diff --git a/rfc/001-service-mesh.md b/rfc/001-service-mesh.md index 5f0bccda49..d880debac1 100644 --- a/rfc/001-service-mesh.md +++ b/rfc/001-service-mesh.md @@ -134,7 +134,7 @@ Note that this is not secure by default. If the user doesn't configure the endpoints in their application, traffic is send out unencrypted and without authentication. - + ### Step 2: Ingress @@ -148,7 +148,7 @@ Envoy. Also traffic originating from the uid the proxy is started with, is not redirected. Since by default all traffic is routed to Envoy, the workload's ingress endpoint are secure by default. - + ### Step 3: Secure by default egress