File tree Expand file tree Collapse file tree 1 file changed +24
-1
lines changed Expand file tree Collapse file tree 1 file changed +24
-1
lines changed Original file line number Diff line number Diff line change 2727
2828Follow Amazon's instructions to provision your cluster.
2929
30- ### Configuring OpenWhisk
30+ ### Configuring OpenWhisk using SSL and IAM
3131
3232AWS's Elastic Kubernetes Service (EKS) does not support standard Kubernetes
3333ingress. Instead, it relies on provisioning Elastic Load
@@ -86,6 +86,29 @@ available before the hostname is actually properly registered in DNS.
8686Be patient and keep trying until you stop getting `no such host`
8787errors from `wsk` when attempting to access it.
8888
89+ # ## Configuring Openwhisk using SSL and Elastic Loadbalancers
90+
91+ Due to the way AWS supports TLS termination on ELBs there are a couple of configuration options required to put a
92+ signed certificate in place when deploying openwhisk.
93+
94+ First ensure you have a signed certificate in your AWS Certificate Manager.
95+
96+ Then ensure you enable the following :
97+ ` ` ` yaml
98+ whisk:
99+ ingress:
100+ awsSSL: "true"
101+ type: LoadBalancer
102+ annotations:
103+ service.beta.kubernetes.io/aws-load-balancer-backend-protocol: http
104+ service.beta.kubernetes.io/aws-load-balancer-ssl-ports: https-api
105+ service.beta.kubernetes.io/aws-load-balancer-ssl-cert: <your certificate ARN>
106+ ` ` `
107+
108+ This will setup a loadbalanced service that allows your users to connect via HTTPS to the cluster. Internally we switch
109+ from SSL to plain HTTP communication as we're forwarding ports internally.
110+ Please read [this doc](https://kubernetes-on-aws.readthedocs.io/en/latest/user-guide/tls-termination.html#common-pitfalls) for more information.
111+
89112# # Hints and Tips
90113
91114# # Limitations
You can’t perform that action at this time.
0 commit comments