Complete TLS example for Kubernetes Ingress in user guide

This commit is contained in:
robotte
2020-03-09 19:16:05 +01:00
committed by GitHub
parent 554bceb75b
commit 91b0e2e4dc

View File

@@ -369,7 +369,7 @@ spec:
kubectl apply -f https://raw.githubusercontent.com/containous/traefik/v1.7/examples/k8s/ui.yaml kubectl apply -f https://raw.githubusercontent.com/containous/traefik/v1.7/examples/k8s/ui.yaml
``` ```
Now lets setup an entry in our `/etc/hosts` file to route `traefik-ui.minikube` to our cluster. Now let's setup an entry in our `/etc/hosts` file to route `traefik-ui.minikube` to our cluster.
In production you would want to set up real DNS entries. In production you would want to set up real DNS entries.
You can get the IP address of your minikube instance by running `minikube ip`: You can get the IP address of your minikube instance by running `minikube ip`:
@@ -393,6 +393,23 @@ You can add a TLS entrypoint by adding the following `args` to the container spe
--entrypoints=Name:https Address::443 TLS --entrypoints=Name:https Address::443 TLS
--entrypoints=Name:http Address::80 --entrypoints=Name:http Address::80
``` ```
Now let's add the TLS port either to the deployment:
```
ports:
- name: https
containerPort: 443
```
or to the daemon set:
```
ports:
- name: https
containerPort: 443
hostPort: 443
```
To setup an HTTPS-protected ingress, you can leverage the TLS feature of the ingress resource. To setup an HTTPS-protected ingress, you can leverage the TLS feature of the ingress resource.