text stringlengths 0 59.1k |
|---|
initialDelaySeconds: 30 |
timeoutSeconds: 1 |
volumeMounts: |
- mountPath: /etc/nginx/ssl |
name: secret-volume |
- mountPath: /etc/nginx/conf.d |
name: configmap-volume |
<|endoftext|> |
# source: k8s_examples/_archived/https-nginx/README.md type: docs |
# Nginx https service |
This example creates a basic nginx https service useful in verifying proof of concept, keys, secrets, configmap, and end-to-end https service creation in kubernetes. |
It uses an [nginx server block](http://wiki.nginx.org/ServerBlockExample) to serve the index page over both http and https. It will detect changes to nginx's configuration file, default.conf, mounted as a configmap volume and reload nginx automatically. |
### Generate certificates |
First generate a self signed rsa key and certificate that the server can use for TLS. |
```sh |
$ make keys KEY=/tmp/nginx.key CERT=/tmp/nginx.crt |
``` |
### Create a https nginx application running in a kubernetes cluster |
You need a [running kubernetes cluster](https://kubernetes.io/docs/setup/pick-right-solution/) for this to work. |
Create a secret and a configmap. |
```sh |
$ kubectl create secret tls nginxsecret --key /tmp/nginx.key --cert /tmp/nginx.crt |
secret "nginxsecret" created |
$ kubectl create configmap nginxconfigmap --from-file=examples/staging/https-nginx/default.conf |
configmap "nginxconfigmap" created |
``` |
Create a service and a replication controller using the configuration in nginx-app.yaml. |
```sh |
$ kubectl create -f examples/staging/https-nginx/nginx-app.yaml |
You have exposed your service on an external port on all nodes in your |
cluster. If you want to expose this service to the external internet, you may |
need to set up firewall rules for the service port(s) (tcp:32211,tcp:30028) to serve traffic. |
... |
service "nginxsvc" created |
replicationcontroller "my-nginx" created |
``` |
Then, find the node port that Kubernetes is using for http and https traffic. |
```sh |
$ kubectl get service nginxsvc -o json |
... |
{ |
"name": "http", |
"protocol": "TCP", |
"port": 80, |
"targetPort": 80, |
"nodePort": 32211 |
}, |
{ |
"name": "https", |
"protocol": "TCP", |
"port": 443, |
"targetPort": 443, |
"nodePort": 30028 |
} |
... |
``` |
If you are using Kubernetes on a cloud provider, you may need to create cloud firewall rules to serve traffic. |
If you are using GCE or GKE, you can use the following commands to add firewall rules. |
```sh |
$ gcloud compute firewall-rules create allow-nginx-http --allow tcp:32211 --description "Incoming http allowed." |
Created [https://www.googleapis.com/compute/v1/projects/hello-world-job/global/firewalls/allow-nginx-http]. |
NAME NETWORK SRC_RANGES RULES SRC_TAGS TARGET_TAGS |
allow-nginx-http default 0.0.0.0/0 tcp:32211 |
$ gcloud compute firewall-rules create allow-nginx-https --allow tcp:30028 --description "Incoming https allowed." |
Created [https://www.googleapis.com/compute/v1/projects/hello-world-job/global/firewalls/allow-nginx-https]. |
NAME NETWORK SRC_RANGES RULES SRC_TAGS TARGET_TAGS |
allow-nginx-https default 0.0.0.0/0 tcp:30028 |
``` |
Find your nodes' IPs. |
```sh |
$ kubectl get nodes -o json | grep ExternalIP -A 2 |
"type": "ExternalIP", |
"address": "104.198.1.26" |
} |
-- |
"type": "ExternalIP", |
"address": "104.198.12.158" |
} |
-- |
"type": "ExternalIP", |
"address": "104.198.11.137" |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.