You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A Gateway describes how traffic can be translated to Services within the cluster. That is, it defines a request for a way to translate traffic from somewhere that does not know about Kubernetes to somewhere that does. For example, traffic sent to a Kubernetes Service by a cloud load balancer, an in-cluster proxy, or an external hardware load balancer. While many use cases have client traffic originating “outside” the cluster, this is not a requirement.
4
+
5
+
## Create Gateway for an Application
6
+
7
+
Gateway is a way of exposing services externally, which generates an external IP address to connect route and service.
8
+
9
+
## Create service for an Application
10
+
11
+
Service is a way of exposing services internally, creating a service generates an internal DNS that can access `procfile_type`.
12
+
13
+
## Create Route for an Application
14
+
15
+
A Gateway may be attached to one or more Route references which serve to direct traffic for a subset of traffic to a specific service.
Now that Workflow has been deployed with the `global.ingressClass` , we will need a Kubernetes ingress controller in place to begin routing traffic.
65
+
Now that Workflow has been deployed with the `global.gatewayClass` , we will need a Kubernetes gateway in place to begin routing traffic.
66
66
67
-
Here is an example of how to use [traefik](https://traefik.io/) as an ingress controller for Workflow. Of course, you are welcome to use any controller you wish.
67
+
Here is an example of how to use [istio](https://istio.io/) as an gateway for Workflow. Of course, you are welcome to use any controller you wish.
User must to set up a hostname, and assumes the `*.$host` convention.
81
+
User must install [drycc](../quickstart/install-workflow.md) and then set up a hostname, and assumes the `*.$host` convention.
79
82
80
-
We need to point the `*.$host` record to the public IP address of your ingress controller. You can get the public IP using the following command. A wildcard entry is necessary here as apps will use the same rule after they are deployed.
83
+
We need to point the `*.$host` record to the public IP address of your gateway. You can get the public IP using the following command. A wildcard entry is necessary here as apps will use the same rule after they are deployed.
81
84
82
85
```
83
-
$ kubectl get svc ingress-traefik --namespace kube-system
Copy file name to clipboardExpand all lines: src/installing-workflow/index.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,9 +33,9 @@ More rigorous installations would benefit from using outside sources for the fol
33
33
*[Redis](../managing-workflow/platform-logging.md#configuring-off-cluster-redis) - Such as AWS Elasticache
34
34
*[InfluxDB](../managing-workflow/platform-monitoring.md#configuring-off-cluster-influxdb) and [Grafana](../managing-workflow/platform-monitoring.md#off-cluster-grafana)
35
35
36
-
#### Ingress
36
+
#### Gateway
37
37
38
-
Now, workflow requires that ingress and cert-manager must be installed. Any compatible Kubernetes entry controller can be used, but only ingress-nginx and ingress-traefik currently support enforced HTTPS and allowlist. Enable entries in accordance with [this guide](./ingress.md).
38
+
Now, workflow requires that gateway and cert-manager must be installed. Any compatible Kubernetes entry controller can be used.
Drycc uses ingress as a routing implementation, so you have to choose an ingress.
12
-
We recommend using [nginx-ingress](https://github.com/helm/charts/tree/master/stable/nginx-ingress) or [traefik-ingress](https://github.com/helm/charts/tree/master/stable/traefik), which we have adapted to allowlist and force TLS functions.
11
+
Drycc uses gateway as a routing implementation, so you have to choose an gateway. We recommend using [istio](https://istio.io/) or [kong](https://konghq.com/).
13
12
14
13
Workflow supports the use of ACME to manage automatic certificates, [cert-manager](https://github.com/helm/charts/tree/master/stable/cert-manager) is also one of the necessary components, if you use cert-manager EAB, you need to set the `clusterResourceNamespace` to the namespace of drycc.
Copy file name to clipboardExpand all lines: src/managing-workflow/configuring-dns.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ DNS for any applications using a "custom domain" (a fully-qualified domain name
23
23
Although it is dependent upon your distribution of Kubernetes and your underlying infrastructure, in many cases, the IP(s) or existing fully-qualified domain name of a load balancer can be determined directly using the `kubectl` tool:
24
24
25
25
```
26
-
$ kubectl --namespace=ingress-nginx describe service | grep "LoadBalancer Ingress"
26
+
$ kubectl --namespace=istio-nginx describe service | grep "LoadBalancer"
@@ -73,7 +73,7 @@ We'll assume the following in this section:
73
73
Here are the steps for configuring cloud DNS to route to your drycc cluster:
74
74
75
75
1. Get the load balancer IP or domain name
76
-
- If you are on Google Container Engine, you can run `kubectl get svc -n ingress-nginx` and look for the `LoadBalancer Ingress` column to get the IP address
76
+
- If you are on Google Container Engine, you can run `kubectl get svc -n istio-ingress` and look for the `LoadBalancer Ingress` column to get the IP address
77
77
2. Create a new Cloud DNS Zone (on the console: `Networking` => `Cloud DNS`, then click on `Create Zone`)
78
78
3. Name your zone, and set the DNS name to `mystuff.com.` (note the `.` at the end
0 commit comments