Skip to content

Commit de93607

Browse files
authored
Merge pull request #520 from citrix/cic-release-1.22
fixed image and language issues
2 parents 8a0e27f + 2cbd30f commit de93607

2 files changed

Lines changed: 54 additions & 72 deletions

File tree

docs/deploy/deploy-cic-adc-admin-partition.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,19 +42,19 @@ Ensure that:
4242

4343
kubectl get pods --all-namespaces
4444

45-
## Use case: How to securely deliver multi-tenant microservice-based applications using Citrix ADC admin partitions
45+
## Use case: How to securely deliver multitenant microservice-based applications using Citrix ADC admin partitions
4646

47-
You can isolate ingress traffic between different microservice based applications with the Citrix ADC admin partition using Citrix ingress controller. Citrix ADC admin partition enables multi-tenancy at the software level in a single Citrix ADC instance. Each partition has its own control plane and network plane.
47+
You can isolate ingress traffic between different microservice based applications with the Citrix ADC admin partition using Citrix ingress controller. Citrix ADC admin partition enables multitenancy at the software level in a single Citrix ADC instance. Each partition has its own control plane and network plane.
4848

4949
You can deploy one instance of Citrix ingress controller in each namespace in a cluster.
5050

5151
For example, imagine you have two namespaces in a Kubernetes cluster and you want to isolate these namespaces from each other under two different admins. You can use the admin partition feature to separate these two namespaces. Create namespace 1 and namespace 2 and deploy Citrix ingress controller separately in both of these namespaces.
5252

5353
Citrix ingress controller instances provide configuration instructions to the respective Citrix ADC partitions using the system user account specified in the YAML manifest.
5454

55-
![Citrix ADC managing Kubernetes cluster workload using admin partitions](admin-partition-topology.png)
55+
![Citrix ADC managing Kubernetes cluster workload using admin partitions](../media/admin-partition-topology.png)
5656

57-
In this example, apache and guestbook sample applications are deployed in two different namespaces (namespace 1 and namespace 2 respectively) in a Kubernetes cluster. Both apache and guestbook application team wants to manage their workload independently and do not want to share resources. Citrix ADC admin partition helps to achieve multi-tenancy and in this example, two partitions (default, partition1) are used to manage both application workload separately.
57+
In this example, apache and guestbook sample applications are deployed in two different namespaces (namespace 1 and namespace 2 respectively) in a Kubernetes cluster. Both apache and guestbook application team wants to manage their workload independently and do not want to share resources. Citrix ADC admin partition helps to achieve multitenancy and in this example, two partitions (default, partition1) are used to manage both application workload separately.
5858

5959
The following prerequisites apply:
6060

docs/deploy/multi-cloud-ingress-lb-solution.md

Lines changed: 50 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The following diagram explains a deployment topology of the multi-cloud ingress
1010

1111
![Deployment topology](../media/multi-cloud-ingress-architecture.png)
1212

13-
**Prerequisites**
13+
### Prerequisites
1414

1515
- You should be familiar with AWS and Azure.
1616
- You should be familiar with Citrix ADC and [Citrix ADC networking](https://docs.citrix.com/en-us/citrix-adc/current-release/networking.html).
@@ -35,39 +35,39 @@ Also, you can install the Citrix ADC VPX instances in a different VPC. In that c
3535

3636
For high availability (HA), you can install two instances of Citrix ADC VPX in HA mode.
3737

38-
1. Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AWS, see [Deploy Citrix ADC VPX instance on AWS](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-aws.html#deploy-a-citrix-adc-vpx-instance-on-aws).
38+
1. Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AWS, see [Deploy Citrix ADC VPX instance on AWS](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-aws.html#deploy-a-citrix-adc-vpx-instance-on-aws).
3939

4040
Citrix ADC VPX requires a secondary public IP address other than the NSIP to run GSLB service sync and ADNS service.
4141

42-
2. Open the AWS console and choose **EC2** > **Network Interfaces** > **VPX primary ENI ID** > **Manage IP addresses**. Click **Assign new IP Address**.
42+
2. Open the AWS console and choose **EC2** > **Network Interfaces** > **VPX primary ENI ID** > **Manage IP addresses**. Click **Assign new IP Address**.
4343

4444
![Manage-ip-address](../media/multi-cloud-manage-ipaddress.png)
4545

4646
After the secondary public IP address has been assigned to the VPX ENI, associate an elastic IP address to it.
4747

48-
3. Choose **EC2** > **Network Interfaces** > **VPX ENI ID** - **Actions** , click **Associate IP Address**. Select an elastic IP address for the secondary IP address and click **Associate**.
48+
3. Choose **EC2** > **Network Interfaces** > **VPX ENI ID** - **Actions** , click **Associate IP Address**. Select an elastic IP address for the secondary IP address and click **Associate**.
4949

