You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To have the `threescale-wasm-auth` module authorize requests against 3scale, the module must have access to 3scale services. You can accomplish this within {SMProductName}and Istio by applying an external `ServiceEntry` object.
9
+
To have the `threescale-wasm-auth` module authorize requests against 3scale, the module must have access to 3scale services. You can do this within {SMProductName} by applying an external `ServiceEntry` object and a corresponding `DestinationRule` object for TLS configuration to use the HTTPS protocol.
10
10
11
-
The custom resources set up the service entries for access from within {SMProductShortName} to 3scale Hosted (SaaS) for the backend and system components of the Service Management API and the Account Management API. The Service Management API receives queries for the authorization status of each request. The Account Management API provides API management configuration settings for your services.
11
+
The custom resources (CRs) set up the service entries and destination rules for secure access from within {SMProductShortName} to 3scale Hosted (SaaS) for the backend and system components of the Service Management API and the Account Management API. The Service Management API receives queries for the authorization status of each request. The Account Management API provides API management configuration settings for your services.
12
12
13
13
.Procedure
14
14
15
-
* Apply the following external `ServiceEntry` custom resources to your cluster:
15
+
. Apply the following external `ServiceEntry` CR and related `DestinationRule` CR for 3scale Hosted *backend* to your cluster:
16
+
.. Add the `ServiceEntry` CR to a file called `service-entry-threescale-saas-backend.yml`:
16
17
+
17
-
.Custom resource for 3scale Hosted backend
18
+
.ServiceEntry CR
18
19
[source,terminal]
19
20
----
20
21
apiVersion: networking.istio.io/v1beta1
21
22
kind: ServiceEntry
22
23
metadata:
23
-
name: threescale-saas-backend
24
+
name: service-entry-threescale-saas-backend
24
25
spec:
25
26
hosts:
26
27
- su1.3scale.net
@@ -31,14 +32,47 @@ spec:
31
32
location: MESH_EXTERNAL
32
33
resolution: DNS
33
34
----
35
+
.. Add the `DestinationRule` CR to a file called `destination-rule-threescale-saas-backend.yml`:
34
36
+
35
-
.Custom resource for 3scale Hosted system
37
+
.DestinationRule CR
38
+
[source,terminal]
39
+
----
40
+
apiVersion: networking.istio.io/v1beta1
41
+
kind: DestinationRule
42
+
metadata:
43
+
name: destination-rule-threescale-saas-backend
44
+
spec:
45
+
host: su1.3scale.net
46
+
trafficPolicy:
47
+
tls:
48
+
mode: SIMPLE
49
+
sni: su1.3scale.net
50
+
----
51
+
52
+
.. Apply and save the external `ServiceEntry` CR for the 3scale Hosted backend to your cluster, by running the following command:
Alternatively, you can deploy an in-mesh 3scale service. To do this, change the location of these services in the custom resources.
117
+
Alternatively, you can deploy an in-mesh 3scale service. To deploy an in-mesh 3scale service, change the location of the services in the CR by deploying 3scale and linking to the deployment.
0 commit comments