You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/ROOT/pages/03.1-platform.adoc
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@
10
10
11
11
== Walkthrough As a Platform Engineer
12
12
13
-
The ansible scripts we just run has setup the following as ArgoCD applicatiopns:
13
+
The ansible scripts we just ran have set up the following as ArgoCD applications:
14
14
15
15
* Red Hat Connectivity Link operator and a Kuadrant instance
16
16
* A TLS issuer for TLS certificates. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/cluster/cert-manager.io\~v1~ClusterIssuer/prod-web-lets-encrypt-issuer/yaml[View CR^]]
@@ -43,12 +43,12 @@ spec:
43
43
name: ********
44
44
```
45
45
46
-
* TLS Issuer references to the ACME server https://letsencrypt.org/[Let's Encrypt^]
47
-
* It uses the DNS providers credentials, in this case AWS to create the TLS certificates
46
+
* TLS Issuer references the ACME server https://letsencrypt.org/[Let's Encrypt^]
47
+
* It uses the DNS providers credentials, in this case AWS, to create the TLS certificates
48
48
******
49
49
====
50
50
51
-
* A Gateway (based on istio gateway) with a wildcard hostname based on the root domain. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[View CR^]]
51
+
* A Gateway (based on Istio Gateway) with a wildcard hostname based on the root domain. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[View CR^]]
52
52
+
53
53
.[underline]#Click to see an example and description#
54
54
[%collapsible]
@@ -89,7 +89,7 @@ spec:
89
89
90
90
91
91
* Various policies attached to the Gateway:
92
-
** A default `deny-all` Auth Policy to start with zero-trust [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/kuadrant.io\~v1~AuthPolicy/prod-web-deny-all/yaml[View CR^]]
92
+
** A default `deny-all` Auth Policy to start with zerotrust [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/kuadrant.io\~v1~AuthPolicy/prod-web-deny-all/yaml[View CR^]]
93
93
+
94
94
.[underline]#Click to see an example and description#
95
95
[%collapsible]
@@ -206,7 +206,7 @@ spec:
206
206
207
207
=== Create a DNS Policy
208
208
209
-
Now that we have setup a secure, protected application connectivity environment, we are now ready to expose this to the Internet. We will do so by creating a DNSPolicy +
209
+
Now that we have set up a secure, protected application connectivity environment, we are now ready to expose this to the Internet. We will do so by creating a DNSPolicy +
210
210
211
211
* Copy the following into the *Import YAML* utility accessible by the (+) button on top of the https://console-openshift-console.%OPENSHIFTSUBDOMAIN%[OpenShift Console^]
212
212
+
@@ -227,8 +227,8 @@ spec:
227
227
- name: prod-web-aws-credentials
228
228
----
229
229
230
-
* The DNSPolicy acts against a target Gateway by processing its listeners for hostnames and then create dns records for those hostnames.
231
-
* Note that the DNSPolicy doesn't contain a *routingStrategy* because this is a single cluster deployment. But in case of multi-cluster deployments DNSPolicy allows for `routingStrategy: loadbalanced` and can optionally include loadbalancing specifications.
230
+
* The DNSPolicy acts against a target Gateway by processing its listeners for hostnames and then creating DNS records for those hostnames.
231
+
* Note that the DNSPolicy doesn't contain a *routingStrategy* because this is a single cluster deployment. But in case of multi-cluster deployments DNSPolicy allows for `routingStrategy: loadbalanced` and can optionally include load-balancing specifications.
232
232
* The *targetRef* sections refers to the [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[Gateway^]] created when the Ansible script was executed.
233
233
* A number of DNS records are created on AWS Route 53.
* Check if the HTTPRoute works as it should. Run this curl command from a terminal. You can make use of the installed OpenShift Terminal by clicking https://console-openshift-console.apps.%OPENSHIFTSUBDOMAIN%/terminal[here^, window="terminal"] to execute the `curl` command.
244
244
+
245
-
NOTE: By using the OpenShift terminal, we can circumvent any delays in the DN propogation to local development environements including laptop,. Typicallu,due to the nature of DNS Records it may take a while for it get propagated.
245
+
NOTE: By using the OpenShift terminal, we can circumvent any delays in the DN propogation to local development environments, including a laptop. Typically, due to the nature of DNS Records it may take a while for them to get propagated.
for i in {1..10}; do curl -k -w "%{http_code}" https://echo.globex.%AWSROOTZONE%; done
275
275
----
276
-
* You would see that you will get a response 5 times, post which you would see *Too Many Requests 429*
277
-
* We haven't setup a RateLimitPolicy for the echoAPI itself, and so the gateway's default RateLimitPolicy gets applied to the echoAPI HTTPRoute. You can create another RateLimitPolicy and attach it to the echoAPI HTTPRoute to check this out.
276
+
* You will see that you get a response 5 times, after which you see *Too Many Requests 429*
277
+
* We haven't set up a RateLimitPolicy for the echoAPI itself, and so the gateway's default RateLimitPolicy gets applied to the echoAPI HTTPRoute. You can create another RateLimitPolicy and attach it to the echoAPI HTTPRoute to check this out.
0 commit comments