mirror of https://github.com/istio/istio.io.git
				
				
				
			Use ServiceEntry to expose an example Vault CA server (#4199)
This commit is contained in:
		
							parent
							
								
									b5581a5899
								
							
						
					
					
						commit
						35e9164509
					
				|  | @ -33,18 +33,11 @@ to Node Agent, which returns the signed certificate to the Istio proxy. | ||||||
|         --name=istio \ |         --name=istio \ | ||||||
|         --namespace=istio-system \ |         --namespace=istio-system \ | ||||||
|         --set global.mtls.enabled=true \ |         --set global.mtls.enabled=true \ | ||||||
|         --set global.proxy.excludeIPRanges="34.83.129.211/32" \ |  | ||||||
|         --values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \ |         --values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \ | ||||||
|         install/kubernetes/helm/istio >> istio-auth.yaml |         install/kubernetes/helm/istio >> istio-auth.yaml | ||||||
|     $ kubectl create -f istio-auth.yaml |     $ kubectl create -f istio-auth.yaml | ||||||
|     {{< /text >}} |     {{< /text >}} | ||||||
| 
 | 
 | ||||||
| The testing Vault server used in this tutorial has the IP |  | ||||||
| address `34.83.129.211`. The configuration |  | ||||||
| `global.proxy.excludeIPRanges="34.83.129.211/32"` whitelists the IP address of |  | ||||||
| the testing Vault server, so that Envoy will not intercept the traffic from |  | ||||||
| Node Agent to Vault. |  | ||||||
| 
 |  | ||||||
| The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml) | The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml) | ||||||
| contains the configuration that enables SDS (secret discovery service) in Istio. | contains the configuration that enables SDS (secret discovery service) in Istio. | ||||||
| The Vault CA related configuration is set as environmental variables: | The Vault CA related configuration is set as environmental variables: | ||||||
|  | @ -65,6 +58,29 @@ env: | ||||||
|   value: "istio_ca/sign/istio-pki-role" |   value: "istio_ca/sign/istio-pki-role" | ||||||
| {{< /text >}} | {{< /text >}} | ||||||
| 
 | 
 | ||||||
|  | 1.  The testing Vault server used in this tutorial has the IP | ||||||
|  |     address `34.83.129.211`. Create a service entry with the address of the testing | ||||||
|  |     Vault server: | ||||||
|  | 
 | ||||||
|  |     {{< text bash >}} | ||||||
|  |     $ kubectl apply -f - <<EOF | ||||||
|  |     apiVersion: networking.istio.io/v1alpha3 | ||||||
|  |     kind: ServiceEntry | ||||||
|  |     metadata: | ||||||
|  |       name: vault-service-entry | ||||||
|  |     spec: | ||||||
|  |       hosts: | ||||||
|  |       - vault-server | ||||||
|  |       addresses: | ||||||
|  |       - 34.83.129.211/32 | ||||||
|  |       ports: | ||||||
|  |       - number: 8200 | ||||||
|  |         name: https | ||||||
|  |         protocol: HTTPS | ||||||
|  |       location: MESH_EXTERNAL | ||||||
|  |     EOF | ||||||
|  |     {{< /text >}} | ||||||
|  | 
 | ||||||
| ## Deploy workloads for testing | ## Deploy workloads for testing | ||||||
| 
 | 
 | ||||||
| This section deploys the `httpbin` and `sleep` workloads for testing. When the sidecar of a | This section deploys the `httpbin` and `sleep` workloads for testing. When the sidecar of a | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue