Skip to content

Latest commit

 

History

History
150 lines (114 loc) · 5.03 KB

kubernetes.md

File metadata and controls

150 lines (114 loc) · 5.03 KB

Kubernetes

Setup Kubernetes EasyHAProxy

EasyHAProxy for Kubernetes operates by querying all ingress definitions with the annotation kubernetes.io/ingress.class: easyhaproxy-ingress. Upon finding this annotation, EasyHAProxy immediately sets up HAProxy and begins serving traffic.

For Kubernetes installations, there are three available installation modes:

  • DaemonSet: This mode exposes ports 80, 443, and 1936.
  • NodePort: Ports 31080, 31443, and 31936 are exposed.
  • ClusterIP: In this mode, no ports are exposed externally, and HAProxy is accessible only within the cluster.

To install EasyHAProxy in your Kubernetes cluster, follow these steps:

1) Identify the node where your EasyHAProxy container will run

EasyHAProxy will be limited to a single node. To understand that see limitations page.

$ kubectl get nodes

NAME      STATUS   ROLES    AGE    VERSION
node-01   Ready    <none>   561d   v1.21.13-3
node-02   Ready    <none>   561d   v1.21.13-3

Add the EasyHAProxy label to the node.

kubectl label nodes node-01 "easyhaproxy/node=master"

2) Install EasyHAProxy with Kubernetes Manifest

kubectl create namespace easyhaproxy

kubectl apply -f \
    https://raw.githubusercontent.com/byjg/docker-easy-haproxy/4.4.0/deploy/kubernetes/easyhaproxy-daemonset.yml

If necessary, you can configure environment variables. To get a list of the variables, please follow the environment variable guide

Running containers

Your container only requires creating an ingress with the annotation kubernetes.io/ingress.class: easyhaproxy-ingress pointing to your service.

e.g.

kind: Ingress
metadata:
  annotations:
    kubernetes.io/ingress.class: easyhaproxy-ingress
  name: example-ingress
  namespace: example
spec:
  rules:
  - host: example.org
    http:
      paths:
      - backend:
          service:
            name: example-service
            port:
              number: 8080
        pathType: ImplementationSpecific

Once the container is running, EasyHAProxy will detect automatically and start to redirect all traffic from example.org:80 to your container at port 8080.

You don't need to expose any port in your container.

Notes:

  • At this point, the implementation doesn't support all ingress properties or wildcard domains.
  • The ingress will publish the ports 80 and 443, plus 1936 if stats are enabled.
  • EasyHAProxy will read all spec.rules[].host spec, however it will parse only the first path spec.rules[].http.paths[0].port.number for each rule, and ignore the other paths.

Kubernetes annotations

annotation Description Default Example
kubernetes.io/ingress.class (required) Activate EasyHAProxy. required easyhaproxy-ingress
easyhaproxy.redirect_ssl (optional) Boolean. Force redirect all endpoints to HTTPS. false true or false
easyhaproxy.certbot (optional) Boolean. It will request certbot certificates for the ingresses domains. false true or false
easyhaproxy.redirect (optional) JSON. Key pair with a domain and its destination. empty {"domain":"redirect_url"}
easyhaproxy.mode (optional) Set the HTTP mode for that connection. http http or tcp
easyhaproxy.listen_port (optional) Set the an additional port for that ingress http http or tcp

Important: The annotations are per ingress and applied to all hosts in that ingress configuration.

Certbot / ACME / Letsencrypt

It is necessary add the annotation easyhaproxy.certbot to the ingress configuration:

kind: Ingress
metadata:
  annotations:
    kubernetes.io/ingress.class: easyhaproxy-ingress
    easyhaproxy.certbot: 'true'
  name: example-ingress
  namespace: example
spec:
  ....

More info here.

Make sure your cluster is accessible both through ports 80 and 443.

Custom SSL Certificates

Create a secret with your certificate and key and associate them with your ingress.

---
apiVersion: v1
kind: Secret
metadata:
  name: host2-tls
  namespace: default
data:
  tls.crt: base64 of your certificate
  tls.key: base64 of your certificate private key
type: kubernetes.io/tls

---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  annotations:
    kubernetes.io/ingress.class: easyhaproxy-ingress
  name: tls-example
  namespace: default
spec:
  tls:
  - hosts:
      - host2.local
    secretName: host2-tls
  rules:
    ...

Open source ByJG