ingress-nginx-helm/hack/manifest-templates/provider/aws/nlb-with-tls-termination/values.yaml
Chen Chen ee9c6246f2
Add rolling update strategy to each static deployment file (#10129)
* Add rollingUpdate strategy to each static deployment file

Signed-off-by: z1cheng <imchench@gmail.com>

* Update the templates and regenerate

Signed-off-by: z1cheng <imchench@gmail.com>

* Upgrade k8s version and add rolling update for exoscale

Signed-off-by: z1cheng <imchench@gmail.com>

* Add rolling update strategy to Oracle template

Signed-off-by: z1cheng <imchench@gmail.com>

* Revert the k8s version in generate-deploy-scripts.sh

Signed-off-by: z1cheng <imchench@gmail.com>

---------

Signed-off-by: z1cheng <imchench@gmail.com>
2023-07-24 08:26:13 -07:00

40 lines
1.4 KiB
YAML

# AWS NLB with TLS termination
controller:
updateStrategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 1
service:
type: LoadBalancer
externalTrafficPolicy: Local
annotations:
# This example is for legacy in-tree service load balancer controller for AWS NLB,
# that has been phased out from Kubernetes mainline.
service.beta.kubernetes.io/aws-load-balancer-cross-zone-load-balancing-enabled: "true"
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "https"
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX"
service.beta.kubernetes.io/aws-load-balancer-type: nlb
# Ensure the ELB idle timeout is less than nginx keep-alive timeout. By default,
# NGINX keep-alive is set to 75s. If using WebSockets, the value will need to be
# increased to '3600' to avoid any potential issues.
service.beta.kubernetes.io/aws-load-balancer-connection-idle-timeout: "60"
targetPorts:
http: tohttps
https: http
# Configures the ports the nginx-controller listens on
containerPort:
http: 80
https: 80
tohttps: 2443
config:
proxy-real-ip-cidr: XXX.XXX.XXX/XX
use-forwarded-headers: "true"
http-snippet: |
server {
listen 2443;
return 308 https://$host$request_uri;
}