Skip to content
This repository has been archived by the owner on May 17, 2019. It is now read-only.

Latest commit

 

History

History
33 lines (18 loc) · 1.3 KB

File metadata and controls

33 lines (18 loc) · 1.3 KB

Croc Hunter Canary deployment with Istio

Install Istio

Access from the Internet using Istio ingress gateway

Istio will route the traffic entering through the ingress gateway. Find the ingress gateway ip address and configure a wildcard DNS for it.

For example map *.example.com to

kubectl -n istio-system get service istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}'

Create the Gateway that will route all external traffic through the ingress gateway

kubectl create -f gateway.yaml

Create the VirtualService that will route to the staging and production deployments (change the host to your DNS)

kubectl create -f virtualservice.yaml

Access from other services in the cluster through Istio

If you need to access the service through Istio from inside the cluster (not needed for the demo)

Enable Istio in the jx-staging and jx-production namespaces

kubectl label namespace jx-staging istio-injection=enabled
kubectl label namespace jx-production istio-injection=enabled

Optional: Create a ServiceEntry to allow traffic to the Google metadata api to display the region

kubectl create -f google-api.yaml