-
-
-
-
Importing and synchronizing StyleBooks from GitHub repository
-
Simplified migration of Citrix ADC application configuration using StyleBooks
-
-
Use ADM log messages for managing and monitoring your infrastructure
-
-
Citrix ADC automation using Citrix ADM in Cisco ACI hybrid mode
-
Citrix ADC device package in Cisco ACI's cloud orchestrator mode
-
Kubernetes
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Manage the Kubernetes Ingress configuration in Citrix ADM
Kubernetes (K8s) is an open source container orchestration platform that automates the deployment, scaling, and management of cloud-native applications.
Kubernetes provides the Ingress feature which allows client traffic outside the cluster to access microservices of an application running inside the Kubernetes cluster. ADC instances can act as the Ingress to applications running inside a Kubernetes cluster. ADC instances can load balance and content route North-South traffic from the clients to any microservices inside the Kubernetes cluster.
Note
- Citrix ADM supports the Ingress feature on the clusters with Kubernetes version 1.14 and above.
- Citrix ADM supports Citrix ADC VPX and MPX appliances as Ingress devices.
- In the Kubernetes environment, the Citrix ADC instance load balances only the “NodePort” service type.
You can configure multiple ADC instances to act as Ingress devices on the same cluster or different clusters or namespaces. After you configure the instances, you can assign each instance to different applications based on the Ingress policy.
You can create and deploy an Ingress configuration using Kubernetes kubectl
or APIs. You can also configure and deploy an Ingress from Citrix ADM.
You can specify the following aspects of Kubernetes integration in ADM:
-
Cluster – You can register or unregister Kubernetes clusters for which ADM can deploy Ingress configurations. When you register a cluster in Citrix ADM, specify the Kubernetes API server information. Then, select an ADM agent that can reach the Kubernetes cluster and deploy Ingress configurations.
-
Policies – Ingress policies are used to select the ADC instance based on cluster or namespace to deploy an Ingress configuration. Specify the cluster, site, and instance information when you add a policy.
-
Ingress Configuration – This configuration is the Kubernetes Ingress configuration, which includes the content switching rules and the corresponding URL paths of the microservices and their ports. You can also specify the SSL/TLS certificates (to offload SSL processing on the ADC instance) using Kubernetes secret resources.
The Citrix ADM automatically maps the Ingress configurations to ADC instances using Ingress policies.
For each successful Ingress configuration, Citrix ADM generates a StyleBook ConfigPack. The ConfigPack represents the ADC configuration applied to the ADC instance that corresponds to the Ingress configuration. To view the ConfigPack, navigate to Applications > StyleBooks > Configurations.
Before you begin
To use Citrix ADC instances as Ingress devices on Kubernetes clusters, ensure you have:
-
Kubernetes cluster in place.
-
Kubernetes cluster registered in Citrix ADM.
Configure the Citrix ADM with a secret token to manage a Kubernetes cluster
For Citrix ADM to be able to receive events from Kubernetes, you need to create a service account in Kubernetes for Citrix ADM. And, configure the service account with the necessary RBAC permissions in the Cluster.
-
Create a service account for Citrix ADM. For example, the service account name can be
citrixadm-sa
. To create a service account, see Use Multiple Service Accounts. -
Use the
cluster-admin
role to bind the Citrix ADM service account. This binding grants aClusterRole
across the cluster to a service account. The following is an example command to bind acluster-admin
role to the service account.kubectl create clusterrolebinding citrixadm-sa-admin --clusterrole=cluster-admin --serviceaccount=default:citrixadm-sa <!--NeedCopy-->
After binding the Citrix ADM service account to the
cluster-admin
role, the service account has the cluster-wide access. For more information, seekubectl
createclusterrolebinding
. -
Obtain the token from the created service account.
For example, run the following command to view the token for the
citrixadm-sa
service account:kubectl describe sa citrixadm-sa <!--NeedCopy-->
-
Run the following command to obtain the secret string of the token:
kubectl describe secret <token-name> <!--NeedCopy-->
Add the Kubernetes cluster in Citrix ADM
After you configure a Citrix ADM agent and configure static routes, you must register the Kubernetes cluster in Citrix ADM.
To register the Kubernetes cluster:
-
Log on to Citrix ADM with administrator credentials.
