Skip to content

Commit 340a878

Browse files
author
Brice Fallon-Freeman
authored
Merge pull request openshift#8337 from bfallonf/ingress_edit_2
Further edits to ingress object section
2 parents 891a26b + 93a55b5 commit 340a878

File tree

1 file changed

+23
-4
lines changed

1 file changed

+23
-4
lines changed

admin_guide/managing_networking.adoc

+23-4
Original file line numberDiff line numberDiff line change
@@ -155,15 +155,26 @@ the same rules apply for claiming a domain for a namespace based on the creation
155155
time of the object. For example, the oldest route winning against any other
156156
claimants wanting to use the same namespace.
157157

158-
For example, ownership of routes is based on the claims made for that host name with the same namespace. The oldest route wins against any other claims.
158+
For example, ownership of routes is based on the claims made for that host name
159+
with the same namespace. The oldest route wins against any other claims.
160+
161+
[NOTE]
162+
====
163+
Routes and ingress objects have the same data structure internally on the
164+
router, with ingress objects having the capability to turn into multiple route
165+
objects. The claim rules above apply for each of these objects. However, because
166+
an ingress object can have two hostnames, one hostname can be claimed by the
167+
ingress object and be active, while the second cannot claim, and remains
168+
inactive.
169+
====
159170

160171
While this makes the router compatible with Kubernetes ingress
161172
objects, some caveats exist:
162173

163174
* Ingress objects store the keys and certificates in secrets, so the router needs permission to read all secrets in the system.
164175
* Ingress objects only support edge termination for *https* routes.
165176

166-
To configure an existing router to have Ingress support (assuming the default
177+
To configure an existing router to have ingress support (assuming the default
167178
name of `router` for the deployment configuration and the service-account):
168179

169180
. Set the `ROUTER_ENABLE_INGRESS` environment variable to `true`:
@@ -172,10 +183,18 @@ name of `router` for the deployment configuration and the service-account):
172183
$ oc env dc router ROUTER_ENABLE_INGRESS=true`
173184
----
174185

175-
. Add the cluster-admin role to the router:
186+
. Add the `cluster-reader` role to the router, where `-z` is the service
187+
account:
188+
+
189+
----
190+
$ oc adm policy add-cluster-role-to-user cluster-reader -z router
191+
----
192+
193+
. Give the router the authorization to manage ingress objects:
176194
+
177195
----
178-
$ oc adm policy add-role-to-user cluster-admin router`
196+
$ oc adm policy add-cluster-role-to-user \
197+
system:openshift:controller:service-serving-cert-controller -z router
179198
----
180199

181200
[[admin-guide-controlling-egress-traffic]]

0 commit comments

Comments
 (0)