diff --git a/Istio/istio-classic/README.md b/Istio/istio-classic/README.md
index 0d1a212..50fa73b 100644
--- a/Istio/istio-classic/README.md
+++ b/Istio/istio-classic/README.md
@@ -12,5 +12,5 @@ https://istio.io/latest/docs/ops/diagnostic-tools/proxy-cmd/
-
+Using service accounts
diff --git a/Istio/sidecar/01-ingress-proxy-forwarding/README.md b/Istio/sidecar/01-ingress-proxy-forwarding/README.md
new file mode 100644
index 0000000..2ea94af
--- /dev/null
+++ b/Istio/sidecar/01-ingress-proxy-forwarding/README.md
@@ -0,0 +1,108 @@
+
+
+
+
+# Continues from
+
+- 01-hello_world_1_service_1_deployment
+
+
+
+
+
+---
+
+## Files
+
+- deployment.yaml
+- gateway.yaml
+- sidecar.yaml
+
+> Added the `sidecar.yaml` file.
+
+## deployment.yaml
+
+### Creates
+
+#### Service
+
+- helloworld
+
+#### Deployments
+
+- helloworld-nginx (Nginx container)
+
+## gateway.yaml
+
+### Creates
+
+#### Gateway
+
+##### helloworld-gateway
+
+###### Configuration
+
+```yml
+port: 80
+istio-ingress: ingressgateway
+hosts: "*"
+```
+
+#### VirtualService
+
+##### helloworld-vs
+
+###### Configuration
+
+
+
+```yaml
+hosts: "*"
+uri: "/helloworld"
+rewrite:
+ uri: "/"
+```
+- Allows the traffic from that have any domain.
+
+- Only allows traffic that has as a destination the directory/path `/helloworld`.
+
+- `rewrite.uri` allows to redirect the traffic towards the root directory of the service, as the service(s) used don't have any directory named `helloworld` but are configured to work at the root base level.
+
+# Run example
+
+## Deploy resources
+
+```shell
+$ kubectl apply -f ./
+service/helloworld created
+deployment.apps/helloworld-nginx created
+gateway.networking.istio.io/helloworld-gateway created
+virtualservice.networking.istio.io/helloworld-vs created
+```
+
+## Wait for the pods to be ready
+
+(I think it deploys 2 pods as there is the Envoy Proxy pod besides the Nginx deployment)
+
+```shell
+$ kubectl get deployment helloworld-nginx -w
+NAME READY UP-TO-DATE AVAILABLE AGE
+helloworld-nginx 1/1 1 1 44s
+```
+
+## Test the service
+
+### Get LB IP
+
+```shell
+$ kubectl get svc istio-ingressgateway -n istio-system
+NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
+istio-ingressgateway LoadBalancer 10.97.47.216 192.168.1.50 15021:31316/TCP,80:32012/TCP,443:32486/TCP 39h
+```
+
+### Curl
+
+```shell
+$ curl 192.168.1.50/helloworld -s | grep "
.*" ✔
+Welcome to nginx!
+```
\ No newline at end of file
diff --git a/Istio/sidecar/01-ingress-proxy-forwarding/deployment.yaml b/Istio/sidecar/01-ingress-proxy-forwarding/deployment.yaml
new file mode 100644
index 0000000..8c16538
--- /dev/null
+++ b/Istio/sidecar/01-ingress-proxy-forwarding/deployment.yaml
@@ -0,0 +1,44 @@
+## https://github.com/istio/istio/blob/master/samples/helloworld/helloworld.yaml
+apiVersion: v1
+kind: Service
+metadata:
+ name: helloworld-service
+ labels:
+ app: helloworld
+ service: helloworld
+# namespace: visiblent
+spec:
+ ports:
+ - port: 8080
+ name: http
+ selector:
+ app: helloworld
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: helloworld-nginx
+ labels:
+ app: helloworld
+# namespace: visiblent
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: helloworld
+ template:
+ metadata:
+ labels:
+ app: helloworld
+# namespace: visiblent
+ spec:
+# serviceAccountName: istio-helloworld
+ containers:
