Skip to content

Latest commit

 

History

History
200 lines (142 loc) · 7.12 KB

INGRESS.md

File metadata and controls

200 lines (142 loc) · 7.12 KB

Ingress Configuration with NGINX

In general services running in a kubernetes cluster are not visible from outside your cluster or the Internet. To gain access to a service running inside your cluster from the Internet, you need a so called Ingress Network.

Imixs-Cloud provides you with a ready to use Ingress Configuration based on the NGINX Ingress Controller in combination with the ACME provider Let's Encrypt. This makes it easy to publish services to the Internet in a secure way.

Quick Setup

The following is a quick setup guide to install the NGINX Controller. You will find a detailed description about the setup here.

1. Edit the NGINX .yaml files

First edit the file management/nginx/020-service.yaml and replace {YOUR_CLUSTER_IP} with the ip address of your master node. This will be the entry point for all your services.

In the file management/nginx/030-cluster-issuer.yaml replace the email address with a valid address from your organization. This email address will become the issuer for the Let’s Encrypt certificates.

2. Deploy the cert-manager

To support certificates from Let's Encrypt, the cert-manager is needed. This service can be deployed directly from the cert-manager repo on Github:

$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml

3. Deploy the NGINX Controller

Finally you can deploy the NGINX Ignress Controller:

$ kubectl apply --kustomize  management/nginx

The deployment may take some seconds.

You will find a detailed description about the setup here.

Ingress

Now as you have deployed the NGINX Intress controller into your cluster you can define your own Ingress within your POD to gain access from the Internet. The following example shows a simple Ingress configuration from the whoami sample application:

kind: Ingress
apiVersion: networking.k8s.io/v1
metadata:
  name: whoami
  annotations:
    kubernetes.io/ingress.class: "nginx"		    	    	  
    cert-manager.io/cluster-issuer: "letsencrypt-staging"
    # For production
    #cert-manager.io/cluster-issuer: "letsencrypt-prod"
spec:
  tls:
  - hosts:
    - {YOUR-DOMAIN-NAME}
    secretName: tls-whoami
  rules:
  - host: {YOUR-DOMAIN-NAME}
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: whoami
            port:
              number: 80

HTTP requests will be automatically forwarded to HTTPS and a Let's Encrypt certificate will be requested by cert-manager.

Let's Encrypt

Let's Encrypt supports a staging and a production server for certificates. The Let’s Encrypt staging server has no rate-limits for requests made against it, so for testing purposes you should always first use the staging configuration. If everything works fine you can change to the production cluster-issuer.

cert-manager.io/cluster-issuer: "letsencrypt-prod"

Authentication

The NGINX Controller also supports a Basic Authentication mechanism to protect web sites and services. To protect your ingress with Basic Authentication follow these steps:

1. Create a basic auth file

Using openssl you can create a auth file for basic authentication on your master node:

$ USER=<USERNAME_HERE>; PASSWORD=<PASSWORD_HERE>; echo "${USER}:$(openssl passwd -stdin -apr1 <<< ${PASSWORD})" >> auth

2. Create a secret:

Next you can create a secet in your namespace the Ingress is defined:

$ kubectl -n YOUR_NAMESPACE create secret generic basic-auth --from-file=auth

3. Update the NGINX Ingress

Now you can update the Ingress yaml file by adding the annotations for 'auth' and 'ssl'. See the following example:

kind: Ingress
apiVersion: networking.k8s.io/v1
metadata:
  name: YOUR_INGRESS
  namespace: YOUR_NAMESPACE
  annotations:
    kubernetes.io/ingress.class: "nginx"	  
    cert-manager.io/cluster-issuer: "letsencrypt-staging"
    # type of authentication
    nginx.ingress.kubernetes.io/auth-type: basic
    # prevent the controller from redirecting (308) to HTTPS
    nginx.ingress.kubernetes.io/ssl-redirect: 'false'
    # name of the secret that contains the user/password definitions
    nginx.ingress.kubernetes.io/auth-secret: basic-auth
    # message to display with an appropriate context why the authentication is required
    nginx.ingress.kubernetes.io/auth-realm: 'Authentication Required '
spec:
  tls:
  - hosts:
    - {YOUR-DOMAIN-NAME}
    secretName: your-secret
  rules:
  - host: {YOUR-DOMAIN-NAME}
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: your-service
            port:
              number: 80

NGNX Configuration

With the NGINX annotations you can customize the behavior in many ways.

Redirect from/to www

In some scenarios is required to redirect from www.domain.com to domain.com or vice versa. To enable this feature use the annotation nginx.ingress.kubernetes.io/from-to-www-redirect: "true". See the following example:

kind: Ingress
apiVersion: networking.k8s.io/v1
metadata:
  name: foo-org
  namespace: www-foo-org
  annotations:
    kubernetes.io/ingress.class: "nginx"	  
    cert-manager.io/cluster-issuer: "letsencrypt-staging"
    nginx.ingress.kubernetes.io/from-to-www-redirect: 'true'
spec:
  tls:
  - hosts:
    - foo.org
    - www.foo.org
    secretName: tls-foo
  rules:
  - host: www.foo.org 
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: foo-org
            port:
              number: 80

You don't have to set the host 'foo.org' as the annotation from-to-www-redirect is enough as long as you have SSL certificate to terminate both foo.org and www.foo.org (provided by letsencrypt)

Custom max body size

For NGINX, an 413 error will be returned to the client when the size in a request exceeds the maximum allowed default size of 1MB of the client request body. This size can be configured by the parameter client_max_body_size.

To configure this setting globally for all Ingress rules, the proxy-body-size value may be set in the NGINX ConfigMap. To use custom values in an Ingress rule define these annotation:

kind: Ingress
apiVersion: networking.k8s.io/v1
metadata:
  name: foo-org
  namespace: www-foo-org
  annotations:
    nginx.ingress.kubernetes.io/proxy-body-size: 8m
 ....

Find details also here.

Configuration Snippet

With the annotation 'nginx.ingress.kubernetes.io/configuration-snippet' you can add custom config snippets. See the following example for a redirect:

nginx.ingress.kubernetes.io/configuration-snippet: |
  if ($host = 'foo.org' ) {
    rewrite ^ https://www.foo.org$request_uri permanent;
  }