ingress-nginx-helm/docs/deploy/index.md

228 lines
8 KiB
Markdown
Raw Normal View History

2018-04-24 09:36:16 +00:00
# Installation Guide
!!! attention
The default configuration watches Ingress object from **all the namespaces**.
To change this behavior use the flag `--watch-namespace` to limit the scope to a particular namespace.
!!! warning
If multiple Ingresses define paths for the same host, the ingress controller **merges the definitions**.
!!! danger
The [admission webhook](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/) require conectivity between Kubernetes API server and the ingress controller.
In case [Network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/) or additional firewalls, please allow access to port `8443`.
!!! attention
The first time the ingress controller starts, two [Jobs](https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/) create the SSL Certificate used by the admission webhook.
For this reason, there is an initial delay of up to two minutes until it is possible to create and validate Ingress definitions.
You can wait until is ready to running the next command:
```yaml
kubectl wait --namespace ingress-nginx \
--for=condition=ready pod \
--selector=app.kubernetes.io/component=controller \
2020-06-02 16:11:15 +00:00
--timeout=120s
```
## Contents
- [Provider Specific Steps](#provider-specific-steps)
- [Docker for Mac](#docker-for-mac)
- [minikube](#minikube)
- [AWS](#aws)
- [GCE - GKE](#gce-gke)
- [Azure](#azure)
2020-04-29 22:56:40 +00:00
- [Digital Ocean](#digital-ocean)
- [Bare-metal](#bare-metal)
- [Verify installation](#verify-installation)
- [Detect installed version](#detect-installed-version)
- [Using Helm](#using-helm)
2018-04-24 09:36:16 +00:00
### Provider Specific Steps
2018-04-24 09:36:16 +00:00
#### Docker for Mac
2018-04-24 09:36:16 +00:00
Kubernetes is available in Docker for Mac (from [version 18.06.0-ce](https://docs.docker.com/docker-for-mac/release-notes/#stable-releases-of-2018))
2018-04-24 09:36:16 +00:00
[enable]: https://docs.docker.com/docker-for-mac/#kubernetes
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/cloud/deploy.yaml
```
2018-04-24 09:36:16 +00:00
#### minikube
2018-04-24 09:36:16 +00:00
For standard usage:
```console
minikube addons enable ingress
```
For development:
- Disable the ingress addon:
2018-04-24 09:36:16 +00:00
```console
minikube addons disable ingress
2018-04-24 09:36:16 +00:00
```
- Execute `make dev-env`
- Confirm the `ingress-nginx-controller` deployment exists:
2018-04-24 09:36:16 +00:00
```console
$ kubectl get pods -n ingress-nginx
2018-04-24 09:36:16 +00:00
NAME READY STATUS RESTARTS AGE
ingress-nginx-controller-fdcdcd6dd-vvpgs 1/1 Running 0 11s
2018-04-24 09:36:16 +00:00
```
#### AWS
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
In AWS we use a Network load balancer (NLB) to expose the NGINX Ingress controller behind a Service of `Type=LoadBalancer`.
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
##### Network Load Balancer (NLB)
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/aws/deploy.yaml
2020-03-30 22:45:58 +00:00
```
2018-04-24 09:36:16 +00:00
##### TLS termination in AWS Load Balancer (ELB)
In some scenarios is required to terminate TLS in the Load Balancer and not in the ingress controller.
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
For this purpose we provide a template:
2020-07-10 13:12:00 +00:00
- Download [deploy-tls-termination.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/aws/deploy-tls-termination.yaml)
2018-04-24 09:36:16 +00:00
```console
2020-07-10 13:12:00 +00:00
wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/aws/deploy-tls-termination.yaml
```
- Edit the file and change:
- VPC CIDR in use for the Kubernetes cluster:
`proxy-real-ip-cidr: XXX.XXX.XXX/XX`
- AWS Certificate Manager (ACM) ID
2018-04-24 09:36:16 +00:00
`arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX`
2018-04-24 09:36:16 +00:00
- Deploy the manifest:
```console
2020-03-30 22:45:58 +00:00
kubectl apply -f deploy-tls-termination.yaml
```
2020-03-30 22:45:58 +00:00
##### NLB Idle Timeouts
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
In some scenarios users will need to modify the value of the NLB idle timeout. Users need to ensure the idle timeout is less than the [keepalive_timeout](http://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout) that is configured for NGINX.
By default NGINX `keepalive_timeout` is set to `75s`.
The default NLB idle timeout works for most scenarios, unless the NGINX [keepalive_timeout](http://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout) has been modified, in which case the annotation
`service.beta.kubernetes.io/aws-load-balancer-connection-idle-timeout` value must be modified to ensure it is less than the configured `keepalive_timeout`.
!!! note ""
An idle timeout of `3600` is recommended when using WebSockets
More information with regards to timeouts for can be found in the [official AWS documentation](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/network-load-balancers.html#connection-idle-timeout)
2018-04-24 09:36:16 +00:00
#### GCE-GKE
2018-04-24 09:36:16 +00:00
!!! info
Initialize your user as a cluster-admin with the following command:
```console
kubectl create clusterrolebinding cluster-admin-binding \
--clusterrole cluster-admin \
--user $(gcloud config get-value account)
```
!!! danger
For private clusters, you will need to either add an additional firewall rule that allows master nodes access port `8443/tcp` on worker nodes, or change the existing rule that allows access to ports `80/tcp`, `443/tcp` and `10254/tcp` to also allow access to port `8443/tcp`.
See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules) on adding rules and the [Kubernetes issue](https://github.com/kubernetes/kubernetes/issues/79739) for more detail.
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/cloud/deploy.yaml
```
2018-04-24 09:36:16 +00:00
!!! failure Important
Proxy protocol is not supported in GCE/GKE
2018-04-24 09:36:16 +00:00
#### Azure
2018-04-24 09:36:16 +00:00
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/cloud/deploy.yaml
```
2018-04-24 09:36:16 +00:00
2020-04-29 22:56:40 +00:00
#### Digital Ocean
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/do/deploy.yaml
2020-04-29 22:56:40 +00:00
```
2018-09-04 19:32:47 +00:00
#### Bare-metal
2018-04-24 09:36:16 +00:00
Using [NodePort](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport):
```console
2020-07-10 13:12:00 +00:00
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.34.0/deploy/static/provider/baremetal/deploy.yaml
```
2018-04-24 09:36:16 +00:00
2018-09-04 19:32:47 +00:00
!!! tip
For extended notes regarding deployments on bare-metal, see [Bare-metal considerations](./baremetal.md).
2018-09-04 19:32:47 +00:00
### Verify installation
2018-04-24 09:36:16 +00:00
!!! info
In minikube the ingress addon is installed in the namespace **kube-system** instead of ingress-nginx
To check if the ingress controller pods have started, run the following command:
2018-04-24 09:36:16 +00:00
```console
kubectl get pods -n ingress-nginx \
-l app.kubernetes.io/name=ingress-nginx --watch
2018-04-24 09:36:16 +00:00
```
Once the ingress controller pods are running, you can cancel the command typing `Ctrl+C`.
Now, you are ready to create your first ingress.
### Detect installed version
To detect which version of the ingress controller is running, exec into the pod and run `nginx-ingress-controller version` command.
2018-04-24 09:36:16 +00:00
```console
POD_NAMESPACE=ingress-nginx
POD_NAME=$(kubectl get pods -n $POD_NAMESPACE -l app.kubernetes.io/name=ingress-nginx --field-selector=status.phase=Running -o jsonpath='{.items[0].metadata.name}')
kubectl exec -it $POD_NAME -n $POD_NAMESPACE -- /nginx-ingress-controller --version
2018-04-24 09:36:16 +00:00
```
## Using Helm
2018-04-24 09:36:16 +00:00
2020-03-30 22:45:58 +00:00
NGINX Ingress controller can be installed via [Helm](https://helm.sh/) using the chart from the project repository.
To install the chart with the release name `ingress-nginx`:
2018-04-24 09:36:16 +00:00
```console
helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
2020-04-27 00:27:54 +00:00
helm install my-release ingress-nginx/ingress-nginx
```
If you are using [Helm 2](https://v2.helm.sh/) then specify release name using `--name` flag
```console
helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx/
helm install --name ingress-nginx ingress-nginx/ingress-nginx
```
2018-04-24 09:36:16 +00:00
## Detect installed version:
2018-04-24 09:36:16 +00:00
```console
POD_NAME=$(kubectl get pods -l app.kubernetes.io/name=ingress-nginx -o jsonpath='{.items[0].metadata.name}')
kubectl exec -it $POD_NAME -- /nginx-ingress-controller --version
2018-04-24 09:36:16 +00:00
```