+ - name: helloworld
+ image: nginx
+ resources:
+ requests:
+ cpu: "100m"
+ imagePullPolicy: IfNotPresent #Always
+ ports:
+ - containerPort: 80
diff --git a/Istio/sidecar/01-ingress-proxy-forwarding/gateway.yaml b/Istio/sidecar/01-ingress-proxy-forwarding/gateway.yaml
new file mode 100644
index 0000000..6206265
--- /dev/null
+++ b/Istio/sidecar/01-ingress-proxy-forwarding/gateway.yaml
@@ -0,0 +1,64 @@
+# https://github.com/istio/istio/blob/master/samples/helloworld/helloworld-gateway.yaml
+apiVersion: networking.istio.io/v1alpha3
+kind: Gateway
+metadata:
+ name: helloworld-gateway
+spec:
+ selector:
+ istio: ingressgateway # use istio default controller
+ servers:
+ - port:
+ number: 80
+ name: http
+ protocol: HTTP
+ hosts:
+ - "*"
+---
+apiVersion: networking.istio.io/v1alpha3
+kind: VirtualService
+metadata:
+ name: helloworld-vs
+spec:
+ hosts:
+ - "*"
+ gateways:
+ - helloworld-gateway
+ http:
+ - match:
+ - uri:
+ exact: /helloworld
+ route:
+ - destination:
+ host: helliworld
+# host: helloworlddo
+# host: helloworld-nginx-56c5c77cd7-9mxmf.visiblent
+ port:
+ number: 8080
+ rewrite:
+ uri: "/"
+---
+#apiVersion: networking.istio.io/v1alpha3
+#kind: VirtualService
+#metadata:
+# name: helloworld-vs
+#spec:
+# hosts:
+# - "*"
+# gateways:
+# - helloworld-gateway
+# http:
+# - timeout: 3s
+# match:
+# - uri:
+# - exact: "/external"
+# route:
+# - destination:
+# host: help.websiteos.com
+# port:
+# number: 80
+# rewrite:
+# uri: "/websiteos/example_of_a_simple_html_page.htm"
+# headers:
+# request:
+# set:
+# HOST: "help.websiteos.com"
\ No newline at end of file
diff --git a/Istio/sidecar/01-ingress-proxy-forwarding/sidecar.yaml b/Istio/sidecar/01-ingress-proxy-forwarding/sidecar.yaml
new file mode 100644
index 0000000..7ce4d69
--- /dev/null
+++ b/Istio/sidecar/01-ingress-proxy-forwarding/sidecar.yaml
@@ -0,0 +1,48 @@
+## First we overide the default configuration.
+# This configures the egress, to only allow egress within the same namespace, and to `istio-system`
+#apiVersion: networking.istio.io/v1beta1
+#kind: Sidecar
+#metadata:
+# name: default
+# namespace: istio-config
+#spec:
+# egress:
+# - hosts:
+# - "./*"
+# - "istio-system/*"
+---
+apiVersion: networking.istio.io/v1alpha3
+kind: Sidecar
+metadata:
+ name: helloworlddo
+# name: helloworld-sidecar
+# namespace: visiblent
+spec:
+ workloadSelector:
+ labels:
+ app: helloworld
+ ingress:
+# - bind: 192.168.1.50
+# - bind: 172.17.121.220
+ - port:
+ number: 8080
+ protocol: HTTP
+ name: ingressport
+ defaultEndpoint: 127.0.0.1:80
+# defaultEndpoint: unix:///var/run/someuds.sock
+# captureMode: DEFAULT
+# egress:
+# - port:
+# number: 80
+# protocol: HTTP
+# name: egressport
+# hosts:
+# - "prod-us1/*"
+# - hosts:
+# - "istio-system/*"
+# egress:
+# hosts:
+# - "./*"
+# - "istio-system/*"
+# captureMode: DEFAULT
+
diff --git a/Istio/sidecar/01-visibility/README.md b/Istio/sidecar/01-visibility/README.md
deleted file mode 100644
index 24129d7..0000000
--- a/Istio/sidecar/01-visibility/README.md
+++ /dev/null
@@ -1,27 +0,0 @@
-https://github.com/steren/istio.github.io/blob/master/_docs/setup/kubernetes/sidecar-injection.md
-
-https://istio.io/latest/docs/reference/config/networking/sidecar/
-
-
-# Continues from
-
-- 01-hello_world_1_service_1_deployment
-
-
-
-the labbel `workloadSelector` only affects the pods.
