Skip to content

Commit e8afbcd

Browse files
Updating dual tier and OpenShift Operator doc
1 parent 771d41b commit e8afbcd

36 files changed

Lines changed: 474 additions & 480 deletions

deployment/dual-tier/README.md

Lines changed: 22 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Perform the following:
1717

1818
1. Create a Kubernetes cluster in cloud or on-premises. The Kubernetes cluster in cloud can be a managed Kubernetes (for example: GKE, EKS, or AKS) or a custom created Kubernetes deployment.
1919

20-
1. Deploy Citrix ADC MPX or VPX on a multi-NIC deployment mode outside the Kubernetes cluster.
20+
2. Deploy Citrix ADC MPX or VPX on a multi-NIC deployment mode outside the Kubernetes cluster.
2121
- For instructions to deploy Citrix ADC MPX, see [Citrix ADC documentation](https://docs.citrix.com/en-us/citrix-adc/13).
2222

2323
- For instructions to deploy Citrix ADC VPX, see [Deploy a Citrix ADC VPX instance](https://docs.citrix.com/en-us/citrix-adc/13/deploying-vpx.html).
@@ -26,36 +26,41 @@ Perform the following:
2626

2727
1. Configure an IP address from the subnet of the Kubernetes cluster as SNIP on the Citrix ADC. For information on configuring SNIPs in Citrix ADC, see [Configuring Subnet IP Addresses (SNIPs)](https://docs.citrix.com/en-us/citrix-adc/13/networking/ip-addressing/configuring-citrix-adc-owned-ip-addresses/configuring-subnet-ip-addresses-snips.html).
2828

29-
1. Enable management access for the SNIP that is the same subnet of the Kubernetes cluster. The SNIP should be used as `NS_IP` variable in the [Citrix ingress controller YAML](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml) file to enable Citrix ingress controller to configure the Tier-1 Citrix ADC.
29+
2. Enable management access for the SNIP that is the same subnet of the Kubernetes cluster. The SNIP should be used as `NS_IP` variable in the [Citrix ingress controller YAML](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml) file to enable Citrix ingress controller to configure the Tier-1 Citrix ADC.
3030

3131
>**Note:**
3232
>It is not mandatory to use SNIP as `NS_IP`. If the management IP address of the Citrix ADC is reachable from Citrix ingress controller then you can use the management IP address as `NS_IP`.
3333
34-
1. In cloud deployments, enable [MAC-Based Forwarding mode](https://docs.citrix.com/en-us/citrix-adc/13/networking/interfaces/configuring-mac-based-forwarding.html) on the Tier-1 Citrix ADC VPX. As Citrix ADC VPX is deployed in multi-NIC mode, it would not have the return route to reach the POD CNI network or the Client network. Hence, you need to enable MAC-Based Forwarding mode on the Tier-1 Citrix ADC VPX to handle this scenario.
34+
3. In cloud deployments, enable [MAC-Based Forwarding mode](https://docs.citrix.com/en-us/citrix-adc/13/networking/interfaces/configuring-mac-based-forwarding.html) on the Tier-1 Citrix ADC VPX. As Citrix ADC VPX is deployed in multi-NIC mode, it would not have the return route to reach the POD CNI network or the Client network. Hence, you need to enable MAC-Based Forwarding mode on the Tier-1 Citrix ADC VPX to handle this scenario.
3535

36-
1. Create a [Citrix ADC system user account](https://developer-docs.citrix.com/projects/citrix-k8s-ingress-controller/en/latest/deploy/deploy-cic-yaml/#create-system-user-account-for-citrix-ingress-controller-in-citrix-adc) specific to Citrix ingress controller. Citrix ingress controller uses the system user account to automatically configure the Tier-1 Citrix ADC.
36+
4. The user name and password of the Citrix ADC VPX or MPX appliance used as the Ingress device. The Citrix ADC appliancemust have a system user account (non-default) with certain privileges so that the Citrix ingress controller can configure the Citrix ADC VPX or MPX appliance. For instructions to create the system user account on Citrix ADC, see [Create System User Account for Citrix ingress controller in Citrix ADC](https://docs.citrix.com/en-us/citrix-k8s-ingress-controller/deploy/cic-yaml.html#create-system-user-account-for-citrix-ingress-controller-in-citrix-adc)
3737

