` pod, **including** kubelet health probes. Depending on your CNI, kubelet probes and link-local addresses may be ignored by this policy, or be blocked by it:
7272

@@ -100,4 +100,4 @@ spec:
100100
cidr: 169.254.7.127/32
101101
{{< /text >}}
102102

103-
Note: If you are using a dualStack cluster or an IPv6-only cluster, make sure to update your `NetworkPolicy` with the IPv6 ipBlock (fd16:9254:7127:1337:ffff:ffff:ffff:ffff/128) in addition to, or instead of, the IPv4 entry.
103+
Note: If you are using a dual-stack cluster or an IPv6-only cluster, make sure to update your `NetworkPolicy` with the IPv6 ipBlock (fd16:9254:7127:1337:ffff:ffff:ffff:ffff/128) in addition to, or instead of, the IPv4 entry.

0 commit comments

Comments
 (0)