Product
|
Cloud costs
|
released
September 30, 2019
|
3
min read
|

How to: Your First Istio Service Mesh Deployment

Updated

Istio gained a lot of popularity in the last year. I am not 100% on what Istio is but what I do know is that I need two Istios; one to use and one for show to get on stage at a technology conference such as CNCF’s KubeCon.

All jokes aside, don’t worry if your knowledge of Service Meshes has some gaps. We are here to help. Service Mesh technology is blooming as our applications are becoming more distributed and embracing a more microservice architecture. 

Changing Landscape

Not too long ago, networking teams owned the connectivity and routing between your application and the inside/outside world. When we had a handful of predictable contexts to route to, the networking team could be given plenty of time to modify the rules (remember filing a ticket for a firewall rule or adding a new virtual IP?). Take a look at the below requests for tacos that I gave in a presentation about application networking complexity.

The traditional olden day taco request with virtual machines:

The Olden Days - Taco Request


With the networking stack to support the olden days:

The Olden Days - Networking Stack


As applications started to become more distributed, our tickets to the networking teams became longer as a dynamic portion of endpoints started to creep in. 

Fast forward to today with the land of Kubernetes, Serverless, and the public cloud; resources are always being spun up and spun down. We certainly could not make a ticket for every endpoint. Routes and endpoints change all the time, as systems decide how much firepower we need (e.g. autoscaling).

The modern-day taco request with Lambda and Redis:

The Modern Days - Taco Request


With a networking stack to support the modern days:

The Modern Days - Networking Stack


With development teams and orchestrators cranking out more endpoints than ever, there needed to be technology in place to make sure communication was clear, thus welcome Service Meshes.

Hello Mesh

With the ever-changing and distributed architectures ushering us out of the monolith, Service Mesh technology was born. Solo.io, a leader in Service Mesh orchestration, defines Services Meshes as: “A Service Mesh abstracts the business logic of an application (what the service does) from the application network (how it should talk to each other)”. Having your applications participate in a Service Mesh abstracts away the networking complexity (though this complexity has to go somewhere, stay tuned for part two). 

Like any rising in popularity technology, there are choices in Service Mesh. Like Kubernetes, the most popular one by the amount of press is Istio. Honorable mentions though are LinkerD, Hashi’s Consul, and even public cloud vendors such as AWS has AWS App Mesh. Let’s run through your first Istio deployment to see what the hoopla is all about.

Your First Istio Deployment

Deploying Istio and an application that leverages Istio is easy with just a few pieces. We can use our trusted friend, Minikube, and go through Istio’s example application, book info. Reading the Istio documentation on Minikube, we do need to allocate some more resources to Minikube.

We will also be using istioctl, the command-line utility for Istio.

Like always, you can watch the video or go through the rest of the blog post. Let's get our first Istio deployment done!

Grab an Istio distribution, at the time of this blog the latest is 1.3.1:

curl -L https://git.io/getLatestIstio | ISTIO_VERSION=1.3.1 sh -

Istio Deployment - Istio Distribution


Once you download the files, you can follow the prompt to add istioctl to your path. Or can CD into the folder for istioctl and wire from there.

cd istio-1.3.1
export PATH=$PWD/bin:$PATH

Istio Deployment - Istioctl Path


Let’s get a Minikube instance started. If you have not used Minikube before, you can leverage Homebrew to install/upgrade.

brew cask install minikube or brew cask update minikube 

With Minikube installed:
minikube start --memory=8192 --cpus=4

Istio Deployment - Minikube Start


Validate by launching the dashboard.

minikube dashboard

Minikube Dashboard


Verify with istioctl also.

istioctl verify-install

Istio Deployment - Verify Install


Once we validated with istioctl,  we can leverage install the Istio Demo that is included with the Istio Download.

kubectl apply -f install/kubernetes/istio-demo.yaml

Istio Deployment - Install Istio Demo


We can validate the install by seeing if the appropriate services have started.

kubectl get svc -n istio-system

Istio Deployment - Validate Install


Now that Istio is running, configure the default namespace for automatic sidecar injection. Getting closer to the Istio-ing!

kubectl label namespace default istio-injection=enabled

Now install the book info app.

kubectl apply -f samples/bookinfo/platform/kube/bookinfo.yaml

Istio Deployment - Install Book Info App


Let’s make the application accessible outside the Kubernetes cluster with an Istio Gateway.

kubectl apply -f samples/bookinfo/networking/bookinfo-gateway.yaml
kubectl get gateway

Istio Deployment - Gateway


Getting closer, we now need to set the Ingress IP and Ports and set the Gateway URL.


export INGRESS_HOST=$(minikube ip)

export INGRESS_PORT=$(kubectl -n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="http2")].nodePort}')

export SECURE_INGRESS_PORT=$(kubectl -n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="https")].nodePort}')

export GATEWAY_URL=$INGRESS_HOST:$INGRESS_PORT

Istio Deployment - Ingress


Finally, let’s get the Gateway URL.  Here I get 192.168.99.100:31380
printenv GATEWAY_URL

Istio Deployment - Gateway URL


We can go to the <Gateway_URL> / productpage to see the application. Just like that, you are cooking with Istio!

Product Page


An important feature of Istio is to allow Istio to handle destination rules. The book info sample application comes with a few handy ones for us to learn off of.

kubectl apply -f samples/bookinfo/networking/destination-rule-all.yaml
kubectl get destinationrules -o yaml

Istio Deployment - Destination Rule


With that, you have an Istio environment and application to play with. Like any good net citizen, let’s clean up once we are done. The Istio project makes this easy by shipping a cleanup.sh.

/istio-1.3.1/samples/bookinfo/platform/kube/cleanup.sh

Istio Deployment - Cleanup


Can terminate minikube with minikube delete.

Mesh With Harness

We hope you had fun learning how to do your first Istio deployment! Service Meshes continue to rise in popularity. At Harness, we are here to help. Service Meshes are democratizing networking rules to the development teams. Having the destination rules/traffic splits as part of your pipelines are import. 

Stay tuned for part two where we talk about the challenges with Service Meshes. I am not a networking engineer and a bulk share of challenges is bringing networking complexity to the app dev world.

Cheers!
-Ravi

Sign up now

Sign up for our free plan, start building and deploying with Harness, take your software delivery to the next level.

Get a demo

Sign up for a free 14 day trial and take your software development to the next level

Documentation

Learn intelligent software delivery at your own pace. Step-by-step tutorials, videos, and reference docs to help you deliver customer happiness.

Case studies

Learn intelligent software delivery at your own pace. Step-by-step tutorials, videos, and reference docs to help you deliver customer happiness.

We want to hear from you

Enjoyed reading this blog post or have questions or feedback?
Share your thoughts by creating a new topic in the Harness community forum.

Sign up for our monthly newsletter

Subscribe to our newsletter to receive the latest Harness content in your inbox every month.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Continuous Delivery & GitOps