The purpose of this document is to show how to expose CDI Upload Proxy service in a production environment.
You have a Kubernetes cluster up and running with CDI installed.
In order to upload data to your cluster, the cdi-uploadproxy service must be accessible from outside the cluster. This can be achieved using Ingress (Kubernetes) or Route (Openshift).
Before starting to work with Ingress resource, you will need to setup an Ingress Controller. Simply creating the resource will take no affect. There are number of Ingress controllers you can choose from.
Create Ingress for the upload proxy:
cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: cdi-uploadproxy-ingress
namespace: cdi
annotations:
nginx.org/ssl-services: "cdi-uploadproxy"
ingress.kubernetes.io/ssl-passthrough: "true"
nginx.ingress.kubernetes.io/secure-backends: "true"
nginx.ingress.kubernetes.io/proxy-body-size: "0"
spec:
rules:
# change to a valid FQDN in your organization
- host: cdi-uploadproxy.example.com
http:
paths:
- backend:
serviceName: cdi-uploadproxy
servicePort: 443
tls:
- hosts:
# change to a valid FQDN in your organization
- cdi-uploadproxy.example.com
EOF
Using router wildcard certificate and generated hostname with reencrypt route:
oc get secret -n cdi cdi-upload-proxy-ca-key -o=jsonpath="{.data['tls\.crt']}" | base64 -d > tls.crt && \
oc create route reencrypt -n cdi --service=cdi-uploadproxy --dest-ca-cert=tls.crt && \
rm tls.crt
Using your own key/cert with passthrough route
oc delete secret -n cdi cdi-upload-proxy-server-key && \
oc create secret tls -n cdi cdi-upload-proxy-server-key --key tls.key --cert tls.crt && \
oc create route passthrough -n cdi --service=cdi-uploadproxy && \
oc delete pod -n cdi -l cdi.kubevirt.io=cdi-uploadproxy
Assuming you completed the steps in Upload document execute the following to upload the image:
curl -v -H "Authorization: Bearer $TOKEN" --data-binary @tests/images/cirros-qcow2.img https://cdi-uploadproxy.example.com/v1alpha1/upload