You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 7, 2025. It is now read-only.
Here we are removing the `redis-cart``Deployment` and `Service` because we are leveraging Memorystore (redis) instead. We are also removing the default `frontend-external``Service` because we will use the ASM Ingress Gateway to expose the Online Boutique's `frontend`.
41
+
{{% notice info %}}
42
+
Here, we are removing the upstream `Namespace` resource as we already defined it in a previous section while configuring the associated Config Sync's `RepoSync` setup.
66
43
{{% /notice %}}
67
44
68
-
## Define VirtualService
69
-
70
-
Define the `VirtualService` resource in order to establish the Ingress Gateway routing to the OnlineBoutique app:
You could browse the files in the `~/$ONLINE_BOUTIQUE_DIR_NAME/upstream/base` folder, along with the `Namespace`, `Deployment` and `Service` resources for the OnlineBoutique apps, you could see the `VirtualService` resource which will allow to establish the Ingress Gateway routing to the OnlineBoutique app. The `spec.hosts` value is `"*"` but in the following part you will replace this value by the actual DNS of the OnlineBoutique solution (i.e. `ONLINE_BOUTIQUE_INGRESS_GATEWAY_HOST_NAME`) defined a previous section.
kpt pkg get https://github.com/GoogleCloudPlatform/microservices-demo.git/docs/service-accounts@mathieu-benoit/authorization-policies
19
-
rm service-accounts/Kptfile
20
-
rm service-accounts/kustomization.yaml
21
-
kpt pkg get https://github.com/GoogleCloudPlatform/microservices-demo.git/docs/authorization-policies@mathieu-benoit/authorization-policies
22
-
rm authorization-policies/Kptfile
23
-
rm authorization-policies/kustomization.yaml
18
+
kpt pkg get https://github.com/GoogleCloudPlatform/anthos-service-mesh-samples.git/docs/online-boutique-asm-manifests/service-accounts@asm-acm-tutorial
19
+
kpt pkg get https://github.com/GoogleCloudPlatform/anthos-service-mesh-samples.git/docs/online-boutique-asm-manifests/authorization-policies@asm-acm-tutorial
sed -i "s/ONLINEBOUTIQUE_NAMESPACE/${ONLINEBOUTIQUE_NAMESPACE}/g;s/INGRESS_GATEWAY_NAMESPACE/${INGRESS_GATEWAY_NAMESPACE}/g;s/INGRESS_GATEWAY_NAME/${INGRESS_GATEWAY_NAME}/g" authorization-policies/for-ingress-gateway/kustomization.yaml
Copy file name to clipboardExpand all lines: content/onlineboutique/set-up-onlineboutique-git-repo.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ roleRef:
84
84
EOF
85
85
```
86
86
{{% notice tip %}}
87
-
We are using the [`edit` user-facing role](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles) here, to follow the least privilege principle. Earlier in this workshop during the ASM installation, we extended the default `edit` role with more capabilities regarding to the Istio resources: `VirtualService`, `Sidecar` and `Authorization`wich will be leveraged in the OnlineBoutique's namespace.
87
+
We are using the [`edit` user-facing role](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles) here, to follow the least privilege principle. Earlier in this workshop during the ASM installation, we extended the default `edit` role with more capabilities regarding to the Istio resources: `VirtualService`, `Sidecar` and `Authorization`which will be leveraged in the OnlineBoutique's namespace.
0 commit comments