Why Services Are Not the Best Fit for External Access?
In this lesson, we will discover why services are not the best fit for enabling external access to the applications.
Only Services won’t Suffice
We cannot explore solutions before we know what the problems are. Therefore, we’ll re-create a few objects using the knowledge we already gained. That will let us see whether Kubernetes Services satisfy all the needs users of our applications might have. Or, to be more explicit, we’ll explore which features we’re missing when making our applications accessible to users.
We already discussed that it is a bad practice to publish fixed ports through Services. That method is likely to result in conflicts or, at the very least, create the additional burden of carefully keeping track of which port belongs to which Service. We already discarded that option before, and we won’t change our minds now.
Since we’ve clarified that, let’s go back and create the Deployments and the Services from the previous chapter.
kubectl create \-f ingress/go-demo-2-deploy.ymlkubectl get \-f ingress/go-demo-2-deploy.yml
The output of the get
command is as follows.
NAME READY UP-TO-DATE AVAILABLE AGEdeployment.apps/go-demo-2-db 0/1 1 0 2m15sNAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGEservice/go-demo-2-db ClusterIP 10.111.211.179 <none> 27017/TCP 2m15sNAME READY UP-TO-DATE AVAILABLE AGEdeployment.apps/go-demo-2-api 0/3 3 0 2m15sNAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGEservice/go-demo-2-api NodePort 10.103.180.226 <none> 8080:30753/TCP 2m15s
As you can see, these are the same Services and Deployments we previously created.
Before we move on, we should wait until all the Pods are up and running.
kubectl get pods
The ...