You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deploy/deploy-cic-adc-admin-partition.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,19 +42,19 @@ Ensure that:
42
42
43
43
kubectl get pods --all-namespaces
44
44
45
-
## Use case: How to securely deliver multi-tenant microservice-based applications using Citrix ADC admin partitions
45
+
## Use case: How to securely deliver multitenant microservice-based applications using Citrix ADC admin partitions
46
46
47
-
You can isolate ingress traffic between different microservice based applications with the Citrix ADC admin partition using Citrix ingress controller. Citrix ADC admin partition enables multi-tenancy at the software level in a single Citrix ADC instance. Each partition has its own control plane and network plane.
47
+
You can isolate ingress traffic between different microservice based applications with the Citrix ADC admin partition using Citrix ingress controller. Citrix ADC admin partition enables multitenancy at the software level in a single Citrix ADC instance. Each partition has its own control plane and network plane.
48
48
49
49
You can deploy one instance of Citrix ingress controller in each namespace in a cluster.
50
50
51
51
For example, imagine you have two namespaces in a Kubernetes cluster and you want to isolate these namespaces from each other under two different admins. You can use the admin partition feature to separate these two namespaces. Create namespace 1 and namespace 2 and deploy Citrix ingress controller separately in both of these namespaces.
52
52
53
53
Citrix ingress controller instances provide configuration instructions to the respective Citrix ADC partitions using the system user account specified in the YAML manifest.
54
54
55
-

55
+

56
56
57
-
In this example, apache and guestbook sample applications are deployed in two different namespaces (namespace 1 and namespace 2 respectively) in a Kubernetes cluster. Both apache and guestbook application team wants to manage their workload independently and do not want to share resources. Citrix ADC admin partition helps to achieve multi-tenancy and in this example, two partitions (default, partition1) are used to manage both application workload separately.
57
+
In this example, apache and guestbook sample applications are deployed in two different namespaces (namespace 1 and namespace 2 respectively) in a Kubernetes cluster. Both apache and guestbook application team wants to manage their workload independently and do not want to share resources. Citrix ADC admin partition helps to achieve multitenancy and in this example, two partitions (default, partition1) are used to manage both application workload separately.
- You should be familiar with Citrix ADC and [Citrix ADC networking](https://docs.citrix.com/en-us/citrix-adc/current-release/networking.html).
@@ -35,39 +35,39 @@ Also, you can install the Citrix ADC VPX instances in a different VPC. In that c
35
35
36
36
For high availability (HA), you can install two instances of Citrix ADC VPX in HA mode.
37
37
38
-
1. Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AWS, see [Deploy Citrix ADC VPX instance on AWS](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-aws.html#deploy-a-citrix-adc-vpx-instance-on-aws).
38
+
1.Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AWS, see [Deploy Citrix ADC VPX instance on AWS](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-aws.html#deploy-a-citrix-adc-vpx-instance-on-aws).
39
39
40
40
Citrix ADC VPX requires a secondary public IP address other than the NSIP to run GSLB service sync and ADNS service.
41
41
42
-
2. Open the AWS console and choose **EC2** > **Network Interfaces** > **VPX primary ENI ID** > **Manage IP addresses**. Click **Assign new IP Address**.
42
+
2.Open the AWS console and choose **EC2** > **Network Interfaces** > **VPX primary ENI ID** > **Manage IP addresses**. Click **Assign new IP Address**.
After the secondary public IP address has been assigned to the VPX ENI, associate an elastic IP address to it.
47
47
48
-
3. Choose **EC2** > **Network Interfaces** > **VPX ENI ID** - **Actions** , click **Associate IP Address**. Select an elastic IP address for the secondary IP address and click **Associate**.
48
+
3.Choose **EC2** > **Network Interfaces** > **VPX ENI ID** - **Actions** , click **Associate IP Address**. Select an elastic IP address for the secondary IP address and click **Associate**.