-
-```yaml
- workloadSelector:
-```
-
-
-
-
-```sh
-kubectl create namespace istio-config
-```
-
-
-
-No fucking clue on how to make it NOT work.
diff --git a/Istio/sidecar/01-visibility/gateway.yaml b/Istio/sidecar/01-visibility/gateway.yaml
deleted file mode 100644
index ea57ed8..0000000
--- a/Istio/sidecar/01-visibility/gateway.yaml
+++ /dev/null
@@ -1,36 +0,0 @@
-# https://github.com/istio/istio/blob/master/samples/helloworld/helloworld-gateway.yaml
-apiVersion: networking.istio.io/v1alpha3
-kind: Gateway
-metadata:
- name: helloworld-gateway
-spec:
- selector:
- istio: ingressgateway # use istio default controller
- servers:
- - port:
- number: 80
- name: http
- protocol: HTTP
- hosts:
- - "*"
----
-apiVersion: networking.istio.io/v1alpha3
-kind: VirtualService
-metadata:
- name: helloworld-vs
-spec:
- hosts:
- - "*"
- gateways:
- - helloworld-gateway
- http:
- - match:
- - uri:
- exact: /helloworld
- route:
- - destination:
- host: helloworld.visiblent.svc.cluster.local
- port:
- number: 80
- rewrite:
- uri: "/"
\ No newline at end of file
diff --git a/Istio/sidecar/01-visibility/sidecar.yaml b/Istio/sidecar/01-visibility/sidecar.yaml
deleted file mode 100644
index 7faeb95..0000000
--- a/Istio/sidecar/01-visibility/sidecar.yaml
+++ /dev/null
@@ -1,23 +0,0 @@
-## First we overide the default configuration.
-# This configures the egress, to only allow egress within the same namespace, and to `istio-system`
-apiVersion: networking.istio.io/v1beta1
-kind: Sidecar
-metadata:
- name: default
- namespace: istio-config
-spec:
- egress:
- - hosts:
- - "./*"
-# - "istio-system/*"
----
-apiVersion: networking.istio.io/v1beta1
-kind: Sidecar
-metadata:
- name: default
- namespace: visiblent
-spec:
- egress:
- - hosts:
- - "visiblent/*"
- - "istio-system/*"
diff --git a/Istio/sidecar/01-visibility/tmp.yaml b/Istio/sidecar/01-visibility/tmp.yaml
deleted file mode 100644
index 7c95865..0000000
--- a/Istio/sidecar/01-visibility/tmp.yaml
+++ /dev/null
@@ -1,235 +0,0 @@
-## https://github.com/istio/istio/blob/master/samples/helloworld/helloworld.yaml
-#apiVersion: v1
-#kind: Service
-#metadata:
-# name: helloworld
-# labels:
-# app: helloworld
-# service: helloworld
-#spec:
-# ports:
-# - port: 80
-# name: http
-# selector:
-# app: helloworld
-#---
-##apiVersion: v1
-##kind: ServiceAccount
-##metadata:
-## name: istio-helloworld
-## labels:
-## account:
-#---
-#apiVersion: apps/v1
-#kind: Deployment
-#metadata:
-# creationTimestamp: null
-# labels:
-# app: helloworld
-# name: helloworld-nginx
-#spec:
-# replicas: 1
-# selector:
-# matchLabels:
-# app: helloworld
-# strategy: {}
-# template:
-# metadata:
-# annotations:
-# kubectl.kubernetes.io/default-container: helloworld
-# kubectl.kubernetes.io/default-logs-container: helloworld
-# prometheus.io/path: /stats/prometheus
-# prometheus.io/port: "15020"
-# prometheus.io/scrape: "true"
-# sidecar.istio.io/status: '{"initContainers":["istio-init"],"containers":["istio-proxy"],"volumes":["workload-socket","credential-socket","workload-certs","istio-envoy","istio-data","istio-podinfo","istio-token","istiod-ca-cert"],"imagePullSecrets":null,"revision":"default"}'
-# creationTimestamp: null
-# labels:
-# app: helloworld
-# security.istio.io/tlsMode: istio
-# service.istio.io/canonical-name: helloworld
-# service.istio.io/canonical-revision: latest
-# spec:
-# containers:
-# - image: nginx
-# imagePullPolicy: IfNotPresent
-# name: helloworld
-# ports:
-# - containerPort: 80
-# resources:
-# requests:
-# cpu: 100m
-# - args:
-# - proxy
-# - sidecar
-# - --domain
-# - $(POD_NAMESPACE).svc.cluster.local
-# - --proxyLogLevel=warning
