Careful!
You are browsing documentation for a version of Kuma that is not the latest release.
Looking for even older versions? Learn more.
Federate zone control plane
With Kuma you can first start with just one zone control plane and then federate it to a multi-zone deployment. This way you can:
- see your mesh deployment in one centralized place
- connect multiple zones and introduce cross zone connectivity
- manage policies that are pushed to all zones
Prerequisites
- Completed quickstart to set up a zone control plane with demo application
- Have kumactl installed and in your path
Start a global control plane
Start a new Kubernetes cluster
Currently, it’s not possible to deploy global and zone control plane in the same Kubernetes cluster, therefore we need a new Kubernetes cluster.
You can skip this step if you already have a Kubernetes cluster running. It can be a cluster running locally or in a public cloud like AWS EKS, GCP GKE, etc.
minikube start -p mesh-global
Setup the minikube tunnel
If you are using minikube for local testing, you can take advantage of the built-in minikube tunnel command. This command allows load balancer addresses to be provisioned using localhost.
Using nohup
will allow the tunnel to continue running should your current terminal session end.
nohup minikube tunnel -p mesh-global &
Deploy a global control plane
helm install --kube-context=mesh-global --create-namespace --namespace kuma-system \
--set controlPlane.mode=global \
--set controlPlane.defaults.skipMeshCreation=true \
kuma kuma/kuma
We skip default mesh creation as we will bring mesh from zone control plane in the next steps.
Sync endpoint
Find and save the external IP and port of the kuma-global-zone-sync
service in the kuma-system
namespace:
export KDS_IP=$(kubectl --context=mesh-global get svc --namespace kuma-system kuma-global-zone-sync -o jsonpath='{.status.loadBalancer.ingress[0].ip}')
If you are using minikube, you should use host.minikube.internal
to ensure networking works correctly.
export KDS_IP=host.minikube.internal
Copy resources from zone to global control plane
To federate zone control plane without any traffic interruption, we need to copy resources like secrets, meshes etc. First, we need to expose API server of zone control plane:
kubectl --context=mesh-zone port-forward svc/kuma-control-plane -n kuma-system 5681:5681
Then we export resources:
export ZONE_USER_ADMIN_TOKEN=$(kubectl --context=mesh-zone get secrets -n kuma-system admin-user-token -ojson | jq -r .data.value | base64 -d)
kumactl config control-planes add \
--address http://localhost:5681 \
--headers "authorization=Bearer $ZONE_USER_ADMIN_TOKEN" \
--name "zone-cp" \
--overwrite
kumactl export --profile=federation-with-policies --format=kubernetes > resources.yaml
And finally, we apply resources on global control plane
kubectl apply --context=mesh-global -f resources.yaml
Connect zone control plane to global control plane
Update Helm deployment of zone control plane to configure connection to the global control plane.
helm upgrade --kube-context=mesh-zone --namespace kuma-system \
--set controlPlane.mode=zone \
--set controlPlane.zone=zone-1 \
--set ingress.enabled=true \
--set controlPlane.kdsGlobalAddress=grpcs://${KDS_IP}:5685 \
--set controlPlane.tls.kdsZoneClient.skipVerify=true \
kuma kuma/kuma
Verify federation
To verify federation, first port-forward the API service from the global control plane to port 15681 to avoid collision with previous port forward.
kubectl --context=mesh-global port-forward svc/kuma-control-plane -n kuma-system 15681:5681
And then navigate to 127.0.0.1:15681/gui to see the GUI.
You should eventually see
- a zone in list of zones
- policies including
redis
MeshTrafficPermission that we applied in the quickstart guide. - data plane proxies for the demo application that we installed in the quickstart guide.
Apply policy on global control plane
We can check policy synchronization from global control plane to zone control plane by applying a policy on global control plane:
echo "apiVersion: kuma.io/v1alpha1
kind: MeshCircuitBreaker
metadata:
name: demo-app-to-redis
namespace: kuma-system
labels:
kuma.io/mesh: default
spec:
targetRef:
kind: MeshService
name: demo-app_kuma-demo_svc_5000
to:
- targetRef:
kind: MeshService
name: redis_kuma-demo_svc_6379
default:
connectionLimits:
maxConnections: 2
maxPendingRequests: 8
maxRetries: 2
maxRequests: 2" | kubectl --context=mesh-global apply -f -
If we execute the following command:
kubectl get --context=mesh-zone meshcircuitbreakers -A
The policy should be eventually available in zone control plane
NAMESPACE NAME TARGETREF KIND TARGETREF NAME
kuma-system demo-app-to-redis-65xb45x2xfd5bf7f MeshService demo-app_kuma-demo_svc_5000
kuma-system mesh-circuit-breaker-all-default Mesh
Next steps
- Read the multi-zone docs to learn more about this deployment model and cross-zone connectivity.