Skip to content

Commit a4fc797

Browse files
authored
Merge pull request #30957 from stevsmit/BZ1933918
Bz1933918
2 parents 1b7ac44 + 30adee8 commit a4fc797

File tree

2 files changed

+51
-2
lines changed

2 files changed

+51
-2
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * ingress/routes.adoc
4+
5+
[id="nw-ingress-creating-a-passthrough-route_{context}"]
6+
= Creating a passthrough route
7+
8+
You can configure a secure route using passthrough termination by using the `oc create route` command. With passthrough termination, encrypted traffic is sent straight to the destination without the router providing TLS termination. Therefore no key or certificate is required on the route.
9+
10+
.Prerequisites
11+
12+
* You must have a service that you want to expose.
13+
14+
.Procedure
15+
16+
* Create a `Route` resource:
17+
+
18+
[source,terminal]
19+
----
20+
$ oc create route passthrough route-passthrough-secured --service=frontend --port=8080
21+
----
22+
+
23+
If you examine the resulting `Route` resource, it should look similar to the following:
24+
+
25+
.A Secured Route Using Passthrough Termination
26+
[source,yaml]
27+
----
28+
apiVersion: v1
29+
kind: Route
30+
metadata:
31+
name: route-passthrough-secured <1>
32+
spec:
33+
host: www.example.com
34+
port:
35+
targetPort: 8080
36+
tls:
37+
termination: passthrough <2>
38+
insecureEdgeTerminationPolicy: None <3>
39+
to:
40+
kind: Service
41+
name: frontend
42+
----
43+
<1> The name of the object, which is limited to 63 characters.
44+
<2> The `*termination*` field is set to `passthrough`. This is the only required `tls` field.
45+
<3> Optional `insecureEdgeTerminationPolicy`. The only valid values are are `None`, `Redirect`, or empty for disabled.
46+
+
47+
The destination pod is responsible for serving certificates for the
48+
traffic at the endpoint. This is currently the only method that can support requiring client certificates, also known as two-way authentication.

networking/routes/secured-routes.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,7 @@ include::modules/common-attributes.adoc[]
55

66
toc::[]
77

8-
The following sections describe how to create re-encrypt and edge routes with
9-
custom certificates.
8+
Secure routes provide the ability to use several types of TLS termination to serve certificates to the client. The following sections describe how to create re-encrypt, edge, and passthrough routes with custom certificates.
109

1110
[IMPORTANT]
1211
====
@@ -20,3 +19,5 @@ in the Azure documentation.
2019
include::modules/nw-ingress-creating-a-reencrypt-route-with-a-custom-certificate.adoc[leveloffset=+1]
2120

2221
include::modules/nw-ingress-creating-an-edge-route-with-a-custom-certificate.adoc[leveloffset=+1]
22+
23+
include::modules/nw-ingress-creating-a-passthrough-route.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)