Skip to content

Commit 78f627e

Browse files
authored
Fix for documentation broken links (#3447)
1 parent 7b223ac commit 78f627e

File tree

10 files changed

+155
-107
lines changed

10 files changed

+155
-107
lines changed

docs/RELEASE-NOTES.rst

Lines changed: 82 additions & 82 deletions
Large diffs are not rendered by default.

docs/config_examples/Install/openshift/HA/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ From CIS > 2.0, AS3 >= 3.18 is required.
2424
https://clouddocs.f5.com/products/extensions/f5-appsvcs-extension/latest/userguide/installation.html
2525

2626
* Get the required YAML files for the repo and update the files to the setup environment.
27-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/openshift for YAML files to use moving forward.
27+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/openshift for YAML files to use moving forward.
2828

2929
## 3. Adding BIG-IP to OpenShift Cluster
3030

@@ -34,7 +34,7 @@ Create one HostSubnet for each BIG-IP device.
3434
These will handle health monitor traffic.
3535
Also create one HostSubnet to pass data traffic using floating IP address.
3636

37-
**Note** Refer YAML files at https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/openshift/HA
37+
**Note** Refer YAML files at https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/openshift/HA
3838
Clone, the repo and update appropriately as per the environment.
3939

4040
```

docs/config_examples/Install/openshift/StandAlone/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ From CIS > 2.0, AS3 >= 3.18 is required.
1414
https://clouddocs.f5.com/products/extensions/f5-appsvcs-extension/latest/userguide/installation.html
1515

1616
* Get the required YAML files for the repo and update the files to the setup environment.
17-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/openshift for YAML files to use moving forward.
17+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/openshift for YAML files to use moving forward.
1818

1919
## 3. Adding BIG-IP to OpenShift Cluster
2020

docs/config_examples/configmap/user-defined-configmap/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ From CIS > 2.0, AS3 >= 3.18 is required.
2525
https://clouddocs.f5.com/products/extensions/f5-appsvcs-extension/latest/userguide/installation.html
2626

2727
* Get the required YAML files for the repo and update the files to the setup environment.
28-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/configmap/user-defined-configmap for YAML files to use moving forward.
28+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/configmap/user-defined-configmap for YAML files to use moving forward.
2929

3030
CIS uses the partition defined in the CIS configuration by default to communicate with the F5 BIG-IP when adding static ARPs and forwarding entries for VXLAN. CIS managed partitions **<partition_AS3>** and **<partition>** should not be used in ConfigMap as Tenants. If CIS is deployed with **bigip-partition=cis**, then **<cis_AS3>** and **<cis>** are not supposed to be used as a tenant in AS3 declaration. Below is a proper declaration which would be correctly processed by CIS. Using **<k8s>** for the AS3 tenant in AS3.
3131

docs/config_examples/customResource/CustomResource.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ This page is created to document the behaviour of CIS in CRD Mode.
4040
* Schema Validation
4141
- OpenAPI Schema Validation
4242

43-
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
43+
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
4444

4545

4646
**VirtualServer Components**
@@ -198,15 +198,15 @@ This page is created to document the behaviour of CIS in CRD Mode.
198198

199199
### Examples
200200

201-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/VirtualServer
201+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/VirtualServer
202202

203203
## TLSProfile
204204
* TLSProfile is used to specify the TLS termination for a single/list of services in a VirtualServer Custom Resource. TLS termination relies on SNI. Any non-SNI traffic received on port 443 may result in connection issues.
205205
* TLSProfile can be created either with certificates stored as k8s secrets or can be referenced to profiles existing in BIG-IP
206206
* Schema Validation
207207
- OpenAPI Schema Validation
208208

209-
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
209+
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
210210

211211

212212
**TLSProfile Components**
@@ -249,14 +249,14 @@ different terminations(for same domain), one with edge and another with re-encry
249249

250250
### Examples
251251

252-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/VirtualServerWithTLSProfile
