I have installed service mesh(Istio) and working with Ambassador to route traffic to our application. Whenever I am sending traffic through Istio Ingress its working fine and working with the ambassador but when sending through Ambassador, It is showing unknown, You can see on the attached image, could be related to the fact that the ambassador does not use an Istio sidecar.
Used code to deploy Ambassador service:
apiVersion: v1
kind: Service
metadata:
name: ambassador
spec:
type: LoadBalancer
externalTrafficPolicy: Local
ports:
- name: ambassador-http
port: 80
targetPort: 8080
selector:
service: ambassador
---
Is there anything to I can add here to make it possible?
Thanks
Yes, it is possible and here is detailed guide for this from Abmassador documentation:
Getting Ambassador Working With Istio
Getting Ambassador working with Istio is straightforward. In this example, we'll use the
bookinfo
sample application from Istio.By default, the Bookinfo application uses the Istio ingress. To use Ambassador, we need to:
First you will need to deploy the Ambassador ambassador-admin service to your cluster:
It's simplest to use the YAML files we have online for this (though of course you can download them and use them locally if you prefer!).
First, you need to check if Kubernetes has RBAC enabled:
If you see something like
--authorization-mode=Node,RBAC
in the output, then RBAC is enabled.If RBAC is enabled, you'll need to use:
Without RBAC, you can use:
(Note that if you are planning to use mutual TLS for communication between Ambassador and Istio/services in the future, then the order in which you deploy the ambassador-admin service and the ambassador LoadBalancer service below may need to be swapped)
Next you will deploy an ambassador service that acts as a point of ingress into the cluster via the LoadBalancer type. Create the following YAML and put it in a file called
ambassador-service.yaml
.Then, apply it to the Kubernetes with
kubectl
:The YAML above does several things:
LoadBalancer
. Note that if you're not deploying in an environment whereLoadBalancer
is a supported type (i.e. MiniKube), you'll need to change this to a different type of service, e.g.,NodePort
./httpbin/
to the publichttpbin.org
HTTP Request and Response service (which provides useful endpoint that can be used for diagnostic purposes). In Ambassador, Kubernetes annotations (as shown above) are used for configuration. More commonly, you'll want to configure routes as part of your service deployment process, as shown in this more advanced example.You can see if the two Ambassador services are running correctly (and also obtain the LoadBalancer IP address when this is assigned after a few minutes) by executing the following commands:
Above we see that external IP assigned to our LoadBalancer is 35.224.41.XX (XX is used to mask the actual value), and that all ambassador pods are running (Ambassador relies on Kubernetes to provide high availability, and so there should be two small pods running on each node within the cluster).
You can test if Ambassador has been installed correctly by using the test route to
httpbin.org
to get the external cluster Origin IP from which the request was made:If you're seeing a similar response, then everything is working great!
(Bonus: If you want to use a little bit of awk magic to export the LoadBalancer IP to a variable AMBASSADOR_IP, then you can type
export AMBASSADOR_IP=$(kubectl get services ambassador | tail -1 | awk '{ print $4 }')
and usecurl $AMBASSADOR_IP/httpbin/ip
bookinfo.yaml
manifest to include the necessary Ambassador annotations. See below.The annotation above implements an Ambassador mapping from the '/productpage/' URI to the Kubernetes productpage service running on port 9080 ('productpage:9080'). The 'prefix' mapping URI is taken from the context of the root of your Ambassador service that is acting as the ingress point (exposed externally via port 80 because it is a LoadBalancer) e.g. '35.224.41.XX/productpage/'.
You can now apply this manifest from the root of the Istio GitHub repo on your local file system (taking care to wrap the apply with istioctl kube-inject):
bookinfo.yaml
manifest by typingkubectl delete ingress gateway
.35.192.109.XX/productpage/
. You can see the actual IP address again for Ambassador by typingkubectl get services ambassador
.Also according to documentation there is no need for Ambassador pods to be injected.