Skip to content

Latest commit

 

History

History

dual-nginx

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

Ingress NGINX Dual

Ingress NGINX is an Ingress Controller for NGINX webserver and reverse proxy, it manages NGINX in a Kubernetes native manner. This package deploys 2 NGINX Controllers, one with ingress class external to serve public traffic, and one with ingress class internal to serve internal traffic.

Requirements

Image repository and tag

Configuration

Ingress NGINX Double is deployed with the following default configuration:

  • Maximum allowed size of the client request body: 10m
  • HTTP status code used in redirects: 301
  • Metrics are scraped by Prometheus every 10s
  • Validating Admission webhook that validates an ingress definition does not break NGINX configuration.

Deployment

  1. Add the module to your Furyfile.yml:

dual-nginx depends on the nginx package, so we need to download both of them.

bases:
  - name: ingress/nginx
    version: "v3.0.1"
  - name: ingress/dual-nginx
    version: "v3.0.1"

See furyctl documentation for additional details about Furyfile.yml format.

  1. Execute furyctl legacy vendor -H to download the packages

  2. Inspect the download packages under ./vendor/katalog/ingress/dual-nginx.

  3. Define a kustomization.yaml that includes the ./vendor/katalog/ingress/dual-nginx directory as resource.

resources:
  - ./vendor/katalog/ingress/dual-nginx
  1. Apply the necessary patches. You can find a list of common customization here.

  2. To deploy the packages to your cluster, execute:

kustomize build . | kubectl apply -f -

Your are now ready to expose your applications using Kubernetes Ingress objects.

Common customizations

nginx package is deployed by default as a DaemonSet, meaning that it will deploy 1 ingress-controller pod on every worker node.

This is probably NOT what you want, standard Fury clusters have at least 1 infra node (nodes that are dedicated to run Fury infrastructural components, like Prometheus, elasticsearch, and the ingress controllers).

If your cluster has infra nodes you should patch the daemonset adding the NodeSelector for the infra nodes to the Ingress DaemonSet. You can do this usiing the following kustomize patch:

---
apiVersion: apps/v1
kind: DaemonSet
metadata:
  name: ingress-nginx-controller-external
spec:
  template:
    spec:
      nodeSelector:
        node-kind.sighup.io/infra: ""
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
  name: ingress-nginx-controller-internal
spec:
  template:
    spec:
      nodeSelector:
        node-kind.sighup.io/infra: ""

If you don't have infra nodes and you don't want to run ingress-controllers on all your worker nodes, you should probably label some nodes and adjust the previous NodeSelector accordingly.

Alerts

Followings Prometheus alerts are already defined for this package.

ingress-nginx.rules

Parameter Description Severity Interval
NginxIngressDown This alert fires if Prometheus target discovery was not able to reach ingress-nginx-metrics in the last 15 minutes. critical 15m
NginxIngressFailureRate This alert fires if the failure rate (the rate of 5xx responses) measured on a time window of 2 minutes was higher than 10% in the last 10 minutes. critical 10m
NginxIngressFailedReload This alert fires if the ingress' configuration reload failed in the last 10 minutes. warning 10m
NginxIngressLatencyTooHigh This alert fires if the ingress 99th percentile latency was more than 5 seconds in the last 10 minutes. warning 10m
NginxIngressLatencyTooHigh This alert fires if the ingress 99th percentile latency was more than 10 seconds in the last 10 minutes. critical 10m
NginxIngressCertificateExpiration This alert fires if the certificate for a given host is expiring in less than 7 days. warning
NginxIngressCertificateExpiration This alert fires if the certificate for a given host is expiring in less than 1 day. critical

License

For license details please see LICENSE