|
1 |
| -# Annotations Reference: https://kubernetes-sigs.github.io/aws-alb-ingress-controller/guide/ingress/annotation/ |
2 |
| -apiVersion: extensions/v1beta1 |
| 1 | +# Annotations Reference: https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/ingress/annotations/ |
| 2 | +apiVersion: networking.k8s.io/v1 |
3 | 3 | kind: Ingress
|
4 | 4 | metadata:
|
5 |
| - name: ingress-usermgmt-restapp-service |
6 |
| - labels: |
7 |
| - app: usermgmt-restapp |
| 5 | + name: app1-ingress-service |
8 | 6 | namespace: fp-dev
|
9 | 7 | annotations:
|
| 8 | + # Load Balancer Name |
| 9 | + alb.ingress.kubernetes.io/load-balancer-name: ingress-fargatedemo |
10 | 10 | # Ingress Core Settings
|
11 |
| - kubernetes.io/ingress.class: "alb" |
| 11 | + #kubernetes.io/ingress.class: "alb" (OLD INGRESS CLASS NOTATION - STILL WORKS BUT RECOMMENDED TO USE IngressClass Resource) |
12 | 12 | alb.ingress.kubernetes.io/scheme: internet-facing
|
13 | 13 | # Health Check Settings
|
14 | 14 | alb.ingress.kubernetes.io/healthcheck-protocol: HTTP
|
15 | 15 | alb.ingress.kubernetes.io/healthcheck-port: traffic-port
|
16 | 16 | #Important Note: Need to add health check path annotations in service level if we are planning to use multiple targets in a load balancer
|
17 |
| - #alb.ingress.kubernetes.io/healthcheck-path: /usermgmt/health-status |
18 | 17 | alb.ingress.kubernetes.io/healthcheck-interval-seconds: '15'
|
19 | 18 | alb.ingress.kubernetes.io/healthcheck-timeout-seconds: '5'
|
20 | 19 | alb.ingress.kubernetes.io/success-codes: '200'
|
21 | 20 | alb.ingress.kubernetes.io/healthy-threshold-count: '2'
|
22 |
| - alb.ingress.kubernetes.io/unhealthy-threshold-count: '2' |
| 21 | + alb.ingress.kubernetes.io/unhealthy-threshold-count: '2' |
23 | 22 | ## SSL Settings
|
24 | 23 | alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}, {"HTTP":80}]'
|
25 |
| - alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-1:180789647333:certificate/9f042b5d-86fd-4fad-96d0-c81c5abc71e1 |
| 24 | + alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-1:180789647333:certificate/d86de939-8ffd-410f-adce-0ce1f5be6e0d |
26 | 25 | #alb.ingress.kubernetes.io/ssl-policy: ELBSecurityPolicy-TLS-1-1-2017-01 #Optional (Picks default if not used)
|
27 | 26 | # SSL Redirect Setting
|
28 |
| - alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_301"}}' |
| 27 | + alb.ingress.kubernetes.io/ssl-redirect: '443' |
29 | 28 | # External DNS - For creating a Record Set in Route53
|
30 |
| - external-dns.alpha.kubernetes.io/hostname: fpdev.kubeoncloud.com |
| 29 | + external-dns.alpha.kubernetes.io/hostname: fpdev101.stacksimplify.com |
31 | 30 | # For Fargate
|
32 | 31 | alb.ingress.kubernetes.io/target-type: ip
|
33 | 32 | spec:
|
34 | 33 | rules:
|
35 | 34 | - http:
|
36 |
| - paths: |
37 |
| - - path: /* # SSL Redirect Setting |
| 35 | + paths: |
| 36 | + - path: /app1 |
| 37 | + pathType: Prefix |
38 | 38 | backend:
|
39 |
| - serviceName: ssl-redirect |
40 |
| - servicePort: use-annotation |
41 |
| - - path: /* |
42 |
| - backend: |
43 |
| - serviceName: app1-nginx-nodeport-service |
44 |
| - servicePort: 80 |
| 39 | + service: |
| 40 | + name: app1-nginx-nodeport-service |
| 41 | + port: |
| 42 | + number: 80 |
45 | 43 | # Important Note-1: In path based routing order is very important, if we are going to use "/*", try to use it at the end of all rules.
|
46 | 44 |
|
0 commit comments