-# - --proxyComponentLogLevel=misc:error
-# - --log_output_level=default:info
-# - --concurrency
-# - "2"
-# env:
-# - name: JWT_POLICY
-# value: third-party-jwt
-# - name: PILOT_CERT_PROVIDER
-# value: istiod
-# - name: CA_ADDR
-# value: istiod.istio-system.svc:15012
-# - name: POD_NAME
-# valueFrom:
-# fieldRef:
-# fieldPath: metadata.name
-# - name: POD_NAMESPACE
-# valueFrom:
-# fieldRef:
-# fieldPath: metadata.namespace
-# - name: INSTANCE_IP
-# valueFrom:
-# fieldRef:
-# fieldPath: status.podIP
-# - name: SERVICE_ACCOUNT
-# valueFrom:
-# fieldRef:
-# fieldPath: spec.serviceAccountName
-# - name: HOST_IP
-# valueFrom:
-# fieldRef:
-# fieldPath: status.hostIP
-# - name: PROXY_CONFIG
-# value: |
-# {}
-# - name: ISTIO_META_POD_PORTS
-# value: |-
-# [
-# {"containerPort":80}
-# ]
-# - name: ISTIO_META_APP_CONTAINERS
-# value: helloworld
-# - name: ISTIO_META_CLUSTER_ID
-# value: Kubernetes
-# - name: ISTIO_META_INTERCEPTION_MODE
-# value: REDIRECT
-# - name: ISTIO_META_MESH_ID
-# value: cluster.local
-# - name: TRUST_DOMAIN
-# value: cluster.local
-# image: istio/proxyv2:1.16.1
-# name: istio-proxy
-# ports:
-# - containerPort: 15090
-# name: http-envoy-prom
-# protocol: TCP
-# readinessProbe:
-# failureThreshold: 30
-# httpGet:
-# path: /healthz/ready
-# port: 15021
-# initialDelaySeconds: 1
-# periodSeconds: 2
-# timeoutSeconds: 3
-# resources:
-# limits:
-# cpu: "2"
-# memory: 1Gi
-# requests:
-# cpu: 100m
-# memory: 128Mi
-# securityContext:
-# allowPrivilegeEscalation: false
-# capabilities:
-# drop:
-# - ALL
-# privileged: false
-# readOnlyRootFilesystem: true
-# runAsGroup: 1337
-# runAsNonRoot: true
-# runAsUser: 1337
-# volumeMounts:
-# - mountPath: /var/run/secrets/workload-spiffe-uds
-# name: workload-socket
-# - mountPath: /var/run/secrets/credential-uds
-# name: credential-socket
-# - mountPath: /var/run/secrets/workload-spiffe-credentials
-# name: workload-certs
-# - mountPath: /var/run/secrets/istio
-# name: istiod-ca-cert
-# - mountPath: /var/lib/istio/data
-# name: istio-data
-# - mountPath: /etc/istio/proxy
-# name: istio-envoy
-# - mountPath: /var/run/secrets/tokens
-# name: istio-token
-# - mountPath: /etc/istio/pod
-# name: istio-podinfo
-# initContainers:
-# - args:
-# - istio-iptables
-# - -p
-# - "15001"
-# - -z
-# - "15006"
-# - -u
-# - "1337"
-# - -m
-# - REDIRECT
-# - -i
-# - '*'
-# - -x
-# - ""
-# - -b
-# - '*'
-# - -d
-# - 15090,15021,15020
-# - --log_output_level=default:info
-# image: istio/proxyv2:1.16.1
-# name: istio-init
-# resources:
-# limits:
-# cpu: "2"
-# memory: 1Gi
-# requests:
-# cpu: 100m
-# memory: 128Mi
-# securityContext:
-# allowPrivilegeEscalation: false
-# capabilities:
-# add:
-# - NET_ADMIN
-# - NET_RAW
-# drop:
-# - ALL
-# privileged: false
-# readOnlyRootFilesystem: false
-# runAsGroup: 0
-# runAsNonRoot: false
-# runAsUser: 0
-# volumes:
-# - name: workload-socket
-# - name: credential-socket
-# - name: workload-certs
-# - emptyDir:
-# medium: Memory
-# name: istio-envoy
-# - emptyDir: {}
-# name: istio-data
-# - downwardAPI:
-# items:
-# - fieldRef:
-# fieldPath: metadata.labels
-# path: labels
-# - fieldRef:
-# fieldPath: metadata.annotations
-# path: annotations
-# name: istio-podinfo
-# - name: istio-token
-# projected:
-# sources:
-# - serviceAccountToken:
-# audience: istio-ca
-# expirationSeconds: 43200
-# path: istio-token
-# - configMap:
-# name: istio-ca-root-cert
-# name: istiod-ca-cert
-#status: {}
-#---
diff --git a/Istio/sidecar/README.md b/Istio/sidecar/README.md
index 156694b..28b6d63 100644
--- a/Istio/sidecar/README.md
+++ b/Istio/sidecar/README.md
@@ -8,6 +8,8 @@ I am not very sure on how or why to use this...
