You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deploy/multi-cloud-ingress-lb-solution.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -165,17 +165,17 @@ The global traffic policy (GTP) and global service entry (GSE) CRDs help to conf
165
165
166
166
The GTP CRD accepts the parameters for configuring GSLB on the Citrix ADC including deployment type (canary, failover, and local-first), GSLB domain, health monitor for the ingress, and service type.
167
167
168
-
For GTP CRD definition, see the [GTP CRD](https://developer-docs.citrix.com/projects/citrix-k8s-ingress-controller/en/latest/multicluster/multi-cluster/#gtp-crd-definition). Apply the GTP CRD definition on AWS and Azure Kubernetes clusters using the following command:
168
+
For GTP CRD definition, see the [GTP CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/#gtp-crd-definition). Apply the GTP CRD definition on AWS and Azure Kubernetes clusters using the following command:
The GSE CRD specifies the endpoint information (information about any Kubernetes object that routes traffic into the cluster) in each cluster. The global service entry automatically picks the external IP address of the application, which routes traffic into the cluster. If the external IP address of the routes change, the global service entry picks a newly assigned IP address and configure the multi-cluster endpoints of Citrix ADCs accordingly.
175
175
176
-
For the GSE CRD definition, see the [GSE CRD](https://developer-docs.citrix.com/projects/citrix-k8s-ingress-controller/en/latest/multicluster/multi-cluster/#gse-crd-definition). Apply the GSE CRD definition on AWS and Azure Kubernetes clusters using the following command:
176
+
For the GSE CRD definition, see the [GSE CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/#gse-crd-definition). Apply the GSE CRD definition on AWS and Azure Kubernetes clusters using the following command:
2. Create the secrets on the AWS and Azure clusters using the following command:
193
193
@@ -197,7 +197,7 @@ To deploy the multi-cluster controller, perform the following steps:
197
197
198
198
**Note**: You can add a user to Citrix ADC using the `add system user` command.
199
199
200
-
3. Download the GSLB controller YAML file from [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml).
200
+
3. Download the GSLB controller YAML file from [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gslb-controller.yaml).
201
201
202
202
4. Apply the `gslb-controller.yaml` in an AWS cluster using the following command:
203
203
@@ -242,7 +242,7 @@ To deploy the multi-cluster controller, perform the following steps:
242
242
name: secret-1
243
243
key: password
244
244
245
-
Apply the [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml) in the Azure cluster using the following command:
245
+
Apply the [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gslb-controller.yaml) in the Azure cluster using the following command:
Copy file name to clipboardExpand all lines: docs/gslb/gslb.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,13 +62,13 @@ The following CRDs are introduced to support the Citrix ADC configuration for pe
62
62
63
63
GTP CRD accepts the parameters for configuring GSLB on the Citrix ADC including deployment type (canary, failover, local-first), GSLB domain, health monitor for the Ingress, and service type.
64
64
65
-
The GTP CRD spec is available in the Citrix ingress controller GitHub repo at: [grp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml).
65
+
The GTP CRD spec is available in the Citrix ingress controller GitHub repo at: [grp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml).
66
66
67
67
### GSE CRD
68
68
69
69
GSE CRD dictates the endpoint information (any Kubernetes object which routes traffic into the cluster) in each cluster.
70
70
71
-
The GSE CRD Spec is available in the Citrix ingress controller GitHub repo at: [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml)
71
+
The GSE CRD Spec is available in the Citrix ingress controller GitHub repo at: [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml)
72
72
73
73
The GSE CRD is auto generated for an Ingress object if the service specified in the Ingress resource is referred in the GTP CRD instance and the `status-loadbalancer-ip/hostname` field is already populated. For a service of type `LoadBalancer`, the GSE CRD is auto generated if the service is referred in the GTP CRD instance and the `status-loadbalancer-ip/hostname` field is already populated.
74
74
@@ -96,7 +96,7 @@ Perform the following steps to deploy the Citrix global load balancing solution
96
96
97
97
**Note:** These secrets are used in the GSLB controller YAML file for the respective sites. The `username` and `password` in the command specifies the user name and password of the Citrix GSLB ADC.
98
98
99
-
3. Download the GSLB controller YAML file [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml).
99
+
3. Download the GSLB controller YAML file [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gslb-controller.yaml).
100
100
101
101
4. Edit the GSLB controller YAML file and update the following values as per the requirements of each cluster.
102
102
@@ -155,11 +155,11 @@ Perform the following steps to deploy the Citrix global load balancing solution
155
155
156
156
kubectl apply -f gslb-controller.yaml
157
157
158
-
6. Deploy the [GTP CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml) definition YAML file, using the following command.
158
+
6. Deploy the [GTP CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml) definition YAML file, using the following command.
