diff --git a/content/en/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/index.md b/content/en/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/index.md index 8a89f0c0275e8..f87c036c285d3 100644 --- a/content/en/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/index.md +++ b/content/en/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/index.md @@ -45,6 +45,8 @@ traffic to external services. * [Deploy Istio egress gateway](/docs/tasks/traffic-management/egress/egress-gateway/#deploy-istio-egress-gateway). +* [Enable Envoy’s access logging](/docs/tasks/telemetry/logs/access-log/#enable-envoy-s-access-logging) + ## Perform TLS origination with an egress gateway This section describes how to perform the same TLS origination as in the diff --git a/content/en/docs/tasks/traffic-management/egress/egress-gateway/index.md b/content/en/docs/tasks/traffic-management/egress/egress-gateway/index.md index c560b5088d9dd..b19be9818a4a5 100644 --- a/content/en/docs/tasks/traffic-management/egress/egress-gateway/index.md +++ b/content/en/docs/tasks/traffic-management/egress/egress-gateway/index.md @@ -37,6 +37,8 @@ controlled way. {{< boilerplate before-you-begin-egress >}} +* [Enable Envoy’s access logging](/docs/tasks/telemetry/logs/access-log/#enable-envoy-s-access-logging) + ## Deploy Istio egress gateway 1. Check if the Istio egress gateway is deployed: @@ -310,7 +312,7 @@ You need to specify port 443 with protocol `TLS` in a corresponding `ServiceEntr EOF {{< /text >}} -1. Verify that your `ServiceEntry` was applied correctly by sending an HTTPS request to [http://edition.cnn.com/politics](https://edition.cnn.com/politics). +1. Verify that your `ServiceEntry` was applied correctly by sending an HTTPS request to [https://edition.cnn.com/politics](https://edition.cnn.com/politics). {{< text bash >}} $ kubectl exec -it $SOURCE_POD -c sleep -- curl -sL -o /dev/null -D - https://edition.cnn.com/politics @@ -482,7 +484,7 @@ You need to specify port 443 with protocol `TLS` in a corresponding `ServiceEntr {{< /tabset >}} -1. Send an HTTPS request to [http://edition.cnn.com/politics](https://edition.cnn.com/politics). +1. Send an HTTPS request to [https://edition.cnn.com/politics](https://edition.cnn.com/politics). The output should be the same as before. {{< text bash >}} diff --git a/content/en/docs/tasks/traffic-management/egress/egress_sni_monitoring_and_policies/index.md b/content/en/docs/tasks/traffic-management/egress/egress_sni_monitoring_and_policies/index.md index 039ee258c55e5..8f891252d726e 100644 --- a/content/en/docs/tasks/traffic-management/egress/egress_sni_monitoring_and_policies/index.md +++ b/content/en/docs/tasks/traffic-management/egress/egress_sni_monitoring_and_policies/index.md @@ -15,6 +15,8 @@ example extends that example to show how to configure SNI monitoring and apply p * [Deploy Istio egress gateway](/docs/tasks/traffic-management/egress/egress-gateway/#deploy-istio-egress-gateway). +* [Enable Envoy’s access logging](/docs/tasks/telemetry/logs/access-log/#enable-envoy-s-access-logging) + * Configure traffic to `*.wikipedia.org` by following [the steps](/docs/tasks/traffic-management/egress/wildcard-egress-hosts/#wildcard-configuration-for-arbitrary-domains) in [Configure Egress Traffic using Wildcard Hosts](/docs/tasks/traffic-management/egress/wildcard-egress-hosts/) example, diff --git a/content/en/docs/tasks/traffic-management/egress/http-proxy/index.md b/content/en/docs/tasks/traffic-management/egress/http-proxy/index.md index ec8cc3b81c774..2e5b4d56b0ef6 100644 --- a/content/en/docs/tasks/traffic-management/egress/http-proxy/index.md +++ b/content/en/docs/tasks/traffic-management/egress/http-proxy/index.md @@ -18,6 +18,8 @@ services. {{< boilerplate before-you-begin-egress >}} +* [Enable Envoy’s access logging](/docs/tasks/telemetry/logs/access-log/#enable-envoy-s-access-logging) + ## Deploy an HTTPS proxy To simulate a legacy proxy and only for this example, you deploy an HTTPS proxy inside your cluster. diff --git a/content/en/docs/tasks/traffic-management/egress/wildcard-egress-hosts/index.md b/content/en/docs/tasks/traffic-management/egress/wildcard-egress-hosts/index.md index 8805cd2f4fc46..077c6340c4b47 100644 --- a/content/en/docs/tasks/traffic-management/egress/wildcard-egress-hosts/index.md +++ b/content/en/docs/tasks/traffic-management/egress/wildcard-egress-hosts/index.md @@ -25,6 +25,8 @@ without the need to specify every language's site separately. * [Deploy Istio egress gateway](/docs/tasks/traffic-management/egress/egress-gateway/#deploy-istio-egress-gateway). +* [Enable Envoy’s access logging](/docs/tasks/telemetry/logs/access-log/#enable-envoy-s-access-logging) + ## Configure direct traffic to a wildcard host The first, and simplest, way to access a set of hosts within a common domain is by configuring