252+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/VirtualServerWithTLSProfile
253253

254254
## TransportServer
255255
* TransportServer resource expose non-HTTP traffic configuration for a virtual server address in BIG-IP.
256256
* Schema Validation
257257
- OpenAPI Schema Validation
258258

259-
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
259+
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
260260

261261

262262
**TransportServer Components**
@@ -336,14 +336,14 @@ different terminations(for same domain), one with edge and another with re-encry
336336

337337
### Examples
338338

339-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/TransportServer
339+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/TransportServer
340340

341341
## ExternalDNS
342342
* ExternalDNS CRD's allows you to control DNS records dynamically via Kubernetes/OSCP resources in a DNS provider-agnostic way.
343343
* Schema Validation
344344
- OpenAPI Schema Validation
345345

346-
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
346+
https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResourceDefinitions/customresourcedefinitions.yml
347347

348348

349349
**ExternalDNS Components**
@@ -395,16 +395,16 @@ Known Issues:
395395

396396
### Examples
397397

398-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/ExternalDNS
398+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/ExternalDNS
399399

400400

401401
## IngressLink
402402

403-
Refer https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/IngressLink/README.md
403+
Refer https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/IngressLink/README.md
404404

405405
## Policy CRD
406406

407-
Refer https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy
407+
Refer https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy
408408

409409

410410
# Note

docs/config_examples/customResource/IngressLink/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Create IngressLink Custom Resource definition as follows:
3232
* On the Main tab, click **Local Traffic > iRules**.
3333
* Click **Create**.
3434
* In the Name field, type name as "Proxy_Protocol_iRule".
35-
* In the Definition field, Copy the definition from [Proxy_Protocol_iRule](https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/Proxy_Protocol_iRule) file.
35+
* In the Definition field, Copy the definition from [Proxy_Protocol_iRule](https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/Proxy_Protocol_iRule) file.
3636
* Click **Finished**.
3737

3838
### 3. Install the CIS Controller.
@@ -48,7 +48,7 @@ Create IngressLink Custom Resource definition as follows:
4848

4949
* Download the sample IngressLink Resource:
5050

51-
```curl -OL https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/ingresslink.yaml```
51+
```curl -OL https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/ingresslink.yaml```
5252

5353
* Update the "virtualServerAddress" parameter in the ingresslink.yaml resource. This IP address will be used to configure the BIG-IP device. It will be used to accept traffic and load balance it among the NGINX Ingress Controller pods.
5454

@@ -62,9 +62,9 @@ Create IngressLink Custom Resource definition as follows:
6262

6363
To test the integration, deploy a sample application:
6464

65-
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/ingress-example/cafe.yaml
66-
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/ingress-example/cafe-secret.yaml
67-
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/ingress-example/cafe-ingress.yaml
65+
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/ingress-example/cafe.yaml
66+
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/ingress-example/cafe-secret.yaml
67+
kubectl apply -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/ingress-example/cafe-ingress.yaml
6868

6969
The Ingress Controller pods are behind the IP configured in Step 5 (virtualServerAddress parameter).
7070

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Virtual Server with http2 Profile
2+
3+
This section demonstrates the option to configure http2 Profile in virtual server.
4+
5+
Option which can use to refer http2 Profile:
6+
7+
```
8+
#Examples
9+
#1
10+
profiles:
11+
http2:
12+
client: /Common/samplehttp2Client
13+
14+
#2
15+
profiles:
16+
http2:
17+
server: /Common/samplehttp2server
18+
#3
19+
profiles:
20+
http2:
21+
client: /Common/samplehttp2Client
22+
server: /Common/samplehttp2server
23+
```
24+
25+
## vs-with-profilehttp2.yaml
26+
27+
By deploying this yaml file in your cluster, CIS will create a Virtual Server containing http2 Profile on BIG-IP.
28+
