Skip to content

Commit 71db260

Browse files
buggtbdgrove-oss
authored andcommitted
update docs for aws ssl
1 parent 2c6bd31 commit 71db260

File tree

1 file changed

+24
-1
lines changed

1 file changed

+24
-1
lines changed

docs/k8s-aws.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727

2828
Follow Amazon's instructions to provision your cluster.
2929

30-
### Configuring OpenWhisk
30+
### Configuring OpenWhisk using SSL and IAM
3131

3232
AWS's Elastic Kubernetes Service (EKS) does not support standard Kubernetes
3333
ingress. Instead, it relies on provisioning Elastic Load
@@ -86,6 +86,29 @@ available before the hostname is actually properly registered in DNS.
8686
Be patient and keep trying until you stop getting `no such host`
8787
errors from `wsk` when attempting to access it.
8888

89+
### Configuring Openwhisk using SSL and Elastic Loadbalancers
90+
91+
Due to the way AWS supports TLS termination on ELBs there are a couple of configuration options required to put a
92+
signed certificate in place when deploying openwhisk.
93+
94+
First ensure you have a signed certificate in your AWS Certificate Manager.
95+
96+
Then ensure you enable the following:
97+
```yaml
98+
whisk:
99+
ingress:
100+
awsSSL: "true"
101+
type: LoadBalancer
102+
annotations:
103+
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: http
104+
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: https-api
105+
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: <your certificate ARN>
106+
```
107+
108+
This will setup a loadbalanced service that allows your users to connect via HTTPS to the cluster. Internally we switch
109+
from SSL to plain HTTP communication as we're forwarding ports internally.
110+
Please read [this doc](https://kubernetes-on-aws.readthedocs.io/en/latest/user-guide/tls-termination.html#common-pitfalls) for more information.
111+
89112
## Hints and Tips
90113

91114
## Limitations

0 commit comments

Comments
 (0)