You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Get the required YAML files for the repo and update the files to the setup environment.
28
-
https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/configmap/user-defined-configmap for YAML files to use moving forward.
28
+
https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/configmap/user-defined-configmap for YAML files to use moving forward.
29
29
30
30
CIS uses the partition defined in the CIS configuration by default to communicate with the F5 BIG-IP when adding static ARPs and forwarding entries for VXLAN. CIS managed partitions **<partition_AS3>** and **<partition>** should not be used in ConfigMap as Tenants. If CIS is deployed with **bigip-partition=cis**, then **<cis_AS3>** and **<cis>** are not supposed to be used as a tenant in AS3 declaration. Below is a proper declaration which would be correctly processed by CIS. Using **<k8s>** for the AS3 tenant in AS3.
* TLSProfile is used to specify the TLS termination for a single/list of services in a VirtualServer Custom Resource. TLS termination relies on SNI. Any non-SNI traffic received on port 443 may result in connection issues.
205
205
* TLSProfile can be created either with certificates stored as k8s secrets or can be referenced to profiles existing in BIG-IP
* On the Main tab, click **Local Traffic > iRules**.
33
33
* Click **Create**.
34
34
* In the Name field, type name as "Proxy_Protocol_iRule".
35
-
* In the Definition field, Copy the definition from [Proxy_Protocol_iRule](https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/customResource/IngressLink/Proxy_Protocol_iRule) file.
35
+
* In the Definition field, Copy the definition from [Proxy_Protocol_iRule](https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/2.x-master/docs/config_examples/customResource/IngressLink/Proxy_Protocol_iRule) file.
* Update the "virtualServerAddress" parameter in the ingresslink.yaml resource. This IP address will be used to configure the BIG-IP device. It will be used to accept traffic and load balance it among the NGINX Ingress Controller pods.
Copy file name to clipboardExpand all lines: docs/config_examples/next-gen-routes/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -682,7 +682,7 @@ spec:
682
682
| A/B Deployment | YES | YES |
683
683
| Policy CR | NO | YES |
684
684
685
-
Please refer to the [examples](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details.
685
+
Please refer to the [examples](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details.
686
686
687
687
688
688
## Known issues
@@ -736,7 +736,7 @@ Yes you can continue using the rewriteAppRoot in route annotations.
736
736
### Any changes in RBAC?
737
737
No.
738
738
### How do I use policy CR with routes?
739
-
You can define the policy CR in Extended ConfigMap [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy). </br>
739
+
You can define the policy CR in Extended ConfigMap [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy). </br>
740
740
Make sure that Policy CR is created in a namespace which CIS is monitoring.
741
741
### How do I apply different policies/profiles to HTTP and HTTPS virtual servers?
742
742
You can use both PolicyCR and httpServerPolicyCR in route group to apply different policies/profiles to HTTP and HTTPS VS.</br>
Copy file name to clipboardExpand all lines: docs/config_examples/next-gen-routes/migration-guide.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@
15
15
16
16
## Overview
17
17
NextGenRoute Controller uses extendedConfigMap for extending the native resources (routes). All the routes are group by namespaces or namespace-labels into RouteGroups. Each RouteGroup shares the same vsAddress, vsName and policy CR which is specified in extendedConfigMap.
18
-
In order to migrate to nextGen we first need to create an extended ConfigMap and policy CR then modify the CIS deployment accordingly. Refer [NextGen Route Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details
18
+
In order to migrate to nextGen we first need to create an extended ConfigMap and policy CR then modify the CIS deployment accordingly. Refer [NextGen Route Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details
19
19
20
20
## Migration using defaultRouteGroup
21
21
Currently, RouteGroup are expected to define per namespace or namespace label as follows:
@@ -171,7 +171,7 @@ Sample Route:
171
171
172
172
#### Step-2 Creating Extended ConfigMap using defaultRouteGroup
173
173
174
-
Extended ConfigMap is a must-use with the nextGen Route Controller. Refer [Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/next-gen-routes) for more details
174
+
Extended ConfigMap is a must-use with the nextGen Route Controller. Refer [Documentation](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/next-gen-routes) for more details
175
175
176
176
You can create an extended ConfigMap for given example as follows:
177
177
* You can define the vserverAddr same as "route-vserver-addr" parameter in CIS deployment.
@@ -222,7 +222,7 @@ spec:
222
222
223
223
**Note**:
224
224
* If WAF/AllowSourceRange is defined in both route annotation & policy CR, route annotation takes the priority by default.
225
-
* You can use the Policy CR to extend the virtual server capabilities even more. [See Details](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy).
225
+
* You can use the Policy CR to extend the virtual server capabilities even more. [See Details](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy).
226
226
* Make sure the namespace where we created the policy CR monitored by CIS.
227
227
228
228
#### Step-4 Update the CIS deployment parameters and start
@@ -248,7 +248,7 @@ spec:
248
248
249
249
* Remove "tls-version", "cipher-group" & "ciphers" parameters from CIS deployment and define them under "baseRouteSpec" in extendedConfigMap. See Step-2 above.
250
250
251
-
* Remove "override-as3-declaration" parameter as it's no more supported with NextGen Routes. You can use the Policy CR to extend the virtual server capabilities. [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/master/docs/config_examples/customResource/Policy).
251
+
* Remove "override-as3-declaration" parameter as it's no more supported with NextGen Routes. You can use the Policy CR to extend the virtual server capabilities. [See Example](https://github.com/F5Networks/k8s-bigip-ctlr/tree/2.x-master/docs/config_examples/customResource/Policy).
0 commit comments