-
Navigate to Orchestration > Kubernetes > Cluster. The Clusters page is displayed.
-
Click Add.
-
In the Add Cluster page, specify the following parameters:
-
Name - Specify a name of your choice.
-
API Server URL - You can get the API Server URL details from the Kubernetes main node.
-
On the Kubernetes main node, run the command
kubectl cluster-info
. -
Enter the URL that displays for “Kubernetes master is running at.”
-
-
Authentication Token - Specify the authentication token string obtained while you configure Citrix ADM to manage a Kubernetes cluster. The authentication token is required to validate access for communication between the Kubernetes cluster and Citrix ADM. To generate an authentication token:
-
On the Kubernetes main node, run the following commands:
kubectl describe secret <token-name> <!--NeedCopy-->
-
Copy the token that is generated and paste it as the Authentication Token
For more information, see Kubernetes documentation.
-
-
Select the agent from the list.
-
Click Create.
-
Define an Ingress policy
The Ingress policy decides which Citrix ADC is used to deploy an Ingress configuration, based on the Ingress Cluster or Namespace.
-
Navigate to Orchestration > Kubernetes > Policy.
-
Click Add to create a policy.
-
Specify the policy name.
-
Define Conditions to deploy the Ingress configuration on a Kubernetes cluster. These conditions are typically based on Ingress Cluster and Namespace.
-
In the Infrastructure panel,
-
Site - Select a site from the list.
-
Instance - Select the ADC instance from the list.
The Site and Instance lists populate the options based on the cluster selection in the Conditions panel.
These lists display the sites or instances that are associated with the Citrix ADM agent configured with the Kubernetes cluster.
-
-
In Choose Network, select the network from which ADM auto-assigns the virtual IP addresses to an Ingress configuration.
This list displays the networks created in Networks > IPAM.
-
Click Create.
-
Deploy the Ingress configuration
You can deploy the Ingress configuration from Kubernetes using kubectl
, Kubernetes API, or other tools. You can also deploy the Ingress configuration directly from Citrix ADM.
-
Navigate to Orchestration > Kubernetes > Ingresses.
-
Click Add.
-
In the Create Ingress field, specify the following details:
-
Specify the name of the Ingress.
-
In Cluster, select the Kubernetes cluster on which you want to deploy an Ingress.
-
Select the Cluster Namespace from the list. This field lists the namespaces that are present in the specified Kubernetes cluster.
-
Optional, select Auto Assign Frontend IP address.
-
Select Ingress Protocol from the list. If you select HTTPS, specify TLS secret.
This secret embeds the Kubernetes secret resource that embeds the HTTPS certificate and private key.
An HTTPS Ingress requires a TLS based secret configured on the Kubernetes cluster. Specify the
tls.crt
andtls.key
fields to include the server certificate and the certificate key respectively. -
For content routing, specify the following details:
-
URL paths - Specify the path that is associated with the Kubernetes service and port.
-
Kubernetes service - Specify the desired service.
-
Port - Specify the service port.
-
LB method - Select the preferred load-balancing method to the selected Kubernetes service.
The selected method updates the Ingress Specification with an appropriate annotation. For example, if you select ROUNDROBIN method, the Citrix annotation appears as follows:
"lbmethod":"ROUNDROBIN" <!--NeedCopy-->
-
Persistence Type - Select the preferred load-balancing persistence type to the selected Kubernetes service.
The selected persistence type updates the Ingress Specification with an appropriate annotation. For example, if you select COOKIEINSERT, the Citrix annotation appears as follows:
"persistenceType":"COOKIEINSERT" <!--NeedCopy-->
Click Add to add more URL paths and ports to the Ingress configuration.
After deployment, the Ingress configuration redirects the client traffic to a specific service based on the following:
- The requested URL path and port.
- The defined LB method and persistence type.
Note
Kubernetes Services used in an Ingress Configuration are expected to be of type NodePort.
-
-
Optional, specify an Ingress Description.
-
click Deploy.
If you want to review the configuration before you deploy, click Generate Ingress Spec. The specified Ingress configuration appears in the YAML format. After reviewing the configuration, click Deploy.
-
Note Apply licenses to the virtual servers that are created using Ingress configurations. To apply license, perform the following steps:
- Go to System > Licensing & Analytics.
- Under Virtual Server License Summary, enable Auto-select virtual servers.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.