+NOT HOW TO TRIGGER / UNTRIGGER IT
+
```yaml
apiVersion:
networking.istio.io/v1alpha3
@@ -20,4 +22,66 @@ spec:
- hosts:
- "./*"
- "istio-system/*"
-```
\ No newline at end of file
+```
+
+
+
+whats this again??
+
+istio operator right? ye, but what is it again? I think I checked this time ago when doing something about creating a new ingress
+
+
+kubectl get io -A
+
+
+2023-04-17T00:08:00.086475Z info validationController Not ready to switch validation to fail-closed: dummy invalid config not rejected
+
+
+2023-04-17T00:08:04.012630Z info validationServer configuration is invalid: gateway must have at least one server
+
+
+
+
+kubectl logs -f deployments/istiod -n istio-system
+
+https://istio.io/latest/docs/reference/config/networking/sidecar/
+
+
+
+
+ egress:
+ - port:
+ number: 8080
+ protocol: HTTP
+ hosts:
+ - "staging/*"
+
+
+
+With the YAML above, the sidecar proxies the traffic that’s bound for port 8080 for services running in the staging namespace.
+
+
+
+
+
+
+
+
+- Confirm pod ingress port forwarding
+
+- Confirm it can reach other places / namespaces / resources (pod egress)
+
+- mtls (somehow)
+
+
+# Ingress
+
+Does stuff
+
+# Egress
+
+What is "bind"
+
+# CaptureMode
+
+Not my problem rn
\ No newline at end of file
diff --git a/Istio/sidecar/01-visibility/01-namespace.yaml b/Istio/sidecar/placeholder/01-namespace.yaml
similarity index 92%
rename from Istio/sidecar/01-visibility/01-namespace.yaml
rename to Istio/sidecar/placeholder/01-namespace.yaml
index e63c0e0..625c1cd 100644
--- a/Istio/sidecar/01-visibility/01-namespace.yaml
+++ b/Istio/sidecar/placeholder/01-namespace.yaml
@@ -5,4 +5,5 @@ metadata:
labels:
# istio-injection: "false"
istio-injection: "enabled"
+ f: "3"
---
\ No newline at end of file
diff --git a/Istio/sidecar/placeholder/README.md b/Istio/sidecar/placeholder/README.md
new file mode 100644
index 0000000..8f520e8
--- /dev/null
+++ b/Istio/sidecar/placeholder/README.md
@@ -0,0 +1,66 @@
+https://github.com/steren/istio.github.io/blob/master/_docs/setup/kubernetes/sidecar-injection.md
+
+https://istio.io/latest/docs/reference/config/networking/sidecar/
+
+
+# Continues from
+
+- 01-hello_world_1_service_1_deployment
+
+
+
+the labbel `workloadSelector` only affects the pods.
+
+```yaml
+ workloadSelector:
+```
+
+
+whats this command again?
+
+
+istioctl operator init
+
+
+https://istio.io/latest/docs/ops/common-problems/injection/
+
+
+```sh
+kubectl create namespace istio-config
+```
+
+
+
+No fucking clue on how to make it NOT work.
+
+
+
+https://istio.io/latest/blog/2021/discovery-selectors/#discovery-selectors-vs-sidecar-resource
+
+
+
+https://istio.io/latest/docs/reference/config/networking/sidecar/
+
+# Sidecar notes
+
+Sidecar describes the configuration of the sidecar proxy that mediates inbound and outbound communication to the
+workload instance it is attached to.
+
+By default, Istio will program all sidecar proxies in the mesh with the necessary
+configuration required to reach every workload instance in the mesh, as well as accept traffic on all the ports associated
+with the workload.
