-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
df960ea
commit e08c6d1
Showing
15 changed files
with
69 additions
and
58 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,21 @@ | ||
# This example shows how to deploy and expose GraphDB with AWS Load Balancer Controller Ingress without SSL. | ||
|
||
configuration: | ||
externalUrl: http://graphdb-example-dns-name.com/ # Change this to your ALB DNS name or Route53 if you use it. | ||
# Change this to your AzureDNS domain name or use nip.io which you can do after you deploy the chart since you | ||
# need to map the public IP address of the Application Gateway to the nip.io. | ||
externalUrl: http://ip.address.nip.io/ | ||
|
||
ingress: | ||
enabled: true | ||
className: alb | ||
annotations: | ||
# Define name of the Load Ingress | ||
alb.ingress.kubernetes.io/load-balancer-name: graphdb-ingress | ||
# Define target type for the Ingress | ||
alb.ingress.kubernetes.io/target-type: ip | ||
# This ensures the load balancer is public | ||
alb.ingress.kubernetes.io/scheme: internet-facing | ||
# Allowed CIDRs to access the load balancer | ||
alb.ingress.kubernetes.io/inbound-cidrs: "0.0.0.0/0" | ||
# Define the ports on which the Ingress should create listener | ||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}]' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,27 @@ | ||
# This example shows how to deploy and expose GraphDB with AWS Load Balancer Controller Ingress with SSL enabled. | ||
|
||
configuration: | ||
externalUrl: https://graphdb-example-dns-name.com/ # Change this to your ALB DNS name or Route53 if you use it. | ||
# Change this to your AzureDNS domain name or use nip.io which you can do after you deploy the chart since you | ||
# need to map the public IP address of the Application Gateway to the nip.io. | ||
externalUrl: https://ip.address.nip.io | ||
|
||
ingress: | ||
enabled: true | ||
className: alb | ||
annotations: | ||
# Define name of the Load Ingress | ||
alb.ingress.kubernetes.io/load-balancer-name: graphdb-ingress | ||
# Define target type for the Ingress | ||
alb.ingress.kubernetes.io/target-type: ip | ||
# This ensures the load balancer is public | ||
alb.ingress.kubernetes.io/scheme: internet-facing | ||
# Allowed CIDRs to access the load balancer | ||
alb.ingress.kubernetes.io/inbound-cidrs: "0.0.0.0/0" | ||
# Define the ports on which the Ingress should create listener | ||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]' | ||
alb.ingress.kubernetes.io/certificate-arn: "" # ARN of the ACM SSL Certificate that will be used | ||
# ARN of the ACM SSL Certificate that will be used | ||
alb.ingress.kubernetes.io/certificate-arn: "" | ||
# TLS Policy | ||
alb.ingress.kubernetes.io/ssl-policy: "ELBSecurityPolicy-TLS13-1-2-2021-06" | ||
alb.ingress.kubernetes.io/ssl-redirect: '443' | ||
# Enable SSL redirect on the listener | ||
alb.ingress.kubernetes.io/ssl-redirect: '443' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
serviceAccount: | ||
create: true | ||
name: graphdb | ||
annotations: | ||
eks.amazonaws.com/role-arn: arn:aws:iam::<AWS_ACCOUNT_ID>:role/eks-service-account-role # Example ARN Role, replace with your actual IAM Role ARN | ||
# Example ARN Role, replace with your actual IAM Role ARN | ||
eks.amazonaws.com/role-arn: arn:aws:iam::<AWS_ACCOUNT_ID>:role/eks-service-account-role |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,15 @@ | ||
# This example shows how to deploy and expose GraphDB with Application Gateway Ingress with SSL certificate hosted in the KeyVault Service. | ||
|
||
configuration: | ||
externalUrl: https://ip.address.nip.io/ # Change this to your AzureDNS domain name or use nip.io which you can do after you deploy the chart since you need to map the public IP address of the Application Gateway to the nip.io. | ||
# Change this to your AzureDNS domain name or use nip.io which you can do after you deploy the chart since you | ||
# need to map the public IP address of the Application Gateway to the nip.io. | ||
externalUrl: https://ip.address.nip.io/ | ||
|
||
ingress: | ||
enabled: true | ||
className: azure-application-gateway | ||
annotations: | ||
appgw.ingress.kubernetes.io/appgw-ssl-certificate: "name-of-appgw-installed-certificate" # Set the name of the SSL certificate that you have in the KeyVault Service | ||
appgw.ingress.kubernetes.io/ssl-redirect: "true" | ||
# Set the name of the SSL certificate that you have in the KeyVault Service | ||
appgw.ingress.kubernetes.io/appgw-ssl-certificate: "name-of-appgw-installed-certificate" | ||
# Enable SSL redirect on the listener | ||
appgw.ingress.kubernetes.io/ssl-redirect: "true" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,16 +1,9 @@ | ||
# This example shows how to deploy and expose GraphDB with Application Gateway Ingress and Service Type Load Balancer without SSL enabled. | ||
|
||
configuration: | ||
externalUrl: http://ip.address.nip.io/ # Change this to your AzureDNS domain name or use nip.io which you can do after you deploy the chart since you need to map the public IP address of the Application Gateway to the nip.io. | ||
|
||
ingress: | ||
enabled: true | ||
className: azure-application-gateway | ||
|
||
service: | ||
enabled: true | ||
ports: | ||
http: 80 | ||
type: LoadBalancer | ||
annotations: | ||
service.beta.kubernetes.io/azure-load-balancer-internal: "true" | ||
service.beta.kubernetes.io/azure-load-balancer-internal: "false" |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,4 @@ | ||
serviceAccount: | ||
create: true | ||
name: graphdb | ||
annotations: | ||
azure.workload.identity/client-id: <YOUR_MANAGED_IDENTITIY_CLIENT_ID> |