gorgeous-beach-23305
05/17/2023, 7:33 PMNAME CLASS HOSTS ADDRESS PORTS AGE
orchestrator-grpc <none> <http://orchestrator.playground.cloud.abc.com|orchestrator.playground.cloud.abc.com> <http://b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com|b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com> 80 3h41m
orchestrator-http <none> <http://orchestrator.playground.cloud.abc.com|orchestrator.playground.cloud.abc.com> <http://b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com|b37bbe12aafaf42a7b06f611f91b07bd-7362ba7e14b8b74e.elb.eu-central-1.amazonaws.com> 80 3h41m
1. When I list the ingresses, I get this. As you can see the hostnames for both the ingresses are same. Is this expected? I am told that this could be a problem. Also, is there anything needed to be done for the webhook service? like setting up an ingress or anything to handle https traffic?
2. We are using nginx ingress controller and cert-manager to provision certificates in k8s. To set up nginx to use the certificate provided by cert-manager, 2 things are required - a) annotation specifying the cert-manager / issuer - <http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: "abc-issuer"
and b) in the ingress spec, a tls section needs to be added like so -
tls:
- hosts:
- <http://echo1.example.com|echo1.example.com>
- <http://echo2.example.com|echo2.example.com>
secretName: echo-tls
As shown here in the cert-manager docs. However, the flyte-binary ingress template does not have these elements to be overridden from values.yaml. I tried adding the spec section in values.yaml, but this does not work.
spec:
tls:
hosts:
- "${app_name}.${env}.<http://cloud.abc.com|cloud.abc.com>"
secretName: "${app_name}.${env}.<http://cloud.abc.com|cloud.abc.com>"
At this point, with the dns configured, the UI works, but without setting up SSL, grpc will not work, so we are not able to register workflow. Please let me know if anyone has faced this issue and found a resolution. Thanks!average-finland-92144
05/17/2023, 7:58 PMdescribe
each one of the Ingress resources you'll see that, despite using the same host name, the controller will route traffic to the corresponding service depending on the path (multiplexor pattern). I don't think there's anything you need to do for the webhook
serviceaverage-finland-92144
05/17/2023, 7:59 PMvalues.yaml
under commonAnnotations
you can add the required annotations for, in this case, Ingress resource:
commonAnnotations:
ingress:
<http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: nameOfClusterIssuer
...average-finland-92144
05/17/2023, 8:13 PMaverage-finland-92144
05/17/2023, 8:15 PMgorgeous-beach-23305
05/17/2023, 8:40 PM<http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: nameOfClusterIssuer
in the latter and it did not work. That is why I am thinking it might need the tls
section because it said so in the cert-manager docs. Should it be added in the root commonAnnotations as you have shown above?average-finland-92144
05/17/2023, 9:12 PMspec
sectiongorgeous-beach-23305
05/18/2023, 5:21 AMfreezing-boots-56761
freezing-boots-56761
freezing-boots-56761
freezing-boots-56761
gorgeous-beach-23305
05/18/2023, 1:48 PMfreezing-boots-56761
gorgeous-beach-23305
05/18/2023, 2:41 PMshy-family-76866
05/31/2023, 1:47 PMfreezing-boots-56761
Flyte enables production-grade orchestration for machine learning workflows and data processing created to accelerate local workflows to production.
Powered by