Skip to content

Commit 0805a6c

Browse files
Revisions for 1.18.0 (additional ingress/gateway examples).
1 parent ca5943f commit 0805a6c

8 files changed

Lines changed: 74 additions & 55 deletions

File tree

Binary file not shown.

networking/ingress-nginx/ingress-nginx-values.yaml

Lines changed: 0 additions & 23 deletions
This file was deleted.

networking/ingress-nginx/istio-externalservice.yaml

Lines changed: 0 additions & 10 deletions
This file was deleted.

networking/ingress-nginx/kurl-externalservice.yaml

Lines changed: 0 additions & 8 deletions
This file was deleted.

networking/istio/README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,11 @@ Additionally, some EnvoyFilters can be found in `networking/istio/envoyfilter/`
3737

3838
By default the deployment includes an Istio Gateway that uses the correct DNS names and basic TLS configuration. If you need a custom Gateway instead, disable the default one either via Replicated config or with ArgoCD values overrides.
3939

40-
[example-gateway.yaml](example-gateway.yaml) is an example Istio Gateway for KNIME Business Hub. Before applying it, set the gateway metadata namespace to your Hub namespace and replace the example hosts (`hub.example.com`, `apps.example.com`, etc.) with your actual hostnames. If TLS is terminated at the gateway instead of the load balancer, uncomment and configure the TLS section for port 443.
40+
[ingress-gateway.yaml](ingress-gateway.yaml) is an example Istio Gateway for KNIME Business Hub. Before applying it, set the gateway metadata namespace to your Hub namespace and replace the example hosts (`hub.example.com`, `apps.example.com`, etc.) with your actual hostnames. If TLS is terminated at the gateway instead of the load balancer, uncomment and configure the TLS section for port 443.
41+
42+
## Ingress example
43+
44+
[ingress.yaml](./ingress.yaml) is an example Ingress resource for routing traffic to the Istio Ingress Gateway service. In a KNIME Business Hub installation, all relevant traffic must reach the Istio Ingress Gateway and will be routed properly from that point onward. The example can be further configured to fit your desired ingress strategy.
4145

4246
## Openshift
4347

networking/istio/ingress.yaml

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
apiVersion: networking.k8s.io/v1
2+
kind: Ingress
3+
metadata:
4+
name: knime-business-hub-ingress
5+
namespace: knime
6+
spec:
7+
ingressClassName: <ingressclass>
8+
rules:
9+
- host: <baseurl>
10+
http:
11+
paths:
12+
- path: /
13+
pathType: ImplementationSpecific
14+
backend:
15+
service:
16+
name: istio-ingressgateway
17+
port:
18+
number: 443
19+
- host: api.<baseurl>
20+
http:
21+
paths:
22+
- path: /
23+
pathType: ImplementationSpecific
24+
backend:
25+
service:
26+
name: istio-ingressgateway
27+
port:
28+
number: 443
29+
- host: apps.<baseurl>
30+
http:
31+
paths:
32+
- path: /
33+
pathType: ImplementationSpecific
34+
backend:
35+
service:
36+
name: istio-ingressgateway
37+
port:
38+
number: 443
39+
- host: ws.<baseurl>
40+
http:
41+
paths:
42+
- path: /
43+
pathType: ImplementationSpecific
44+
backend:
45+
service:
46+
name: istio-ingressgateway
47+
port:
48+
number: 443
49+
- host: auth.<baseurl>
50+
http:
51+
paths:
52+
- path: /
53+
pathType: ImplementationSpecific
54+
backend:
55+
service:
56+
name: istio-ingressgateway
57+
port:
58+
number: 443
59+
- host: storage.<baseurl>
60+
http:
61+
paths:
62+
- path: /
63+
pathType: ImplementationSpecific
64+
backend:
65+
service:
66+
name: istio-ingressgateway
67+
port:
68+
number: 443

networking/openshift/ingress.yaml

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,12 @@
11
apiVersion: networking.k8s.io/v1
22
kind: Ingress
33
metadata:
4-
name: business-hub-hub
4+
name: knime-business-hub-ingress
55
namespace: knime
66
annotations:
77
haproxy.router.openshift.io/timeout: "1800"
88
spec:
99
ingressClassName: <ingressclass>
10-
## The tls block needs additional configuration if cert-manager or similar
11-
## is used to create and bind certificates in the cluster to specific ingress rules.
12-
#tls:
13-
#- hosts:
14-
# - <baseurl>
15-
# secretName: <cert-secret-name>
16-
#- hosts:
17-
# - api.<baseurl>
18-
# secretName: <cert-secret-name>
19-
#- hosts:
20-
# - ws.<baseurl>
21-
# secretName: <cert-secret-name>
2210
rules:
2311
- host: <baseurl>
2412
http:

0 commit comments

Comments
 (0)