Nandakumar Raghu
05/17/2023, 7:33 PMNAME CLASS HOSTS ADDRESS PORTS AGE
orchestrator-grpc <none> <http://orchestrator.playground.cloud.abc.com|orchestrator.playground.cloud.abc.com> <http://b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com|b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com> 80 3h41m
orchestrator-http <none> <http://orchestrator.playground.cloud.abc.com|orchestrator.playground.cloud.abc.com> <http://b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com|b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com> 80 3h41m
1. When I list the ingresses, I get this. As you can see the hostnames for both the ingresses are same. Is this expected? I am told that this could be a problem. Also, is there anything needed to be done for the webhook service? like setting up an ingress or anything to handle https traffic?
2. We are using nginx ingress controller and cert-manager to provision certificates in k8s. To set up nginx to use the certificate provided by cert-manager, 2 things are required - a) annotation specifying the cert-manager / issuer - <http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: "abc-issuer"
and b) in the ingress spec, a tls section needs to be added like so -
tls:
- hosts:
- <http://echo1.example.com|echo1.example.com>
- <http://echo2.example.com|echo2.example.com>
secretName: echo-tls
As shown here in the cert-manager docs. However, the flyte-binary ingress template does not have these elements to be overridden from values.yaml. I tried adding the spec section in values.yaml, but this does not work.
spec:
tls:
hosts:
- "${app_name}.${env}.<http://cloud.abc.com|cloud.abc.com>"
secretName: "${app_name}.${env}.<http://cloud.abc.com|cloud.abc.com>"
At this point, with the dns configured, the UI works, but without setting up SSL, grpc will not work, so we are not able to register workflow. Please let me know if anyone has faced this issue and found a resolution. Thanks!David Espejo (he/him)
05/17/2023, 7:58 PMdescribe
each one of the Ingress resources you'll see that, despite using the same host name, the controller will route traffic to the corresponding service depending on the path (multiplexor pattern). I don't think there's anything you need to do for the webhook
servicevalues.yaml
under commonAnnotations
you can add the required annotations for, in this case, Ingress resource:
commonAnnotations:
ingress:
<http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: nameOfClusterIssuer
...Nandakumar Raghu
05/17/2023, 8:40 PM<http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: nameOfClusterIssuer
in the latter and it did not work. That is why I am thinking it might need the tls
section because it said so in the cert-manager docs. Should it be added in the root commonAnnotations as you have shown above?David Espejo (he/him)
05/17/2023, 9:12 PMspec
sectionNandakumar Raghu
05/18/2023, 5:21 AMjeev
Nandakumar Raghu
05/18/2023, 1:48 PMjeev
Nandakumar Raghu
05/18/2023, 2:41 PMRaphael Guzman
05/31/2023, 1:47 PMjeev