You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can download the latest release using the official Istio repository or just copy the following command, which would do the same for you.
90
+
\
91
+
You can download the latest release using the official Istio repository or just copy the following command, which would do the same for you.
92
92
93
-
```shellsession
94
-
curl -L https://istio.io/downloadIstio | sh -
95
-
```
93
+
```shellsession
94
+
curl -L https://istio.io/downloadIstio | sh -
95
+
```
96
96
97
97
For details reach out to **[ISTIO download page](https://istio.io/latest/docs/setup/getting-started/#download)**.
98
98
@@ -110,56 +110,50 @@ cd ..
110
110
111
111
**Note:** In the future, a case might occur when your cluster does not recognize istioctl. In this case, export the path again after getting into istio directory.
112
112
113
-
2.#### Install Istio with patches:
113
+
#### **Install Istio with patches:**
114
114
115
-
After deploying SPIRE into your environment and verifying that all deployments are in Ready state, install Istio with custom patches for the Ingress-gateway as well as for Istio-proxy.
115
+
After deploying SPIRE into your environment and verifying that all deployments are in Ready state, install Istio with custom patches for the Ingress-gateway as well as for Istio-proxy.
116
116
117
-
Get the istio-spire-config patch using **[this link](https://raw.githubusercontent.com/cxteamtrials/caas-trials-content/main/services/istio/release-1.17/spire/spire-patch.yaml)** and copy that patch into your cluster. Install that patch using following command.
117
+
Get the istio-spire-config patch using **[this link](https://raw.githubusercontent.com/cxteamtrials/caas-trials-content/main/services/istio/release-1.17/spire/spire-patch.yaml)** and copy that patch into your cluster. Install that patch using following command.
118
118
119
-
```shellsession
120
-
istioctl install -f istio-spire-config.yaml
121
-
```
119
+
```shellsession
120
+
istioctl install -f istio-spire-config.yaml
121
+
```
122
122
123
-
This will share the spiffe-csi-driver with the Ingress Gateway and the sidecars that are going to be injected on workload pods, granting them access to the SPIRE Agent’s UNIX Domain Socket.
124
-
3.#### Patching Istio-Ingress gateways
123
+
This will share the spiffe-csi-driver with the Ingress Gateway and the sidecars that are going to be injected on workload pods, granting them access to the SPIRE Agent’s UNIX Domain Socket.
125
124
126
-
If you receive the error shown below, your ingress-gateway is not patched yet and is not being registered onto the server.
125
+
*#### Patching Istio-Ingress gateways
127
126
128
-

127
+
If you receive the error shown below, your ingress-gateway is not patched yet and is not being registered onto the server.
129
128
130
-
**3.1** For patching, the first step is to get and apply one of SPIRE controller manager’s [CRD(Custom Resource Definition)](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/) ClusterSPIFFEID. It is a cluster-wide resource used to register workloads with SPIRE. The ClusterSPIFFEID can target all workloads in the cluster or can be optionally scoped to specific pods or namespaces via label selectors.
129
+

131
130
132
-
Create a ClusterSPIFFEID CRD to generate registration entries in SPIRE server for all workloads with the label **`spiffe.io/spire-managed-identity: true`**.
131
+
For patching, the first step is to get and apply one of SPIRE controller manager’s [CRD(Custom Resource Definition)](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/) ClusterSPIFFEID. It is a cluster-wide resource used to register workloads with SPIRE. The ClusterSPIFFEID can target all workloads in the cluster or can be optionally scoped to specific pods or namespaces via label selectors.
133
132
134
-
\
135
-
Get the ClusterSPIFFEID used by us for this demo using **[this link](https://raw.githubusercontent.com/cxteamtrials/caas-trials-content/main/services/spire/clusterspiffeid-example.yaml)**, copy that into your cluster, and apply it.
133
+
Create a ClusterSPIFFEID CRD to generate registration entries in SPIRE server for all workloads with the label **`spiffe.io/spire-managed-identity: true`**.
136
134
137
-
```shellsession
138
-
kubectl apply -f cluster-spiffeID-crd.yaml
139
-
```
135
+
\
136
+
Get the ClusterSPIFFEID used by us for this demo using **[this link](https://raw.githubusercontent.com/cxteamtrials/caas-trials-content/main/services/spire/clusterspiffeid-example.yaml)**, copy that into your cluster, and apply it.
137
+
138
+
```shellsession
139
+
kubectl apply -f cluster-spiffeID-crd.yaml
140
+
```
140
141
141
-
**Note:** You can create your own custom clusterSPIFFEID CRD with your own match label and own selector. For now, we have created simple CRD with one pod selector and one match label.
142
+
**Note:** You can create your own custom clusterSPIFFEID CRD with your own match label and own selector. For now, we have created simple CRD with one pod selector and one match label.
142
143
143
-
**3.2** Now simply patch the ingress-gateway with spiffe.io/spire managed-identity: true label.
144
+
Now simply patch the ingress-gateway with spiffe.io/spire managed-identity: true label.
144
145
145
-
This will register your ingress-gateway pod into the server.
146
+
This will register your ingress-gateway pod into the server.
0 commit comments