+
+The Sidecar configuration provides a way to fine tune the set of ports, protocols that the proxy will
+accept when forwarding traffic to and from the workload. In addition, it is possible to restrict the set of services that
+the proxy can reach when forwarding outbound traffic from workload instances.
+
+
+
+
+The behavior of the system is undefined if two or more Sidecar configurations with a workloadSelector select the same workload instance.
+
+
+
+https://youtu.be/lnYTqNfyzNk
+
+https://www.youtube.com/watch?v=UJ86BNQEcTA
diff --git a/Istio/sidecar/placeholder/deployment-SE.yaml b/Istio/sidecar/placeholder/deployment-SE.yaml
new file mode 100644
index 0000000..6eb148c
--- /dev/null
+++ b/Istio/sidecar/placeholder/deployment-SE.yaml
@@ -0,0 +1,19 @@
+## https://github.com/istio/istio/blob/master/samples/helloworld/helloworld.yaml
+#---
+#apiVersion: networking.istio.io/v1alpha3
+#kind: ServiceEntry
+#metadata:
+# name: external-svc
+# namespace: visiblent
+#spec:
+# hosts:
+# - help.websiteos.com
+# # /websiteos/example_of_a_simple_html_page.htm
+## - http://help.websiteos.com/websiteos/example_of_a_simple_html_page.htm
+# ports:
+# - number: 80
+# name: http
+# protocol: HTTP
+# resolution: DNS
+# location: MESH_EXTERNAL
+#---
\ No newline at end of file
diff --git a/Istio/sidecar/01-visibility/deployment.yaml b/Istio/sidecar/placeholder/deployment.yaml
similarity index 79%
rename from Istio/sidecar/01-visibility/deployment.yaml
rename to Istio/sidecar/placeholder/deployment.yaml
index da44c94..16de6e5 100644
--- a/Istio/sidecar/01-visibility/deployment.yaml
+++ b/Istio/sidecar/placeholder/deployment.yaml
@@ -1,19 +1,19 @@
-# https://github.com/istio/istio/blob/master/samples/helloworld/helloworld.yaml
+## https://github.com/istio/istio/blob/master/samples/helloworld/helloworld.yaml
apiVersion: v1
kind: Service
metadata:
- name: helloworld
+ name: helliworld
labels:
app: helloworld
service: helloworld
- namespace: visiblent
+# namespace: visiblent
spec:
ports:
- - port: 80
+ - port: 8080
name: http
selector:
app: helloworld
----
+#---
#apiVersion: v1
#kind: ServiceAccount
#metadata:
@@ -27,7 +27,7 @@ metadata:
name: helloworld-nginx
labels:
app: helloworld
- namespace: visiblent
+# namespace: visiblent
spec:
replicas: 1
selector:
@@ -37,7 +37,7 @@ spec:
metadata:
labels:
app: helloworld
- namespace: visiblent
+# namespace: visiblent
spec:
# serviceAccountName: istio-helloworld
containers:
diff --git a/Istio/sidecar/placeholder/gateway.yaml b/Istio/sidecar/placeholder/gateway.yaml
new file mode 100644
index 0000000..6206265
--- /dev/null
+++ b/Istio/sidecar/placeholder/gateway.yaml
@@ -0,0 +1,64 @@
+# https://github.com/istio/istio/blob/master/samples/helloworld/helloworld-gateway.yaml
+apiVersion: networking.istio.io/v1alpha3
+kind: Gateway
+metadata:
+ name: helloworld-gateway
+spec:
+ selector:
+ istio: ingressgateway # use istio default controller
+ servers:
+ - port:
+ number: 80
+ name: http
+ protocol: HTTP
+ hosts:
+ - "*"
+---
+apiVersion: networking.istio.io/v1alpha3
+kind: VirtualService
+metadata:
+ name: helloworld-vs
+spec:
+ hosts:
+ - "*"
+ gateways:
+ - helloworld-gateway
+ http:
+ - match:
+ - uri:
+ exact: /helloworld
+ route:
+ - destination:
+ host: helliworld
+# host: helloworlddo
+# host: helloworld-nginx-56c5c77cd7-9mxmf.visiblent
+ port:
+ number: 8080
+ rewrite:
+ uri: "/"
+---
+#apiVersion: networking.istio.io/v1alpha3
+#kind: VirtualService
+#metadata:
+# name: helloworld-vs
+#spec:
+# hosts:
+# - "*"
+# gateways:
+# - helloworld-gateway
+# http:
+# - timeout: 3s
+# match:
+# - uri:
+# - exact: "/external"
+# route:
+# - destination:
+# host: help.websiteos.com
+# port:
+# number: 80
+# rewrite:
+# uri: "/websiteos/example_of_a_simple_html_page.htm"
+# headers:
+# request:
+# set:
+# HOST: "help.websiteos.com"
\ No newline at end of file
diff --git a/Istio/sidecar/placeholder/sidecar.yaml b/Istio/sidecar/placeholder/sidecar.yaml
new file mode 100644
index 0000000..594f2c9
--- /dev/null
+++ b/Istio/sidecar/placeholder/sidecar.yaml
@@ -0,0 +1,47 @@
+## First we overide the default configuration.
