This guide will walk you through deploying Qpoint Proxy and Qpoint Connect on a Kubernetes cluster using Helm, setting up a test Pod to verify the setup, and configuring iptables or environment variables for traffic routing. The Proxy supports only HTTPS traffic at this time.
We'll skip Certificate Installation in this guide. See the Kubernetes Connect guide for additional information on how to supply certificates.
helm list -n <namespace>
kubectl get pods -n <namespace>
kubectl get services -n <namespace>
Example Output:
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
qpoint-proxy default 1 2024-06-01 19:15:54.326489 -0400 EDT deployed qpoint-proxy-0.0.2 v0.1.2
NAME READY STATUS RESTARTS AGE
qpoint-proxy-b48b8bd5-hq4kr 1/1 Running 0 15s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
qpoint-proxy ClusterIP 10.96.74.0 <none> 10443/TCP, 18443/TCP 22s
Route traffic
Qpoint Init
If your application does not support environment variables for proxies, you can use the Qpoint Init container to configure iptables rules for routing traffic through Qpoint Connect.
Note that the following assumes that Qpoint Connect has been installed in the qpoint namespace (i.e. DNS value of qpoint-connect.qpoint.svc.cluster.local).