159
159
160
160
kubectl create -f gtp-crd.yaml
161
161
162
-
7. Deploy the [GSE CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml) definition YAML file using the following command.
162
+
7. Deploy the [GSE CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml) definition YAML file using the following command.
163
163
164
164
kubectl create -f gse-crd.yaml
165
165
@@ -378,7 +378,7 @@ This configuration can be verified using the following command:
378
378
379
379
## GTP CRD definition
380
380
381
-
GTP CRD definition is available at [gtp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml))
381
+
GTP CRD definition is available at [gtp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml))
382
382
383
383
The following table explains the GTP CRD attributes.
384
384
@@ -400,7 +400,7 @@ The following table explains the GTP CRD attributes.
400
400
401
401
## GSE CRD definition
402
402
403
-
GSE CRD definition is available at [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml)
403
+
GSE CRD definition is available at [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml)
Copy file name to clipboardExpand all lines: gslb/README.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,13 +62,13 @@ The following CRDs are introduced to support the Citrix ADC configuration for pe
62
62
63
63
GTP CRD accepts the parameters for configuring GSLB on the Citrix ADC including deployment type (canary, failover, local-first), GSLB domain, health monitor for the Ingress, and service type.
64
64
65
-
The GTP CRD spec is available in the Citrix ingress controller GitHub repo at: [grp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml).
65
+
The GTP CRD spec is available in the Citrix ingress controller GitHub repo at: [grp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml).
66
66
67
67
### GSE CRD
68
68
69
69
GSE CRD dictates the endpoint information (any Kubernetes object which routes traffic into the cluster) in each cluster.
70
70
71
-
The GSE CRD Spec is available in the Citrix ingress controller GitHub repo at: [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml)
71
+
The GSE CRD Spec is available in the Citrix ingress controller GitHub repo at: [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml)
72
72
73
73
The GSE CRD is auto generated for an Ingress object if the service specified in the Ingress resource is referred in the GTP CRD instance and the `status-loadbalancer-ip/hostname` field is already populated. For a service of type `LoadBalancer`, the GSE CRD is auto generated if the service is referred in the GTP CRD instance and the `status-loadbalancer-ip/hostname` field is already populated.
74
74
@@ -85,7 +85,7 @@ For GSE CRD auto generation in the case of Ingress, host name should exactly mat
85
85
86
86
Perform the following steps to deploy the Citrix global load balancing solution for geographically distributed Kubernetes clusters.
87
87
88
-
1. Create the RBAC permissions required to deploy the GSLB controller using the [gslb-rbac.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-rbac.yaml) file.
88
+
1. Create the RBAC permissions required to deploy the GSLB controller using the [gslb-rbac.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gslb-rbac.yaml) file.
89
89
90
90
kubectl apply -f gslb-rbac.yaml
91
91
@@ -96,7 +96,7 @@ Perform the following steps to deploy the Citrix global load balancing solution
96
96
97
97
**Note:** These secrets are used in the GSLB controller YAML file for the respective sites. The `username` and `password` in the command specifies the user name and password of the Citrix GSLB ADC.
98
98
99
-
3. Download the GSLB controller YAML file [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gslb-controller.yaml).
99
+
3. Download the GSLB controller YAML file [gslb-controller.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gslb-controller.yaml).
100
100
101
101
4. Edit the GSLB controller YAML file and update the following values as per the requirements of each cluster.
102
102
@@ -155,11 +155,11 @@ Perform the following steps to deploy the Citrix global load balancing solution
155
155
156
156
kubectl apply -f gslb-controller.yaml
157
157
158
-
6. Deploy the [GTP CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml) definition YAML file, using the following command.
158
+
6. Deploy the [GTP CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml) definition YAML file, using the following command.
159
159
160
160
kubectl create -f gtp-crd.yaml
161
161
162
-
7. Deploy the [GSE CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml) definition YAML file using the following command.
162
+
7. Deploy the [GSE CRD](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml) definition YAML file using the following command.
163
163
164
164
kubectl create -f gse-crd.yaml
165
165
@@ -378,7 +378,7 @@ This configuration can be verified using the following command:
378
378
379
379
## GTP CRD definition
380
380
381
-
GTP CRD definition is available at [gtp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gtp-crd.yaml))
381
+
GTP CRD definition is available at [gtp-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gtp-crd.yaml))
382
382
383
383
The following table explains the GTP CRD attributes.
384
384
@@ -400,7 +400,7 @@ The following table explains the GTP CRD attributes.
400
400
401
401
## GSE CRD definition
402
402
403
-
GSE CRD definition is available at [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/multicluster/Manifest/gse-crd.yaml)
403
+
GSE CRD definition is available at [gse-crd.yaml](https://github.com/citrix/citrix-k8s-ingress-controller/blob/master/gslb/Manifest/gse-crd.yaml)
0 commit comments