Skip to content

Instantly share code, notes, and snippets.

@PetrMc
Last active May 9, 2024 21:53
Show Gist options
  • Save PetrMc/1592b5eb89ada7a33a7dccfa598c66d5 to your computer and use it in GitHub Desktop.
Save PetrMc/1592b5eb89ada7a33a7dccfa598c66d5 to your computer and use it in GitHub Desktop.
This Gist contains a YAML configuration file for setting up an ingress gateway in an Amazon EKS cluster, specifically tailored for use with Solo.io’s distribution of Istio. Use this to seamlessly integrate Istio's powerful routing capabilities within your EKS environment.
---
apiVersion: v1
kind: Namespace
metadata:
name: solo-ingress-ns
---
apiVersion: v1
kind: Service
metadata:
name: solo-ingressgateway
namespace: solo-ingress-ns
spec:
type: LoadBalancer
selector:
istio: solo-ingress-gw
ports:
- port: 80
name: http
- port: 443
name: https
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: solo-ingressgateway-gw
namespace: solo-ingress-ns
spec:
selector:
matchLabels:
istio: solo-ingress-gw
template:
metadata:
annotations:
inject.istio.io/templates: gateway
labels:
istio: solo-ingress-gw
sidecar.istio.io/inject: "true"
spec:
containers:
- name: istio-proxy
image: auto
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: solo-ingressgateway-sds
namespace: solo-ingress-ns
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get", "watch", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: solo-ingressgateway-sds
namespace: solo-ingress-ns
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: solo-ingressgateway-sds
subjects:
- kind: ServiceAccount
name: default
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment