mirror of https://github.com/docker/docs.git
Improve consistency of L7 routing docs
This commit is contained in:
parent
280429e88f
commit
c32dd765f3
|
@ -1716,7 +1716,7 @@ manuals:
|
|||
- title: Deploy a Compose-based app
|
||||
path: /ee/ucp/kubernetes/deploy-with-compose/
|
||||
- title: Deploy an ingress controller
|
||||
path: /ee/ucp/kubernetes/deploy-ingress-controller/
|
||||
path: /ee/ucp/kubernetes/layer-7-routing/
|
||||
- title: Create a service account for a Kubernetes app
|
||||
path: /ee/ucp/kubernetes/create-service-account/
|
||||
- title: Install a CNI plugin
|
||||
|
|
|
@ -15,15 +15,21 @@ mesh. Even though the service is running on a single node, users can access
|
|||
WordPress using the domain name or IP of any of the nodes that are part of
|
||||
the swarm.
|
||||
|
||||
UCP extends this one step further with application layer routing (also known
|
||||
as layer 7 routing), allowing users to access Docker services using domain names
|
||||
UCP extends this one step further with layer 7 layer routing (also known as
|
||||
application layer 7), allowing users to access Docker services using domain names
|
||||
instead of IP addresses.
|
||||
|
||||
This functionality is made available through the Interlock component.
|
||||
|
||||

|
||||
|
||||
In this example, users can access the WordPress service using
|
||||
`http://wordpress.example.org`. UCP and Docker Engine take care of routing
|
||||
the traffic to the right service.
|
||||
`http://wordpress.example.org`. Interlock takes care of routing traffic to
|
||||
the right place.
|
||||
|
||||
Interlock is specific to the Swarm orchestrator. If you're trying to route
|
||||
traffic to your Kubernetes applications, check
|
||||
[layer 7 routing with Kubernetes.](../kubernetes/layer-7-routing.md)
|
||||
|
||||
## Features and benefits
|
||||
|
||||
|
@ -44,4 +50,3 @@ routing mesh, but you don't have to. You can use host mode networking for maximu
|
|||
performance.
|
||||
* **Security**: The layer 7 routing components that are exposed to the outside
|
||||
world run on worker nodes. Even if they get compromised, your cluster won't.
|
||||
|
||||
|
|
|
@ -1,30 +1,29 @@
|
|||
---
|
||||
title: Deploy an ingress controller for a Kubernetes app
|
||||
description: Learn how to enable routing for a Kubernetes workload in Docker Enterprise Edition.
|
||||
keywords: UCP, Docker EE, Kubernetes, ingress, routing
|
||||
title: Layer 7 routing
|
||||
description: Learn how to route traffic to your Kubernetes workloads in
|
||||
Docker Enterprise Edition.
|
||||
keywords: UCP, Kubernetes, ingress, routing
|
||||
redirect_from:
|
||||
- /ee/ucp/kubernetes/deploy-ingress-controller/
|
||||
---
|
||||
|
||||
When you deploy your Kubernetes app on a Docker EE cluster, you may want to
|
||||
expose a service that enables external users to connect to it. Also, you may
|
||||
want network communication to reference named hosts, instead of IP addresses.
|
||||
Kubernetes provides *ingress controllers* to enable these functions.
|
||||
When you deploy a Kubernetes application, you may want to make it accessible
|
||||
to users using hostnames instead of IP addresses.
|
||||
|
||||
Kubernetes provides **ingress controllers** for this. This functionality is
|
||||
specific to Kubernetes. If you're trying to route traffic to Swarm-based
|
||||
applications, check [layer 7 routing with Swarm](../interlock/index.md).
|
||||
|
||||
Use an ingress controller when you want to:
|
||||
|
||||
- give your Kubernetes app an externally-reachable URL,
|
||||
- load-balance traffic to your app, or
|
||||
- offer name-based hosting.
|
||||
* Give your Kubernetes app an externally-reachable URL.
|
||||
* Load-balance traffic to your app.
|
||||
|
||||
Kubernetes provides an NGINX ingress controller that you can use in a Docker EE
|
||||
cluster, without modifications.
|
||||
Kubernetes provides an NGINX ingress controller that you can use in Docker EE
|
||||
without modifications.
|
||||
Learn about [ingress in Kubernetes](https://v1-8.docs.kubernetes.io/docs/concepts/services-networking/ingress/).
|
||||
|
||||
> Routing for Swarm apps
|
||||
>
|
||||
> To enable similar features for Swarm apps, see [Layer 7 routing](../interlock/index.md).
|
||||
{: .important}
|
||||
|
||||
## Create the Kubernetes namespace for the ingress controller
|
||||
## Create a dedicated namespace
|
||||
|
||||
1. Navigate to the **Namespaces** page and click **Create**.
|
||||
2. In the **Object YAML** editor, append the following text.
|
||||
|
@ -72,7 +71,7 @@ namespace needs access to Kubernetes resources, so create a grant with
|
|||
> [migrate Kubernetes roles to Docker EE authorization](../authorization/migrate-kubernetes-roles.md).
|
||||
{: .important}
|
||||
|
||||
## Install the NGINX ingress controller
|
||||
## Deploy NGINX ingress controller
|
||||
|
||||
The cluster is ready for the ingress controller deployment, which has three
|
||||
main components:
|
||||
|
@ -249,7 +248,7 @@ spec:
|
|||
app: ingress-nginx
|
||||
```
|
||||
|
||||
## Inspect the installation
|
||||
## Check your deployment
|
||||
|
||||
The `default-http-backend` provides a simple service that serves a 404 page
|
||||
at `/` and serves 200 on the `/healthz` endpoint.
|
||||
|
@ -275,7 +274,7 @@ at `/` and serves 200 on the `/healthz` endpoint.
|
|||
|
||||
A new page opens, displaying `default backend - 404`.
|
||||
|
||||
## Inspect the installation in the CLI
|
||||
## Check your deployment from the CLI
|
||||
|
||||
From the command line, confirm that the deployment is running by using
|
||||
`curl` with the URL that's shown on the details pane of the **ingress-nginx**
|
Loading…
Reference in New Issue