You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Configure security group: To receive traffic from the VPC Lattice fleet, you must set up security groups so that they allow all Pods communicating with VPC Lattice to allow traffic on all ports from the 169.254.171.0/24 address range. See [Control traffic to resources using security groups](https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html) for details.
33
33
@@ -62,7 +62,7 @@ Run through them again for a second cluster to use with the extended example sho
62
62
```
63
63
1. Create the `system` namespace:
64
64
```bash
65
-
kubectl apply -f examples/deploy_namespace.yaml
65
+
kubectl apply -f examples/deploy-namesystem.yaml
66
66
```
67
67
68
68
1. Create an iamserviceaccount for pod level permission:
@@ -82,6 +82,11 @@ Run through them again for a second cluster to use with the extended example sho
82
82
kubectl apply -f examples/deploy-v0.0.1.yaml
83
83
```
84
84
85
+
1. Create the amazon-vpc-lattice GatewayClass:
86
+
```bash
87
+
kubectl apply -f examples/gatewayclass.yaml
88
+
```
89
+
85
90
## Using the AWS Gateway API Controller
86
91
87
92
The first part of this section provides an example of setting up of service-to-service communications on a single cluster.
@@ -140,27 +145,27 @@ This example creates a single cluster in a single VPC, then configures two route
140
145
kubectl get httproute
141
146
```
142
147
```
143
-
NAME HOSTNAMES AGE
144
-
httpbin5h9m
145
-
parking17h
148
+
NAME HOSTNAMES AGE
149
+
inventory51s
150
+
rates 6m11s
146
151
```
147
152
1. List the route’s yaml file to see the DNS address (highlighted here on the `message` line):
0 commit comments