Here client corresponds to ingress http2 profile and Server refers to egress http2 profile.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
apiVersion: "cis.f5.com/v1"
2+
kind: VirtualServer
3+
metadata:
4+
name: my-new-virtual-server
5+
labels:
6+
f5cr: "true"
7+
spec:
8+
# This is an insecure virtual, Please use TLSProfile to secure the virtual
9+
# check out tls examples to understand more.
10+
host: cafe.example.com
11+
virtualServerAddress: "172.16.3.4"
12+
botDefense: /Common/bot-defense
13+
profiles:
14+
http2:
15+
client: /Common/Samplehttp2client
16+
server: /Common/Samplehttp2Server
17+
pools:
18+
- path: /coffee
19+
service: svc-1
20+
servicePort: 80

docs/config_examples/next-gen-routes/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -682,7 +682,7 @@ spec:
682682
| A/B Deployment | YES | YES |
683683
| Policy CR | NO | YES |
684684

685-
Please refer to the [examples](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details.
685+
Please refer to the [examples](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details.
686686

687687

688688
## Known issues
@@ -736,7 +736,7 @@ Yes you can continue using the rewriteAppRoot in route annotations.
736736
### Any changes in RBAC?
737737
No.
738738
### How do I use policy CR with routes?
739-
You can define the policy CR in Extended ConfigMap [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy). </br>
739+
You can define the policy CR in Extended ConfigMap [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy). </br>
740740
Make sure that Policy CR is created in a namespace which CIS is monitoring.
741741
### How do I apply different policies/profiles to HTTP and HTTPS virtual servers?
742742
You can use both PolicyCR and httpServerPolicyCR in route group to apply different policies/profiles to HTTP and HTTPS VS.</br>

docs/config_examples/next-gen-routes/migration-guide.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515

1616
## Overview
1717
NextGenRoute Controller uses extendedConfigMap for extending the native resources (routes). All the routes are group by namespaces or namespace-labels into RouteGroups. Each RouteGroup shares the same vsAddress, vsName and policy CR which is specified in extendedConfigMap.
18-
In order to migrate to nextGen we first need to create an extended ConfigMap and policy CR then modify the CIS deployment accordingly. Refer [NextGen Route Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details
18+
In order to migrate to nextGen we first need to create an extended ConfigMap and policy CR then modify the CIS deployment accordingly. Refer [NextGen Route Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details
1919

2020
## Migration using defaultRouteGroup
2121
Currently, RouteGroup are expected to define per namespace or namespace label as follows:
@@ -171,7 +171,7 @@ Sample Route:
171171

172172
#### Step-2 Creating Extended ConfigMap using defaultRouteGroup
173173

174-
Extended ConfigMap is a must-use with the nextGen Route Controller. Refer [Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details
174+
Extended ConfigMap is a must-use with the nextGen Route Controller. Refer [Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details
175175

176176
You can create an extended ConfigMap for given example as follows:
177177
* You can define the vserverAddr same as "route-vserver-addr" parameter in CIS deployment.
@@ -222,7 +222,7 @@ spec:
222222
223223
**Note**:
224224
* If WAF/AllowSourceRange is defined in both route annotation & policy CR, route annotation takes the priority by default.
225-
* You can use the Policy CR to extend the virtual server capabilities even more. [See Details](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy).
225+
* You can use the Policy CR to extend the virtual server capabilities even more. [See Details](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy).
226226
* Make sure the namespace where we created the policy CR monitored by CIS.
227227
228228
#### Step-4 Update the CIS deployment parameters and start
@@ -248,7 +248,7 @@ spec:
248248
249249
* Remove "tls-version", "cipher-group" & "ciphers" parameters from CIS deployment and define them under "baseRouteSpec" in extendedConfigMap. See Step-2 above.
250250
251-
* Remove "override-as3-declaration" parameter as it's no more supported with NextGen Routes. You can use the Policy CR to extend the virtual server capabilities. [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy).
251+
* Remove "override-as3-declaration" parameter as it's no more supported with NextGen Routes. You can use the Policy CR to extend the virtual server capabilities. [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy).
252252
253253
```
254254
args: [

0 commit comments

Comments
 (0)