Careful!
You are browsing documentation for the next version of Kuma. Use this version at your own risk.
Kubernetes Gateway API
To get traffic from outside your mesh inside it (North/South) with Kuma you can use a builtin gateway.
In the quickstart, traffic was only able to get in the mesh by port-forwarding to an instance of an app inside the mesh. In production, you typically set up a gateway to receive traffic external to the mesh. In this guide you will add a built-in gateway in front of the demo-app service and expose it publicly. We will deploy and configure Gateway using Kubernetes Gateway API.
Service graph of the demo app with a builtin gateway on front:
Prerequisites
- Completed quickstart to set up a zone control plane with demo application
Install Gateway API CRDs
To install Gateway API please refer to official installation instruction.
You also need to manually install Kuma GatewayClass:
At this moment, when you install Gateway API CRDs after installing Kuma control plane you need to restart it to start Gateway API controller. To do this run:
Start a gateway
The Gateway resource represents the proxy instance that handles traffic for a set of Gateway API routes. You can create gateway with a single listener on port 8080 by running:
The Kubernetes cluster needs to support LoadBalancer
for this to work.
If you are running minikube
you will want to open a tunnel with minikube tunnel -p mesh-zone
.
You may not have support for LoadBalancer
if you are running locally with kind
or k3d
.
One option for kind
is kubernetes-sigs/cloud-provider-kind.
You can now check if the gateway is running in the demo app kuma-demo
namespace:
Observe the gateway pod:
Retrieve the public URL for the gateway with:
Check the gateway is running:
Which outputs:
Notice the gateway says that there are no routes configured.
Define a route using HTTPRoute
HTTPRoute resources contain a set of matching criteria for HTTP
requests and upstream Services
to route those requests to.
Now try to reach our gateway again:
which outputs:
Notice the forbidden error. This is because the quickstart has very restrictive permissions as defaults. Therefore, the gateway doesn’t have permissions to talk to the demo-app service.
To fix this, add a MeshTrafficPermission
:
Check it works with:
Now it returns a 200 OK response:
Securing your public endpoint with a certificate
The application is now exposed to a public endpoint thanks to the gateway. We will now add TLS to our endpoint.
Create a certificate
Create a self-signed certificate:
Create Kubernetes secret with generated certificate:
Now update the gateway to use this certificate:
Check the call to the gateway:
Which should output a successful call and indicate TLS is being used:
Note that we’re using --insecure
as we have used a self-signed certificate.
Next steps
- Further explore Gateway API documentation
- Learn more about how to customize Kuma Gateway with Gateway API
- Learn about setting up observability to get full end to end visibility of your mesh.