From 6f1a6307ec2ff796d04d6bea40adb4ca51258e08 Mon Sep 17 00:00:00 2001 From: Patryk Strugacz Date: Mon, 27 Jan 2025 10:34:18 +0100 Subject: [PATCH] Apply suggestions from code review Co-authored-by: Natalia Sitko <80401180+nataliasitko@users.noreply.github.com> --- .../01-50-send-requests-using-egress.md | 29 ++++++++++--------- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/docs/user/tutorials/01-50-send-requests-using-egress.md b/docs/user/tutorials/01-50-send-requests-using-egress.md index 27dd5d97b..618682c5c 100644 --- a/docs/user/tutorials/01-50-send-requests-using-egress.md +++ b/docs/user/tutorials/01-50-send-requests-using-egress.md @@ -1,26 +1,27 @@ -# Send requests using Istio Egress +# Send Requests Using Istio Egress Gateway +Learn how to configure and use the Istio egress Gateway to allow outbound traffic from your Kyma runtime cluster to specific external destinations. Test your configuration by sending an HTTPS request to an external website using a sample Deployment. ## Prerequisites -* Istio module with egress enabled. +* You have the Istio module added. * To use CLI instruction, you must install [kubectl](https://kubernetes.io/docs/tasks/tools/#kubectl) and [curl](https://curl.se/). -### Configuration +## Steps -1. Export the following values as environment variables: +1. Export the following value as an environment variable: ```bash export NAMESPACE={service-namespace} ``` -2. Create a new namespace for the sample application. +2. Create a new namespace for the sample application: ```bash kubectl create ns $NAMESPACE kubectl label namespace $NAMESPACE istio-injection=enabled --overwrite ``` -3. Make sure there is an Istio CR with egress enabled: +3. Enable the egress Gateway in the Istio custom resource: ```bash kubectl apply -f - <