Skip to content
This repository has been archived by the owner on May 16, 2022. It is now read-only.

Exercise for the blog post on external ingress proxies in Istio #19

Open
wants to merge 11 commits into
base: master
Choose a base branch
from

Conversation

jhengy
Copy link

@jhengy jhengy commented Feb 26, 2020

Task Accomplished

  • added yaml files to deploy nginx ingress
  • updated README.md
  • did few rounds of testing on the exercise

Reference

@@ -0,0 +1,14 @@
# ingress-ingress-ns.yaml
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ZackButcher Just to verify my understanding, since there's another Ingress resource in the default namespace, which nginx-ingress-controller will enforce this Ingress resource? Is it the nginx-ingress-controller in the same namespace, i.e. ingress namespace?

Comment on lines 8 to 14
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/service-upstream: "true"
nginx.ingress.kubernetes.io/upstream-vhost: httpbin.default.svc.cluster.local
spec:
backend:
serviceName: httpbin
servicePort: 8000
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ZackButcher Also, currently there is only one httpbin service in the default namespace. The same httpbin service is exposed to external traffics by the two Ingress resources in the default and the ingress namespaces. Would it be better if we have two httpbin services in the default namespace, each exposed by a different Ingress resource?

Comment on lines +68 to +75
2. Create ingress resource routing to httpbin
```shell script
kubectl apply -f ingress-ingress-ns.yaml
```
3. Create sidecar resource to allow traffic from pods in ingress namespace to pods in default namespace
```shell script
kubectl apply -f sidecar-ingress-ns.yaml
```
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ZackButcher Another observation is that as of the current setup, these two steps does not seem to be necessary. The verification steps below behave normally when these steps are omitted

@jhengy jhengy marked this pull request as ready for review March 9, 2020 18:09
@jhengy jhengy requested a review from ZackButcher March 9, 2020 18:10
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant