Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
19 changes: 12 additions & 7 deletions modules/installation-two-node-ingress-lb-configuration.adoc
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤖 [error] AsciiDocDITA.ShortDescription: Assign [role="_abstract"] to a paragraph to use it as in DITA.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

Original file line number Diff line number Diff line change
Expand Up @@ -2,27 +2,32 @@
[id="two-node-ingress-lb-configuration_{context}"]
= Configuring an Ingress load balancer for a two-node cluster with fencing

You must configure an external Ingress load balancer (LB) before you install a two-node OpenShift cluster with fencing. The Ingress LB forwards external application traffic to the Ingress Controller pods that run on the control plane nodes. Both nodes can actively receive traffic.
[role="_abstract"]
Configure an external Ingress load balancer to forward application traffic to Ingress Controller pods on control plane nodes. You must configure this load balancer before installing a two-node OpenShift cluster with fencing to allow both nodes to actively receive traffic.

[NOTE]
====
An external load balancer is recommended for production deployments but is not required.
====

.Prerequisites

* You have two control plane nodes with fencing enabled.
* You have network connectivity from the load balancer to both control plane nodes.
* You created DNS records for `api.<cluster_name>.<base_domain>` and `*.apps.<cluster_name>.<base_domain>`.
* You have an external load balancer that supports health checks on endpoints.
* You have two control plane nodes with fencing enabled.
* You have network connectivity from the load balancer to both control plane nodes.
* You created DNS records for `api.<cluster_name>.<base_domain>` and `*.apps.<cluster_name>.<base_domain>`.

.Procedure

. Configure the load balancer to forward traffic for the following ports:
+
* `6443`: Kubernetes API server
* `6443`: Kubernetes API server
* `80` and `443`: Application ingress
+
You must forward traffic to both control plane nodes.

. Configure health checks on the load balancer. You must monitor the backend endpoints so that the load balancer only sends traffic to nodes that respond.

. Configure the load balancer to forward traffic to both control plane nodes. The following example shows how to configure two control plane nodes:
. Configure the load balancer to forward traffic to both control plane nodes. The following example shows how to configure two control plane nodes:
+
[source,terminal]
----
Expand Down