5050
![Associate-elastic-ipaddress](../media/multi-cloud-associate-elasticip.png)
5151

52-
4. Log in to the Citrix ADC VPX instance and add the secondary IP address as `SNIP` and enable the management access using the following command:
52+
4. Log in to the Citrix ADC VPX instance and add the secondary IP address as `SNIP` and enable the management access using the following command:
5353

5454
add ip 192.168.211.73 255.255.224.0 -mgmtAccess ENABLED -type SNIP
5555

5656
**Note**: To log in to Citrix ADC VPX using SSH, you must enable the SSH port in the security group. Route tables must have an internet gateway configured for the default traffic and the NACL must allow the SSH port.
5757

5858
**Note**: If you are running the Citrix ADC VPX in High Availability (HA) mode, you must perform this configuration in both of the Citrix ADC VPX instances.
5959

60-
5. Enable Content Switching (CS), Load Balancing (LB), Global Server Load Balancing(GSLB), and SSL features in Citrix ADC VPX using the following command:
60+
5. Enable Content Switching (CS), Load Balancing (LB), Global Server Load Balancing(GSLB), and SSL features in Citrix ADC VPX using the following command:
6161

6262
enable feature *feature*
6363

6464
**Note**: To enable GSLB, you must have an additional license.
6565

66-
6. Enable port 53 for UDP and TCP in the VPX security group for Citrix ADC VPX to receive DNS traffic. Also enable the TCP port 22 for SSH and the TCP port range 3008–3011 for GSLB metric exchange.
66+
6. Enable port 53 for UDP and TCP in the VPX security group for Citrix ADC VPX to receive DNS traffic. Also enable the TCP port 22 for SSH and the TCP port range 3008–3011 for GSLB metric exchange.
6767

6868
For information on adding rules to the security group, see [Adding rules to a security group](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html#adding-security-group-rule).
6969

70-
7. Add a nameserver to Citrix ADC VPX using the following command:
70+
7. Add a nameserver to Citrix ADC VPX using the following command:
7171

7272
add nameserver *nameserver IP*
7373

@@ -82,7 +82,7 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
8282
1. Install Citrix ADC VPX in AWS. For information on installing Citrix ADC VPX in AKS, see [Deploy a Citrix ADC VPX instance on Microsoft Azure](https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/deploy-vpx-on-azure.html).
8383

8484
You must have a SNIP with public IP for GSLB sync and ADNS service. If SNIP already exists, associate a public IP address with it.
85-
85+
8686
2. To associate, choose **Home** > **Resource group** > **VPX instance** > **VPX NIC instance**. Associate a public IP address as shown in the following image. Click **Save** to save the changes.
8787

8888
![snip](../media/multi-cloud-snip.png)
@@ -103,9 +103,9 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
103103

104104
5. Enable the inbound rule for the following ports in the network security group on the Azure portal.
105105

106-
- TCP: 3008–3011 for GSLB metric exchange
107-
- TCP: 22 for SSH
108-
- TCP and UDP: 53 for DNS
106+
- TCP: 3008–3011 for GSLB metric exchange
107+
- TCP: 22 for SSH
108+
- TCP and UDP: 53 for DNS
109109

110110
6. Add a nameserver to Citrix ADC VPX using the following command:
111111

@@ -135,7 +135,7 @@ While installing the Citrix ADC VPX, select the VNet where the AKS cluster is in
135135

136136
For example, create an 'A' record `ns1.domain.com` pointing to the ADNS service public IP address. NS record for the domain must point to ns1.domain.com.
137137

138-
## Configure GSLB service in Citrix ADC VPX deployed in AWS and Azure
138+
## Configure GSLB service in Citrix ADC VPX deployed in AWS and Azure
139139

140140
You must create GSLB sites on Citrix ADC VPX deployed on AWS and Azure.
141141

@@ -157,7 +157,7 @@ You must create GSLB sites on Citrix ADC VPX deployed on AWS and Azure.
157157

158158
**Note**: If the initial sync fails, review the security groups on both AWS and Azure to allow the required ports.
159159

160-
## Apply GTP and GSE CRDs on AWS and Azure Kubernetes clusters
160+
## Apply GTP and GSE CRDs on AWS and Azure Kubernetes clusters
161161

162162
The global traffic policy (GTP) and global service entry (GSE) CRDs help to configure Citrix ADC for performing GSLB in Kubernetes applications. These CRDs are designed for configuring multi-cluster ingress and load balancing solution for Kubernetes clusters.
163163

