GKE with Kubernetes Gateway API - Load Balancer with self-signed SSL
Step-01: Introduction¶
- Create GCP Application Load Balancer using Kubernetes Gateway API, Static IP for Load Balancer, Self-signed SSL with Kubernetes Secrets
- Approach-1: Using Kubernetes YAML Manifests
- Approach-2: Using Terraform Manifests
Step-02: Approach-1: Using Kubernetes YAML Manifests¶
Step-02-01: NO CHANGES from previous demo¶
- 01-myapp1-deployment.yaml
- 02-myapp1-clusterip-service.yaml
- 04-gateway-http-route.yaml
Step-02-02: Create Regional Static IP¶
# Create Regional Load Balancer IP
gcloud compute addresses create my-regional-ip1 \
--region="REGION_NAME" \
--project=my-project-id
gcloud compute addresses create my-regional-ip1 \
--region="us-central1" \
--project=gcplearn9 \
--network-tier="STANDARD"
# List IP Addresss
gcloud compute addresses list
Step-02-03: Create Self-signed SSL certificates¶
# Change Directory
cd p2-regional-k8sresources-yaml/self-signed-ssl
# Create your app1 key:
openssl genrsa -out app1.key 2048
# Create your app1 certificate signing request:
openssl req -new -key app1.key -out app1.csr -subj "/CN=app1.stacksimplify.com"
# Create your app1 certificate:
openssl x509 -req -days 7300 -in app1.csr -signkey app1.key -out app1.crt
Step-02-04: Create Kubernetes Secret¶
# Change Directory
cd p2-regional-k8sresources-yaml/self-signed-ssl
# List Kubernetes Secrets
kubectl get secrets
# Create Kubernetes Secret
kubectl create secret tls myssl-secret \
--cert=app1.crt \
--key=app1.key
# List Kubernetes Secrets
kubectl get secrets
Step-02-05: 03-gateway.yaml¶
kind: Gateway
apiVersion: gateway.networking.k8s.io/v1
metadata:
name: mygateway1-regional
spec:
gatewayClassName: gke-l7-regional-external-managed
listeners:
- name: https
protocol: HTTPS
port: 443
tls:
mode: Terminate
certificateRefs:
- name: myssl-secret
addresses:
- type: NamedAddress
value: my-regional-ip1
Step-02-06: Deploy and Verify Resources¶
# List Kubernetes Gateway Classes
kubectl get gatewayclass
# Deploy Kubernetes Resources
kubectl apply -f p2-regional-k8sresources-yaml
# List Kubernetes Deployments
kubectl get deploy
# List Kubernetes Pods
kubectl get pods
# List Kubernetes Services
kubectl get svc
# List Kubernetes Gateways created using Gateway API
kubectl get gateway
kubectl get gtw
# Describe Gateway
kubectl describe gateway mygateway1-regional
# List HTTP Route
kubectl get httproute
# Verify Gateway is GCP GKE Console
Go to GKE Console -> Networking -> Gateways, Services & Ingress -> mygateway1-regional
# Verify GCP Cloud Load Balancer
Go to Cloud Load Balancers -> Review load balancer settings
# Access Application
https://<LB-IP>
Step-02-07: Clean-up¶
Step-03: Project-3: p3-k8sresources-terraform-manifests: Terraform Manifests¶
Step-03-01: NO changes to following manifests¶
- Folder: p3-k8sresources-terraform-manifests
- c2-01-variables.tf
- c2-02-local-values.tf
- c3-01-remote-state-datasource.tf
- c3-02-providers.tf
- c4-myapp1-deployment.tf
- c5-myapp1-clusterip-service.tf
- c7-gateway-http-route.tf
- c8-static-ip.tf
- terraform.tfvars
Step-03-02: c1-versions.tf¶
- Update your Cloud Storage Bucket
Step-03-03: c9-kubernetes-secret.tf¶
resource "kubernetes_secret" "tls_secret" {
metadata {
name = "${local.name}-my-tls-secret"
namespace = "default"
}
type = "kubernetes.io/tls"
data = {
"tls.crt" = file("${path.module}/self-signed-ssl/app1.crt")
"tls.key" = file("${path.module}/self-signed-ssl/app1.key")
}
}
output "tls_secret_name" {
value = kubernetes_secret.tls_secret.metadata[0].name
}
Step-03-04: c6-gateway.tf¶
resource "kubernetes_manifest" "my_gateway" {
manifest = {
apiVersion = "gateway.networking.k8s.io/v1"
kind = "Gateway"
metadata = {
name = "mygateway1-regional"
namespace = "default"
}
spec = {
gatewayClassName = "gke-l7-regional-external-managed"
listeners = [{
name = "https"
protocol = "HTTPS"
port = 443
tls = {
mode = "Terminate"
certificateRefs = [{
name = kubernetes_secret.tls_secret.metadata[0].name
}]
}
}]
addresses = [{
type = "NamedAddress"
value = google_compute_address.static_ip.name
}]
}
}
}
Step-03-05: Execute Terraform Commands¶
# Change Directory
cd p3-regional-k8sresources-terraform-manifests
# Terraform Initialize
terraform init
# Terraform Validate
terraform validate
# Terraform plan
terraform plan
# Terraform Apply
terraform apply -auto-approve
Step-03-06: Verify Kubernetes Resources¶
# List Kubernetes Deployments
kubectl get deploy
# List Kubernetes Pods
kubectl get pods
# List Kubernetes Services
kubectl get svc
# List Kubernetes Gateways created using Gateway API
kubectl get gateway
kubectl get gtw
# Describe Gateway
kubectl describe gateway mygateway1-regional
# List HTTP Route
kubectl get httproute
# Verify Gateway is GCP GKE Console
Go to GKE Console -> Networking -> Gateways, Services & Ingress -> mygateway1-regional
# Verify GCP Cloud Load Balancer
Go to Cloud Load Balancers -> Review load balancer settings
# List Kubernetes Secrets
kubectl get secrets
# Access Application
https://<LB-IP>
Step-03-07: Clean-Up¶
# Change Directory
cd p3-regional-k8sresources-terraform-manifests
# Terraform Destroy
terraform apply -destroy -auto-approve
Gateway Documentation¶
- https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.Listener
🎉 New Course
Ultimate DevOps Real-World Project Implementation on AWS
$15.99
$84.99
81% OFF
DEVOPS2026FEB
Enroll Now on Udemy →
🎉 Offer