Skip to content

Commit

Permalink
updates as per review comments.
Browse files Browse the repository at this point in the history
  • Loading branch information
deveshdama committed Sep 6, 2024
1 parent 779e213 commit 699142c
Showing 1 changed file with 6 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,10 @@ This document contains instructions on how to integrate Istio-based service mesh
* Deploy bookinfo demo app, expose a secure HTTPS service using simple TLS.
* Demonstrate HTTPS connections for Azure Service Mesh workloads using cert-manager and let's encrypt as the certificate authority.

> [!Note]
> Kubernetes ingress for Istio-based service mesh is an `allowed` feature. More details on configuration options [here](https://learn.microsoft.com/en-us/azure/aks/istio-support-policy#allowed-supported-and-blocked-customizations)
> [cert-manager](https://cert-manager.io/) and [let's encrypt](https://letsencrypt.org/) are not supported by Microsoft.
## Before you begin
* [Install](https://learn.microsoft.com/en-us/azure/aks/istio-deploy-addon#install-istio-add-on) Istio-based service mesh add-on on your cluster.
```shell
Expand All @@ -23,7 +27,8 @@ kubectl label namespace default istio.io/rev=$revision

## Steps
### 1. Setup DNS record
Set up a DNS record for the `EXTERNAL-IP` address of the external ingressgateway service with your cloud provider. In this example, we are setting up the DNS record for `4.153.8.39` with `test.dev.azureservicemesh.io`.
Set up a DNS record for the `EXTERNAL-IP` address of the external ingressgateway service with your cloud provider.
In this example, we [set up the DNS record](https://learn.microsoft.com/en-us/azure/dns/dns-operations-recordsets-portal) for `4.153.8.39` with `test.dev.azureservicemesh.io` on azure portal.

Run the following command to retrieve the external IP address of the ingress gateway:
```shell
Expand Down Expand Up @@ -98,10 +103,6 @@ Create a ConfigMap with the name `istio-shared-configmap-<asm-revision>` in the
kubectl apply -f configmap.yaml
```

> [!Note]
> Kubernetes ingress for Istio-based service mesh is an `allowed` feature. More details on configuration options [here](https://learn.microsoft.com/en-us/azure/aks/istio-support-policy#allowed-supported-and-blocked-customizations)
> cert-manager is not supported by Microsoft, more info can be found [here](https://cert-manager.io/)
### 5. Install cert-manager
```shell
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.15.2/cert-manager.yaml
Expand Down

0 comments on commit 699142c

Please sign in to comment.