You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 7, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: content/onlineboutique/create-memorystore.md
+26-2Lines changed: 26 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,14 @@ tags: ["kcc", "platform-admin"]
7
7

8
8
_{{< param description >}}_
9
9
10
-
In this section, you will create a Memorystore (redis) instance for the Online Boutique's `cartservice` app to connect to.
10
+
In this section, you will create a Memorystore (redis) instance for the Online Boutique's `cartservice` app to connect to. We will also create a second Memorystore (redis) with TLS enabled.
Define the [Memorystore (redis) resource](https://cloud.google.com/config-connector/docs/reference/resource-docs/redis/redisinstance) with TLS enabled:
description: "Duration: 10 min | Persona: Apps Operator"
5
5
tags: ["apps-operator", "asm", "security-tips"]
6
-
hidden: true
7
6
---
8
7

9
8
_{{< param description >}}_
10
9
11
-
{{% notice warning %}}
12
-
This section is under construction and is not working currently, this page is hidden. Do not use it yet.
13
-
{{% /notice %}}
14
-
15
10
In this section, you will secure the access by TLS to the Memorystore (redis) instance from the OnlineBoutique's `cartservice` appl, without updating the source code of the app, just with Istio's capabilities.
16
11
17
12
Initialize variables:
@@ -29,21 +24,20 @@ The `CART_MEMORYSTORE_HOST` has been built in order to explicitly represent the
Update the Online Boutique apps with the new Memorystore (redis) connection information:
39
34
```Bash
40
35
cd${WORK_DIR}$ONLINE_BOUTIQUE_DIR_NAME/staging
41
36
cp -r ../upstream/base/for-memorystore/ .
42
-
sed -i "s/REDIS_IP/${REDIS_IP}/g;s/REDIS_PORT/${REDIS_PORT}/g" for-memorystore/kustomization.yaml
43
-
kustomize edit add component for-memorystore
37
+
sed -i "s/REDIS_IP/${REDIS_TLS_IP}/g;s/REDIS_PORT/${REDIS_TLS_PORT}/g" for-memorystore/kustomization.yaml
44
38
```
45
39
{{% notice info %}}
46
-
This will change the `REDIS_ADDR` environment variable of the `cartservice` to point to the Memorystore (redis) instance as well as removing the `Deployment` and the `Service` of the default in-cluster `redis` database container.
40
+
This will change the `REDIS_ADDR` environment variable of the `cartservice` to point to the Memorystore (redis) instance with TLS enabled.
47
41
{{% /notice %}}
48
42
49
43
Define the `Secret` with the Certificate Authority:
@@ -68,13 +62,13 @@ spec:
68
62
hosts:
69
63
- ${CART_MEMORYSTORE_HOST}
70
64
addresses:
71
-
- ${REDIS_IP}/32
65
+
- ${REDIS_TLS_IP}/32
72
66
endpoints:
73
-
- address: ${REDIS_IP}
67
+
- address: ${REDIS_TLS_IP}
74
68
location: MESH_EXTERNAL
75
69
resolution: STATIC
76
70
ports:
77
-
- number: ${REDIS_PORT}
71
+
- number: ${REDIS_TLS_PORT}
78
72
name: tcp-redis
79
73
protocol: TCP
80
74
EOF
@@ -116,12 +110,10 @@ patches:
116
110
EOF
117
111
```
118
112
119
-
Update the previously deployed `Sidecars`, `NetworkPolicies` and `AuthorizationPolicies`:
Copy file name to clipboardExpand all lines: content/service-mesh/set-up-asm-configs.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,12 +117,14 @@ rules:
117
117
- "virtualservices"
118
118
- "authorizationpolicies"
119
119
- "sidecars"
120
+
- "serviceentries"
121
+
- "destinationrules"
120
122
verbs:
121
123
- "*"
122
124
EOF
123
125
```
124
126
{{% notice tip %}}
125
-
Later in this workshop, for each app namespace, we will define a Config Sync's `RepoSync` which will be bound to the `edit``ClusterRole`. With that new extension, it will allow each namespace to deploy Istio resources such as `Sidecar`, `VirtualService`and `AuthorizationPolicy` while meeting with the least privilege principle requirement.
127
+
Later in this workshop, for each app namespace, we will define a Config Sync's `RepoSync` which will be bound to the `edit``ClusterRole`. With that new extension, it will allow each namespace to deploy Istio resources such as `Sidecar`, `VirtualService`, `AuthorizationPolicy`, `ServiceEntry`and `DestinationRule` while meeting with the least privilege principle requirement.
0 commit comments