@@ -176,8 +176,8 @@ The GSE CRD specifies the endpoint information (information about any Kubernetes
176176
For the GSE CRD definition, see the [GSE CRD](https://developer-docs.citrix.com/projects/citrix-k8s-ingress-controller/en/latest/multicluster/multi-cluster/#gse-crd-definition). Apply the GSE CRD definition on AWS and Azure Kubernetes clusters using the following command:
177177

178178
kubectl apply -f https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/multicluster/Manifest/gse-crd.yaml
179-
180-
## Deploy multi-cluster controller
179+
180+
## Deploy multi-cluster controller
181181

182182
Multi-cluster controller helps you to ensure the high availability of the applications across clusters in a multi-cloud environment.
183183

@@ -197,7 +197,6 @@ To deploy the multi-cluster controller, perform the following steps:
197197

198198
**Note**: You can add a user to Citrix ADC using the `add system user` command.
199199

200-
201200
3. Download the GSLB controller YAML file from [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml).
202201

203202
4. Apply the `gslb-controller.yaml` in an AWS cluster using the following command:
@@ -294,7 +293,7 @@ In this example application deployment scenario, an `https` image of apache is u
294293

295294
The application is exposed as type LoadBalancer in both AWS and Azure clusters. You must run the commands in both AWS and Azure Kubernetes clusters.
296295

297-
1. Create a deployment of a sample apache application using the following command:
296+
1. Create a deployment of a sample apache application using the following command:
298297

299298
kubectl create deploy apache --image=httpd:latest port=80
300299

@@ -364,7 +363,7 @@ As the GTP CRD is configured for the traffic policy as `FAILOVER`, Citrix ADC VP
364363

365364
You can deploy the multi-cloud and multi-cluster ingress and load balancing solution with Amazon EKS and Microsoft AKS with Citrix ADC VPX as GSLB and the same Citrix ADC VPX as ingress device too.
366365

367-
To deploy the multi-cloud multi-cluster ingress and load balancing with Citrix ADC VPX as ingress device, you must complete the following tasks described in the previous sections:
366+
To deploy the multi-cloud multi-cluster ingress and load balancing with Citrix ADC VPX as the ingress device, you must complete the following tasks described in the previous sections:
368367

369368
1. [Deploy Citrix ADC VPX in AWS](#deploy-citrix-adc-vpx-in-aws)
370369
1. [Deploy Citrix ADC VPX in Azure](#deploy-citrix-adc-vpx-in-azure)
@@ -378,63 +377,49 @@ After completing the preceding tasks, perform the following tasks:
378377
1. Configure Citrix ADC VPX as Ingress Device for AWS
379378
1. Configure Citrix ADC VPX as Ingress Device for Azure
380379

381-
### Configure Citrix ADC VPX as Ingress Device for AWS
380+
### Configure Citrix ADC VPX as Ingress device for AWS
382381

383-
#### Create Citrix ADC VPX login credentials using Kubernetes secret
382+
Perform the following steps:
384383

385-
```
386-
kubectl create secret generic nslogin --from-literal=username='nsroot' --from-literal=password='<instance-id-of-vpx>'
387-
```
384+
1. Create Citrix ADC VPX login credentials using Kubernetes secret
388385

389-
The Citrix ADC VPX password is usually the instance-id of the VPX if you have not changed it.
386+
kubectl create secret generic nslogin --from-literal=username='nsroot' --from-literal=password='<instance-id-of-vpx>'
390387

391-
#### Configure SNIP in the Citrix ADC VPX
388+
The Citrix ADC VPX password is usually the instance-id of the VPX if you have not changed it.
392389

393-
SSH to the Citrix ADC VPX and configure a SNIP, which is the secondary IP of the VPX to which no Elastic IP is assigned
390+
1. Configure SNIP in the Citrix ADC VPX by connecting to the Citrix ADC VPX using SSH. SNIP is the secondary IP address of Citrix a VPX to which the elastic IP address is not assigned.
394391

395-
```
396-
add ns ip 192.168.84.93 255.255.224.0
397-
```
392+
add ns ip 192.168.84.93 255.255.224.0
398393

399-
This is required for Citrix ADC to interact with the pods inside the Kubernetes cluster.
394+
This step is required for Citrix ADC to interact with the pods inside the Kubernetes cluster.
400395

401-
#### Update the Citrix ADC VPX management IP and VIP in the Citrix Ingress controller manifest
396+
1. Update the Citrix ADC VPX management IP address and VIP in the Citrix ingress controller manifest.
402397

