This topic introduces Ingresses and describes how Ingress controllers and Server Load Balancer (SLB) Ingress controllers work.
Introduction to Ingresses
In a Kubernetes cluster, an Ingress functions as an access point that exposes Services in the cluster. It distributes most of the network traffic that is destined for the Services in the cluster. An Ingress is a Kubernetes resource. It manages external access to the Services in a Kubernetes cluster. You can configure forwarding rules for an Ingress to route network traffic to backend pods of different Services.
How an Ingress controller works
- A Service is an abstraction of an application that is deployed on a set of replicated pods.
- An Ingress contains reverse proxy rules. It controls to which Services HTTP or HTTPS requests are routed. For example, an Ingress routes requests to different Services based on the hosts and URLs in the requests.
- An Ingress controller is a reverse proxy program that parses Ingress rules. If changes are made to the Ingress rules, the Ingress controller updates the Ingress rules accordingly. After an Ingress controller receives a request, it redirects the request to a Service based on the Ingress rules.
How an SLB Ingress controller works
Serverless Kubernetes (ASK) clusters provide fully managed SLB Ingress controllers based on the Layer-7 forwarding of SLB instances. This saves the Infrastructure as a service (IaaS) cost and provides cloud service-level disaster recoveries for Ingresses.
- If you do not specify an SLB instance, ASK automatically creates an Internet-facing SLB instance. ASK does not create an internal-facing SLB instance for an ASK cluster.
- You can use existing Internet-facing or internal-facing SLB instances only by specifying instance IDs in annotations.
- If no existing Internet-facing instance is available, you can create one. Then, specify the ID of the newly created instance in annotations.
- If no existing internal-facing instance is available, you can create one. Then, specify the ID of the newly created instance in annotations.
- If you use an existing SLB instance, it must be a high-performance SLB instance that supports elastic network interfaces (ENIs). In addition, make sure that port 80 and port 443 are not used by other Services.
- SLB instances listen on port 80 for HTTP requests and listen on port 443 for HTTPS requests.
- SLB instances automatically use the certificate stored in the Secret that is specified in the configurations of the first Ingress created in the cluster. If no Secret is specified in the configurations of this Ingress, the default fake certificate is used.