What is the correct way to configure Apigee Edge Saas integration with GKE

I don´t have much expirence in Apigee. Therefore, i have the following doubt.

I have an API expose with an Ingress Controller on GKE, but and I need to expose the same API in Apigee Edge instead.

I don´t know if i have to set up an API Proxies with a target server 2 - way TLS or it neccesary set up edge microgateway on GKE.


I´m an bit confused which is the correct way based on my needs.

Regards,

Solved Solved
0 2 584
1 ACCEPTED SOLUTION

No you do not need (should not use) Edge microgateway.

To connect Apigee Edge to GKE, the obvious approach is to expose the GKE via one of the load balancer mechanisms that permits external (internet) traffic. See this article. But external HTTP(s) Load balancers do not support mTLS at this time.

That means you must use the L4 Load Balancer; in that case you must terminate TLS (and enforce mutual TLS) at your ingress controller on the GKE cluster itself. There are multiple kubernetes ingress controller options out there that can terminate TLS and perform client authentication, among them are: nginx-ingress, istio ingress gateway, and contour. But if you are running on GKE, you can use Anthos Service Mesh , which relies on Istio. ASM may be more than you need if you just want mTLS on ingress.

Exposing apps through GKE ingress is described here.

The doc for mutual TLS for the Istio ingress gateway is here.

Then set the corresponding configuration on the target server on the Apigee SaaS side. The documentation for that is pretty clear.

View solution in original post

2 REPLIES 2

No you do not need (should not use) Edge microgateway.

To connect Apigee Edge to GKE, the obvious approach is to expose the GKE via one of the load balancer mechanisms that permits external (internet) traffic. See this article. But external HTTP(s) Load balancers do not support mTLS at this time.

That means you must use the L4 Load Balancer; in that case you must terminate TLS (and enforce mutual TLS) at your ingress controller on the GKE cluster itself. There are multiple kubernetes ingress controller options out there that can terminate TLS and perform client authentication, among them are: nginx-ingress, istio ingress gateway, and contour. But if you are running on GKE, you can use Anthos Service Mesh , which relies on Istio. ASM may be more than you need if you just want mTLS on ingress.

Exposing apps through GKE ingress is described here.

The doc for mutual TLS for the Istio ingress gateway is here.

Then set the corresponding configuration on the target server on the Apigee SaaS side. The documentation for that is pretty clear.

Thank you for the answer. It helped me to understand what is the next step to take.

Regards,