mirror of https://github.com/istio/istio.io.git
Use ServiceEntry to expose an example Vault CA server (#4199)
This commit is contained in:
parent
b5581a5899
commit
35e9164509
|
|
@ -33,18 +33,11 @@ to Node Agent, which returns the signed certificate to the Istio proxy.
|
||||||
--name=istio \
|
--name=istio \
|
||||||
--namespace=istio-system \
|
--namespace=istio-system \
|
||||||
--set global.mtls.enabled=true \
|
--set global.mtls.enabled=true \
|
||||||
--set global.proxy.excludeIPRanges="34.83.129.211/32" \
|
|
||||||
--values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \
|
--values install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml \
|
||||||
install/kubernetes/helm/istio >> istio-auth.yaml
|
install/kubernetes/helm/istio >> istio-auth.yaml
|
||||||
$ kubectl create -f istio-auth.yaml
|
$ kubectl create -f istio-auth.yaml
|
||||||
{{< /text >}}
|
{{< /text >}}
|
||||||
|
|
||||||
The testing Vault server used in this tutorial has the IP
|
|
||||||
address `34.83.129.211`. The configuration
|
|
||||||
`global.proxy.excludeIPRanges="34.83.129.211/32"` whitelists the IP address of
|
|
||||||
the testing Vault server, so that Envoy will not intercept the traffic from
|
|
||||||
Node Agent to Vault.
|
|
||||||
|
|
||||||
The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml)
|
The yaml file [`values-istio-example-sds-vault.yaml`]({{< github_file >}}/install/kubernetes/helm/istio/example-values/values-istio-example-sds-vault.yaml)
|
||||||
contains the configuration that enables SDS (secret discovery service) in Istio.
|
contains the configuration that enables SDS (secret discovery service) in Istio.
|
||||||
The Vault CA related configuration is set as environmental variables:
|
The Vault CA related configuration is set as environmental variables:
|
||||||
|
|
@ -65,6 +58,29 @@ env:
|
||||||
value: "istio_ca/sign/istio-pki-role"
|
value: "istio_ca/sign/istio-pki-role"
|
||||||
{{< /text >}}
|
{{< /text >}}
|
||||||
|
|
||||||
|
1. The testing Vault server used in this tutorial has the IP
|
||||||
|
address `34.83.129.211`. Create a service entry with the address of the testing
|
||||||
|
Vault server:
|
||||||
|
|
||||||
|
{{< text bash >}}
|
||||||
|
$ kubectl apply -f - <<EOF
|
||||||
|
apiVersion: networking.istio.io/v1alpha3
|
||||||
|
kind: ServiceEntry
|
||||||
|
metadata:
|
||||||
|
name: vault-service-entry
|
||||||
|
spec:
|
||||||
|
hosts:
|
||||||
|
- vault-server
|
||||||
|
addresses:
|
||||||
|
- 34.83.129.211/32
|
||||||
|
ports:
|
||||||
|
- number: 8200
|
||||||
|
name: https
|
||||||
|
protocol: HTTPS
|
||||||
|
location: MESH_EXTERNAL
|
||||||
|
EOF
|
||||||
|
{{< /text >}}
|
||||||
|
|
||||||
## Deploy workloads for testing
|
## Deploy workloads for testing
|
||||||
|
|
||||||
This section deploys the `httpbin` and `sleep` workloads for testing. When the sidecar of a
|
This section deploys the `httpbin` and `sleep` workloads for testing. When the sidecar of a
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue