Skip to content

Commit c3e68f0

Browse files
committed
OSDOCS-16862: CQA2.0 of CORE-3: Ingress Controllers and Load Balancing Overview
1 parent 21086f3 commit c3e68f0

File tree

37 files changed

+280
-292
lines changed

37 files changed

+280
-292
lines changed

_topic_maps/_topic_map.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1692,7 +1692,7 @@ Topics:
16921692
File: overview-traffic
16931693
- Name: Configuring ExternalIPs for services
16941694
File: configuring-externalip
1695-
- Name: Configuring ingress cluster traffic using an Ingress Controller
1695+
- Name: Configuring ingress cluster traffic by using an Ingress Controller
16961696
File: configuring-ingress-cluster-traffic-ingress-controller
16971697
- Name: Configuring the Ingress Controller endpoint publishing strategy
16981698
File: nw-configuring-ingress-controller-endpoint-publishing-strategy

modules/configuration-externalip.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
[id="configuration-externalip_{context}"]
77
= Configuration for ExternalIP
88

9-
The following parameters in the `Network.config.openshift.io` custom resource (CR) govern the use of an external IP address in {product-title}:
9+
[role="_abstract"]
10+
You can set parameters in the `Network.config.openshift.io` custom resource (CR) to govern the use of an external IP address in {product-title}. These parameters are listed as follows:
1011

1112
* `spec.externalIP.autoAssignCIDRs` defines an IP address block used by the load balancer when choosing an external IP address for the service. {product-title} supports only a single IP address block for automatic assignment. This configuration requires less steps than manually assigning ExternalIPs to services, which requires managing the port space of a limited number of shared IP addresses. If you enable automatic assignment, the Cloud Controller Manager Operator allocates an external IP address to a `Service` object with `spec.type=LoadBalancer` defind in its configuration.
1213

modules/example-policy-objects.adoc

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@
66
[id="example-policy-objects_{context}"]
77
= Example policy objects
88

9-
The examples in this section show different `spec.externalIP.policy` configurations.
9+
[role="_abstract"]
10+
Reference the examples in the `Example policy objects` section to understand different `spec.externalIP.policy` configurations.
11+
12+
In the following example, the policy prevents {product-title} from creating any service with a specified external IP address.
1013

11-
- In the following example, the policy prevents {product-title} from creating any service with a specified external IP address.
12-
+
1314
.Example policy to reject any value specified for `Service` object `spec.externalIPs[]`
1415
[source,yaml]
1516
----
@@ -23,8 +24,8 @@ spec:
2324
# ...
2425
----
2526

26-
- In the following example, both the `allowedCIDRs` and `rejectedCIDRs` fields are set.
27-
+
27+
In the following example, both the `allowedCIDRs` and `rejectedCIDRs` fields are set.
28+
2829
.Example policy that includes both allowed and rejected CIDR blocks
2930
[source,yaml]
3031
----
@@ -42,8 +43,8 @@ spec:
4243
# ...
4344
----
4445

45-
- In the following example, `policy` is set to `{}`. With this configuration, using the `oc get networks.config.openshift.io -o yaml` command to view the configuration means `policy` parameter does not show on the command output. The same behavior exists for `policy: null`.
46-
+
46+
In the following example, `policy` is set to `{}`. With this configuration, using the `oc get networks.config.openshift.io -o yaml` command to view the configuration means `policy` parameter does not show on the command output. The same behavior exists for `policy: null`.
47+
4748
.Example policy to allow any value specified for `Service` object `spec.externalIPs[]`
4849
[source,yaml]
4950
----

modules/nw-allocate-load-balancers-to-subnets-procedure.adoc

Lines changed: 53 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -6,119 +6,106 @@
66
[id="nw-allocating-load-balancers-to-subnets-procedure_{context}"]
77
= Specifying AWS subnets for OpenShift API and ingress load balancers at installation
88

9-
Perform the following steps to allocate API and ingress load balancers to specific subnets.
9+
[role="_abstract"]
10+
You can allocate API and ingress load balancers to specific subnets for the purposes of aligning security and networking policies with your organization requirements.
1011

11-
.Prerequisites
12+
When defining entries for control plane load balancers in the `subnets` list, ensure that you adhere to the following pattern:
13+
+
14+
[source,yaml]
15+
----
16+
# ... (within platform.aws.vpc.subnets list)
17+
- id: subnet-0fcf8e0392f0910d6 # Public Subnet for External API LB
18+
roles:
19+
- type: ControlPlaneExternalLB
20+
- id: subnet-0fcf8e0392f0910d7 # Private Subnet for Internal API LB
21+
roles:
22+
- type: ControlPlaneInternalLB
23+
# ...
24+
----
1225

13-
Before you begin, ensure you have:
26+
For the default public Ingress Controller, any subnet assigned the `IngressControllerLB` role in your `install-config.yaml` file must be a public subnet. For example, the subnet must have a route table entry in AWS that directs outbound traffic to an internet gateway (IGW). Ensure you list all necessary subnets, public and private across the AZs, and assign them appropriate roles according to your cluster architecture.
1427

15-
* An existing AWS virtual private cloud (VPC).
28+
Subnet IDs define the subnets in an existing VPC and can optionally specify their intended roles. If no roles are specified on any subnet, the subnet roles are decided automatically. In this case, the VPC must not contain any other non-cluster subnets without the `kubernetes.io/cluster/<cluster-id>` tag.
1629

17-
* Pre-configured AWS subnets intended for use by the OpenShift cluster, with the following considerations:
30+
If roles are specified for subnets, each subnet must have at least one assigned role, and the `ClusterNode`, `BootstrapNode`, `IngressControllerLB`, `ControlPlaneExternalLB`, and `ControlPlaneInternalLB` roles must be assigned to at least one subnet. However, if the cluster scope is internal, `ControlPlaneExternalLB` is not required.
1831

19-
** You have a list of their subnet IDs (for example, `subnet-0123456789abcdef0`). These IDs will be used in the `install-config.yaml` file.
32+
.Prerequisites
2033

34+
* An existing AWS virtual private cloud (VPC).
35+
* Pre-configured AWS subnets intended for use by the OpenShift cluster, with the following considerations:
36+
** You have a list of their subnet IDs (for example, `subnet-0123456789abcdef0`). These IDs will be used in the `install-config.yaml` file.
2137
** Use subnets spanning at least two availability zones (AZs) for high availability of load balancers and other critical components, like control planes.
22-
2338
** You have sufficient available IP addresses within these subnets for all assigned roles.
24-
2539
** The AWS configuration for these subnets, including network ACLs and security groups, must permit necessary traffic for all roles assigned to them. For subnets hosting an ingress controller, this typically includes TCP ports 80 and 443 from required sources.
26-
2740
* You have the OpenShift installer binary for your target OpenShift version.
28-
2941
* You have an `install-config.yaml` file.
3042
3143
.Procedure
3244

33-
. Prepare the `install-config.yaml` file:
34-
+
35-
If you haven't already, generate the installation configuration file using the OpenShift installer:
45+
. Generate the installation configuration file by using the {product-title} installation program by entering the following command:
3646
+
3747
[source,terminal]
3848
----
3949
$ openshift-install create install-config --dir=<your_installation_directory>
4050
----
41-
+
42-
This command creates the `install-config.yaml` file in the specified directory.
4351

44-
. Define subnets and assign roles:
45-
+
46-
Open the `install-config.yaml` file located in `<your_installation_directory>` using a text editor. You will define your VPC subnets and their designated roles under the `platform.aws.vpc.subnets` field.
47-
+
48-
For each AWS subnet you intend the cluster to use, you will create an entry specifying its `id` and a list of `roles`. Each role is an object with a `type` key. To designate a subnet for the default Ingress Controller, assign it a role with `type: IngressControllerLB`.
52+
. Use a text editor to open the `install-config.yaml` file.
53+
54+
. Define subnets and assign roles. You must define your VPC subnets and their designated roles under the `platform.aws.vpc.subnets` parameter. For each AWS subnet, create an entry by specifying an `id` and a list of `roles`. Each role is an object with a `type` key. To designate a subnet for the default Ingress Controller, assign a role with `type: IngressControllerLB` to the subnet.
4955
+
5056
[source,yaml]
5157
----
5258
apiVersion: v1
53-
baseDomain: example.com <1>
59+
baseDomain: example.com
5460
metadata:
5561
name: my-cluster # Example cluster name
5662
platform:
5763
aws:
58-
region: us-east-1 <2>
59-
vpc: <3>
60-
subnets: <4>
61-
- id: subnet-0fcf8e0392f0910d5 # Public Subnet in AZ us-east-1a <5>
64+
region: us-east-1
65+
vpc:
66+
subnets:
67+
- id: subnet-0fcf8e0392f0910d5 # Public Subnet in AZ us-east-1a
6268
roles:
63-
- type: IngressControllerLB <6>
69+
- type: IngressControllerLB
6470
- type: BootstrapNode
6571
- id: subnet-0xxxxxxxxxxxxxxza # Public Subnet in another AZ for HA
6672
roles:
6773
- type: IngressControllerLB
6874
- id: subnet-0fcf8e0392f0910d4 # Private Subnet in AZ us-east-1a
6975
roles:
70-
- type: ClusterNode <7>
76+
- type: ClusterNode
7177
- id: subnet-0yyyyyyyyyyyyyyzb # Private Subnet in another AZ for HA
7278
roles:
7379
- type: ClusterNode
7480
# Add other subnet IDs and their roles as needed for your cluster architecture
75-
pullSecret: '...' <8>
76-
sshKey: '...' <9>
81+
pullSecret: '...'
82+
sshKey: '...'
7783
----
78-
<1> Your base domain.
79-
<2> Your AWS region.
80-
<3> The vpc object under `platform.aws` contains the subnets list.
81-
<4> List of all subnet objects that OpenShift will use. Each object defines a subnet id and its roles.
82-
<5> Replace with your AWS Subnet ID.
83-
<6> The `type: IngressControllerLB` role specifically designates this subnet for the default Ingress Controller's LoadBalancer. In private/internal cluster, the subnet with `IngressControllerLB` role must be private.
84-
<7> The `type: ClusterNode` role designates this subnet for control plane and compute nodes. These are typically private subnets.
85-
<8> Your pull secret.
86-
<9> Your SSH key.
8784
+
88-
Entries for control plane load balancers in the `subnets` list would follow a similar pattern:
85+
where:
8986
+
90-
[source,yaml]
91-
----
92-
# ... (within platform.aws.vpc.subnets list)
93-
- id: subnet-0fcf8e0392f0910d6 # Public Subnet for External API LB
94-
roles:
95-
- type: ControlPlaneExternalLB
96-
- id: subnet-0fcf8e0392f0910d7 # Private Subnet for Internal API LB
97-
roles:
98-
- type: ControlPlaneInternalLB
99-
# ...
100-
----
101-
+
102-
For the default public Ingress Controller, any subnet assigned the `IngressControllerLB` role in your `install-config.yaml` file must be a public subnet. For example, it must have a route table entry in AWS that directs outbound traffic to an internet gateway (IGW).
103-
+
104-
Ensure you list all necessary subnets, public and private across the AZs, and assign them appropriate roles according to your cluster architecture.
105-
+
106-
Subnet IDs define the subnets in an existing VPC and can optionally specify their intended roles. If no roles are specified on any subnet, the subnet roles are decided automatically. In this case, the VPC must not contain any other non-cluster subnets without the `kubernetes.io/cluster/<cluster-id>` tag.
107-
+
108-
If roles are specified for subnets, each subnet must have at least one assigned role, and the `ClusterNode`, `BootstrapNode`, `IngressControllerLB`, `ControlPlaneExternalLB`, and `ControlPlaneInternalLB` roles must be assigned to at least one subnet. However, if the cluster scope is internal, `ControlPlaneExternalLB` is not required.
109-
110-
. Proceed with the cluster Installation:
111-
+
112-
After saving your changes to the `install-config.yaml` file, create the cluster:
87+
`baseDomain`:: Your base domain.
88+
`region`:: Your AWS region.
89+
`vpc`:: The vpc object under `platform.aws` contains the subnets list.
90+
`subnets`:: List of all subnet objects that OpenShift will use. Each object defines a subnet id and its roles.
91+
`id`:: Replace with your AWS Subnet ID.
92+
`type.IngressControllerLB`:: The `type: IngressControllerLB` role specifically designates this subnet for the default Ingress Controller's LoadBalancer. In private/internal cluster, the subnet with `IngressControllerLB` role must be private.
93+
`type.ClusterNode`:: The `type: ClusterNode` role designates this subnet for control plane and compute nodes. These are typically private subnets.
94+
`pullSecret`:: Your pull secret.
95+
`sshKey`:: Your SSH key.
96+
97+
. Save you changes to the `install-config.yaml` file.
98+
99+
. Install the cluster by running the following command:
113100
+
114101
[source,terminal]
115102
----
116103
$ openshift-install create cluster --dir=<your_installation_directory>
117104
----
118105
+
119-
The installation program will now use the subnet definitions and explicit role assignments from the `platform.aws.vpc.subnets` section of your `install-config.yaml` file to provision cluster resources, including placing the Ingress Controller's LoadBalancer in the subnets you designated with the `IngressControllerLB` role.
120-
106+
The installation program uses the subnet definitions and explicit role assignments from the `platform.aws.vpc.subnets` section of your `install-config.yaml` file to provision cluster resources. This includes placing the LoadBalancer of the Ingress Controller in the subnets you designated with the `IngressControllerLB` role.
107+
+
121108
[NOTE]
122109
====
123-
The role assignment mechanism within `platform.aws.vpc.subnets`, such as specifying types like `IngressControllerLB`, `ClusterNode`, `ControlPlaneExternalLB`, `ControlPlaneInternalLB`, `BootstrapNode` is the comprehensive way the OpenShift installer identifies suitable subnets for various cluster services and components.
124-
====
110+
The role assignment mechanism within `platform.aws.vpc.subnets`, such as specifying types like `IngressControllerLB`, `ClusterNode`, `ControlPlaneExternalLB`, `ControlPlaneInternalLB`, `BootstrapNode` is the comprehensive way the installation program identifies suitable subnets for various cluster services and components.
111+
====

modules/nw-allocating-load-balancers-to-subnets.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,5 @@
66
[id="nw-allocating-load-balancers-to-subnets_{context}"]
77
= Allocating API and Ingress Load Balancers to Specific Subnets on AWS
88

9+
[role="_abstract"]
910
You can control the network placement of OpenShift Load Balancers on AWS, including those for the Ingress Controller, by explicitly defining your virtual private cloud's (VPC's) subnets and assigning them specific roles directly within the `platform.aws.vpc.subnets` section of the `install-config.yaml` file. This method provides granular control over which subnets are used for resources, such as the Ingress Controller and other cluster components.

modules/nw-aws-nlb-existing-cluster.adoc

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,14 @@
66
[id="nw-aws-nlb-existing-cluster_{context}"]
77
= Configuring an Ingress Controller Network Load Balancer on an existing AWS cluster
88

9-
You can create an Ingress Controller backed by an AWS Network Load Balancer (NLB) on an existing cluster.
9+
[role="_abstract"]
10+
You can create an Ingress Controller backed by an {aws-full} Network Load Balancer (NLB) on an existing cluster.
1011

1112
.Prerequisites
1213

13-
* You must have an installed AWS cluster.
14-
* `PlatformStatus` of the infrastructure resource must be AWS.
15-
** To verify that the `PlatformStatus` is AWS, run:
14+
* You installed an {aws-short} cluster.
15+
* `PlatformStatus` of the infrastructure resource must be {aws-short}.
16+
** To verify that the `PlatformStatus` is {aws-short}, run the following command:
1617
+
1718
[source,terminal]
1819
----
@@ -22,8 +23,6 @@ AWS
2223
2324
.Procedure
2425

25-
Create an Ingress Controller backed by an AWS NLB on an existing cluster.
26-
2726
. Create the Ingress Controller manifest:
2827
+
2928
[source,terminal]
@@ -37,22 +36,25 @@ Create an Ingress Controller backed by an AWS NLB on an existing cluster.
3736
apiVersion: operator.openshift.io/v1
3837
kind: IngressController
3938
metadata:
40-
name: $my_ingress_controller<1>
39+
name: <ingress_controller_name>
4140
namespace: openshift-ingress-operator
4241
spec:
43-
domain: $my_unique_ingress_domain<2>
42+
domain: <unique_ingress_domain
4443
endpointPublishingStrategy:
4544
type: LoadBalancerService
4645
loadBalancer:
47-
scope: External<3>
46+
scope: External
4847
providerParameters:
4948
type: AWS
5049
aws:
5150
type: NLB
5251
----
53-
<1> Replace `$my_ingress_controller` with a unique name for the Ingress Controller.
54-
<2> Replace `$my_unique_ingress_domain` with a domain name that is unique among all Ingress Controllers in the cluster. This variable must be a subdomain of the DNS name `<clustername>.<domain>`.
55-
<3> You can replace `External` with `Internal` to use an internal NLB.
52+
+
53+
where:
54+
+
55+
`<ingress_controller_name>`: Replace `<ingress_controller_name>` with a unique name for the Ingress Controller.
56+
`<unique_ingress_domain>`:: Replace `<unique_ingress_domain>` with a domain name that is unique among all Ingress Controllers in the cluster. This variable must be a subdomain of the DNS name `<clustername>.<domain>`.
57+
`scope`:: You can replace `External` with `Internal` to use an internal NLB.
5658
5759
. Create the resource in the cluster:
5860
+

modules/nw-aws-nlb-new-cluster.adoc

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,36 +7,33 @@
77
[id="nw-aws-nlb-new-cluster_{context}"]
88
= Configuring an Ingress Controller Network Load Balancer on a new AWS cluster
99

10-
You can create an Ingress Controller backed by an AWS Network Load Balancer (NLB) on a new cluster.
10+
[role="_abstract"]
11+
You can create an Ingress Controller backed by an {aws-full} Network Load Balancer (NLB) on a new cluster in situations where you need more transparent networking capabilities.
1112

1213
.Prerequisites
1314

14-
* Create the `install-config.yaml` file and complete any modifications to it.
15+
* Create and edit the `install-config.yaml` file. For instructions, see "Creating the installation configuration file" in the _Additonal resources_ section.
1516
1617
.Procedure
1718

18-
Create an Ingress Controller backed by an AWS NLB on a new cluster.
19-
2019
. Change to the directory that contains the installation program and create the manifests:
2120
+
2221
[source,terminal]
2322
----
24-
$ ./openshift-install create manifests --dir <installation_directory> <1>
23+
$ ./openshift-install create manifests --dir <installation_directory>
2524
----
26-
<1> For `<installation_directory>`, specify the name of the directory that
27-
contains the `install-config.yaml` file for your cluster.
25+
* For `<installation_directory>`, specify the name of the directory that contains the `install-config.yaml` file for your cluster.
2826
2927
. Create a file that is named `cluster-ingress-default-ingresscontroller.yaml` in the `<installation_directory>/manifests/` directory:
3028
+
3129
[source,terminal]
3230
----
33-
$ touch <installation_directory>/manifests/cluster-ingress-default-ingresscontroller.yaml <1>
31+
$ touch <installation_directory>/manifests/cluster-ingress-default-ingresscontroller.yaml
3432
----
35-
<1> For `<installation_directory>`, specify the directory name that contains the
33+
`<installation_directory>`:: For `<installation_directory>`, specify the directory name that contains the
3634
`manifests/` directory for your cluster.
37-
+
38-
After creating the file, several network configuration files are in the
39-
`manifests/` directory, as shown:
35+
36+
. Check the several network configuration files that exist in the `manifests/` directory by entering the following command:
4037
+
4138
[source,terminal]
4239
----
@@ -71,4 +68,5 @@ spec:
7168
----
7269

7370
. Save the `cluster-ingress-default-ingresscontroller.yaml` file and quit the text editor.
74-
. Optional: Back up the `manifests/cluster-ingress-default-ingresscontroller.yaml` file. The installation program deletes the `manifests/` directory when creating the cluster.
71+
72+
. Optional: Back up the `manifests/cluster-ingress-default-ingresscontroller.yaml` file because the installation program deletes the `manifests/` directory during cluster creation.

modules/nw-aws-replacing-clb-with-nlb.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
[id="nw-aws-replacing-clb-with-nlb_{context}"]
77
= Replacing Ingress Controller Classic Load Balancer with Network Load Balancer
88

9-
You can replace an Ingress Controller that is using a Classic Load Balancer (CLB) with one that uses a Network Load Balancer (NLB) on AWS.
9+
[role="_abstract"]
10+
You can replace an Ingress Controller that is using a Classic Load Balancer (CLB) with one that uses a Network Load Balancer (NLB) on {aws-full}.
1011

1112
[WARNING]
1213
====

0 commit comments

Comments
 (0)