9.6 KiB
title | description | weight | aliases | keywords | owner | test | |||
---|---|---|---|---|---|---|---|---|---|
Request Routing | This task shows you how to configure dynamic request routing to multiple versions of a microservice. | 10 |
|
|
istio/wg-networking-maintainers | yes |
This task shows you how to route requests dynamically to multiple versions of a microservice.
{{< boilerplate gateway-api-gamma-support >}}
Before you begin
-
Setup Istio by following the instructions in the Installation guide.
-
Deploy the Bookinfo sample application.
-
Review the Traffic Management concepts doc.
About this task
The Istio Bookinfo sample consists of four separate microservices, each with multiple versions.
Three different versions of one of the microservices, reviews
, have been deployed and are running concurrently.
To illustrate the problem this causes, access the Bookinfo app's /productpage
in a browser and refresh several times.
The URL is http://$GATEWAY_URL/productpage
, where $GATEWAY_URL
is the External IP address of the ingress, as explained in
the Bookinfo doc.
You’ll notice that sometimes the book review output contains star ratings and other times it does not. This is because without an explicit default service version to route to, Istio routes requests to all available versions in a round robin fashion.
The initial goal of this task is to apply rules that route all traffic to v1
(version 1) of the microservices. Later, you
will apply a rule to route traffic based on the value of an HTTP request header.
Route to version 1
To route to one version only, you configure route rules that send traffic to default versions for the microservices.
{{< warning >}} If you haven't already, follow the instructions in define the service versions. {{< /warning >}}
- Run the following command to create the route rules:
{{< tabset category-name="config-api" >}}
{{< tab name="Istio APIs" category-value="istio-apis" >}}
Istio uses virtual services to define route rules.
Run the following command to apply virtual services that will route all traffic to v1
of each microservice:
{{< text bash >}} $ kubectl apply -f @samples/bookinfo/networking/virtual-service-all-v1.yaml@ {{< /text >}}
Because configuration propagation is eventually consistent, wait a few seconds for the virtual services to take effect.
{{< /tab >}}
{{< tab name="Gateway API" category-value="gateway-api" >}}
{{< text bash >}} $ kubectl apply -f - <<EOF apiVersion: gateway.networking.k8s.io/v1 kind: HTTPRoute metadata: name: reviews spec: parentRefs:
- group: "" kind: Service name: reviews port: 9080 rules:
- backendRefs:
- name: reviews-v1 port: 9080 EOF {{< /text >}}
{{< /tab >}}
{{< /tabset >}}
- Display the defined routes with the following command:
{{< tabset category-name="config-api" >}}
{{< tab name="Istio APIs" category-value="istio-apis" >}}
{{< text bash yaml >}} $ kubectl get virtualservices -o yaml
- apiVersion: networking.istio.io/v1
kind: VirtualService
...
spec:
hosts:
- details http:
- route:
- destination: host: details subset: v1
- apiVersion: networking.istio.io/v1
kind: VirtualService
...
spec:
hosts:
- productpage http:
- route:
- destination: host: productpage subset: v1
- apiVersion: networking.istio.io/v1
kind: VirtualService
...
spec:
hosts:
- ratings http:
- route:
- destination: host: ratings subset: v1
- apiVersion: networking.istio.io/v1
kind: VirtualService
...
spec:
hosts:
- reviews http:
- route:
- destination: host: reviews subset: v1 {{< /text >}}
You can also display the corresponding subset
definitions with the following command:
{{< text bash >}} $ kubectl get destinationrules -o yaml {{< /text >}}
{{< /tab >}}
{{< tab name="Gateway API" category-value="gateway-api" >}}
{{< text bash >}} $ kubectl get httproute reviews -o yaml ... spec: parentRefs:
- group: gateway.networking.k8s.io kind: Service name: reviews port: 9080 rules:
- backendRefs:
- group: "" kind: Service name: reviews-v1 port: 9080 weight: 1 matches:
- path: type: PathPrefix value: / status: parents:
- conditions:
- lastTransitionTime: "2022-11-08T19:56:19Z" message: Route was valid observedGeneration: 8 reason: Accepted status: "True" type: Accepted
- lastTransitionTime: "2022-11-08T19:56:19Z" message: All references resolved observedGeneration: 8 reason: ResolvedRefs status: "True" type: ResolvedRefs controllerName: istio.io/gateway-controller parentRef: group: gateway.networking.k8s.io kind: Service name: reviews port: 9080 {{< /text >}}
In the resource status, make sure that the Accepted
condition is True
for the reviews
parent.
