Remotely Accessing Telemetry Addons
This task shows how to configure Istio to expose and access the telemetry addons outside of a cluster.
Configuring remote access
Remote access to the telemetry addons can be configured in a number of different ways. This task covers two basic access methods: secure (via HTTPS) and insecure (via HTTP). The secure method is strongly recommended for any production or sensitive environment. Insecure access is simpler to set up, but will not protect any credentials or data transmitted outside of your cluster.
Option 1: Secure access (HTTPS)
A server certificate is required for secure access. Follow these steps to install and configure server certificates for a domain that you control.
You may use self-signed certificates instead. Visit our Securing Gateways with HTTPS Using Secret Discovery Service task1 for general information on using self-signed certificates to access in-cluster services.
Install Istio2 in your cluster and enable the
cert-manager
flag and configureistio-ingressgateway
to use the Secret Discovery Service3.To install Istio accordingly, use the following Helm installation options:
--set gateways.enabled=true
--set gateways.istio-ingressgateway.enabled=true
--set gateways.istio-ingressgateway.sds.enabled=true
--set certmanager.enabled=true
--set certmanager.email=mailbox@donotuseexample.com
To additionally install the telemetry addons, use the following Helm installation options:
- Grafana:
--set grafana.enabled=true
- Kiali:
--set kiali.enabled=true
- Prometheus:
--set prometheus.enabled=true
- Tracing:
--set tracing.enabled=true
Configure the DNS records for your domain.
Get the external IP address of the
istio-ingressgateway
.Set an environment variable to hold your target domain.
Point your desired domain at that external IP address via your domain provider.
The mechanism for achieving this step varies by provider. Here are a few example documentation links:
- Bluehost: DNS Management Add Edit or Delete DNS Entries4
- GoDaddy: Add an A record5
- Google Domains: Resource Records6
- Name.com: Adding an A record7
Verify that the DNS records are correct.
Generate a server certificate
Wait until the server certificate is ready.
Apply networking configuration for the telemetry addons.
Apply the following configuration to expose Grafana:
Apply the following configuration to expose Kiali:
Apply the following configuration to expose Prometheus:
Apply the following configuration to expose the tracing service:
Visit the telemetry addons via your browser.
- Kiali:
https://$TELEMETRY_DOMAIN:15029/
- Prometheus:
https://$TELEMETRY_DOMAIN:15030/
- Grafana:
https://$TELEMETRY_DOMAIN:15031/
- Tracing:
https://$TELEMETRY_DOMAIN:15032/
- Kiali:
Option 2: Insecure access (HTTP)
Install Istio8 in your cluster with your desired telemetry addons.
To additionally install the telemetry addons, use the following Helm installation options:
- Grafana:
--set grafana.enabled=true
- Kiali:
--set kiali.enabled=true
- Prometheus:
--set prometheus.enabled=true
- Tracing:
--set tracing.enabled=true
- Grafana:
Apply networking configuration for the telemetry addons.
Apply the following configuration to expose Grafana:
Apply the following configuration to expose Kiali:
Apply the following configuration to expose Prometheus:
Apply the following configuration to expose the tracing service:
Visit the telemetry addons via your browser.
- Kiali:
http://<IP ADDRESS OF CLUSTER INGRESS>:15029/
- Prometheus:
http://<IP ADDRESS OF CLUSTER INGRESS>:15030/
- Grafana:
http://<IP ADDRESS OF CLUSTER INGRESS>:15031/
- Tracing:
http://<IP ADDRESS OF CLUSTER INGRESS>:15032/
- Kiali:
Cleanup
Remove all related Gateways:
Remove all related Virtual Services:
If installed, remove the gateway certificate: