title | services | ms.date | ms.topic | description | keywords |
---|---|---|---|---|---|
Use a custom traefik ingress controller and configure HTTPS |
azure-dev-spaces |
12/10/2019 |
conceptual |
Learn how to configure Azure Dev Spaces to use a custom traefik ingress controller and configure HTTPS using that ingress controller |
Docker, Kubernetes, Azure, AKS, Azure Kubernetes Service, containers, Helm, service mesh, service mesh routing, kubectl, k8s |
This article shows you how to configure Azure Dev Spaces to use a custom traefik ingress controller. This article also shows you how to configure that custom ingress controller to use HTTPS.
- An Azure subscription. If you don't have one, you can create a free account.
- Azure CLI installed.
- Azure Kubernetes Service (AKS) cluster with Azure Dev Spaces enabled.
- kubectl installed.
- Helm 3 installed.
- A custom domain with a DNS Zone. This article assumes the custom domain and DNS Zone are in the same resource group as your AKS cluster, but it is possible to use a custom domain and DNS Zone in a different resource group.
Connect to your cluster using kubectl, the Kubernetes command-line client. To configure kubectl
to connect to your Kubernetes cluster, use the az aks get-credentials command. This command downloads credentials and configures the Kubernetes CLI to use them.
az aks get-credentials --resource-group myResourceGroup --name myAKS
To verify the connection to your cluster, use the kubectl get command to return a list of the cluster nodes.
kubectl get nodes
NAME STATUS ROLES AGE VERSION
aks-nodepool1-12345678-vmssfedcba Ready agent 13m v1.14.1
Add the official stable Helm repository, which contains the traefik ingress controller Helm chart.
helm repo add stable https://kubernetes-charts.storage.googleapis.com/
Create a Kubernetes namespace for the traefik ingress controller and install it using helm
.
Note
If your AKS cluster does not have RBAC enabled, remove the --set rbac.enabled=true parameter.
kubectl create ns traefik
helm install traefik stable/traefik --namespace traefik --set kubernetes.ingressClass=traefik --set rbac.enabled=true --set fullnameOverride=customtraefik --set kubernetes.ingressEndpoint.useDefaultPublishedService=true --version 1.85.0
Note
The above example creates a public endpoint for your ingress controller. If you need to use a private endpoint for your ingress controller instead, add the --set service.annotations."service\.beta\.kubernetes\.io/azure-load-balancer-internal"=true parameter to the helm install command.
helm install traefik stable/traefik --namespace traefik --set kubernetes.ingressClass=traefik --set rbac.enabled=true --set fullnameOverride=customtraefik --set kubernetes.ingressEndpoint.useDefaultPublishedService=true --set service.annotations."service\.beta\.kubernetes\.io/azure-load-balancer-internal"=true --version 1.85.0
This private endpoint is exposed within the virtual network where you AKS cluster is deployed.
Get the IP address of the traefik ingress controller service using kubectl get.
kubectl get svc -n traefik --watch
The sample output shows the IP addresses for all the services in the traefik name space.
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
traefik LoadBalancer 10.0.205.78 <pending> 80:32484/TCP,443:30620/TCP 20s
...
traefik LoadBalancer 10.0.205.78 MY_EXTERNAL_IP 80:32484/TCP,443:30620/TCP 60s
Add an A record to your DNS zone with the external IP address of the traefik service using az network dns record-set a add-record.
az network dns record-set a add-record \
--resource-group myResourceGroup \
--zone-name MY_CUSTOM_DOMAIN \
--record-set-name *.traefik \
--ipv4-address MY_EXTERNAL_IP
The above example adds an A record to the MY_CUSTOM_DOMAIN DNS zone.
In this article, you use the Azure Dev Spaces Bike Sharing sample application to demonstrate using Azure Dev Spaces. Clone the application from GitHub and navigate into its directory:
git clone https://github.com/Azure/dev-spaces
cd dev-spaces/samples/BikeSharingApp/charts
Open values.yaml and make the following updates:
- Replace all instances of <REPLACE_ME_WITH_HOST_SUFFIX> with traefik.MY_CUSTOM_DOMAIN using your domain for MY_CUSTOM_DOMAIN.
- Replace kubernetes.io/ingress.class: traefik-azds # Dev Spaces-specific with kubernetes.io/ingress.class: traefik # Custom Ingress.
Below is an example of an updated values.yaml
file:
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
bikesharingweb:
ingress:
annotations:
kubernetes.io/ingress.class: traefik # Custom Ingress
hosts:
- dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN # Assumes deployment to the 'dev' space
gateway:
ingress:
annotations:
kubernetes.io/ingress.class: traefik # Custom Ingress
hosts:
- dev.gateway.traefik.MY_CUSTOM_DOMAIN # Assumes deployment to the 'dev' space
Save your changes and close the file.
Create the dev space with your sample application using azds space select
.
azds space select -n dev -y
Deploy the sample application using helm install
.
helm install bikesharingsampleapp . --dependency-update --namespace dev --atomic
The above example deploys the sample application to the dev namespace.
Display the URLs to access the sample application using azds list-uris
.
azds list-uris
The below output shows the example URLs from azds list-uris
.
Uri Status
--------------------------------------------------- ---------
http://dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN/ Available
http://dev.gateway.traefik.MY_CUSTOM_DOMAIN/ Available
Navigate to the bikesharingweb service by opening the public URL from the azds list-uris
command. In the above example, the public URL for the bikesharingweb service is http://dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN/
.
Note
If you see an error page instead of the bikesharingweb service, verify you updated both the kubernetes.io/ingress.class annotation and the host in the values.yaml file.
Use the azds space select
command to create a child space under dev and list the URLs to access the child dev space.
azds space select -n dev/azureuser1 -y
azds list-uris
The below output shows the example URLs from azds list-uris
to access the sample application in the azureuser1 child dev space.
Uri Status
--------------------------------------------------- ---------
http://azureuser1.s.dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN/ Available
http://azureuser1.s.dev.gateway.traefik.MY_CUSTOM_DOMAIN/ Available
Navigate to the bikesharingweb service in the azureuser1 child dev space by opening the public URL from the azds list-uris
command. In the above example, the public URL for the bikesharingweb service in the azureuser1 child dev space is http://azureuser1.s.dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN/
.
Use cert-manager to automate the management of the TLS certificate when configuring your traefik ingress controller to use HTTPS. Use helm
to install the certmanager chart.
kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.12/deploy/manifests/00-crds.yaml --namespace traefik
kubectl label namespace traefik certmanager.k8s.io/disable-validation=true
helm repo add jetstack https://charts.jetstack.io
helm repo update
helm install cert-manager --namespace traefik --version v0.12.0 jetstack/cert-manager --set ingressShim.defaultIssuerName=letsencrypt --set ingressShim.defaultIssuerKind=ClusterIssuer
Create a letsencrypt-clusterissuer.yaml
file and update the email field with your email address.
apiVersion: cert-manager.io/v1alpha2
kind: ClusterIssuer
metadata:
name: letsencrypt
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: MY_EMAIL_ADDRESS
privateKeySecretRef:
name: letsencrypt
solvers:
- http01:
ingress:
class: traefik
Note
For testing, there is also a staging server you can use for your ClusterIssuer.
Use kubectl
to apply letsencrypt-clusterissuer.yaml
.
kubectl apply -f letsencrypt-clusterissuer.yaml --namespace traefik
Remove the previous traefik ClusterRole and ClusterRoleBinding, then upgrade traefik to use HTTPS using helm
.
Note
If your AKS cluster does not have RBAC enabled, remove the --set rbac.enabled=true parameter.
kubectl delete ClusterRole traefik
kubectl delete ClusterRoleBinding traefik
helm upgrade traefik stable/traefik --namespace traefik --set kubernetes.ingressClass=traefik --set rbac.enabled=true --set kubernetes.ingressEndpoint.useDefaultPublishedService=true --version 1.85.0 --set ssl.enabled=true --set ssl.enforced=true --set ssl.permanentRedirect=true
Get the updated IP address of the traefik ingress controller service using kubectl get.
kubectl get svc -n traefik --watch
The sample output shows the IP addresses for all the services in the traefik name space.
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
traefik LoadBalancer 10.0.205.78 <pending> 80:32484/TCP,443:30620/TCP 20s
...
traefik LoadBalancer 10.0.205.78 MY_NEW_EXTERNAL_IP 80:32484/TCP,443:30620/TCP 60s
Add an A record to your DNS zone with the new external IP address of the traefik service using az network dns record-set a add-record and remove the previous A record using az network dns record-set a remove-record.
az network dns record-set a add-record \
--resource-group myResourceGroup \
--zone-name MY_CUSTOM_DOMAIN \
--record-set-name *.traefik \
--ipv4-address MY_NEW_EXTERNAL_IP
az network dns record-set a remove-record \
--resource-group myResourceGroup \
--zone-name MY_CUSTOM_DOMAIN \
--record-set-name *.traefik \
--ipv4-address PREVIOUS_EXTERNAL_IP
The above example updates the A record in the MY_CUSTOM_DOMAIN DNS zone to use PREVIOUS_EXTERNAL_IP.
Update values.yaml to include the details for using cert-manager and HTTPS. Below is an example of an updated values.yaml
file:
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
bikesharingweb:
ingress:
annotations:
kubernetes.io/ingress.class: traefik # Custom Ingress
cert-manager.io/cluster-issuer: letsencrypt
hosts:
- dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN # Assumes deployment to the 'dev' space
tls:
- hosts:
- dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN
secretName: dev-bikesharingweb-secret
gateway:
ingress:
annotations:
kubernetes.io/ingress.class: traefik # Custom Ingress
cert-manager.io/cluster-issuer: letsencrypt
hosts:
- dev.gateway.traefik.MY_CUSTOM_DOMAIN # Assumes deployment to the 'dev' space
tls:
- hosts:
- dev.gateway.traefik.MY_CUSTOM_DOMAIN
secretName: dev-gateway-secret
Upgrade the sample application using helm
:
helm upgrade bikesharingsampleapp . --namespace dev --atomic
Navigate to the sample application in the dev/azureuser1 child space and notice you are redirected to use HTTPS.
Important
It may take 30 minutes or more for the DNS changes to complete and your sample application to be accessible.
Also notice that the page loads, but the browser shows some errors. Opening the browser console shows the error relates to an HTTPS page trying to load HTTP resources. For example:
Mixed Content: The page at 'https://azureuser1.s.dev.bikesharingweb.traefik.MY_CUSTOM_DOMAIN/devsignin' was loaded over HTTPS, but requested an insecure resource 'http://azureuser1.s.dev.gateway.traefik.MY_CUSTOM_DOMAIN/api/user/allUsers'. This request has been blocked; the content must be served over HTTPS.
To fix this error, update BikeSharingWeb/azds.yaml to use traefik for kubernetes.io/ingress.class and your custom domain for $(hostSuffix). For example:
...
ingress:
annotations:
kubernetes.io/ingress.class: traefik
hosts:
# This expands to [space.s.][rootSpace.]bikesharingweb.<random suffix>.<region>.azds.io
- $(spacePrefix)$(rootSpacePrefix)bikesharingweb.traefik.MY_CUSTOM_DOMAIN
...
Update BikeSharingWeb/package.json with a dependency for the url package.
{
...
"react-responsive": "^6.0.1",
"universal-cookie": "^3.0.7",
"url": "0.11.0"
},
...
Update the getApiHostAsync method in BikeSharingWeb/lib/helpers.js to use HTTPS:
...
getApiHostAsync: async function() {
const apiRequest = await fetch('/api/host');
const data = await apiRequest.json();
var urlapi = require('url');
var url = urlapi.parse(data.apiHost);
console.log('apiHost: ' + "https://"+url.host);
return "https://"+url.host;
},
...
Navigate to the BikeSharingWeb
directory and use azds up
to run your updated BikeSharingWeb service.
cd ../BikeSharingWeb/
azds up
Navigate to the sample application in the dev/azureuser1 child space and notice you are redirected to use HTTPS without any errors.
Learn how Azure Dev Spaces helps you develop more complex applications across multiple containers, and how you can simplify collaborative development by working with different versions or branches of your code in different spaces.
[!div class="nextstepaction"] Team development in Azure Dev Spaces