Files
Marty Hernandez Avedon 3a4b7e73c0 #766 Consistently using verbs in titles (#1038)
* gerundify Configuration for Storage Classes in Azure

* gerundify Authentication Config

* gerundify Bootstrap Password

* gerundify and disambiguate manage-PSP

* gerundify and disambiguate create-PSP

* syncing? Syncing what?

* updating label for Configure OpenLDAP

* updating label for authentication config

* updating label for configuring microsoft ad and shibboleth (saml)

* updating label for configuring microsoft ad and shibboleth (saml) in sidebars (last commit covered versioned docs)

* label + title for one of several sets of pages entitled role-based access control

* gerundify Upgrade a Hardened Custom/Imported Cluster to Kubernetes v1.25

* re-order title of Certificate Troubleshooting so verb comes first

* added 'about' to title because the page is about drivers that provision, not how to provision a driver

* template enforcement > enforcing templates

* update label to match title - deploy > deploying

* updated label to matach title - manage clusters > cluster administration

* gerundify set up in infrastructure setup section

* typo fix - spacing

* matching label to title - launch > launching

* label matching title - set up part 2

* label matching title - windows clusters

* how to configure > configuring

* using > launching (partially matches label to title)

* ingress config > configging an ingress

* match label to title - project administration

* match label to title - project resource quotas

* match title to label - monitoring/alerting guides

* matching label to title - enabling

* gerundify allow unsupported storage drivers

* Update openapi/swagger.json

* lost metadata syntax re-applied

* Apply suggestions from code review
2024-01-11 12:49:32 -05:00

3.0 KiB

title, description
title description
Configuring an Ingress Configuring an Ingress
<head> </head>

:::note

For Kubernetes v1.21 and up, the NGINX Ingress controller no longer runs in hostNetwork by default. It instead uses hostPorts for port 80 and port 443, so you can configure the admission webhook to be accessible only through the ClusterIP. This ensures that the webhook is only accessible from within the cluster.

Because of this change to the controller, the default RKE1 behavior no longer sets hostNetwork to true. However, you must set hostNetwork to true for TCP- and UDP-based Services to work. To do so, edit the cluster's YAML and follow the steps in the official RKE1 doccumention.

:::

Specify a hostname to use

If you use this option, Ingress routes requests for a hostname to the service or workload that you specify.

  1. Enter the Request Host that your Ingress controller will handle request forwarding for. For example, www.mysite.com.
  2. Specify a path of type Prefix and specify a path such as /.
  3. Add a Target Service.
  4. Optional: If you want to specify a workload or service when a request is sent to a particular hostname path, add a Path for the target. For example, if you want requests for www.mysite.com/contact-us to be sent to a different service than www.mysite.com, enter /contact-us in the Path field. The first rule that you create does not typically include a path.
  5. Enter the Port number that each target operates on.

Certificates

:::note

You must have an SSL certificate that the Ingress controller can use to encrypt/decrypt communications. For more information, see Adding SSL Certificates.

:::

  1. To create an Ingress controller, click the Certificates tab.
  2. Click Add Certificate.
  3. Select a Certificate - Secret Name from the drop-down list.
  4. Enter the host using encrypted communication.
  5. To add more hosts that use the same certificate, click Add Hosts.

Labels and Annotations

Add Labels and/or Annotations to provide metadata for your Ingress Controller.

For a list of annotations available for use, see the Nginx Ingress Controller Documentation.