|
1 |
| -# Annotations Reference: https://kubernetes-sigs.github.io/aws-alb-ingress-controller/guide/ingress/annotation/ |
2 |
| -apiVersion: extensions/v1beta1 |
| 1 | +# Annotations Reference: https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/ingress/annotations/ |
| 2 | +apiVersion: networking.k8s.io/v1 |
3 | 3 | kind: Ingress
|
4 | 4 | metadata:
|
5 | 5 | name: ecr-ingress-service
|
6 | 6 | labels:
|
7 | 7 | app: kubeapp-ecr
|
8 | 8 | annotations:
|
| 9 | + # Load Balancer Name |
| 10 | + alb.ingress.kubernetes.io/load-balancer-name: ecr-ingress |
9 | 11 | # Ingress Core Settings
|
10 |
| - kubernetes.io/ingress.class: "alb" |
| 12 | + #kubernetes.io/ingress.class: "alb" (OLD INGRESS CLASS NOTATION - STILL WORKS BUT RECOMMENDED TO USE IngressClass Resource) |
11 | 13 | alb.ingress.kubernetes.io/scheme: internet-facing
|
12 | 14 | # Health Check Settings
|
13 | 15 | alb.ingress.kubernetes.io/healthcheck-protocol: HTTP
|
14 | 16 | alb.ingress.kubernetes.io/healthcheck-port: traffic-port
|
| 17 | + #Important Note: Need to add health check path annotations in service level if we are planning to use multiple targets in a load balancer |
15 | 18 | alb.ingress.kubernetes.io/healthcheck-interval-seconds: '15'
|
16 | 19 | alb.ingress.kubernetes.io/healthcheck-timeout-seconds: '5'
|
17 | 20 | alb.ingress.kubernetes.io/success-codes: '200'
|
18 | 21 | alb.ingress.kubernetes.io/healthy-threshold-count: '2'
|
19 |
| - alb.ingress.kubernetes.io/unhealthy-threshold-count: '2' |
| 22 | + alb.ingress.kubernetes.io/unhealthy-threshold-count: '2' |
20 | 23 | ## SSL Settings
|
21 | 24 | alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}, {"HTTP":80}]'
|
22 |
| - alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-1:180789647333:certificate/9f042b5d-86fd-4fad-96d0-c81c5abc71e1 |
| 25 | + alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-1:180789647333:certificate/d86de939-8ffd-410f-adce-0ce1f5be6e0d |
23 | 26 | #alb.ingress.kubernetes.io/ssl-policy: ELBSecurityPolicy-TLS-1-1-2017-01 #Optional (Picks default if not used)
|
24 | 27 | # SSL Redirect Setting
|
25 |
| - alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_301"}}' |
| 28 | + alb.ingress.kubernetes.io/ssl-redirect: '443' |
26 | 29 | # External DNS - For creating a Record Set in Route53
|
27 |
| - external-dns.alpha.kubernetes.io/hostname: ecrdemo.kubeoncloud.com |
| 30 | + external-dns.alpha.kubernetes.io/hostname: ecrdemo.kubeoncloud.com |
28 | 31 | spec:
|
29 | 32 | rules:
|
30 | 33 | - http:
|
31 |
| - paths: |
32 |
| - - path: /* # SSL Redirect Setting |
| 34 | + paths: |
| 35 | + - path: / |
| 36 | + pathType: Prefix |
33 | 37 | backend:
|
34 |
| - serviceName: ssl-redirect |
35 |
| - servicePort: use-annotation |
36 |
| - - path: /* |
37 |
| - backend: |
38 |
| - serviceName: kubeapp-ecr-nodeport-service |
39 |
| - servicePort: 80 |
| 38 | + service: |
| 39 | + name: kubeapp-ecr-nodeport-service |
| 40 | + port: |
| 41 | + number: 80 |
40 | 42 | # Important Note-1: In path based routing order is very important, if we are going to use "/*", try to use it at the end of all rules.
|
41 | 43 |
|
0 commit comments