Getting Started with Ambassador and Consul Using Kubernetes Initializer
Kubernetes Initializer built by Ambassador Labs provides a new experience for simplifying the deployment of Ambassador and Consul in a Sandbox Kubernetes environment.
HashiCorp Consul integrates with Ambassador to securely route ingress traffic into Consul service mesh when using Kubernetes. When onboarding applications onto a service mesh or when integrating with existing applications outside of the mesh, a north-south API gateway is typically required for communications with clients outside of the network. Ambassador is a Kubernetes API Gateway that allows you to route incoming traffic to your Consul service mesh proxies while also providing the ability to leverage advanced API Gateway functionalities such as rate limiting and authentication. In this blog post, we describe a new way to get started with both Ambassador and Consul service mesh using the Kubernetes Initializer built by Ambassador.
» Overview
Kubernetes Initializer is a tool built by Ambassador Labs that allows you to quickly deploy a sandbox environment of Ambassador along with other platforms such as Prometheus and Consul. Using Kubernetes Initializer you can deploy both Ambassador and Consul across various different Kubernetes distributions such as AKS, EKS, GKE, Minikube, and kind.
» Getting Started
In this example let us walk through setting up Ambassador, Jaeger, Prometheus, and Consul together. First, let’s take a look at how the K8s Initializer can quickly provide a deployment descriptor for both Ambassador, Consul, Prometheus, and Jaeger.
The Kubernetes Initializer provides a quick way to select your desired infrastructure and specify how you would like to handle insecure traffic that enters your Kubernetes cluster. For Cloud Service Provider distributions of Kubernetes, the initializer also generates YAML to create a LoadBalancer using a load balancer type of your choosing (Layer 4 or Layer 7). We can also select kind for local installations which are perfect for sandbox environments.
In addition, you can go setup Observability so that we can easily collect metrics via a Prometheus backend for both Consul and Ambassador. As part of the configuration, the initializer can also configure Consul to collect distributed traces to an installation of Jaeger that is deployed via the initializer YAML.
Finally, you can select Consul as the service mesh to integrate with Ambassador to easily deploy Consul with Ambassador via the YAML generated by Kubernetes Initializer.
» Conclusion
Please join us for an upcoming webinar to get a deep dive on how to use Consul Kubernetes and Ambassador together with Kubernetes Initializer. For more information on how to deploy Consul in production with Ambassador please visit the documentation we have available to describe the Ambassador integration with Consul.
Sign up for the latest HashiCorp news
More blog posts like this one
HashiCorp at AWS re:Invent: Your blueprint to cloud success
If you’re attending AWS re:Invent in Las Vegas, Dec. 2 - Dec. 6th, visit us for breakout sessions, expert talks, and product demos to learn how to take a unified approach to Infrastructure and Security Lifecycle Management.
Consul 1.20 improves multi-tenancy, metrics, and OpenShift deployment
HashiCorp Consul 1.20 is a significant upgrade for the Kubernetes operator and developer experience, including better multi-tenant service discovery, catalog registration metrics, and secure OpenShift integration.
New SLM offerings for Vault, Boundary, and Consul at HashiConf 2024 make security easier
The latest Security Lifecycle Management (SLM) features from HashiCorp Vault, Boundary, and Consul help organizations offer a smoother path to better security practices for developers.