This document describes how to setup the alb-ingress-controller using kubectl or helm. Additionally, it details how to setup external-dns to work with the controller.
If you'd prefer an end-to-end walkthrough (example) of setup instead, see the echoservice example.
This section details what must be setup in order for the controller to run.
Adequate roles and policies must be configured in AWS and available to the node(s) running the controller. How access is granted is up to you. Some will attach the needed rights to node's role in AWS. Others will use projects like kube2iam.
An example policy with the minimum rights can be found at examples/iam-policy.json.
The controller determines subnets to deploy each ALB to based on an annotation or auto-detection.
-
annotation:
alb.ingress.kubernetes.io/subnets
may be specified in each ingress resource with the subnet IDs orName
tags. This allows for flexibility in where ALBs land. This list of subnets must include 2 or more that exist in unique availability zones. See the annotations documentation for more details. -
auto-detection: When subnet annotations are not present, the controller will attempt to choose the best subnets for deploying the ALBs. It uses the following tag criteria to determine the subnets it should use.
-
kubernetes.io/cluster/$CLUSTER_NAME
=shared
where$CLUSTER_NAME
matches theCLUSTER_NAME
environment variable from thealb-ingress-controller.yaml
manifest. -
kubernetes.io/role/alb-ingress
=
-
The controller determines if it should create and manage security groups or use existing ones in AWS based on the presence of an annotation. When alb.ingress.kubernetes.io/security-groups
is present, the list of security groups is assigned to the ALB instance. When the annotation is not present, the controller will create a security group with appropriate ports allowing access to 0.0.0.0/0
and attached to the ALB. It will also create a security group for instances that allows all TCP traffic when the source is the security group created for the ALB.
You must have the Helm App Registry plugin installed for these instructions to work.
helm registry install quay.io/coreos/alb-ingress-controller-helm
-
Setup default-backend-service
A default backend service is required for every ingress controller. The alb-ingress-controller does not make use of it, but will not be able to run the ingress libraries without it. To get around this, deploy a dummy default backend to the cluster. The following example will deploy one in
kube-system
; you may wish to adjust it.$ kubectl create -f https://raw.githubusercontent.com/coreos/alb-ingress-controller/master/examples/default-backend.yaml
-
Configure the alb-ingress-controller manifest.
A sample manifest can be found below.
$ wget https://raw.githubusercontent.com/coreos/alb-ingress-controller/master/examples/alb-ingress-controller.yaml
At minimum, edit the following variables.
-
AWS_REGION
: region in AWS this cluster exists.- name: AWS_REGION value: us-west-1
-
CLUSTER_NAME
: name of the cluster. If doing auto-detection of subnets (described in prerequisites above)CLUSTER_NAME
must match the AWS tags associated with the subnets you wish ALBs to be provisioned.- name: CLUSTER_NAME value: devCluster
-
-
Deploy the alb-ingress-controller manifest.
$ kubectl apply -f alb-ingress-controller.yaml
-
Verify the deployment was successful and the controller started.
$ kubectl logs -n kube-system \ $(kubectl get po -n kube-system | \ egrep -o alb-ingress[a-zA-Z0-9-]+) | \ egrep -o '\[ALB-INGRESS.*$'
Should display output similar to the following.
[ALB-INGRESS] [controller] [INFO]: Log level read as "", defaulting to INFO. To change, set LOG_LEVEL environment variable to WARN, ERROR, or DEBUG. [ALB-INGRESS] [controller] [INFO]: Ingress class set to alb [ALB-INGRESS] [ingresses] [INFO]: Build up list of existing ingresses [ALB-INGRESS] [ingresses] [INFO]: Assembled 0 ingresses from existing AWS resources
external-dns provisions DNS records based on the host information. This project will setup and manage records in Route 53 that point to controller deployed ALBs.
-
Ensure your instance has the correct IAM permission required for external-dns. See https://github.com/kubernetes-incubator/external-dns/blob/master/docs/tutorials/aws.md#iam-permissions.
-
Download external-dns to manage Route 53.
$ wget https://raw.githubusercontent.com/coreos/alb-ingress-controller/master/examples/external-dns.yaml
-
Edit the
--domain-filter
flag to include your hosted zone(s)The following example is for a hosted zone test-dns.com
args: - --source=service - --source=ingress - --domain-filter=test-dns.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones - --provider=aws - --policy=upsert-only # would prevent ExternalDNS from deleting any records, omit to enable full synchronization
-
Deploy external-dns
$ kubectl apply -f external-dns.yaml
-
Verify it deployed successfully.
$ kubectl logs -f -n kube-system $(kubectl get po -n kube-system | egrep -o 'external-dns[A-Za-z0-9-]+') time="2017-09-19T02:51:54Z" level=info msg="config: &{Master: KubeConfig: Sources:[service ingress] Namespace: FQDNTemplate: Compatibility: Provider:aws GoogleProject: DomainFilter:[] AzureConfigFile:/etc/kuberne tes/azure.json AzureResourceGroup: Policy:upsert-only Registry:txt TXTOwnerID:my-identifier TXTPrefix: Interval:1m0s Once:false DryRun:false LogFormat:text MetricsAddress::7979 Debug:false}" time="2017-09-19T02:51:54Z" level=info msg="Connected to cluster at https://10.3.0.1:443"