You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: machine_management/control_plane_machine_management/cpmso_provider_configurations/cpmso-config-options-aws.adoc
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,10 @@ You can enable features by updating values in the control plane machine set.
27
27
28
28
//Restricting the API server to private (AWS control plane machine set version)
* xref:../../../networking/nw-ingress-controller-endpoint-publishing-strategies.adoc#nw-ingresscontroller-change-internal_nw-ingress-controller-endpoint-publishing-strategies[Configuring the Ingress Controller endpoint publishing scope to Internal]
33
+
* xref:../../../networking/nw-configuring-ingress-controller-endpoint-publishing-strategy.adoc#nw-ingresscontroller-change-internal_nw-configuring-ingress-controller-endpoint-publishing-strategy[Configuring the Ingress Controller endpoint publishing scope to Internal]
33
34
34
35
//Selecting a larger Amazon Web Services instance type for control plane machines
Copy file name to clipboardExpand all lines: machine_management/control_plane_machine_management/cpmso_provider_configurations/cpmso-config-options-azure.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ You can enable features by updating values in the control plane machine set.
* xref:../../../networking/nw-ingress-controller-endpoint-publishing-strategies.adoc#nw-ingresscontroller-change-internal_nw-ingress-controller-endpoint-publishing-strategies[Configuring the Ingress Controller endpoint publishing scope to Internal]
31
+
* xref:../../../networking/nw-configuring-ingress-controller-endpoint-publishing-strategy.adoc#nw-ingresscontroller-change-internal_nw-configuring-ingress-controller-endpoint-publishing-strategy[Configuring the Ingress Controller endpoint publishing scope to Internal]
The `ingresscontrollers.operator.openshift.io` resource offers the following
9
-
configuration parameters.
9
+
The `ingresscontrollers.operator.openshift.io` resource includes optional configuration parameters that you can configure to meet specific needs for your organization.
10
10
11
11
[cols="3a,8a",options="header"]
12
12
|===
@@ -26,11 +26,13 @@ The `domain` value must be unique among all Ingress Controllers and cannot be up
26
26
If empty, the default value is `ingress.config.openshift.io/cluster``.spec.domain`.
27
27
28
28
|`replicas`
29
-
|`replicas` is the desired number of Ingress Controller replicas. If not set, the default value is `2`.
29
+
|`replicas` is the number of Ingress Controller replicas. If not set, the default value is `2`.
30
30
31
31
|`endpointPublishingStrategy`
32
32
|`endpointPublishingStrategy` is used to publish the Ingress Controller endpoints to other networks, enable load balancer integrations, and provide access to other systems.
33
33
34
+
For cloud environments, use the `loadBalancer` field to configure the endpoint publishing strategy for your Ingress Controller.
35
+
34
36
ifndef::openshift-rosa,openshift-dedicated[]
35
37
On GCP, AWS, and Azure you can configure the following `endpointPublishingStrategy` fields:
* Google Cloud Platform (GCP): `LoadBalancerService` (with External scope)
56
-
* Bare metal: `NodePortService`
57
-
* Other: `HostNetwork`
58
58
endif::openshift-rosa,openshift-dedicated[]
59
-
+
60
-
[NOTE]
61
-
====
62
-
`HostNetwork` has a `hostNetwork` field with the following default values for the optional binding ports: `httpPort: 80`, `httpsPort: 443`, and `statsPort: 1936`.
63
-
With the binding ports, you can deploy multiple Ingress Controllers on the same node for the `HostNetwork` strategy.
64
59
65
-
.Example
66
-
[source,yaml]
67
-
----
68
-
apiVersion: operator.openshift.io/v1
69
-
kind: IngressController
70
-
metadata:
71
-
name: internal
72
-
namespace: openshift-ingress-operator
73
-
spec:
74
-
domain: example.com
75
-
endpointPublishingStrategy:
76
-
type: HostNetwork
77
-
hostNetwork:
78
-
httpPort: 80
79
-
httpsPort: 443
80
-
statsPort: 1936
81
-
----
82
-
====
83
-
+
84
-
[NOTE]
85
-
====
86
-
On {rh-openstack-first}, the `LoadBalancerService` endpoint publishing strategy is only supported if a cloud provider is configured to create health monitors. For {rh-openstack} 16.2, this strategy is only possible if you use the Amphora Octavia provider.
87
-
88
-
For more information, see the "Setting cloud provider options" section of the {rh-openstack} installation documentation.
89
-
====
90
60
ifndef::openshift-rosa[]
91
61
For most platforms, the `endpointPublishingStrategy` value can be updated. On GCP, you can configure the following `endpointPublishingStrategy` fields:
For non-cloud environments, such as a bare-metal platform, use the `NodePortService`, `HostNetwork`, or `Private` fields to configure the endpoint publishing strategy for your Ingress Controller.
69
+
70
+
If you do not set a value in one of these fields, the default value is based on binding ports specified in the `infrastructure.config.openshift.io/cluster``.status.platform` resource.
71
+
endif::openshift-rosa,openshift-dedicated[]
72
+
73
+
ifndef::openshift-rosa[]
74
+
If you need to update the `endpointPublishingStrategy` value after your cluster is deployed, you can configure the following `endpointPublishingStrategy` fields:
75
+
95
76
* `hostNetwork.protocol`
96
77
* `nodePort.protocol`
78
+
* `private.protocol`
97
79
endif::openshift-rosa[]
98
80
99
81
|`defaultCertificate`
@@ -319,9 +301,3 @@ The `HTTPEmptyRequestsPolicy` type accepts either one of two values:
319
301
320
302
These connections come from load balancer health probes or web browser speculative connections (preconnect) and can be safely ignored. However, these requests can be caused by network errors, so setting this field to `Ignore` can impede detection and diagnosis of problems. These requests can be caused by port scans, in which case logging empty requests can aid in detecting intrusion attempts.
@@ -33,3 +34,23 @@ For more information, see the link:https://kubernetes.io/docs/concepts/services-
33
34
The `HostNetwork` endpoint publishing strategy publishes the Ingress Controller on node ports where the Ingress Controller is deployed.
34
35
35
36
An Ingress Controller with the `HostNetwork` endpoint publishing strategy can have only one pod replica per node. If you want _n_ replicas, you must use at least _n_ nodes where those replicas can be scheduled. Because each pod replica requests ports `80` and `443` on the node host where it is scheduled, a replica cannot be scheduled to a node if another pod on the same node is using those ports.
37
+
38
+
The `HostNetwork` object has a `hostNetwork` field with the following default values for the optional binding ports: `httpPort: 80`, `httpsPort: 443`, and `statsPort: 1936`. By specifying different binding ports for your network, you can deploy multiple Ingress Controllers on the same node for the `HostNetwork` strategy.
The `endpointPublishingStrategy` is used to publish the Ingress Controller endpoints to other networks, enable load balancer integrations, and provide access to other systems.
10
+
11
+
[IMPORTANT]
12
+
====
13
+
On {rh-openstack-first}, the `LoadBalancerService` endpoint publishing strategy is only supported if a cloud provider is configured to create health monitors. For {rh-openstack} 16.2, this strategy is only possible if you use the Amphora Octavia provider.
14
+
15
+
For more information, see the " Setting {rh-openstack} Cloud Controller Manager options" section of the {rh-openstack} installation documentation.
0 commit comments