diff --git a/site/content/en/latest/tasks/extensibility/envoy-patch-policy.md b/site/content/en/latest/tasks/extensibility/envoy-patch-policy.md index e32c447e750..ff819754d1f 100644 --- a/site/content/en/latest/tasks/extensibility/envoy-patch-policy.md +++ b/site/content/en/latest/tasks/extensibility/envoy-patch-policy.md @@ -34,6 +34,7 @@ using a `ConfigMap`. In the next step, we will update this resource to enable En {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -95,6 +98,7 @@ the status code is `404` {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -176,6 +182,7 @@ Then the EnvoyPatchPolicy should target a specific GatewayClass. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/observability/rate-limit-observability.md b/site/content/en/latest/tasks/observability/rate-limit-observability.md index 26ffe24a9b1..478b85859b9 100644 --- a/site/content/en/latest/tasks/observability/rate-limit-observability.md +++ b/site/content/en/latest/tasks/observability/rate-limit-observability.md @@ -37,6 +37,7 @@ we only want to sample `50%` of the trace data. We would configure it as follows {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/operations/customize-envoyproxy.md b/site/content/en/latest/tasks/operations/customize-envoyproxy.md index 50c2cc26118..152f9e7ff44 100644 --- a/site/content/en/latest/tasks/operations/customize-envoyproxy.md +++ b/site/content/en/latest/tasks/operations/customize-envoyproxy.md @@ -17,6 +17,7 @@ First, you need to add ParametersRef in GatewayClass, and refer to EnvoyProxy Co {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -59,6 +62,7 @@ You can customize the EnvoyProxy Deployment Replicas via EnvoyProxy Config like: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -108,6 +114,7 @@ You can customize the EnvoyProxy Image via EnvoyProxy Config like: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -154,6 +163,7 @@ You can customize the EnvoyProxy Pod Annotations via EnvoyProxy Config like: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -204,6 +216,7 @@ You can customize the EnvoyProxy Deployment Resources via EnvoyProxy Config like {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -260,6 +275,7 @@ You can customize the EnvoyProxy Deployment Env via EnvoyProxy Config like: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -316,6 +334,7 @@ You can customize the EnvoyProxy Deployment Volumes or VolumeMounts via EnvoyPro {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -378,6 +399,7 @@ You can customize the EnvoyProxy Service Annotations via EnvoyProxy Config like: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -430,6 +454,7 @@ There are two ways to customize it: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -617,6 +644,7 @@ Once confirmed, you can apply it via EnvoyProxy Config as shown below: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -678,6 +708,7 @@ For example, the following configuration will add `--disable-extensions` arg in {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -716,6 +749,7 @@ For example, the following configuration will add resource limits to the `envoy` {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/operations/deployment-mode.md b/site/content/en/latest/tasks/operations/deployment-mode.md index 300c828120a..16b339fe571 100644 --- a/site/content/en/latest/tasks/operations/deployment-mode.md +++ b/site/content/en/latest/tasks/operations/deployment-mode.md @@ -59,6 +59,7 @@ Lets create a `GatewayClass` linked to the marketing team's Envoy Gateway contro {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -344,6 +347,7 @@ Lets create a `GatewayClass` linked to the product team's Envoy Gateway controll {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -824,6 +830,7 @@ Lets create also and additional `Gateway` linked to the GatewayClass and `backen {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/backend-tls.md b/site/content/en/latest/tasks/security/backend-tls.md index 80ed3593305..706d25ae60d 100644 --- a/site/content/en/latest/tasks/security/backend-tls.md +++ b/site/content/en/latest/tasks/security/backend-tls.md @@ -83,6 +83,7 @@ Create a service that exposes port 443 on the backend service. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -133,6 +136,7 @@ Create a [BackendTLSPolicy][] instructing Envoy Gateway to establish a TLS conne {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/basic-auth.md b/site/content/en/latest/tasks/security/basic-auth.md index c9560f56f88..04559a8d2bc 100644 --- a/site/content/en/latest/tasks/security/basic-auth.md +++ b/site/content/en/latest/tasks/security/basic-auth.md @@ -102,6 +102,7 @@ secret generated in the previous step. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/cors.md b/site/content/en/latest/tasks/security/cors.md index 9243d6a5905..cfbe979cd22 100644 --- a/site/content/en/latest/tasks/security/cors.md +++ b/site/content/en/latest/tasks/security/cors.md @@ -24,6 +24,7 @@ The below example defines a SecurityPolicy that allows CORS for all HTTP request {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/ext-auth.md b/site/content/en/latest/tasks/security/ext-auth.md index 455b986283f..1676b60ded1 100644 --- a/site/content/en/latest/tasks/security/ext-auth.md +++ b/site/content/en/latest/tasks/security/ext-auth.md @@ -36,6 +36,7 @@ Create a new HTTPRoute resource to route traffic on the path `/myapp` to the bac {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -99,6 +102,7 @@ is successfully authorized. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -218,6 +224,7 @@ Create a new HTTPRoute resource to route traffic on the path `/myapp` to the bac {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -279,6 +288,7 @@ It calls the gRPC external authorization service "grpc-ext-auth" on port 9002 fo {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -332,6 +344,7 @@ the communication between the Envoy proxy and the gRPC auth service. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/mutual-tls.md b/site/content/en/latest/tasks/security/mutual-tls.md index 769f3bd4535..a848d8334cf 100644 --- a/site/content/en/latest/tasks/security/mutual-tls.md +++ b/site/content/en/latest/tasks/security/mutual-tls.md @@ -80,6 +80,7 @@ Create a [ClientTrafficPolicy][] to enforce client validation using the CA Certi {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/oidc.md b/site/content/en/latest/tasks/security/oidc.md index b754d35163d..0360ccd496f 100644 --- a/site/content/en/latest/tasks/security/oidc.md +++ b/site/content/en/latest/tasks/security/oidc.md @@ -31,6 +31,7 @@ Let's create an HTTPRoute that represents an application protected by OIDC. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -122,6 +125,7 @@ Note: please replace the ${CLIENT_ID} in the below yaml snippet with the actual {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/private-key-provider.md b/site/content/en/latest/tasks/security/private-key-provider.md index 18d3afc5fd0..cf40a96e9e1 100644 --- a/site/content/en/latest/tasks/security/private-key-provider.md +++ b/site/content/en/latest/tasks/security/private-key-provider.md @@ -118,6 +118,7 @@ It required the node with 3rd generation Intel Xeon Scalable processor server pr {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -172,6 +175,7 @@ data: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -214,6 +220,7 @@ Using the envoyproxy image with contrib extensions and add qat resources request {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -282,6 +291,7 @@ Using the envoyproxy image with contrib extensions and add the node affinity to {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -408,6 +420,7 @@ fortio load -c 10 -k -qps 0 -t 30s -keepalive=false https://www.example.com:${NO {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -492,6 +507,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/security/secure-gateways.md b/site/content/en/latest/tasks/security/secure-gateways.md index 199ac976005..e57b1236389 100644 --- a/site/content/en/latest/tasks/security/secure-gateways.md +++ b/site/content/en/latest/tasks/security/secure-gateways.md @@ -167,6 +167,7 @@ namespace to reference Secrets in the "envoy-gateway-system" namespace: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -230,6 +233,7 @@ Update the Gateway HTTPS listener with `namespace: envoy-gateway-system`, for ex {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/circuit-breaker.md b/site/content/en/latest/tasks/traffic/circuit-breaker.md index 1d3a2e85bbf..9480a86a2cd 100644 --- a/site/content/en/latest/tasks/traffic/circuit-breaker.md +++ b/site/content/en/latest/tasks/traffic/circuit-breaker.md @@ -64,6 +64,7 @@ In order to fail fast, apply a `BackendTrafficPolicy` that limits concurrent req {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/client-traffic-policy.md b/site/content/en/latest/tasks/traffic/client-traffic-policy.md index dc461d7c702..7132453da38 100644 --- a/site/content/en/latest/tasks/traffic/client-traffic-policy.md +++ b/site/content/en/latest/tasks/traffic/client-traffic-policy.md @@ -25,6 +25,7 @@ Before proceeding, you should be able to query the example backend using HTTP. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -204,6 +207,7 @@ This example configures Proxy Protocol for downstream clients. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -340,6 +346,7 @@ This example configures the number of additional ingress proxy hops from the rig {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -491,6 +500,7 @@ This example configures the HTTP request timeout for the client, please check ou {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/connection-limit.md b/site/content/en/latest/tasks/traffic/connection-limit.md index 20bce016805..aac8437dc45 100644 --- a/site/content/en/latest/tasks/traffic/connection-limit.md +++ b/site/content/en/latest/tasks/traffic/connection-limit.md @@ -59,6 +59,7 @@ Next, we apply a limit of 5 connections. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/fault-injection.md b/site/content/en/latest/tasks/traffic/fault-injection.md index cc8bea6f6fe..d4f536dbb33 100644 --- a/site/content/en/latest/tasks/traffic/fault-injection.md +++ b/site/content/en/latest/tasks/traffic/fault-injection.md @@ -28,6 +28,7 @@ Allow requests with a valid faultInjection by creating an [BackendTrafficPolicy] {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -199,6 +202,7 @@ kubectl get backendtrafficpolicy/fault-injection-delay -o yaml {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/global-rate-limit.md b/site/content/en/latest/tasks/traffic/global-rate-limit.md index 97cda03a4a5..dfd1e5cf2a3 100644 --- a/site/content/en/latest/tasks/traffic/global-rate-limit.md +++ b/site/content/en/latest/tasks/traffic/global-rate-limit.md @@ -37,6 +37,7 @@ Lets install a Redis deployment in the `redis-system` namespce. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -159,6 +162,7 @@ as well as configure the URL for the Redis instance used for Global rate limitin {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -222,6 +228,7 @@ with a value set to `one`. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -282,6 +291,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -436,6 +448,7 @@ and so will user `two` (recognised from the traffic flow using the header `x-use {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -496,6 +511,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -633,6 +651,7 @@ This example shows you how to rate limit all requests matching the HTTPRoute rul {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -685,6 +706,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -785,6 +809,7 @@ Note: EG supports two kinds of rate limit for the IP address: exact and distinct {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -924,6 +951,7 @@ Here is an example of a rate limit implemented by the application developer to l {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -1159,6 +1189,7 @@ like container `image`, `securityContext`, `env` and pod `annotations` and `secu {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/grpc-routing.md b/site/content/en/latest/tasks/traffic/grpc-routing.md index 3165405aad5..7c41b54c885 100644 --- a/site/content/en/latest/tasks/traffic/grpc-routing.md +++ b/site/content/en/latest/tasks/traffic/grpc-routing.md @@ -97,6 +97,7 @@ as well as a match for all services with a method name `Ping` which matches `yag {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -179,6 +182,7 @@ with match type `RegularExpression`. It matches all the services and methods wit {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-redirect.md b/site/content/en/latest/tasks/traffic/http-redirect.md index a8fc7d2e82c..2a41777f80b 100644 --- a/site/content/en/latest/tasks/traffic/http-redirect.md +++ b/site/content/en/latest/tasks/traffic/http-redirect.md @@ -21,6 +21,7 @@ For example, to issue a permanent redirect (301) from HTTP to HTTPS, configure ` {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -134,6 +137,7 @@ Define a https listener on the existing gateway {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -198,6 +204,7 @@ Create two HTTPRoutes and attach them to the HTTP and HTTPS listeners using the {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -309,6 +318,7 @@ below will issue a 302 redirect to all `path.redirect.example` requests whose pa {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-request-headers.md b/site/content/en/latest/tasks/traffic/http-request-headers.md index c3e4efdfe26..7bc709c49c6 100644 --- a/site/content/en/latest/tasks/traffic/http-request-headers.md +++ b/site/content/en/latest/tasks/traffic/http-request-headers.md @@ -26,6 +26,7 @@ header in the request. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -147,6 +150,7 @@ filter. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -255,6 +261,7 @@ filter. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -355,6 +364,7 @@ Headers can be added/set/removed in a single filter on the same HTTPRoute and th {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-request-mirroring.md b/site/content/en/latest/tasks/traffic/http-request-mirroring.md index ed214ac8fc3..f22ef51da36 100644 --- a/site/content/en/latest/tasks/traffic/http-request-mirroring.md +++ b/site/content/en/latest/tasks/traffic/http-request-mirroring.md @@ -18,6 +18,7 @@ a second instance of the application deployed in the quickstart. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} Then create an `HTTPRoute` that uses a `HTTPRequestMirrorFilter` to send requests to the original @@ -141,6 +144,7 @@ service from the quickstart, and mirror request to the service that was just dep {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -266,6 +272,7 @@ When an `HTTPRoute` has multiple `backendRefs` and an `HTTPRequestMirrorFilter`, {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -346,6 +355,7 @@ Multiple `HTTPRequestMirrorFilters` are not supported on the same `HTTPRoute` `r {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-response-headers.md b/site/content/en/latest/tasks/traffic/http-response-headers.md index df6f4369fd2..60121674b00 100644 --- a/site/content/en/latest/tasks/traffic/http-response-headers.md +++ b/site/content/en/latest/tasks/traffic/http-response-headers.md @@ -24,6 +24,7 @@ value of the header in the response. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -144,6 +147,7 @@ filter. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -253,6 +259,7 @@ filter. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -353,6 +362,7 @@ Headers can be added/set/removed in a single filter on the same HTTPRoute and th {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-routing.md b/site/content/en/latest/tasks/traffic/http-routing.md index 94a492d51da..aba57adc9b2 100644 --- a/site/content/en/latest/tasks/traffic/http-routing.md +++ b/site/content/en/latest/tasks/traffic/http-routing.md @@ -133,6 +133,7 @@ For this feature to work please make sure {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-timeouts.md b/site/content/en/latest/tasks/traffic/http-timeouts.md index 322707d823d..3ab863608ce 100644 --- a/site/content/en/latest/tasks/traffic/http-timeouts.md +++ b/site/content/en/latest/tasks/traffic/http-timeouts.md @@ -24,6 +24,7 @@ We configure the backend to delay responses by 3 seconds, then we set the reques {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -102,6 +105,7 @@ Then we set the request timeout to 2 seconds. In this case, Envoy Gateway will r {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-traffic-splitting.md b/site/content/en/latest/tasks/traffic/http-traffic-splitting.md index e2ec77dd3ab..06e4a236589 100644 --- a/site/content/en/latest/tasks/traffic/http-traffic-splitting.md +++ b/site/content/en/latest/tasks/traffic/http-traffic-splitting.md @@ -17,6 +17,7 @@ When a single backendRef is configured in a HTTPRoute, it will receive 100% of t {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -119,6 +122,7 @@ First, create a second instance of the example app from the quickstart: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -242,6 +248,7 @@ Then create an HTTPRoute that uses both the app from the quickstart and the seco {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -346,6 +355,7 @@ backend-2 service. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -428,6 +440,7 @@ with status code `500`. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http-urlrewrite.md b/site/content/en/latest/tasks/traffic/http-urlrewrite.md index 2e6ec3f0612..0ebb7595c22 100644 --- a/site/content/en/latest/tasks/traffic/http-urlrewrite.md +++ b/site/content/en/latest/tasks/traffic/http-urlrewrite.md @@ -17,6 +17,7 @@ You can configure to rewrite the prefix in the url like below. In this example, {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -149,6 +152,7 @@ You can configure to rewrite the fullpath in the url like below. In this example {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -277,6 +283,7 @@ You can configure to rewrite the hostname like below. In this example, any reque {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/http3.md b/site/content/en/latest/tasks/traffic/http3.md index a55e6c58e24..502c37496b6 100644 --- a/site/content/en/latest/tasks/traffic/http3.md +++ b/site/content/en/latest/tasks/traffic/http3.md @@ -61,6 +61,7 @@ Apply the following ClientTrafficPolicy to enable HTTP3 {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/local-rate-limit.md b/site/content/en/latest/tasks/traffic/local-rate-limit.md index afda7d125a6..37fb5590a44 100644 --- a/site/content/en/latest/tasks/traffic/local-rate-limit.md +++ b/site/content/en/latest/tasks/traffic/local-rate-limit.md @@ -38,6 +38,7 @@ with a value set to `one`. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -98,6 +101,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -250,6 +256,7 @@ This example shows you how to rate limit all requests matching the HTTPRoute rul {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -302,6 +311,7 @@ spec: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/retry.md b/site/content/en/latest/tasks/traffic/retry.md index d5ab467a38b..4de8f604f96 100644 --- a/site/content/en/latest/tasks/traffic/retry.md +++ b/site/content/en/latest/tasks/traffic/retry.md @@ -48,6 +48,7 @@ The request will be retried 5 times with a 100ms base interval and a 10s maximum {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/routing-outside-kubernetes.md b/site/content/en/latest/tasks/traffic/routing-outside-kubernetes.md index e2acfbfc393..7720d899954 100644 --- a/site/content/en/latest/tasks/traffic/routing-outside-kubernetes.md +++ b/site/content/en/latest/tasks/traffic/routing-outside-kubernetes.md @@ -16,6 +16,7 @@ Define a Service and EndpointSlice that represents https://httpbin.org {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -103,6 +106,7 @@ Add a [TLSRoute][] that can route incoming traffic to the above backend that we {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/tcp-routing.md b/site/content/en/latest/tasks/traffic/tcp-routing.md index 878ed917e50..d36f145e266 100644 --- a/site/content/en/latest/tasks/traffic/tcp-routing.md +++ b/site/content/en/latest/tasks/traffic/tcp-routing.md @@ -25,6 +25,7 @@ Install the GatewayClass and a `tcp-gateway` Gateway first. {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -95,6 +98,7 @@ Install two services `foo` and `bar`, which are bound to `backend-1` and `backen {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} @@ -303,6 +309,7 @@ Install two TCPRoutes `tcp-app-1` and `tcp-app-2` with different `sectionName`: {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}} diff --git a/site/content/en/latest/tasks/traffic/udp-routing.md b/site/content/en/latest/tasks/traffic/udp-routing.md index d20287476b9..b9d8e379282 100644 --- a/site/content/en/latest/tasks/traffic/udp-routing.md +++ b/site/content/en/latest/tasks/traffic/udp-routing.md @@ -58,6 +58,7 @@ Create a UDPRoute resource to route UDP traffic received on Gateway port 5300 to {{< tabpane text=true >}} {{% tab header="Apply from stdin" %}} + ```shell cat <}}