4. Log in to the Citrix ADC VPX instance and add the secondary IP address as `SNIP` and enable the management access using the following command:
52
+
4.Log in to the Citrix ADC VPX instance and add the secondary IP address as `SNIP` and enable the management access using the following command:
53
53
54
54
add ip 192.168.211.73 255.255.224.0 -mgmtAccess ENABLED -type SNIP
55
55
56
56
**Note**: To log in to Citrix ADC VPX using SSH, you must enable the SSH port in the security group. Route tables must have an internet gateway configured for the default traffic and the NACL must allow the SSH port.
57
57
58
58
**Note**: If you are running the Citrix ADC VPX in High Availability (HA) mode, you must perform this configuration in both of the Citrix ADC VPX instances.
59
59
60
-
5. Enable Content Switching (CS), Load Balancing (LB), Global Server Load Balancing(GSLB), and SSL features in Citrix ADC VPX using the following command:
60
+
5.Enable Content Switching (CS), Load Balancing (LB), Global Server Load Balancing(GSLB), and SSL features in Citrix ADC VPX using the following command:
61
61
62
62
enable feature *feature*
63
63
64
64
**Note**: To enable GSLB, you must have an additional license.
65
65
66
-
6. Enable port 53 for UDP and TCP in the VPX security group for Citrix ADC VPX to receive DNS traffic. Also enable the TCP port 22 for SSH and the TCP port range 3008–3011 for GSLB metric exchange.
66
+
6.Enable port 53 for UDP and TCP in the VPX security group for Citrix ADC VPX to receive DNS traffic. Also enable the TCP port 22 for SSH and the TCP port range 3008–3011 for GSLB metric exchange.
67
67
68
68
For information on adding rules to the security group, see [Adding rules to a security group](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html#adding-security-group-rule).
69
69
70
-
7. Add a nameserver to Citrix ADC VPX using the following command:
70
+
7.Add a nameserver to Citrix ADC VPX using the following command:
71
71
72
72
add nameserver *nameserver IP*
73
73
@@ -82,7 +82,7 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
82
82
1. Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AKS, see [Deploy a Citrix ADC VPX instance on Microsoft Azure](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-vpx-on-azure.html).
83
83
84
84
You must have a SNIP with public IP for GSLB sync and ADNS service. If SNIP already exists, associate a public IP address with it.
85
-
85
+
86
86
2. To associate, choose **Home** > **Resource group** > **VPX instance** > **VPX NIC instance**. Associate a public IP address as shown in the following image. Click **Save** to save the changes.
87
87
88
88

@@ -103,9 +103,9 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
103
103
104
104
5. Enable the inbound rule for the following ports in the network security group on the Azure portal.
105
105
106
-
- TCP: 3008–3011 for GSLB metric exchange
107
-
- TCP: 22 for SSH
108
-
- TCP and UDP: 53 for DNS
106
+
-TCP: 3008–3011 for GSLB metric exchange
107
+
-TCP: 22 for SSH
108
+
-TCP and UDP: 53 for DNS
109
109
110
110
6. Add a nameserver to Citrix ADC VPX using the following command:
111
111
@@ -135,7 +135,7 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
135
135
136
136
For example, create an 'A' record `ns1.domain.com` pointing to the ADNS service public IP address. NS record for the domain must point to ns1.domain.com.
137
137
138
-
##Configure GSLB service in Citrix ADC VPX deployed in AWS and Azure
138
+
##Configure GSLB service in Citrix ADC VPX deployed in AWS and Azure
139
139
140
140
You must create GSLB sites on Citrix ADC VPX deployed on AWS and Azure.
141
141
@@ -157,7 +157,7 @@ You must create GSLB sites on Citrix ADC VPX deployed on AWS and Azure.
157
157
158
158
**Note**: If the initial sync fails, review the security groups on both AWS and Azure to allow the required ports.
159
159
160
-
## Apply GTP and GSE CRDs on AWS and Azure Kubernetes clusters
160
+
## Apply GTP and GSE CRDs on AWS and Azure Kubernetes clusters
161
161
162
162
The global traffic policy (GTP) and global service entry (GSE) CRDs help to configure Citrix ADC for performing GSLB in Kubernetes applications. These CRDs are designed for configuring multi-cluster ingress and load balancing solution for Kubernetes clusters.
163
163
@@ -176,8 +176,8 @@ The GSE CRD specifies the endpoint information (information about any Kubernetes
176
176
For the GSE CRD definition, see the [GSE CRD](https://developer-docs.citrix.com/projects/citrix-k8s-ingress-controller/en/latest/multicluster/multi-cluster/#gse-crd-definition). Apply the GSE CRD definition on AWS and Azure Kubernetes clusters using the following command:
Multi-cluster controller helps you to ensure the high availability of the applications across clusters in a multi-cloud environment.
183
183
@@ -197,7 +197,6 @@ To deploy the multi-cluster controller, perform the following steps:
197
197
198
198
**Note**: You can add a user to Citrix ADC using the `add system user` command.
199
199
200
-
201
200
3. Download the GSLB controller YAML file from [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml).
202
201
203
202
4. Apply the `gslb-controller.yaml` in an AWS cluster using the following command:
@@ -294,7 +293,7 @@ In this example application deployment scenario, an `https` image of apache is u
294
293
295
294
The application is exposed as type LoadBalancer in both AWS and Azure clusters. You must run the commands in both AWS and Azure Kubernetes clusters.
296
295
297
-
1.Create a deployment of a sample apache application using the following command:
296
+
1.Create a deployment of a sample apache application using the following command:
@@ -364,7 +363,7 @@ As the GTP CRD is configured for the traffic policy as `FAILOVER`, Citrix ADC VP
364
363
365
364
You can deploy the multi-cloud and multi-cluster ingress and load balancing solution with Amazon EKS and Microsoft AKS with Citrix ADC VPX as GSLB and the same Citrix ADC VPX as ingress device too.
366
365
367
-
To deploy the multi-cloud multi-cluster ingress and load balancing with Citrix ADC VPX as ingress device, you must complete the following tasks described in the previous sections:
366
+
To deploy the multi-cloud multi-cluster ingress and load balancing with Citrix ADC VPX as the ingress device, you must complete the following tasks described in the previous sections:
368
367
369
368
1.[Deploy Citrix ADC VPX in AWS](#deploy-citrix-adc-vpx-in-aws)
370
369
1. [Deploy Citrix ADC VPX in Azure](#deploy-citrix-adc-vpx-in-azure)
@@ -378,63 +377,49 @@ After completing the preceding tasks, perform the following tasks:
378
377
1. Configure Citrix ADC VPX as Ingress Device for AWS
379
378
1. Configure Citrix ADC VPX as Ingress Device for Azure
380
379
381
-
### Configure Citrix ADC VPX as Ingress Device for AWS
380
+
### Configure Citrix ADC VPX as Ingress device for AWS
382
381
383
-
#### Create Citrix ADC VPX login credentials using Kubernetes secret
The Citrix ADC VPX password is usually the instance-id of the VPX if you have not changed it.
392
389
393
-
SSH to the Citrix ADC VPX and configure a SNIP, which is the secondary IP of the VPX to which no Elastic IP is assigned
390
+
1. Configure SNIP in the Citrix ADC VPX by connecting to the Citrix ADC VPX using SSH. SNIP is the secondary IP address of Citrix a VPX to which the elastic IP address is not assigned.
394
391
395
-
```
396
-
add ns ip 192.168.84.93 255.255.224.0
397
-
```
392
+
add ns ip 192.168.84.93 255.255.224.0
398
393
399
-
This is required for Citrix ADC to interact with the pods inside the Kubernetes cluster.
394
+
This step is required for Citrix ADC to interact with the pods inside the Kubernetes cluster.
400
395
401
-
#### Update the Citrix ADC VPX management IP and VIP in the Citrix Ingress controller manifest
396
+
1.Update the Citrix ADC VPX management IP address and VIP in the Citrix ingress controller manifest.
***If you don't have `wget` installed, you can use `fetch` or `curl`***
400
+
**Note:**If you do not have `wget` installed, you can use `fetch` or `curl`.
408
401
409
-
Update the Citrix ADC VPX's primary IP in the `cic.yaml` in the below field
402
+
1.Update the primary IP address of Citrix ADC VPXin the `cic.yaml` in the following field.
410
403
411
-
```
412
-
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
413
-
- name: "NS_IP"
414
-
value: "X.X.X.X"
415
-
```
404
+
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
405
+
- name: "NS_IP"
406
+
value: "X.X.X.X"
416
407
417
-
Update the Citrix ADC VPX VIP in the `cic.yaml` in the below field. This is the private IP to which you have assigned an EIP.
418
-
419
-
```
420
-
# Set NetScaler VIP for the data traffic
421
-
- name: "NS_VIP"
422
-
value: "X.X.X.X"
423
-
```
408
+
1. Update the Citrix ADC VPX VIP in the `cic.yaml` in the following field. This is the private IP address to which you have assigned an elastic IP address
424
409
425
-
#### Create the Citrix Ingress Controller
410
+
# Set NetScaler VIP for the data traffic
411
+
- name: "NS_VIP"
412
+
value: "X.X.X.X"
426
413
427
-
Now that we have configure the Citrix Ingress controller with the required values, let's deploy it.
414
+
1. Once you have edited the YAML file with the required valuesdeploy Citrix ingress controller.
428
415
429
-
```
430
-
kubectl create -f cic.yaml
431
-
```
416
+
kubectl create -f cic.yaml
432
417
433
-
### Configure Citrix ADC VPX as Ingress Device for Azure
418
+
### Configure Citrix ADC VPX as Ingress device for Azure
434
419
435
-
Perform the following steps to deploy the Citrix ingress controller.
420
+
Perform the following steps:
436
421
437
-
1. Create Citrix ADC VPX login credentials using Kubernetes secret.
422
+
1. Create Citrix ADC VPX login credentials using Kubernetes secrets.
**Note:** If you do not have `wget` installed, you can use the `fetch` or `curl` command.
446
+
**Note:** If you do not have `wget` installed, you can use the `fetch` or `curl` command.
462
447
463
-
2. Update the Citrix ingress controller image with the Azure image URL in the `cic.yaml` file.
448
+
2.Update the Citrix ingress controller image with the Azure image URL in the `cic.yaml` file.
464
449
465
450
- name: cic-k8s-ingress-controller
466
451
# CIC Image from Azure
467
452
image: "<azure-cic-image-url>"
468
453
469
-
3. Update the primary IP address of the Citrix ADC VPX in the `cic.yaml` in the following field with the primary private IP address of the Azure VPX instance.
454
+
3.Update the primary IP address of the Citrix ADC VPX in the `cic.yaml` with the primary private IP address of the Azure VPX instance.
470
455
471
456
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
472
457
- name: "NS_IP"
473
458
value: "X.X.X.X"
474
459
475
-
476
-
1. Update the Citrix ADC VPX VIP in the `cic.yaml` in the following field with the private IP address of the VIP assigned during VPX Azure instance creation.
477
-
478
-
460
+
1. Update the Citrix ADC VPX VIP in the `cic.yaml` with the private IP address of the VIP assigned during VPX Azure instance creation.
479
461
480
462
# Set NetScaler VIP for the data traffic
481
463
- name: "NS_VIP"
482
464
value: "X.X.X.X"
483
465
484
-
4. Once you have configured the Citrix ingress controller with the required values, deploy the Citrix ingress controller using the following command.
466
+
4.Once you have configured Citrix ingress controller with the required values, deploy the Citrix ingress controller using the following command.
0 commit comments