{{< /tab >}}
{{< /tabset >}}
You have configured Istio to route to the v1
version of the Bookinfo microservices,
most importantly the reviews
service version 1.
Test the new routing configuration
You can easily test the new configuration by once again refreshing the /productpage
of the Bookinfo app in your browser.
Notice that the reviews part of the page displays with no rating stars, no
matter how many times you refresh. This is because you configured Istio to route
all traffic for the reviews service to the version reviews:v1
and this
version of the service does not access the star ratings service.
You have successfully accomplished the first part of this task: route traffic to one version of a service.
Route based on user identity
Next, you will change the route configuration so that all traffic from a specific user
is routed to a specific service version. In this case, all traffic from a user
named Jason will be routed to the service reviews:v2
.
This example is enabled by the fact that the productpage
service
adds a custom end-user
header to all outbound HTTP requests to the reviews
service.
Istio also supports routing based on strongly authenticated JWT on ingress gateway, refer to the JWT claim based routing for more details.
Remember, reviews:v2
is the version that includes the star ratings feature.
- Run the following command to enable user-based routing:
{{< tabset category-name="config-api" >}}
{{< tab name="Istio APIs" category-value="istio-apis" >}}
{{< text bash >}} $ kubectl apply -f @samples/bookinfo/networking/virtual-service-reviews-test-v2.yaml@ {{< /text >}}
You can confirm the rule is created using the following command:
{{< text bash yaml >}} $ kubectl get virtualservice reviews -o yaml apiVersion: networking.istio.io/v1 kind: VirtualService ... spec: hosts:
- reviews http:
- match:
- headers: end-user: exact: jason route:
- destination: host: reviews subset: v2
- route:
- destination: host: reviews subset: v1 {{< /text >}}
{{< /tab >}}
{{< tab name="Gateway API" category-value="gateway-api" >}}
{{< text bash >}} $ kubectl apply -f - <<EOF apiVersion: gateway.networking.k8s.io/v1 kind: HTTPRoute metadata: name: reviews spec: parentRefs:
- group: "" kind: Service name: reviews port: 9080 rules:
- matches:
- headers:
- name: end-user value: jason backendRefs:
- name: reviews-v2 port: 9080
- headers:
- backendRefs:
- name: reviews-v1 port: 9080 EOF {{< /text >}}
{{< /tab >}}
{{< /tabset >}}
-
On the
/productpage
of the Bookinfo app, log in as userjason
.Refresh the browser. What do you see? The star ratings appear next to each review.
-
Log in as another user (pick any name you wish).
Refresh the browser. Now the stars are gone. This is because traffic is routed to
reviews:v1
for all users except Jason.
You have successfully configured Istio to route traffic based on user identity.
Understanding what happened
In this task, you used Istio to send 100% of the traffic to the v1
version
of each of the Bookinfo services. You then set a rule to selectively send traffic
to version v2
of the reviews
service based on a custom end-user
header added
to the request by the productpage
service.
Note that Kubernetes services, like the Bookinfo ones used in this task, must adhere to certain restrictions to take advantage of Istio's L7 routing features. Refer to the Requirements for Pods and Services for details.
In the traffic shifting task, you will follow the same basic pattern you learned here to configure route rules to gradually send traffic from one version of a service to another.
Cleanup
- Remove the application route rules:
{{< tabset category-name="config-api" >}}
{{< tab name="Istio APIs" category-value="istio-apis" >}}
{{< text bash >}} $ kubectl delete -f @samples/bookinfo/networking/virtual-service-all-v1.yaml@ {{< /text >}}
{{< /tab >}}
{{< tab name="Gateway API" category-value="gateway-api" >}}
{{< text bash >}} $ kubectl delete httproute reviews {{< /text >}}
{{< /tab >}}
{{< /tabset >}}
- If you are not planning to explore any follow-on tasks, refer to the Bookinfo cleanup instructions to shutdown the application.