IBM - International Business Machines Corporation

11/03/2023 | Press release | Distributed by Public on 11/03/2023 03:18

Mastering Ingress in the UI: Elevating your app visibility

When scaling up the number of applications you manage, it can feel like there are a lot of moving parts to ensure that your APIs are going through to the right applications in a secure manner.

To make this easier, IBM Cloud® Kubernetes exposes various API integrations, which are already available through the command line interface (CLI) and Terraform.

We are excited to announce that these features are now accessible through the user interface (UI).

An overview of Ingress

First, let's review the relevant Ingress components.

When clients send requests to an endpoint, the traffic is directed from the domain to the respective load balancer. The load balancer forwards these requests to the Ingress controller, where they undergo request termination using a transport layer security (TLS) secret. A "secret" stores sensitive data, such as a password, authentication token, key or certificate. These requests are then distributed across the available service pods.

Our suite of managed integrations offers APIs to automate cluster setup and management:

  1. Domains : Link a custom domain to your cluster's load balancer by using (CIS). This integration ensures automatic renewal of corresponding TLS certificates.
  2. Ingress Controller Application Load Balancers (ALB): Manage your ALBs with features such as version control, custom configurations, and both horizontal and vertical scaling capabilities.
  3. Secrets: Securely store managed TLS certificates and secrets in your instance, with automatic synchronization to your Kubernetes secrets.

The table outlines the actions available for each API. Use these actions to streamline your cluster management.

Configuring a multi-tenant microservices environment in IBM Cloud

Let's dive into a practical scenario. Imagine you're assigned the task of configuring a multi-tenant environment within IBM Cloud to support a new product built on a microservices architecture, catering to various teams. The architecture is best depicted in the following high-level diagram.

Each team operates distinct microservices that serve specific components. These services are deployed within individual team namespaces, with "echo" representing one team's namespace and "foxtrot" dedicated to another. You've implemented a production cluster to make services accessible to users. After careful consideration, you've decided that employing an Ingress Controller - specifically an ALB - is the optimal choice to serve as the API gateway for your team's requirements.

The "echo" team has reached out for your assistance in establishing a new microservice to be accessible in the production environment via any requests at the "echo" endpoint at techcorp.com/echo/*. The application is currently operational within the "echo" namespace, exposed behind the "echo" service. In this example, we'll examine the configuration of an Ingress resource to understand how to securely expose this API endpoint within your cluster.

Begin by navigating to your IBM Cloud clusters and selecting the correct cluster to access the cluster overview page. Note the cluster-wide default Ingress configurations.

From the left-hand navigation menu, select the "Ingress" tab. Note that all your Ingress components in the overview page are currently healthy.

Now, follow these steps:

1. Set up the domain for your Ingress host. If you have already set up a CIS instance and have an active domain (for guidance on creating one, refer to this getting started guide), configure the necessary service-to-service IAM authorization and designate it as the default domain for your cluster. This ensures that all future ALB changes are automatically reflected in your domain configuration and will generate managed TLS certificates.

2. Navigate to the ALBs tab and locate an enabled public ALB. Verify that the Ingress class in the Ingress resource maps to the managed ALB. Verify that the "autoupdate" feature is enabled by default by attempting to run Update version. This will allow you to promptly address any known vulnerabilities. If this is a private application, you can enable a private ALB and link it to your domain.

3. The "echo-secret" needs to live in the "echo-namespace". Navigate to the secrets tab and take note of the "techcorp" TLS secret. To copy the managed TLS secret into the "echo-namespace", create a secret in the "echo-namespace". Note: If a secret ID doesn't exist within the secret detail, ensure that a default instance is registered.

4. Test the techcorp.com/echo endpoint and confirm that the application is correctly exposed at the "echo" endpoint.

5. Configure monitoring for your ALB traffic (refer to the setup monitoring guide), which enables you to monitor the load and traffic on your ALB, facilitating informed decisions regarding scaling.

With everything configured in the cluster, you are now ready to start serving your users.

Join the conversation

This blog post serves as a primer to showcase the benefits and functionality of using these integrations in the UI. Hopefully it helped you gain an understanding around the capabilities in the UI regarding your Ingress resources. If you have questions, you can engage our team by registering here and joining the discussion in the "#general" channel on our public IBM Cloud Kubernetes Service Slack.

Run Kubernetes at enterprise scale

Software Engineer, IBM Cloud Kubernetes Service