This is documentation for Service Bridge 1.7.x, which is no longer actively maintained.
For up-to-date documentation, see the latest version (1.12.x).
Tetrate Service BridgeVersion: 1.7.x
Building the Demonstration Environment
A simple worked example, with two workload clusters and one edge gateway cluster
In this worked example, we'll configure three Kubernetes clusters:
Clusters cluster-1 and cluster-2 will function as workload clusters, each with an instance of the bookinfo application and an Ingress Gateway to expose the application
Cluster cluster-edge will host a front-end Edge ("Tier-1") Gateway, which will receive traffic and distribute across the Ingress Gateways in the workload clusters
There are a number of moving parts in the configuration, so it's helpful to identify and name each part before proceeding:
cluster-1
cluster-2
cluster-edge
AWS Region:
eu-west-1
eu-west-2
eu-west-1
Namespace:
bookinfo
bookinfo
edge
Workspace:
bookinfo-ws
bookinfo-ws
edge-ws
Networks:
app-network
app-network
edge-network
Gateway Group:
bookinfo-gwgroup-1
bookinfo-gwgroup-2
edge-gwgroup
Ingress Gateway:
ingressgw-1
ingressgw-2
edgegw
Gateway resource:
bookinfo-ingress-1
bookinfo-ingress-2
bookinfo-edge
Kubectl context alias:
k1
k2
k3
Ensure that cluster-1 and cluster-edge are located in one region, and cluster-2 is located in a different region; this will prove useful when testing cluster failover.
In this worked example, we will use organization tse and tenant tse. If you are using Tetrate Service Bridge (TSB), modify the Tetrate configurations to match your organizational hierarchy.
Managing Multiple Clusters
When working with multiple Kubernetes clusters, it can be useful to create an alias for the kubectl command for each cluster. For example, with AWS contexts, you might do something like:
alias k1='kubectl --context arn:aws:eks:eu-west-1:901234567890:cluster/my-cluster-1'
You don't need to do this when applying Tetrate configuration, which is applied either using tctl or against any Kubernetes cluster with GitOps integration.
The Tetrate platform uses Network settings to group sets of clusters and define access control lists. If a cluster is not assigned to a network, this cluster can be reached by any other cluster. When operating at scale, Network settings provide a high-level way of identifying sets of clusters and defining permitted flows.
We will:
Assign cluster-edge to the Network Edge-Network
Assign cluster-1 and cluster-2 to the Network App-Network
Define reachability settings so that Edge-Network can send traffic to App-Network
It's generally easier to configure Network settings using the Tetrate UI:
The OrganizationSettings resource is an internal object; you can obtain it using tctl get organizationsettings -o yaml. Remove any resourceVersion or etag values before submitting an update.
Once you have completed your changes, the cluster page in the UI should resemble the following:
Cluster summary
Note the Network and Is Tier1 columns and values for each cluster.
In addition, you'll have created Workspaces and Gateway Groups for each cluster, and defined the Reachability Settings so that Edge-Network can reach App-Network.
Check that the service on cluster-1 is functioning by sending an HTTP request through the Ingress Gateway to the productpage service:
export GATEWAY_IP=$(kubectl -n bookinfo get service ingressgw-1 -o jsonpath="{.status.loadBalancer.ingress[0]['hostname','ip']}") echo $GATEWAY_IP curl -s --connect-to bookinfo.tse.tetratelabs.io:80:$GATEWAY_IP \ "http://bookinfo.tse.tetratelabs.io/productpage"
Note: The Ingress Gateway may need a cloud load balancer, and you may need to allow several minutes for the cloud load balancer to finish provisioning.
Publish a Gateway resource that balances traffic across the workload clusters
Verify that the service is functioning correctly
If you're using TSE's AWS Controller to automatically manage DNS, remember to first enable it on this cluster. Any public DNS should point to the Edge Gateway on this cluster.
Remember to set the kubectl context or use your context alias to point to cluster-edge.