A Kubernetes ingress controller, which allows to manage LBaaS resources using the Terraform.
The project is still in early alpha. There can be significan code and behavior changes.
Since the LBaaS resources is not the part of the Kubernetes cluster, regular services cannot be accessed. Therefore if you want to expose the service for the loadbalancer, you have to expose it as a node port.
Config examples.
Loadbalancers can be created within the Kubernetes Cloud Providers, but their configuration is not flexible. Moreover the ingress-terraform allows to create one loadbalancer for multiple services.
- OpenStack (Barbican is required for the
TERMINATED_HTTPS
support)
- TLS certificates (
TERMINATED_HTTPS
) - TCP listeners
- UDP listeners (experimental, available only for Octavia API)
- PROXY protocol pool members (experimental, available only for Octavia API)
- Templated terraform script
On the left side is a regular ingress controller, which resides inside the Kubernetes cluster.
On the right side is a Terraform ingress controller. It doesn't receive the ingress traffic, but only manages the loadbalancer. If Terraform ingress controller is down, the loadbalancer will still work.
Each Kubernetes ingress resource represents a loadbalancer.
The following OpenStack auth options are supported:
auth-url
: The URL of the keystone API used to authenticate. On OpenStack control panels, this can be found at Access and Security > API Access > Credentials.password
: Refers to the password of a valid user set in keystone.username
: Refers to the username of a valid user set in keystone.domain-id
: Used to specify the ID of the domain your user belongs to.domain-name
: Used to specify the name of the domain your user belongs to.region
: Used to specify the identifier of the region to use when running on a multi-region OpenStack cloud. A region is a general division of an OpenStack deployment. Although a region does not have a strict geographical connotation, a deployment can use a geographical name for a region identifier such asus-east
. Available regions are found under the/v3/regions
endpoint of the Keystone API.project-id
: Used to specify the ID of the project where you want to create your resources.project-name
: Used to specify the name of the project where you want to create your resources.project-domain-id
: Used to specify the ID of the domain your project belongs to.project-domain-name
: Used to specify the name of the domain your project belongs to.user-domain-id
: Used to specify the ID of the domain your user belongs to.user-domain-name
: Used to specify the name of the domain your user belongs to.application-credential-id
: The ID of an application credential to authenticate with. Anapplication-credential-secret
has to bet set along with this parameter.application-credential-name
: The name of an application credential to authenticate with.application-credential-secret
: The secret of an application credential to authenticate with.
Example auth config:
kind: ConfigMap
apiVersion: v1
metadata:
name: terraform-ingress-controller-config
data:
config: |
cluster-name: terraform-ingress-cluster
openstack:
auth-url: %os_auth_url%
username: %os_username%
password: %os_password%
project-id: %os_project_id%
domain-id: %os_domain_id%
user-domain-id: %os_domain_id%
terraform:
subnet-id: 058d9dce-7a62-4d8c-ac82-6b217d697e81
floating-network-id: 8f408a7c-4d03-4355-81c1-07713fa0caec
floating-subnet-id: 9206c010-882f-4059-914e-f25b33139c40
manage-security-groups: true
create-monitor: true
monitor-delay: "5"
monitor-timeout: "3"
monitor-max-retries: 3
When you specify a configmap name, make sure it exists within the same namespace as an ingress resource.
Name | Type | Default | Description |
---|---|---|---|
terraform.ingress.kubernetes.io/internal | true|false | false | whether to assign a floating IP to the loadbalancer or not |
terraform.ingress.kubernetes.io/tcp-configmap | string | N/A | a config map name with a TCP service ports map |
terraform.ingress.kubernetes.io/udp-configmap | string | N/A | a config map name with a UDP service ports map (supported only in Octavia API) |
terraform.ingress.kubernetes.io/template | string | N/A | a config map name with a custom terraform script template |
terraform.ingress.kubernetes.io/skip-http-listener | true|false | false | whether to skip the HTTP (80 TCP port) listener creation |
terraform.ingress.kubernetes.io/use-octavia | true|false | false | whether Terraform provider should use Octavia API instead of Neutron LBaaS v2 |
terraform.ingress.kubernetes.io/lb-method | string | ROUND_ROBIN |
a load balancer method, can be ROUND_ROBIN , LEAST_CONNECTIONS or SOURCE_IP |
terraform.ingress.kubernetes.io/proxy-protocol | true|false | false | whether to use PROXY protocol for pool members (supported only in Octavia API) |
terraform.ingress.kubernetes.io/lock-timeout | string | 0s | specifies the -lock-timeout Terraform CLI argument |
kubernetes.io/ingress.class | string | N/A | must have the terraform value to be processed by the Terraform Ingress Controller |
- Clone the repo
- Change the current dir to
examples
- Modify the config file
$ kubectl -n kube-system apply -f config.yaml
$ kubectl -n kube-system apply -f serviceaccount.yaml
$ kubectl -n kube-system apply -f deployment.yaml
Expose the HTTP service as a node port and deploy the ingress resource:
$ kubectl run --image=nginx nginx --port=80
$ kubectl expose deployment nginx --type=NodePort --target-port=80
$ kubectl apply -f test-terraform-ingress.yaml
Read ingress controller logs:
$ kubectl -n kube-system logs -f -l k8s-app=terraform-ingress-controller
For example coredns deplyment:
$ kubectl -n kube-system expose deployment coredns --type=NodePort --port=53 --protocol=UDP --target-port=53
The configmap should look like:
apiVersion: v1
kind: ConfigMap
metadata:
name: ingress-udp-services
data:
53: "coredns:53"
The ingress resource annotation should look like:
terraform.ingress.kubernetes.io/udp-configmap: ingress-udp-services
- Handle signals, e.g. wait for terraform to finish, when ingress controller received the exit signal
- Add finalizer to the ingress resource
- Retry on error
- Add intermediate CA support (so far they can be concatenated into the certificate)
- Output terraform script diff
- Prepend logging loadbalancer UID
- Put openstack secrets into the secret and watch for its modification
- Add terraform execution time measurements
- Add additional annotations into ingress to pass custom resources into the template
- Remove OpenStack-only requirement
- Add more watchers and update loadbalancers on tls/node/secret/configmap change events
- Add parallel workers
- Add tests
- Proper logging
The current project is based on the octavia-ingress-controller code.