Skip to content

Latest commit

 

History

History
 
 

nginx

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Static IPs

This example demonstrates how to assign a static-ip to an Ingress on through the Nginx controller.

Prerequisites

You need a TLS cert and a test HTTP service for this example. You will also need to make sure you Ingress targets exactly one Ingress controller by specifying the ingress.class annotation, and that you have an ingress controller running in your cluster.

Acquiring an IP

Since instances of the nginx controller actually run on nodes in your cluster, by default nginx Ingresses will only get static IPs if your cloudprovider supports static IP assignments to nodes. On GKE/GCE for example, even though nodes get static IPs, the IPs are not retained across upgrade.

To acquire a static IP for the nginx ingress controller, simply put it behind a Service of Type=LoadBalancer.

First, create a loadbalancer Service and wait for it to acquire an IP

$ kubectl create -f static-ip-svc.yaml
service "nginx-ingress-lb" created

$ kubectl get svc nginx-ingress-lb
NAME               CLUSTER-IP     EXTERNAL-IP       PORT(S)                      AGE
nginx-ingress-lb   10.0.138.113   104.154.109.191   80:31457/TCP,443:32240/TCP   15m

then, update the ingress controller so it adopts the static IP of the Service by passing the --publish-service flag (the example yaml used in the next step already has it set to "nginx-ingress-lb").

$ kubectl create -f nginx-ingress-controller.yaml
deployment "nginx-ingress-controller" created

Assigning the IP to an Ingress

From here on every Ingress created with the ingress.class annotation set to nginx will get the IP allocated in the previous step

$ kubectl create -f nginx-ingress.yaml
ingress "nginx-ingress" created

$ kubectl get ing nginx-ingress
NAME            HOSTS     ADDRESS           PORTS     AGE
nginx-ingress   *         104.154.109.191   80, 443   13m

$ curl 104.154.109.191 -kL
CLIENT VALUES:
client_address=10.180.1.25
command=GET
real path=/
query=nil
request_version=1.1
request_uri=http://104.154.109.191:8080/
...

Retaining the IP

You can test retention by deleting the Ingress

$ kubectl delete ing nginx-ingress
ingress "nginx-ingress" deleted

$ kubectl create -f nginx-ingress.yaml
ingress "nginx-ingress" created

$ kubectl get ing nginx-ingress
NAME            HOSTS     ADDRESS           PORTS     AGE
nginx-ingress   *         104.154.109.191   80, 443   13m

Note that unlike the GCE Ingress, the same loadbalancer IP is shared amongst all Ingresses, because all requests are proxied through the same set of nginx controllers.

Promote ephemeral to static IP

To promote the allocated IP to static, you can update the Service manifest

$ kubectl patch svc nginx-ingress-lb -p '{"spec": {"loadBalancerIP": "104.154.109.191"}}'
"nginx-ingress-lb" patched

and promote the IP to static (promotion works differently for cloudproviders, provided example is for GKE/GCE) `

$ gcloud compute addresses create nginx-ingress-lb --addresses 104.154.109.191 --region us-central1
Created [https://www.googleapis.com/compute/v1/projects/kubernetesdev/regions/us-central1/addresses/nginx-ingress-lb].
---
address: 104.154.109.191
creationTimestamp: '2017-01-31T16:34:50.089-08:00'
description: ''
id: '5208037144487826373'
kind: compute#address
name: nginx-ingress-lb
region: us-central1
selfLink: https://www.googleapis.com/compute/v1/projects/kubernetesdev/regions/us-central1/addresses/nginx-ingress-lb
status: IN_USE
users:
- us-central1/forwardingRules/a09f6913ae80e11e6a8c542010af0000

Now even if the Service is deleted, the IP will persist, so you can recreate the Service with spec.loadBalancerIP set to 104.154.109.191.