Careful!

You are browsing documentation for a version of Kuma that is not the latest release.

Federate zone control plane

With Kuma you can first start with just one zone control plane and then federate it to a multi-zone deployment. This way you can:

  • see your mesh deployment in one centralized place
  • connect multiple zones and introduce cross zone connectivity
  • manage policies that are pushed to all zones

Prerequisites

Start a global control plane

Start a new Kubernetes cluster

Currently, it’s not possible to deploy global and zone control plane in the same Kubernetes cluster, therefore we need a new Kubernetes cluster.

You can skip this step if you already have a Kubernetes cluster running. It can be a cluster running locally or in a public cloud like AWS EKS, GCP GKE, etc.

minikube start -p mesh-global

Setup the minikube tunnel

If you are using minikube for local testing, you can take advantage of the built-in minikube tunnel command. This command allows load balancer addresses to be provisioned using localhost.

Using nohup will allow the tunnel to continue running should your current terminal session end.

nohup minikube tunnel -p mesh-global &

Deploy a global control plane

helm install --kube-context=mesh-global --create-namespace --namespace kuma-system \
--set controlPlane.mode=global \
--set controlPlane.defaults.skipMeshCreation=true \
kuma kuma/kuma

We skip default mesh creation as we will bring mesh from zone control plane in the next steps.

Sync endpoint

Find and save the external IP and port of the kuma-global-zone-sync service in the kuma-system namespace:

export KDS_IP=$(kubectl --context=mesh-global get svc --namespace kuma-system kuma-global-zone-sync -o jsonpath='{.status.loadBalancer.ingress[0].ip}')

If you are using minikube, you should use host.minikube.internal to ensure networking works correctly.

export KDS_IP=host.minikube.internal

Copy resources from zone to global control plane

To federate zone control plane without any traffic interruption, we need to copy resources like secrets, meshes etc. First, we need to expose API server of zone control plane:

kubectl --context=mesh-zone port-forward svc/kuma-control-plane -n kuma-system 5681:5681

Then we export resources:

export ZONE_USER_ADMIN_TOKEN=$(kubectl --context=mesh-zone get secrets -n kuma-system admin-user-token -ojson | jq -r .data.value | base64 -d)
kumactl config control-planes add \
  --address http://localhost:5681 \
  --headers "authorization=Bearer $ZONE_USER_ADMIN_TOKEN" \
  --name "zone-cp" \
  --overwrite  
  
kumactl export --profile=federation-with-policies --format=kubernetes > resources.yaml

And finally, we apply resources on global control plane

kubectl apply --context=mesh-global -f resources.yaml

Connect zone control plane to global control plane

Update Helm deployment of zone control plane to configure connection to the global control plane.

helm upgrade --kube-context=mesh-zone --namespace kuma-system \
--set controlPlane.mode=zone \
--set controlPlane.zone=zone-1 \
--set ingress.enabled=true \
--set controlPlane.kdsGlobalAddress=grpcs://${KDS_IP}:5685 \
--set controlPlane.tls.kdsZoneClient.skipVerify=true \
kuma kuma/kuma

Verify federation

To verify federation, first port-forward the API service from the global control plane to port 15681 to avoid collision with previous port forward.

kubectl --context=mesh-global port-forward svc/kuma-control-plane -n kuma-system 15681:5681

And then navigate to 127.0.0.1:15681/gui to see the GUI.

You should eventually see

  • a zone in list of zones
  • policies including redis MeshTrafficPermission that we applied in the quickstart guide.
  • data plane proxies for the demo application that we installed in the quickstart guide.

Apply policy on global control plane

We can check policy synchronization from global control plane to zone control plane by applying a policy on global control plane:

echo "apiVersion: kuma.io/v1alpha1
kind: MeshCircuitBreaker
metadata:
  name: demo-app-to-redis
  namespace: kuma-system
  labels:
    kuma.io/mesh: default
spec:
  targetRef:
    kind: MeshService
    name: demo-app_kuma-demo_svc_5000
  to:
  - targetRef:
      kind: MeshService
      name: redis_kuma-demo_svc_6379
    default:
      connectionLimits:
        maxConnections: 2
        maxPendingRequests: 8
        maxRetries: 2
        maxRequests: 2" | kubectl --context=mesh-global apply -f -

If we execute the following command:

kubectl get --context=mesh-zone meshcircuitbreakers -A

The policy should be eventually available in zone control plane

NAMESPACE     NAME                                                TARGETREF KIND   TARGETREF NAME
kuma-system demo-app-to-redis-65xb45x2xfd5bf7f        MeshService      demo-app_kuma-demo_svc_5000
kuma-system mesh-circuit-breaker-all-default          Mesh

Next steps

  • Read the multi-zone docs to learn more about this deployment model and cross-zone connectivity.