instruction fixes (#127)

This commit is contained in:
Frank Budinsky 2017-05-08 11:58:31 -04:00 committed by GitHub
parent b691649b51
commit 22c0fd9bf1
1 changed files with 26 additions and 26 deletions

View File

@ -22,29 +22,8 @@ to configure ingress behavior.
* Start the [httpbin](https://github.com/istio/istio/tree/master/demos/apps/httpbin) sample,
which will be used as the destination service to be exposed externally.
* Determine the ingress URL:
If your cluster is running in an environment that supports external load balancers,
use the ingress' external address:
```bash
kubectl get ingress -o wide
```
```
NAME HOSTS ADDRESS PORTS AGE
gateway * 130.211.10.121 80 1d
export INGRESS_URL=130.211.10.121:80
```
If load balancers are not supported, use the service NodePort instead:
```bash
export INGRESS_URL=$(kubectl get po -l istio=ingress -o jsonpath={.items[0].status.hostIP}):$(kubectl get svc istio-ingress -o jsonpath={.spec.ports[0].nodePort})
```
### Configuring ingress (HTTP)
## Configuring ingress (HTTP)
1. Create the Ingress Resource for the httpbin service
@ -73,6 +52,27 @@ to configure ingress behavior.
Notice that in this example we are only exposing httpbin's `/headers` and `/delay` endpoints.
1. Determine the ingress URL:
If your cluster is running in an environment that supports external load balancers,
use the ingress' external address:
```bash
kubectl get ingress -o wide
```
```
NAME HOSTS ADDRESS PORTS AGE
gateway * 130.211.10.121 80 1d
export INGRESS_URL=130.211.10.121:80
```
If load balancers are not supported, use the service NodePort instead:
```bash
export INGRESS_URL=$(kubectl get po -l istio=ingress -o jsonpath={.items[0].status.hostIP}):$(kubectl get svc istio-ingress -o jsonpath={.spec.ports[0].nodePort})
```
1. Access the httpbin service using _curl_:
```bash
@ -90,13 +90,13 @@ to configure ingress behavior.
A private key and certificate can be created for testing using [OpenSSL](https://www.openssl.org/).
```bash
openssl req -newkey rsa:2048 -nodes -keyout cert.key -x509 -days -out='cert.crt' -subj '/C=US/ST=Seattle/O=Example/CN=secure.example.io'
openssl req -newkey rsa:2048 -nodes -keyout /tmp/cert.key -subj '/C=US/ST=Seattle/O=Example/CN=secure.example.io' > /tmp/cert.crt
```
1. Create the secret using `kubectl`
```bash
kubectl create secret generic ingress-secret --from-file=tls.key=cert.key --from-file=tls.crt=cert.crt
kubectl create secret generic ingress-secret --from-file=tls.key=/tmp/cert.key --from-file=tls.crt=/tmp/cert.crt
```
1. Create the Ingress Resource for the httpbin service
@ -127,7 +127,7 @@ to configure ingress behavior.
1. Access the secured httpbin service using _curl_:
```bash
curl -k https://$INGRESS_URL/html
curl -k https://<TODO>/html
```
```
@ -135,7 +135,7 @@ to configure ingress behavior.
```
### Setting Istio rules on an edge service
## Setting Istio rules on an edge service
Similar to inter-cluster requests, Istio
[routing rules]({{home}}/docs/concepts/traffic-management/rules-configuration.html)