403-
```
404-
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/aws/quick-deploy-cic/manifest/cic.yaml
405-
```
398+
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/aws/quick-deploy-cic/manifest/cic.yaml
406399

407-
***If you don't have `wget` installed, you can use `fetch` or `curl`***
400+
**Note:** If you do not have `wget` installed, you can use `fetch` or `curl`.
408401

409-
Update the Citrix ADC VPX's primary IP in the `cic.yaml` in the below field
402+
1. Update the primary IP address of Citrix ADC VPX in the `cic.yaml` in the following field.
410403

411-
```
412-
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
413-
- name: "NS_IP"
414-
value: "X.X.X.X"
415-
```
404+
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
405+
- name: "NS_IP"
406+
value: "X.X.X.X"
416407

417-
Update the Citrix ADC VPX VIP in the `cic.yaml` in the below field. This is the private IP to which you have assigned an EIP.
418-
419-
```
420-
# Set NetScaler VIP for the data traffic
421-
- name: "NS_VIP"
422-
value: "X.X.X.X"
423-
```
408+
1. Update the Citrix ADC VPX VIP in the `cic.yaml` in the following field. This is the private IP address to which you have assigned an elastic IP address
424409

425-
#### Create the Citrix Ingress Controller
410+
# Set NetScaler VIP for the data traffic
411+
- name: "NS_VIP"
412+
value: "X.X.X.X"
426413

427-
Now that we have configure the Citrix Ingress controller with the required values, let's deploy it.
414+
1. Once you have edited the YAML file with the required values deploy Citrix ingress controller.
428415

429-
```
430-
kubectl create -f cic.yaml
431-
```
416+
kubectl create -f cic.yaml
432417

433-
### Configure Citrix ADC VPX as Ingress Device for Azure
418+
### Configure Citrix ADC VPX as Ingress device for Azure
434419

435-
Perform the following steps to deploy the Citrix ingress controller.
420+
Perform the following steps:
436421

437-
1. Create Citrix ADC VPX login credentials using Kubernetes secret.
422+
1. Create Citrix ADC VPX login credentials using Kubernetes secrets.
438423

439424
kubectl create secret generic nslogin --from-literal=username='<azure-vpx-instance-username>' --from-literal=password='<azure-vpx-instance-password>'
440425

@@ -452,35 +437,32 @@ Perform the following steps to deploy the Citrix ingress controller.
452437

453438
show ip <primary-private-ip-addess>
454439

455-
3. Update the Citrix ADC VPX image URL, management IP, and VIP in the Citrix ingress controller YAML file.
440+
3. Update the Citrix ADC VPX image URL, management IP address, and VIP in the Citrix ingress controller YAML file.
456441

457-
1. Download the Citrix ingress controller YAML file.
442+
1. Download the Citrix ingress controller YAML file.
458443

459-
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/azure/manifest/azurecic/cic.yaml
444+
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/azure/manifest/azurecic/cic.yaml
460445

461-
**Note:** If you do not have `wget` installed, you can use the `fetch` or `curl` command.
446+
**Note:** If you do not have `wget` installed, you can use the `fetch` or `curl` command.
462447

463-
2. Update the Citrix ingress controller image with the Azure image URL in the `cic.yaml` file.
448+
2. Update the Citrix ingress controller image with the Azure image URL in the `cic.yaml` file.
464449

465450
- name: cic-k8s-ingress-controller
466451
# CIC Image from Azure
467452
image: "<azure-cic-image-url>"
468453

469-
3. Update the primary IP address of the Citrix ADC VPX in the `cic.yaml` in the following field with the primary private IP address of the Azure VPX instance.
454+
3. Update the primary IP address of the Citrix ADC VPX in the `cic.yaml` with the primary private IP address of the Azure VPX instance.
470455

471456
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
472457
- name: "NS_IP"
473458
value: "X.X.X.X"
474459

475-
476-
1. Update the Citrix ADC VPX VIP in the `cic.yaml` in the following field with the private IP address of the VIP assigned during VPX Azure instance creation.
477-
478-
460+
1. Update the Citrix ADC VPX VIP in the `cic.yaml` with the private IP address of the VIP assigned during VPX Azure instance creation.
479461

480462
# Set NetScaler VIP for the data traffic
481463
- name: "NS_VIP"
482464
value: "X.X.X.X"
483465

484-
4. Once you have configured the Citrix ingress controller with the required values, deploy the Citrix ingress controller using the following command.
466+
4. Once you have configured Citrix ingress controller with the required values, deploy the Citrix ingress controller using the following command.
485467

486468
kubectl create -f cic.yaml

0 commit comments

Comments
 (0)