+# This configures the egress, to only allow egress within the same namespace, and to `istio-system`
+apiVersion: networking.istio.io/v1beta1
+kind: Sidecar
+metadata:
+ name: default
+ namespace: istio-config
+spec:
+ egress:
+ - hosts:
+ - "./*"
+ - "istio-system/*"
+---
+apiVersion: networking.istio.io/v1alpha3
+kind: Sidecar
+metadata:
+ name: helloworlddo
+# namespace: visiblent
+spec:
+ workloadSelector:
+ labels:
+ app: helloworld
+ ingress:
+# - bind: 192.168.1.50
+# - bind: 172.17.121.220
+ - port:
+ number: 8080
+ protocol: HTTP
+ name: ingressport
+ defaultEndpoint: 127.0.0.1:80
+# defaultEndpoint: unix:///var/run/someuds.sock
+# captureMode: DEFAULT
+# egress:
+# - port:
+# number: 80
+# protocol: HTTP
+# name: egressport
+# hosts:
+# - "prod-us1/*"
+# - hosts:
+# - "istio-system/*"
+# egress:
+# hosts:
+# - "./*"
+# - "istio-system/*"
+# captureMode: DEFAULT
+
diff --git a/Istio/sidecar/placeholder/tmp.yaml b/Istio/sidecar/placeholder/tmp.yaml
new file mode 100644
index 0000000..db3a681
--- /dev/null
+++ b/Istio/sidecar/placeholder/tmp.yaml
@@ -0,0 +1,23 @@
+#apiVersion:
+# networking.istio.io/v1alpha3
+#kind: Sidecar
+#metadata:
+# name: default
+# namespace: default
+#spec:
+# egress:
+# - hosts:
+# - "./*"
+# - "istio-system/*"
+#---
+#apiVersion: networking.istio.io/v1alpha3
+#kind: Sidecar
+#metadata:
+# name: default-sidecar
+# namespace: default
+#spec:
+# egress:
+# - hosts:
+# - "default/*"
+# - "istio-system/*"
+# - "staging/*"
\ No newline at end of file
diff --git a/Istio/sidecar/placeholder/txt.txt b/Istio/sidecar/placeholder/txt.txt
new file mode 100644
index 0000000..a7966da
--- /dev/null
+++ b/Istio/sidecar/placeholder/txt.txt
@@ -0,0 +1,53 @@
+apiVersion: v1
+kind: Service
+metadata:
+ name: ratings
+ labels:
+ app: ratings
+ service: ratings
+spec:
+ ports:
+ - port: 8443
+ name: https
+ targetPort: 80
+ selector:
+ app: ratings
+
+
+
+apiVersion: security.istio.io/v1beta1
+kind: PeerAuthentication
+metadata:
+ name: ratings-peer-auth
+ namespace: prod-us1
+spec:
+ selector:
+ matchLabels:
+ app: ratings
+ mtls:
+ mode: STRICT
+ portLevelMtls:
+ 80:
+ mode: DISABLE
+
+
+
+apiVersion: networking.istio.io/v1alpha3
+kind: Sidecar
+metadata:
+ name: ratings
+ namespace: prod-us1
+spec:
+ workloadSelector:
+ labels:
+ app: ratings
+ ingress:
+ - port:
+ number: 80
+ protocol: HTTPS
+ name: somename
+ defaultEndpoint: unix:///var/run/someuds.sock
+ tls:
+ mode: SIMPLE
+ privateKey: "/etc/certs/privatekey.pem"
+ serverCertificate: "/etc/certs/servercert.pem"
\ No newline at end of file