Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create Traefik ingressroutes for docker{1-3} traffic #57

Open
clee231 opened this issue Sep 1, 2023 · 2 comments
Open

Create Traefik ingressroutes for docker{1-3} traffic #57

clee231 opened this issue Sep 1, 2023 · 2 comments
Assignees
Labels
✨ enhancement New feature or request ☸️ k8s Kubernetes related stuff

Comments

@clee231
Copy link
Contributor

clee231 commented Sep 1, 2023

Currently, some webapps are being hosted on docker{1-3}.

Traffic to/from these webapps must be maintained before the Kubernetes cluster can be switched to accept traffic for app.acm.cs.uic.edu.

Acceptance Criteria

  • Gather a list of webapps accepting traffic on docker{1-3}. Be sure to note the instance and external hostname being used.
  • Create IngressRoute resources within Kubernetes to handle the proxying of this traffic.
@clee231 clee231 added ✨ enhancement New feature or request ☸️ k8s Kubernetes related stuff labels Sep 1, 2023
@clee231
Copy link
Contributor Author

clee231 commented Sep 1, 2023

The following are all the Traefik route definitions within the manage repo for docker{1-3} nodes.

Docker 1 (Supporting ACME)

  • flourish-2023
    • Hosts: sparkhacksatuic.com,www.sparkhacksatuic.com

Docker 2

  • flourish-2023
    • Hosts: flourishconf.com

Docker 3

  • registration-bot
    • Hosts: registration-bot.acmuic.org (This is only available on internal DNS.)

It seems that all nodes are running traefik on ports 80 & 443, however only docker1 has ACME configured. It is not a mistake that both Docker1-2 have apps named flourish-2023. That's is what they are named... 🤔

@clee231
Copy link
Contributor Author

clee231 commented Nov 1, 2023

#59 was merged to address this.
TLS certificates still need to be added for Traefik to correctly secure traffic.

@clee231 clee231 self-assigned this Nov 1, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
✨ enhancement New feature or request ☸️ k8s Kubernetes related stuff
Projects
None yet
Development

No branches or pull requests

1 participant