38-
1. Configure your on-premises firewall or security groups on your cloud to allow inbound traffic to the ports required for Citrix ADC. The Setup process uses port 80 and port 443, you can modify these ports based on your requirement.
38+
You can directly pass the user name and password as environment variables to the controller, or use Kubernetes secrets (recommended). If you want to use Kubernetes secrets, create a secret for the user name and password using the following command:
39+
```
40+
kubectl create secret generic nslogin --from-literal=username='cic' --from-literal=password='mypassword'
41+
```
3942
40-
1. Deploy a sample microservice. Use the following command:
43+
5. Configure your on-premises firewall or security groups on your cloud to allow inbound traffic to the ports required for Citrix ADC. The Setup process uses port 80 and port 443, you can modify these ports based on your requirement.
44+
45+
3. Deploy a sample microservice. Use the following command:
4146
4247
kubectl create -f https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/apache.yaml
4348
44-
1. Deploy Citrix ADC CPX as Tier-2 ingress. Use the following command:
49+
4. Deploy Citrix ADC CPX as Tier-2 ingress. Use the following command:
4550
4651
kubectl create -f https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/tier-2-cpx.yaml
4752
48-
1. Create an ingress object for the Tier-2 Citrix ADC CPX. Use the following command:
53+
5. Create an ingress object for the Tier-2 Citrix ADC CPX. Use the following command:
4954
5055
kubectl create -f https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/ingress-tier-2-cpx.yaml
5156
52-
1. Deploy the Citrix ingress controller for Tier-1 Citrix ADC. Perform the following:
57+
6. Deploy the Citrix ingress controller for Tier-1 Citrix ADC. Perform the following:
5358
5459
1. Download the Citrix ingress controller manifest file. Use the following command:
5560
5661
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml
5762
58-
1. Edit the Citrix ingress controller manifest file and enter the values for the following environmental variables:
63+
2. Edit the Citrix ingress controller manifest file and enter the values for the following environmental variables:
5964
6065
| Environment Variable | Mandatory or Optional | Description |
6166
| ---------------------- | ---------------------- | ----------- |
@@ -67,36 +72,36 @@ Perform the following:
6772
| ingress-classes | Optional | If multiple ingress load balancers are used to load balance different ingress resources. You can use this environment variable to specify Citrix ingress controller to configure Citrix ADC associated with specific ingress class. For information on Ingress classes, see [Ingress class support](../configure/ingress-classes.md)|
6873
| NS_VIP | Optional | Citrix ingress controller uses the IP address provided in this environment variable to configure a virtual IP address to the Citrix ADC that receives Ingress traffic. **Note:** NS_VIP acts as a fallback when the [frontend-ip](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/docs/configure/annotations.md) annotation is not provided in Ingress yaml. Not supported for Type Loadbalancer service. |
6974
70-
1. Deploy the updated Citrix ingress controller manifest file. Use the following command:
75+
3. Deploy the updated Citrix ingress controller manifest file. Use the following command:
7176
7277
kubectl create -f tier-1-vpx-cic.yaml
7378
74-
1. Create an ingress object for the Tier-1 Citrix ADC. Use the following command:
79+
7. Create an ingress object for the Tier-1 Citrix ADC. Use the following command:
7580
7681
kubectl create -f https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/ingress-tier-1-vpx.yaml
7782
78-
1. Update DNS server details in the cloud or on-premises to point your website to the VIP of the Tier-1 Citrix ADC.
83+
8. Update DNS server details in the cloud or on-premises to point your website to the VIP of the Tier-1 Citrix ADC.
7984
8085
For example: `citrix-ingress.com 192.10.2.16`
8186
8287
Where `192.10.2.16` is the VIP of the Tier-1 Citrix ADC and `citrix-ingress.com` is the microservice running in your Kubernetes cluster.
8388
84-
1. Access the URL of the microservice to verify the deployment.
89+
9. Access the URL of the microservice to verify the deployment.
8590
8691
## Set up dual-tier deployment using one step deployment manifest file
8792
8893
For easy deployment, the Citrix ingress controller [repo](https://github.com/citrix/citrix-k8s-ingress-controller) includes an all-in-one deployment manifest. You can download the file and update it with values for the following environmental variables and deploy the manifest file.
8994
9095
>**Note:**
91-
>Ensure that you have completed step 12 in the [Setup process](#setup-process).
96+
>Ensure that you have completed step 1 and 2 in the [Setup process](#setup-process).
9297
9398
Perform the following:
9499
95100
1. Download the all-in-one deployment manifest file. Use the following command:
96101
97102
wget https://raw.githubusercontent.com/citrix/citrix-k8s-ingress-controller/master/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml
98103
99-
1. Edit the all-in-one deployment manifest file and enter the values for the following environmental variables:
104+
2. Edit the all-in-one deployment manifest file and enter the values for the following environmental variables:
100105
101106
| Environment Variable | Mandatory or Optional | Description |
102107
| ---------------------- | ---------------------- | ----------- |
@@ -108,6 +113,6 @@ Perform the following:
108113
| ingress-classes | Optional | If multiple ingress load balancers are used to load balance different ingress resources. You can use this environment variable to specify Citrix ingress controller to configure Citrix ADC associated with specific ingress class. For information on Ingress classes, see [Ingress class support](../configure/ingress-classes.md)|
109114
| NS_VIP | Optional | Citrix ingress controller uses the IP address provided in this environment variable to configure a virtual IP address to the Citrix ADC that receives Ingress traffic. **Note:** NS_VIP acts as a fallback when the [frontend-ip](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/docs/configure/annotations.md) annotation is not provided in Ingress yaml. Not Supported for Type Loadbalancer service. |
110115
111-
1. Deploy the updated all-in-one deployment manifest file. Use the following command:
116+
3. Deploy the updated all-in-one deployment manifest file. Use the following command:
112117
113118
kubectl create -f all-in-one-dual-tier-demo.yaml

0 commit comments

Comments
 (0)