|
6 | 6 | [id="microshift-ingress-control-concept_{context}"]
|
7 | 7 | = Using ingress control in {microshift-short}
|
8 | 8 |
|
9 |
| -When you create your {microshift-short} cluster, each pod and service running on the cluster is allocated an IP address. These IP addresses are accessible to other pods and services running nearby by default, but are not accessible to external clients. {microshift-short} uses a minimal implementation of the {ocp} `IngressController` API to enable external access to cluster services. |
| 9 | +When you create your {microshift-short} cluster, each pod and service running on the cluster is allocated an IP address. These IP addresses are accessible to other pods and services running nearby by default, but are not accessible to external clients. {microshift-short} uses a minimal implementation of the {OCP} `IngressController` API to enable external access to cluster services. |
10 | 10 |
|
11 |
| -With more configuration options, you can fine-tune ingress to meet your specific needs. To use enhanced ingress control, update the parameters in the {microshift-short} configuration file and restart the service. Ingress configuration is useful in a variety of ways, for example: |
| 11 | +With more configuration options, you can fine-tune ingress to meet your specific needs. To use enhanced ingress control, update the parameters in the {microshift-short} configuration file and restart the service. |
12 | 12 |
|
| 13 | +Ingress configuration is useful in a variety of ways, for example: |
| 14 | + |
| 15 | +Accommodate server response speed:: |
13 | 16 | * If your application starts processing requests from clients but the connection is
|
14 | 17 | closed before it can respond, you can set the `ingress.tuningOptions.serverTimeout` parameter in the configuration file to a higher value to accommodate the speed of the response from the server.
|
15 | 18 |
|
| 19 | +Closing router connections:: |
16 | 20 | * If the router has many connections open because an application running on the cluster does not close connections properly, you can set the `ingress.tuningOptions.serverTimeout` and `spec.tuningOptions.serverFinTimeout` parameters to a lower value, forcing those connections to close sooner.
|
17 | 21 |
|
18 |
| -* If you need to configure the ingress controller to verify client certificates, you can use the `ingress.clientTLS` parameter to set a clientCA value, which is a reference to a config map. The config map contains the PEM-encoded CA certificate bundle that is used to verify a client's certificate. Optionally, you can also configure a list of certificate subject filters. |
| 22 | +Verify client certificates:: |
| 23 | +* If you need to configure the ingress controller to verify client certificates, you can use the `ingress.clientTLS` parameter to set a clientCA value, which is a reference to a config map. The config map contains the PEM-encoded CA certificate bundle that is used to verify a client's certificate. Optionally, you can also configure a list of certificate subject filters. |
19 | 24 |
|
| 25 | +Configure a TLS security profile:: |
20 | 26 | * If you need to configure a TLS security profile for an ingress controller, you can use the `ingress.tlsSecurityProfile` parameter to specify a default or custom individual TLS security profiles. The TLS security profile defines the minimum TLS version and the TLS ciphers for TLS connections for the ingress controllers.
|
21 | 27 | If a TLS security profile is not configured, the default value is based on the TLS security profile set for the API server.
|
22 | 28 |
|
23 |
| -* If you need to define a policy for handling new route claims, you can use the `routeAdmission` parameter to allow or deny claims across namespaces. You set the `routeAdmission` parameter to describe how hostname claims across namespaces should be handled and to describe how routes with wildcard policies are handled by the ingress controller. |
| 29 | +Create policies for new route claims:: |
| 30 | +* If you need to define a policy for handling new route claims, you can use the `routeAdmission` parameter to allow or deny claims across namespaces. You set the `routeAdmission` parameter to describe how hostname claims across namespaces should be handled and to describe how routes with wildcard policies are handled by the ingress controller. |
| 31 | + |
| 32 | +Customize error pages:: |
| 33 | +* If you want more than the default error pages, which are usually empty and only return the http status code, configure custom error pages. |
| 34 | + |
| 35 | +Capture HTTP headers or cookies:: |
| 36 | +* If you want to include the capture of HTTP headers or cookies, configure access logging. |
0 commit comments