Skip to content
This repository was archived by the owner on May 5, 2025. It is now read-only.

guides: Creating a PrivateLink to TriggerMesh Services #297

Merged
merged 1 commit into from
Aug 5, 2022

Conversation

sameersbn
Copy link
Contributor

Closes #296

@sameersbn sameersbn self-assigned this Aug 5, 2022
@sameersbn sameersbn requested review from jmcx and sebgoa August 5, 2022 07:14
@sameersbn sameersbn force-pushed the knative-privatelink branch from 1181590 to 4747f01 Compare August 5, 2022 07:21
Copy link
Contributor

@jmcx jmcx left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Minor comments, amazing quality post!

[PrivateLink](https://aws.amazon.com/privatelink) is a service that enables you to establish private connectivity
between VPCs and services hosted on Amazon Web Services (AWS) or on-premises,
without exposing data to the internet. Let’s look at the configuration required
to access Knative services deployed on an AWS Elastic Kubernetes Service (AWS)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same comment about Knative => TriggerMesh

@@ -0,0 +1,136 @@
# Creating a PrivateLink to Knative Services
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a way we can spin this more around exposing TriggerMesh services than Knative? if it makes sense.


## Configuring the Istio Ingress Gateway

In the default configuration, the Istio networking layer for Knative creates an
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe worth mention something like

"the Istio networking layer (or other such as Contour or Kourrier)"

@sameersbn sameersbn requested a review from jmcx August 5, 2022 09:53

Before we set up the PrivateLink, let’s make sure that the VPC to which our EKS
cluster is attached has the DNS hostnames feature enabled. This is needed in order
to be able to access our Knative services using the URL configured for the services.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

knative still mentioned here, maybe not problem

## Configuring the Istio Ingress Gateway

The Istio networking layer (or others such as Kourier) creates an Elastic Load
Balancer (ELB) allowing public access to the Knative services running in the cluster.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

knative still mentioned here, maybe not problem

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍


To access the TriggerMesh services via the PrivateLink, we can create an EC2 instance,
in the consumers AWS account, on the same VPC in which the endpoint was created
and use cURL to reach the Knative service endpoints.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

knative still mentioned here, maybe not problem

@sameersbn sameersbn force-pushed the knative-privatelink branch from f20b9d4 to 1f5b46f Compare August 5, 2022 11:43
@sameersbn sameersbn changed the title guides: Creating a PrivateLink to Knative Services guides: Creating a PrivateLink to TriggerMesh Services Aug 5, 2022
@sameersbn sameersbn merged commit 4a7ffaf into main Aug 5, 2022
@sameersbn sameersbn deleted the knative-privatelink branch August 5, 2022 11:44
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Guide: PrivateLink to Knative Services
2 participants