...

/

Why Services Are Not the Best Fit for External Access?

Why Services Are Not the Best Fit for External Access?

In this lesson, we will discover why services are not the best fit for enabling external access to the applications.

Only Services won’t Suffice

We cannot explore solutions before we know what the problems are. Therefore, we’ll re-create a few objects using the knowledge we already gained. That will let us see whether Kubernetes Services satisfy all the needs users of our applications might have. Or, to be more explicit, we’ll explore which features we’re missing when making our applications accessible to users.

We already discussed that it is a bad practice to publish fixed ports through Services. That method is likely to result in conflicts or, at the very least, create the additional burden of carefully keeping track of which port belongs to which Service. We already discarded that option before, and we won’t change our minds now.

Since we’ve clarified that, let’s go back and create the Deployments and the Services from the previous chapter.

Press + to interact
kubectl create \
-f ingress/go-demo-2-deploy.yml
kubectl get \
-f ingress/go-demo-2-deploy.yml

The output of the get command is as follows.

Press + to interact
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/go-demo-2-db 0/1 1 0 2m15s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/go-demo-2-db ClusterIP 10.111.211.179 <none> 27017/TCP 2m15s
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/go-demo-2-api 0/3 3 0 2m15s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/go-demo-2-api NodePort 10.103.180.226 <none> 8080:30753/TCP 2m15s

As you can see, these are the same Services and Deployments we previously created.

Before we move on, we should wait until all the Pods are up and running.

Press + to interact
kubectl get pods

The ...

Access this course and 1400+ top-rated courses and projects.