Some cleanup for mesh expansion. (#1356)

* Some cleanup for mesh expansion.

1) Added an example ILB
2) Port 27017 is not needed.

* Fix typo.

* Address linsun's comments.

* Ignore Keepalived spell check.
This commit is contained in:
Guang Ya Liu 2018-06-04 21:45:44 +08:00 committed by Lin Sun
parent 3b6f633c1f
commit 054306e83a
2 changed files with 9 additions and 5 deletions

View File

@ -88,6 +88,7 @@ Istiofied
JSON-formatted JSON-formatted
JWT JWT
JWTs JWTs
Keepalived
Kibana Kibana
Kops Kops
Kuat Kuat

View File

@ -35,13 +35,16 @@ You should customize it based on your provisioning tools and DNS requirements.
### Preparing the Kubernetes cluster for expansion ### Preparing the Kubernetes cluster for expansion
* Setup Internal Load Balancers (ILBs) for Kube DNS, Pilot, Mixer and Citadel. This step is specific to * Setup Internal Load Balancers (ILBs) for Kube DNS, Pilot, Mixer and Citadel. This step is specific to
each cloud provider, so you may need to edit annotations. each cloud provider, so you may need to edit annotations. You can use an ILB based on Keepalived at
[here](https://github.com/gyliu513/work/tree/master/k8s/charts/keepalived) for demo or test in case where
the cloud provider or private cloud (for example IBM Cloud Private) doesn't have load balancer service
support out of box.
```command ```command
$ kubectl apply -f install/kubernetes/mesh-expansion.yaml $ kubectl apply -f install/kubernetes/mesh-expansion.yaml
``` ```
* Generate the Istio 'cluster.env' configuration to be deployed in the VMs. This file contains * Generate the Istio `cluster.env` configuration to be deployed in the VMs. This file contains
the cluster IP address ranges to intercept. the cluster IP address ranges to intercept.
```command ```command
@ -250,17 +253,17 @@ Oct 13 21:32:29 demo-vm-1 node_agent[6941]: I1013 21:32:29.862575 6941 nodeag
## Running services on a mesh expansion machine ## Running services on a mesh expansion machine
* Configure the sidecar to intercept the port. This is configured in ``/var/lib/istio/envoy/sidecar.env`, * Configure the sidecar to intercept the port. This is configured in `/var/lib/istio/envoy/sidecar.env`,
using the ISTIO_INBOUND_PORTS environment variable. using the ISTIO_INBOUND_PORTS environment variable.
Example (on the VM running the service): Example (on the VM running the service):
```command ```command
$ echo "ISTIO_INBOUND_PORTS=27017,3306,8080" > /var/lib/istio/envoy/sidecar.env $ echo "ISTIO_INBOUND_PORTS=3306,8080" > /var/lib/istio/envoy/sidecar.env
$ systemctl restart istio $ systemctl restart istio
``` ```
* Manually configure a selector-less service and endpoints. The 'selector-less' service is used for * Manually configure a selector-less service and endpoints. The `selector-less` service is used for
services that are not backed by Kubernetes pods. services that are not backed by Kubernetes pods.
Example, on a machine with permissions to modify Kubernetes services: Example, on a machine with permissions to modify Kubernetes services: