Ingress controller implementation for HAProxy loadbalancer.
HAProxy Ingress images are built by Travis CI and the
image is deployed from Travis CI to Quay.io
whenever a tag is applied. The latest
tag will always point to the latest stable version while
canary
tag will always point to the latest beta-quality and release-candidate versions.
Before the beta-quality releases, the source code could also be tagged and images deployed.
The snapshot
tag will always point to the latest tagged version, which could be a release,
a beta-quality or a development version.
See the HAProxy Ingress chart documentation.
Follow the detailed instructions here or, in short:
kubectl create -f https://raw.githubusercontent.com/jcmoraisjr/haproxy-ingress/master/docs/haproxy-ingress.yaml
kubectl label node <node-name> role=ingress-controller
- Start with deployment instructions
- See TLS termination on how to enable
https
HAProxy Ingress has the following configuration options:
- Changing the default Templates
- Per ingress resource Annotations
- Global configurations with Configmap
- Static command-line arguments
Change the default templates mounting a new template file using a configmap. Note that in the current version, updates to the configmap won't update the in-memory parsed template.
Mounting directory | Configmap keys (filenames) | Source (choose a proper tag) |
---|---|---|
/etc/haproxy/template |
haproxy.tmpl |
haproxy.tmpl |
/etc/haproxy/modsecurity |
spoe-modsecurity.tmpl |
spoe-modsecurity.tmpl |
All templates support Sprig template library. This library provides a group of commonly used template functions to work with dictionaries, lists, math etc.
The following annotations are supported:
[0]
only inv0.8
(beta
)[1]
only inv0.9
(master
)
Configure if HAProxy should maintain client requests to the same backend server.
ingress.kubernetes.io/affinity
: the only supported option iscookie
. If declared, clients will receive a cookie with a hash of the server it should be fidelized to.ingress.kubernetes.io/session-cookie-name
: the name of the cookie.INGRESSCOOKIE
is the default value if not declared.ingress.kubernetes.io/session-cookie-strategy
: the cookie strategy to use (insert, rewrite, prefix).insert
is the default value if not declared.ingress.kubernetes.io/session-cookie-dynamic
: indicates whether or not dynamic cookie naming will be used. With the default oftrue
, a cookie will be generated by HAProxy using a hash of the server IP address, TCP port, and dynamic cookie secret key. Whenfalse
, the server name will be used as the cookie name. Note that setting this tofalse
will have no impact if use-resolver is set.
Note for dynamic-scaling
users only, v0.5 or older: the hash of the server is built based on it's name.
When the slots are scaled down, the remaining servers might change it's server name on
HAProxy configuration. In order to circumvent this, always configure the slot increment at
least as much as the number of replicas of the deployment that need to use affinity. This
limitation was removed on v0.6.
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-cookie
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-cookie
- https://www.haproxy.com/blog/load-balancing-affinity-persistence-sticky-sessions-what-you-need-to-know/
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#dynamic-cookie-key
Configure client authentication with X509 certificate. The following headers are added to the request:
X-SSL-Client-SHA1
: Hex encoding of the SHA-1 fingerprint of the X509 certificateX-SSL-Client-DN
: Distinguished name of the certificateX-SSL-Client-CN
: Common name of the certificate
The prefix of the header name can be configured with ssl-headers-prefix
configmap option, which defaults to X-SSL
.
The following annotations are supported:
ingress.kubernetes.io/auth-tls-cert-header
: if true HAProxy will addX-SSL-Client-Cert
http header with a base64 encoding of the X509 certificate provided by the client. Default is to not provide the client certificate.ingress.kubernetes.io/auth-tls-error-page
: optional URL of the page to redirect the user if he doesn't provide a certificate or the certificate is invalid.ingress.kubernetes.io/auth-tls-secret
: mandatory secret name withca.crt
key providing all certificate authority bundles used to validate client certificates, an optionalca.crl
key can also provide a CRL in PEM format for the server to verify against.ingress.kubernetes.io/auth-tls-verify-client
: optional configuration of Client Verification behavior. Supported values areoff
,on
,optional
andoptional_no_ca
. The default value ison
if a valid secret is provided,off
otherwise.
See also client cert example.
Defines the HTTP protocol version of the backend. Note that HTTP/2 is only supported if HTX is enabled.
A case insensitive match is used, so either h1
or H1
configures HTTP/1 protocol. A non SSL/TLS
configuration does not overrides secure-backends, so h1
and secure-backends true
will still configures SSL/TLS.
Options:
h1
: the default value, configures HTTP/1 protocol.http
is an alias toh1
.h1-ssl
: configures HTTP/1 over SSL/TLS.https
is an alias toh1-ssl
.h2
: configures HTTP/2 protocol.grpc
is an alias toh2
.h2-ssl
: configures HTTP/2 over SSL/TLS.grpcs
is an alias toh2-ssl
.
See also:
- use-htx configmap option to enable HTTP/2 backends.
- secure-backend annotations to configure optional client certificate and certificate authority bundle of SSL/TLS connections.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-proto
Configure backend server groups based on the weight of the group - blue/green balance - or a group selection based on http header or cookie value - blue/green selector.
Both blue/green configurations can be used together: if the http header or cookie isn't provided or doesn't match a group, the blue/green balance will be used.
See below the description of the two blue/green configuration options.
Blue/green balance
Configures weight of a blue/green deployment. The annotation accepts a comma separated list of label name/value pair and a numeric weight. Concatenate label name, label value and weight with an equal sign, without spaces. The label name/value pair will be used to match corresponding pods or deploys. There is no limit to the number of label/weight balance configurations.
The endpoints of a single backend are selected using service selectors, which also uses labels. Because of that, in order to use blue/green deployment, the deployment, daemon set or replication controller template should have at least two label name/value pairs - one that matches the service selector and another that matches the blue/green selector.
ingress.kubernetes.io/blue-green-balance
: comma separated list of labels and weightsingress.kubernetes.io/blue-green-deploy
: deprecated on v0.7, this is an alias toingress.kubernetes.io/blue-green-balance
.ingress.kubernetes.io/blue-green-mode
: defaults todeploy
on v0.7, defines how to apply the weights, might bepod
ordeploy
The following configuration group=blue=1,group=green=4
will redirect 20% of the load to the
group=blue
group and 80% of the load to group=green
group.
Applying the weights depends on the blue/green mode. v0.6 has only pod
mode which means that
every single pod receives the same weight as configured on blue/green balance. This means that
a balance configuration with 50% to each group will redirect twice as much requests to a backend
that has the double of replicas. v0.7 has also deploy
mode which rebalance the weights based
on the number of replicas of each deployment.
In short, regarding blue/green mode: use pod
if you want to redirect more requests to a
deployment updating the number of replicas; use deploy
if you want to control the load
of each side updating the blue/green balance annotation.
Value of 0
(zero) can also be used as weight. This will let the endpoint configured in the
backend accepting persistent connections - see affinity - but will not participate
in the load balancing. The maximum weight value is 256
.
Blue/green selector
Configures header or cookie name and also a pod label name used to tag the group of backend servers.
ingress.kubernetes.io/blue-green-cookie
: theCookieName:LabelName
pairingress.kubernetes.io/blue-green-header
: theHeaderName:LabelName
pair
The CookieName
or HeaderName
is the name of the http cookie or header used in the request to match
a group name. The LabelName
is the name of the pod label used to read the group name of the backend
server.
The following configuration X-Server:group
on ingress.kubernetes.io/blue-green-header
configures
HAProxy to try to match a backend server based on the value of its label group
. A request with header
X-Server: green
will match a pod labeled group=green
. Cookie configuration follows the same rules.
The name of the header and the label follow the k8s label naming convention: must consist of
alphanumeric characters, -
, _
or .
, and must start and end with an alphanumeric character.
Both cookie and header based configurations can be used together in the same backend (k8s service), provided that the label name is the same. If the request uses the configured header and cookie, the header will take precedence, and the cookie would be used if the header value provided doesn't match a healthy backend server.
Note that blue/green selector should be used only on controlled testing scenarios because it doesn't provide a proper load balancing: the first healthy backend server that match header or cookie configuration will be used despite if a proper load balance algorithm would choose another one. This can be changed in the future. Blue/green balance doesn't have this limitation and properly uses the chosen load balance algorithm.
See also:
- the example page
weight
based balance: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-weightuse-server
bases selector: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-use-server
Add CORS headers on OPTIONS http command (preflight) and reponses.
ingress.kubernetes.io/cors-enable
: Enable CORS if defined astrue
.ingress.kubernetes.io/cors-allow-origin
: Optional, configuresAccess-Control-Allow-Origin
header which defines the URL that may access the resource. Defaults to*
.ingress.kubernetes.io/cors-allow-methods
: Optional, configuresAccess-Control-Allow-Methods
header which defines the allowed methods. See defaults here.ingress.kubernetes.io/cors-allow-headers
: Optional, configuresAccess-Control-Allow-Headers
header which defines the allowed headers. See defaults here.ingress.kubernetes.io/cors-allow-credentials
: Optional, configuresAccess-Control-Allow-Credentials
header which defines whether or not credentials (cookies, authorization headers or client certificates) should be exposed. Defaults totrue
.ingress.kubernetes.io/cors-max-age
: Optional, configuresAccess-Control-Max-Age
header which defines the time in seconds the result should be cached. Defaults to86400
(1 day).ingress.kubernetes.io/cors-expose-headers
: Optional, configuresAccess-Control-Expose-Headers
header which defines what headers are allowed to be passed through to the CORS application. Defaults to not add the header.
https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS
Configure rate limit and concurrent connections per client IP address in order to mitigate DDoS attack. If several users are hidden behind the same IP (NAT or proxy), this configuration may have a negative impact for them. Whitelist can be used to these IPs.
The following annotations are supported:
ingress.kubernetes.io/limit-connections
: Maximum number os concurrent connections per client IPingress.kubernetes.io/limit-rps
: Maximum number of connections per second of the same IPingress.kubernetes.io/limit-whitelist
: Comma separated list of CIDRs that should be removed from the rate limit and concurrent connections check
Configurations of connection limit and timeout.
-
ingress.kubernetes.io/maxconn-server
: Defines the maximum concurrent connections each server of a backend should receive. If not specified or a value lesser than or equal zero is used, an unlimited number of connections will be allowed. When the limit is reached, new connections will wait on a queue. -
ingress.kubernetes.io/maxqueue-server
: Defines the maximum number of connections should wait in the queue of a server. When this number is reached, new requests will be redispached to another server, breaking sticky session if configured. The queue will be unlimited if the annotation is not specified or a value lesser than or equal zero is used. -
ingress.kubernetes.io/timeout-queue
: Defines how much time a connection should wait on a queue before a 503 error is returned to the client. The unit defaults to milliseconds if missing, change the unit withs
,m
,h
, ... suffix. The configmaptimeout-queue
option is used as the default value. -
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-maxconn
-
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-maxqueue
-
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-timeout%20queue
-
Time suffix: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#2.4
Configure OAuth2 via Bitly's oauth2_proxy
.
ingress.kubernetes.io/oauth
: Defines the oauth implementation. The only supported option isoauth2_proxy
.ingress.kubernetes.io/oauth-uri-prefix
: Defines the URI prefix of the oauth service. The default value is/oauth2
. There should be a backend with this path in the ingress resource.ingress.kubernetes.io/oauth-headers
: Defines an optional comma-separated list of<header>:<haproxy-var>
used to configure request headers to the upstream backends. The default value isX-Auth-Request-Email:auth_response_email
which means configuring a headerX-Auth-Request-Email
with the value of the varauth_response_email
. New variables can be added overwriting the defaultauth-request.lua
script.
The oauth2_proxy
implementation expects Bitly's oauth2_proxy
running as a backend of the same domain that should be protected. oauth2_proxy
has support
to GitHub, Google, Facebook, OIDC and many others.
All paths of a domain will have the same oauth configurations, despite if the path is configured
on an ingress resource without oauth annotations. In other words, if two ingress resources share
the same domain but only one has oauth annotations - the one that has at least the oauth2_proxy
service - all paths from that domain will be protected.
See also the example page.
Define if the upstream backends support proxy protocol and what version of the protocol should be used.
-
ingress.kubernetes.io/proxy-protocol
: The proxy protocol version the backend expect. Supported values arev1
,v2
,v2-ssl
,v2-ssl-cn
orno
. The default behavior if not declared is that the protocol is not supported by the backends and should not be used. -
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-send-proxy
-
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-send-proxy-v2
-
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-send-proxy-v2-ssl
-
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-send-proxy-v2-ssl-cn
Configure secure (TLS) connection to the backends.
ingress.kubernetes.io/secure-backends
: Define as true if the backend provide a TLS connection.ingress.kubernetes.io/secure-crt-secret
: Optional secret name of client certificate and key. This cert/key pair must be provided if the backend requests a client certificate. Expected secret keys aretls.crt
andtls.key
, the same used if secret is built withkubectl create secret tls <name>
.ingress.kubernetes.io/secure-verify-ca-secret
: Optional secret name with certificate authority bundle used to validate server certificate, preventing man-in-the-middle attacks. Expected secret key isca.crt
. An optionalca.crl
key can also provide a CRL in PEM format for the server to verify against.
Configure hostname alias. All annotations will be combined together with the host attribute in the same ACL, and any of them might be used to match SNI extensions (TLS) or Host HTTP header. The matching is case insensitive.
ingress.kubernetes.io/server-alias
: Defines an alias with hostname-like syntax. On v0.6 and older, wildcard*
wasn't converted to match a subdomain. Regular expression was also accepted but dots were escaped, making this alias less useful as a regex. Starting v0.7 the same hostname syntax is used, so*.my.domain
will matchapp.my.domain
but won't matchsub.app.my.domain
.ingress.kubernetes.io/server-alias-regex
: Only in v0.7 and newer. Match hostname using a POSIX extended regular expression. The regex will be used verbatim, so add^
and$
if strict hostname is desired and escape\.
dots in order to strictly match them. Some HTTP clients add the port number in the Host header, so remember to add(:[0-9]+)?$
in the end of the regex if a dollar sign$
is being used to match the end of the string.
Configures how URI of the requests should be rewritten before send the request to the backend. The following table shows some examples:
ingress path | request path | rewrite target | output |
---|---|---|---|
/abc | /abc | / | / |
/abc | /abc/ | / | / |
/abc | /abc/x | / | /x |
/abc | /abc | /y | /y |
/abc | /abc/ | /y | /y/ |
/abc | /abc/x | /y | /y/x |
/abc/ | /abc | / | 404 |
/abc/ | /abc/ | / | / |
/abc/ | /abc/x | / | /x |
Defines if HAProxy should work in TCP proxy mode and leave the SSL offload to the backend. SSL passthrough is a per domain configuration, which means that other domains can be configured to SSL offload on HAProxy.
If using SSL passthrough, only root /
path is supported.
ingress.kubernetes.io/ssl-passthrough
: Enable ssl passthrough if defined asTrue
and the backend is expected to SSL offload the incoming traffic. The default value isFalse
, which means HAProxy should do the SSL handshake.ingress.kubernetes.io/ssl-passthrough-http-port
: Since v0.7. Optional HTTP port number of the backend. If defined, connections to the HAProxy HTTP port, default80
, is sent to that port which expects to speak plain HTTP. If not defined, connections to the HTTP port will redirect connections to the HTTPS one.
Defines which web application firewall (WAF) implementation should be used
to validate requests. Currently the only supported value is modsecurity
.
See also modsecurity-endpoints configmap option.
This annotation has no effect if the target web application firewall isn't configured.
Allows HAProxy agent checks to be defined for a backend. This is an auxiliary check that is run independently of a regular health check and can be used to control the reported status of a server as well as the weight to be used for load balancing.
NOTE: agent-check-port
must be provided for any of the agent check
options to be applied.
ingress.kubernetes.io/agent-check-port
: Defines the port on which the agent is listening. This option is required in order to use an agent check. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-agent-portingress.kubernetes.io/agent-check-addr
: Defines the address for agent checks. If omitted, the server address will be used. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-agent-checkingress.kubernetes.io/agent-check-interval
: Defines the interval between agent checks. If omitted, the default of 2 seconds will be used. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-agent-interingress.kubernetes.io/agent-check-send
: Defines a string to be sent to the agent upon connection. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-agent-send
Controls server health checks on a per-backend basis.
ingress.kubernetes.io/health-check-uri
: If specified, this changes the default TCP health into an HTTP health check. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4.2-option%20httpchkingress.kubernetes.io/health-check-addr
: Defines the address for health checks. If omitted, the server addr will be used. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-addringress.kubernetes.io/health-check-port
: Defines the port for health checks. If omitted, the server port will be used. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-portingress.kubernetes.io/health-check-interval
: Defines the interval between health checks. If omitted, the value specified in the ConfigMap will be used. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-interingress.kubernetes.io/health-check-rise-count
: The number of successful health checks that must occur before a server is marked operational. If omitted, the default value is 2. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-riseingress.kubernetes.io/health-check-fall-count
: The number of failed health checks that must occur before a server is marked as dead. If omitted, the default value is 3. See also: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-fall
If using ConfigMap to configure HAProxy Ingress, use
--configmap=<namespace>/<configmap-name>
argument on HAProxy Ingress deployment.
A ConfigMap can be created with kubectl create configmap
.
The following parameters are supported:
[0]
only inv0.8
(snapshot
)[1]
only inv0.9
(master
)
Name | Type | Default | |
---|---|---|---|
backend-check-interval |
time with suffix | 2s |
|
backend-server-slots-increment |
number of slots | 32 |
|
balance-algorithm |
algorithm name | roundrobin |
|
bind-ip-addr-healthz |
IP address | * |
|
bind-ip-addr-http |
IP address | * |
|
bind-ip-addr-stats |
IP address | * |
|
bind-ip-addr-tcp |
IP address | * |
|
config-frontend |
multiline HAProxy frontend config | ||
[0] |
config-defaults |
multiline HAProxy config for the defaults section | |
config-global |
multiline HAProxy global config | ||
cookie-key |
secret key | Ingress |
|
dns-accepted-payload-size |
number | 8192 |
|
dns-cluster-domain |
cluster name | cluster.local |
|
dns-hold-obsolete |
time with suffix | 0s |
|
dns-hold-valid |
time with suffix | 1s |
|
dns-resolvers |
multiline resolver=ip[:port] | `` | |
dns-timeout-retry |
time with suffix | 1s |
|
drain-support |
[true|false] | false |
|
[0] |
drain-support-redispatch |
[true|false] | true |
dynamic-scaling |
[true|false] | false |
|
forwardfor |
[add|ignore|ifmissing] | add |
|
healthz-port |
port number | 10253 |
|
hsts |
[true|false] | true |
|
hsts-include-subdomains |
[true|false] | false |
|
hsts-max-age |
number of seconds | 15768000 |
|
hsts-preload |
[true|false] | false |
|
http-log-format |
http log format | HAProxy default log format | |
http-port |
port number | 80 |
|
https-log-format |
https(tcp) log format|default |
do not log | |
https-port |
port number | 443 |
|
https-to-http-port |
port number | 0 (do not listen) | |
load-server-state (experimental) |
[true|false] | false |
|
max-connections |
number | 2000 |
|
modsecurity-endpoints |
comma-separated list of IP:port (spoa) | no waf config | |
modsecurity-timeout-hello |
time with suffix | 100ms |
|
modsecurity-timeout-idle |
time with suffix | 30s |
|
modsecurity-timeout-processing |
time with suffix | 1s |
|
nbproc-ssl |
number of process | 0 |
|
nbthread |
number of threads | 1 |
|
no-tls-redirect-locations |
comma-separated list of url | /.well-known/acme-challenge |
|
proxy-body-size |
number of bytes | unlimited | |
[0] |
slots-min-free |
minimum number of free slots | 0 |
[1] |
ssl-cipher-suites |
colon-separated list | see description |
ssl-ciphers |
colon-separated list | see description | |
ssl-dh-default-max-size |
number | 1024 |
|
ssl-dh-param |
namespace/secret name | no custom DH param | |
[0] |
ssl-engine |
OpenSSL engine name and parameters | no engine set |
ssl-headers-prefix |
prefix | X-SSL |
|
[0] |
ssl-mode-async |
[true|false] | false |
ssl-options |
space-separated list | no-sslv3 no-tls-tickets |
|
ssl-redirect |
[true|false] | true |
|
stats-auth |
user:passwd | no auth | |
stats-port |
port number | 1936 |
|
stats-proxy-protocol |
[true|false] | false |
|
stats-ssl-cert |
namespace/secret name | no ssl/plain http | |
strict-host |
[true|false] | true |
|
syslog-endpoint |
IP:port (udp) | do not log | |
[0] |
syslog-format |
rfc5424|rfc3164 | rfc5424 |
[1] |
syslog-length |
max length of log line | 1024 |
[0] |
syslog-tag |
syslog tag field string | ingress |
tcp-log-format |
tcp log format | HAProxy default log format | |
timeout-client |
time with suffix | 50s |
|
timeout-client-fin |
time with suffix | 50s |
|
timeout-connect |
time with suffix | 5s |
|
timeout-http-request |
time with suffix | 5s |
|
timeout-keep-alive |
time with suffix | 1m |
|
timeout-queue |
time with suffix | 5s |
|
timeout-server |
time with suffix | 50s |
|
timeout-server-fin |
time with suffix | 50s |
|
timeout-stop |
time with suffix | no timeout | |
timeout-tunnel |
time with suffix | 1h |
|
tls-alpn |
TLS ALPN advertisement | h2,http/1.1 |
|
[1] |
use-htx |
[true|false] | false |
use-proxy-protocol |
[true|false] | false |
|
[0] |
var-namespace |
[true|false] | false |
Define a load balancing algorithm. Use a configmap option to define a default value, and an ingress annotation to define a per backend configuration.
Global configmap option:
balance-algorithm
: algorithm name, default value isroundrobin
Annotation on ingress resources:
ingress.kubernetes.io/balance-algorithm
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-balance
Define the interval between TCP health checks to the backend using inter
option.
Default value is 2s
- two seconds between two consecutive checks. Configure an
empty string to disable health checks.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-inter
Define listening IPv4/IPv6 address on several HAProxy frontends. All IP addresses defaults to IPv4 *
if not declared.
bind-ip-addr-tcp
: IP address of all TCP services declared on tcp-services
configmap option.
bind-ip-addr-http
: IP address of all HTTP/s frontends, port :80
and :443
, and also https-to-http-port
if declared.
bind-ip-addr-healthz
: IP address of the health check URL. See also healthz-port
.
bind-ip-addr-stats
: IP address of the statistics page. See also stats-port
.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-bind
Add HAProxy configuration snippet to the configuration file. Use multiline content to add more than one line of configuration.
Examples - configmap:
config-global: |
tune.bufsize 32768
config-defaults: |
option redispatch
config-frontend: |
capture request header X-User-Id len 32
Ingress annotation:
annotations:
ingress.kubernetes.io/config-backend: |
acl bar-url path /bar
http-request deny if bar-url
Global configmap options:
config-global
: Add configuration snippet to the end of the global section.config-defaults
: Add configuration snippet to the end of the defaults section.config-frontend
: Add configuration snippet to all frontend sections.
Annotation option:
ingress.kubernetes.io/config-backend
: Add configuration snippet to the HAProxy backend section.
Define a secret key used with the IP address and port number of a backend server to dynamically create a cookie to that server. Only useful on cookie based server affinity. See also affinity annotations.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#dynamic-cookie-key
Configure dynamic backend server update using DNS service discovery.
Global configmap options:
dns-resolvers
: Multiline list of DNS resolvers inresolvername=ip:port
formatdns-accepted-payload-size
: Maximum payload size announced to the name serversdns-timeout-retry
: Time between two consecutive queries when no valid response was received, defaults to1s
dns-hold-valid
: Time a resolution is considered valid. Keep in sync with DNS cache timeout. Defaults to1s
dns-hold-obsolete
: Time to keep valid a missing IP from a new DNS query, defaults to0s
dns-cluster-domain
: K8s cluster domain, defaults tocluster.local
Annotations on ingress resources:
ingress.kubernetes.io/use-resolver
: Name of the resolver that the backend should use
Important advices!
- Use resolver with headless services, see k8s doc, otherwise HAProxy will reference the service IP instead of the endpoints.
- Beware of DNS cache, eg kube-dns has
--max-ttl
and--max-cache-ttl
to change its default cache of30s
.
See also the example page.
Reference:
- https://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.3.2
- https://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-resolvers
- https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
- https://kubernetes.io/docs/concepts/services-networking/service/#headless-services
The dynamic-scaling
option defines if backend updates should be made starting a
new HAProxy instance that will read the new config file (false
), or updating the
running HAProxy via a Unix socket (true
). Despite the configuration, the config
file will stay in sync with in memory config.
If true
HAProxy Ingress will create at least backend-server-slots-increment
servers on each backend and update them via a Unix socket without reloading HAProxy.
Unused servers will stay in a disabled state.
Starting on v0.6, dynamic-scaling
config will only force a reloading of HAProxy if
the number of servers on a backend need to be increased. Before v0.6 a reload will
also happen when the number of servers could be reduced.
Starting on v0.8, a new configmap option slots-min-free
can be used to configure the
minimum number of free/empty servers per backend. If HAProxy need to be restarted and
an backend has less than slots-min-free
available servers, another
backend-server-slots-increment
new empty servers would be created.
Global configmap options:
dynamic-scaling
: Define if dynamic scaling should be used whenever possiblebackend-server-slots-increment
: Configures the minimum number of servers, the size of the increment when growing and the size of the decrement when shrinking of each HAProxy backendslots-min-free
: Configures the minimum number of empty servers a backend should have on every HAProxy restarts
Annotations on ingress resources:
ingress.kubernetes.io/slots-increment
: A per backend slot increment
http://cbonte.github.io/haproxy-dconv/1.9/management.html#9.3
Define if X-Forwarded-For
header should be added always, added if missing or
ignored from incoming requests. Default is add
which means HAProxy will itself
generate a X-Forwarded-For
header with client's IP address and remove this same
header from incoming requests.
Use ignore
to skip any check. ifmissing
should be used to add
X-Forwarded-For
with client's IP address only if this header is not defined.
Only use ignore
or ifmissing
on trusted networks.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-option%20forwardfor
Define the port number HAProxy should listen to in order to answer for health checking
requests. Use /healthz
as the request path.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-monitor-uri
Configure global (configmap) or per host or location (annotation) HSTS - HTTP Strict Transport Security. Annotations has precedence over global configuration.
Global configmap options:
hsts
:true
if HSTS response header should be addedhsts-include-subdomains
:true
if it should apply to subdomains as wellhsts-max-age
: time in seconds the browser should remember this configurationhsts-preload
:true
if the browser should include the domain to HSTS preload list
Annotations on ingress resources:
ingress.kubernetes.io/hsts
ingress.kubernetes.io/hsts-include-subdomains
ingress.kubernetes.io/hsts-max-age
ingress.kubernetes.io/hsts-preload
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
A port number to listen http requests from another load balancer that does the ssl offload.
How it works: HAProxy will define if the request came from a HTTPS connection reading the
X-Forwarded-Proto
HTTP header or the port number the client used to connect. If the
header is https
or the port number matches https-to-http-port
, HAProxy will behave
just like itself did the ssl offload: HSTS header will be provided if configured and no
https redirect will be done. There is only one exception: if https-to-http-port
is 80
,
only the header will be checked.
The X-Forwarded-Proto
header is optional in the following condition:
- The
https-to-http-port
should not match HTTP port80
; and - The load balancer should connect to the same
https-to-http-port
number, eg cannot have any proxy like Kubernetes'NodePort
between the load balancer and HAProxy
Define if HAProxy should save and reload it's current state between server reloads, like uptime of backends, qty of requests and so on.
This is an experimental feature and has currently some issues if using with dynamic-scaling
:
an old state with disabled servers will disable them in the new configuration.
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-server-state-file
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-load-server-state-from-file
Customize the tcp, http or https log format using log format variables. Only used if syslog-endpoint is also configured.
tcp-log-format
: log format of TCP proxies, defaults to HAProxy default TCP log format. See also TCP services configmap command-line option.http-log-format
: log format of all HTTP proxies, defaults to HAProxy default HTTP log format.https-log-format
: log format of TCP proxy used to inspect SNI extention. Usedefault
to configure default TCP log format, defaults to not log.
https://cbonte.github.io/haproxy-dconv/1.9/configuration.html#8.2.4
Define the maximum number of concurrent connections on all proxies.
Defaults to 2000
connections, which is also the HAProxy default configuration.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.2-maxconn
Configure a comma-separated list of IP:port
of HAProxy agents (SPOA) for ModSecurity.
The default configuration expects the contrib/modsecurity
implementation from HAProxy source code.
Currently all http requests will be parsed by the ModSecurity agent, even if the ingress resource wasn't configured to deny requests based on ModSecurity response.
See also:
- modsecurity config options
ingress.kubernetes.io/waf
annotation- example page
Reference:
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#9.3
- https://www.haproxy.org/download/1.9/doc/SPOE.txt
- https://github.com/jcmoraisjr/modsecurity-spoa
Configure modsecurity agent. These options only have effect if ModSecurity is configured.
See also modsecurity-endpoints
configmap option and
ingress.kubernetes.io/waf
annotation.
Global configmap options:
-
modsecurity-timeout-hello
: Defines the maximum time to wait for the AGENT-HELLO frame from the agent. Default value is100ms
. -
modsecurity-timeout-idle
: Defines the maximum time to wait before close an idle connection. Default value is30s
. -
modsecurity-timeout-processing
: Defines the maximum time to wait for the whole ModSecurity processing. Default value is1s
.
Define the number of dedicated HAProxy process to the SSL/TLS handshake and offloading. The default value is 0 (zero) which means HAProxy should process all the SSL/TLS offloading, as well as the header inspection and load balancing within the same HAProxy process.
The recommended value depends on how much CPU a single HAProxy process is spending. Use 0 (zero) if the amount of processing has low CPU usage. This will avoid a more complex topology and an inter-process communication. Use the number of cores of a dedicated host minus 1 (one) to distribute the SSL/TLS offloading process. Leave one core dedicated to header inspection and load balancing.
If splitting HAProxy into two or more process and the number of threads is one,
cpu-map
is used to bind each process on its own CPU core.
See also nbthread.
nbproc-ssl
: number of dedicated process to SSL/TLS offloading
Referece:
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-nbproc
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#4-bind-process
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-cpu-map
Define the number of threads a single HAProxy process should use to all its processing. If using with nbproc, every single HAProxy process will share this same configuration.
If using two or more threads on a single HAProxy process, cpu-map
is used to
bind each thread on its own CPU core.
Note that multithreaded process is a HAProxy experimental feature!
Reference:
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-nbthread
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-cpu-map
Define a comma-separated list of URLs that should be removed from the TLS redirect.
Requests to :80
http port and starting with one of the URLs from the list will
not be redirected to https despite of the TLS redirect configuration.
This option defaults to /.well-known/acme-challenge
, used by ACME protocol.
Define the maximum number of bytes HAProxy will allow on the body of requests. Default is to not check, which means requests of unlimited size. This limit can be changed per ingress resource.
Since 0.4 a suffix can be added to the size, so 10m
means
10 * 1024 * 1024
bytes. Supported suffix are: k
, m
and g
.
Since 0.7 unlimited
can be used to overwrite any global body size limit.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#7.3.6-req.body_size
Set the list of cipher algorithms used during the SSL/TLS handshake.
Configmap options:
ssl-cipher-suites
: Cipher suites on TLS v1.3 handshakessl-ciphers
: Cipher suites on TLS up to v1.2 handshakessl-cipher-suites-backend
: Default cipher suites on TLS v1.3 handshake to backend serversssl-ciphers-backend
: Default cipher suites on TLS up to v1.2 handshake to backend servers
Annotations:
ingress.kubernetes.io/ssl-cipher-suites-backend
: Per backend configuration of cipher suites on TLS v1.3 handshake, defaults to the configmap configurationingress.kubernetes.io/ssl-ciphers-backend
: Per backend configuration of cipher suites on TLS up to v1.2 handshake, defaults to the configmap configuration
Default values on HAProxy Ingress v0.9 and newer:
- TLS up to v1.2:
ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
- TLS v1.3:
TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256
Default value on HAProxy Ingress up to v0.8:
- TLS up to v1.2:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
See also:
- https://ssl-config.mozilla.org/#server=haproxy
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-ssl-default-bind-ciphers
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-ssl-default-bind-ciphersuites
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-ciphers
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.2-ciphersuites
Define the maximum size of a temporary DH parameters used for key exchange.
Only used if ssl-dh-param
isn't provided.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#tune.ssl.default-dh-param
Define DH parameters file used on ephemeral Diffie-Hellman key exchange during the SSL/TLS handshake.
When stored locally, the DH secret may look like:
-----BEGIN DH PARAMETERS-----
MIICCAKCAgEAg9dDI+Z1dk7A0ctnFqPuS2cq8lIQLc36nvaLE5zcbI5IfiyxmxNh
...
-----END DH PARAMETERS-----
To create your secret you can define the secret with a template and a base64 encoded copy of the DH parameter, or you can generate the secret with:
kubectl create secret generic ingress-dh-param --from-file dhparam.pem
Then, in the haproxy ingress configuration, ssl-dh-param
should reference the
resulting secret.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-ssl-dh-param-file
Set the name of the OpenSSL engine to use. The string shall include the engine name and its parameters.
Additionally, ssl-mode-async
can be set to enable asynchronous TLS I/O operations if
the ssl-engine used supports it.
Reference:
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#ssl-engine
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#ssl-mode-async
Define the http header prefix that should be used with certificate parameters such as
DN and SHA1 on client cert authentication. The default value is X-SSL
which
will create a X-SSL-Client-DN
header with the DN of the certificate.
Since RFC 6648 X-
prefix on unstandardized
headers changed from a convention to deprecation. This configuration allows to
select which pattern should be used on SSL/TLS headers.
Define a space-separated list of options on SSL/TLS connections.
Configmap options:
ssl-options
: Options for frontend connections - HAProxy being the serverssl-options-backend
: Default options for backend server connections - HAProxy being the client
Annotation:
ingress.kubernetes.io/ssl-options-backend
: Per backend options, defaults to the global configmap configuration
Available SSL options:
force-sslv3
: Enforces use of SSLv3 onlyforce-tlsv10
: Enforces use of TLSv1.0 onlyforce-tlsv11
: Enforces use of TLSv1.1 onlyforce-tlsv12
: Enforces use of TLSv1.2 onlyforce-tlsv13
: Enforces use of TLSv1.3 onlyno-sslv3
: Disables support for SSLv3no-tls-tickets
: Enforces the use of stateful session resumptionno-tlsv10
: Disables support for TLSv1.0no-tlsv11
: Disables support for TLSv1.1no-tlsv12
: Disables support for TLSv1.2no-tlsv13
: Disables support for TLSv1.3ssl-max-ver <SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3>
: Enforces the use of a SSL/TLS version or lowerssl-min-ver <SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3>
: Enforces the use of a SSL/TLS version or upper
A global configuration of SSL redirect used as default value if ingress resource
doesn't use ssl-redirect
annotation. If true HAProxy Ingress sends a 302 redirect
to https if TLS is configured.
Configurations of the HAProxy statistics page:
stats-auth
: Enable basic authentication with clear-text password -<user>:<passwd>
stats-port
: Change the port HAProxy should listen to requestsstats-proxy-protocol
: Define if the stats endpoint should enforce the PROXY protocolstats-ssl-cert
: Optional namespace/secret-name oftls.crt
andtls.key
pair used to enable SSL on stats page. Plain http will be used if not provided, the secret wasn't found or the secret doesn't have a crt/key pair.
Defines whether the path of another matching host/FQDN should be used to try
to serve a request. The default value is true
, which means a strict
configuration and the default-backend
should be used if a path couldn't be
matched. If false
, all matching wildcard hosts will be visited in order to
try to match the path.
Using the following configuration:
spec:
rules:
- host: my.domain.com
http:
paths:
- path: /a
backend:
serviceName: svc1
servicePort: 8080
- host: *.domain.com
http:
paths:
- path: /
backend:
serviceName: svc2
servicePort: 8080
A request to my.domain.com/b
would serve:
default-backend
ifstrict-host
is true, the default valuesvc2
ifstrict-host
is false
Configure the UDP syslog endpoint where HAProxy should send access logs.
Configure the log format to be either rfc5424 ( default ) or rfc3164
Configure the maximum length of the log line. Defaults to 1024
if not declared.
Log lines larger than this will be truncated before sent.
http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-log
Configure the tag field in the syslog header to the supplied string. See: http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#3.1-log-tag
Define timeout configurations:
timeout-client
: Maximum inactivity time on the client sidetimeout-client-fin
: Maximum inactivity time on the client side for half-closed connections - FIN_WAIT statetimeout-connect
: Maximum time to wait for a connection to a backendtimeout-http-request
: Maximum time to wait for a complete HTTP requesttimeout-keep-alive
: Maximum time to wait for a new HTTP request on keep-alive connectionstimeout-queue
: Maximum time a connection should wait on a server queue before return a 503 error to the clienttimeout-server
: Maximum inactivity time on the backend sidetimeout-server-fin
: Maximum inactivity time on the backend side for half-closed connections - FIN_WAIT statetimeout-stop
: Maximum time to wait for long lived connections to finish, eg websocket, before hard-stop a HAProxy process due to a reloadtimeout-tunnel
: Maximum inactivity time on the client and backend side for tunnels
Reference:
Defines the TLS ALPN extension advertisement. The default value is h2,http/1.1
which enables
HTTP/2 on the client side.
Defines if the new HTX internal representation for HTTP elements should be used. The default value
is false
. HTX should be used to enable HTTP/2 protocol to backends.
Define if HAProxy is behind another proxy that use the PROXY protocol. If true
, ports
80
and 443
will enforce the PROXY protocol.
The stats endpoint (defaults to port 1936
) has it's own stats-proxy-protocol
configuration.
- http://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.1-accept-proxy
- http://www.haproxy.org/download/1.9/doc/proxy-protocol.txt
If var-namespace
is configured as true
, a HAProxy var txn.namespace
is created with the
kubernetes namespace owner of the service which is the target of the request. This variable is
useful on http logs. The default value is false
. Usage: k8s-namespace: %[var(txn.namespace)]
.
See also http-log.
Set to true if you wish to use HAProxy's drain support for pods that are NotReady (e.g., failing a k8s readiness check) or are in the process of terminating. This option only makes sense with cookie affinity configured as it allows persistent traffic to be directed to pods that are in a not ready or terminating state.
By default, sessions will be redispatched on a failed upstream connection once the target pod is terminated.
You can control this behavior by setting drain-support-redispatch
flag to false
to instead return a 503 failure.
The following command-line arguments are supported:
[0]
only inv0.8
(beta
)
Name | Type | Default | |
---|---|---|---|
allow-cross-namespace |
[true|false] | false |
|
[0] |
annotation-prefix |
prefix without / |
ingress.kubernetes.io |
default-backend-service |
namespace/servicename | (mandatory) | |
default-ssl-certificate |
namespace/secretname | (mandatory) | |
ingress-class |
name | haproxy |
|
kubeconfig |
/path/to/kubeconfig | in cluster config | |
max-old-config-files |
num of files | 0 |
|
publish-service |
namespace/servicename | `` | |
rate-limit-update |
uploads per second (float) | 0.5 |
|
reload-strategy |
[native|reusesocket] | native |
|
sort-backends |
[true|false] | false |
|
tcp-services-configmap |
namespace/configmapname | no tcp svc | |
verify-hostname |
[true|false] | true |
|
wait-before-shutdown |
seconds as integer | 0 |
|
watch-namespace |
namespace | all namespaces |
--allow-cross-namespace
argument, if added, will allow reading secrets from one namespace to an
ingress resource of another namespace. The default behavior is to deny such cross namespace reading.
This adds a breaking change from v0.4
to v0.5
on ingress.kubernetes.io/auth-tls-secret
annotation, where cross namespace reading were allowed without any configuration.
Changes the annotation prefix the controller should look for when parsing services and ingress
objects. The default value is ingress.kubernetes.io
if not declared, which means SSL Redirect
should be configured with the annotation name ingress.kubernetes.io/ssl-redirect
. Annotations
with other prefix are ignored. This allows using HAProxy Ingress with other ingress controllers
that shares ingress and service objects without conflicting each other.
Defines the namespace/servicename
that should be used if the incoming request doesn't match any
hostname, or the requested path doesn't match any location within the desired hostname.
This is a mandatory argument used in the deployment example page.
Defines the namespace/secretname
of the default certificate that should be used if ingress
resources using TLS configuration doesn't provide it's own certificate.
This is a mandatory argument used in the deployment and TLS termination example pages.
More than one ingress controller is supported per Kubernetes cluster. The --ingress-class
argument allow to override the class name of ingress resources that this instance of the
controller should listen to. Class names that match will be used in the HAProxy configuration.
Other classes will be ignored.
The ingress resource must use the kubernetes.io/ingress.class
annotation to name it's
ingress class.
Ingress controller will try to connect to the Kubernetes master using environment variables and a
service account. This behavior can be changed using --kubeconfig
argument that reference a
kubeconfig file with master endpoint and credentials. This is a mandatory argument if the controller
is deployed outside of the Kubernetes cluster.
Everytime a configuration change need to update HAProxy, a configuration file is rewritten even if
dynamic update is used. By default the same file is recreated and the old configuration is lost.
Use --max-old-config-files
to configure after how much files Ingress controller should start to
remove old configuration files. If 0
, the default value, a single haproxy.cfg
is used.
Some infrastructure tools like external-DNS
relay in the ingress status to created access routes to the services exposed with ingress object.
apiVersion: extensions/v1beta1
kind: Ingress
...
status:
loadBalancer:
ingress:
- hostname: <ingressControllerLoadbalancerFQDN>
Use --publish-service=namespace/servicename
to indicate the services fronting the ingress controller. The controller mirrors the address of this service's endpoints to the load-balancer status of all Ingress objects it satisfies.
Use --rate-limit-update
to change how much time to wait between HAProxy reloads. Note that the first
update is always immediate, the delay will only prevent two or more updates in the same time frame.
Moreover reloads will only occur if the cluster configuration has changed, otherwise no reload will
occur despite of the rate limit configuration.
This argument receives the allowed reloads per second. The default value is 0.5
which means no more
than one reload will occur within 2
seconds. The lower limit is 0.05
which means one reload within
20
seconds. The highest one is 10
which will allow ingress controller to reload HAProxy up to 10
times per second.
The --reload-strategy
command-line argument is used to select which reload strategy
HAProxy should use. The following options are available:
native
: Uses native HAProxy reload option-sf
. This is the default option.reusesocket
: (starting on v0.6) Uses HAProxy-x
command-line option to pass the listening sockets between old and new HAProxy process, allowing hitless reloads.multibinder
: (deprecated on v0.6) Uses GitHub's multibinder. This link describes how it works.
Ingress will randomly shuffle backends and server endpoints on each reload in order to avoid
requesting always the same backends just after reloads, depending on the balancing algorithm.
Use --sort-backends
to avoid this behavior and always declare backends and upstream servers
in the same order.
Configure --tcp-services-configmap
argument with namespace/configmapname
resource with TCP
services and ports that HAProxy should listen to. Use the HAProxy's port number as the key of the
configmap.
The value of the configmap entry is a colon separated list of the following items:
<namespace>/<service-name>
, mandatory, is the well known notation of the service that will receive incoming connections.<portnumber>
, mandatory, is the port number the upstream service is listening - this is not related to the listening port of HAProxy.<in-proxy>
, optional, should be defined asPROXY
if HAProxy should expect requests using the PROXY protocol. Leave empty to not use PROXY protocol. This is usually used only if there is another load balancer in front of HAProxy which supports the PROXY protocol. PROXY protocol v1 and v2 are supported.<out-proxy>
, optional, should be defined asPROXY
orPROXY-V2
if the upstream service expect connections using the PROXY protocol v2. UsePROXY-V1
instead if the upstream service only support v1 protocol. Leave empty to connect without using the PROXY protocol.<namespace/secret-name>
, optional, used to configure SSL/TLS over the TCP connection. Secret should havetls.crt
andtls.key
pair used on TLS handshake. Leave empty to not use ssl-offload.
Optional fields should be skipped using two consecutive colons.
In the example below:
...
data:
"5432": "default/pgsql:5432"
"8000": "system-prod/http:8000::PROXY-V1"
"9900": "system-prod/admin:9900:PROXY::system-prod/tcp-9900"
"9990": "system-prod/admin:9999::PROXY-V2"
"9999": "system-prod/admin:9999:PROXY:PROXY"
HAProxy will listen 5 new ports:
5432
will proxy to apgsql
service ondefault
namespace.8000
will proxy tohttp
service, port8000
, on thesystem-prod
namespace. The upstream service will expect connections using the PROXY protocol but it only supports v1.9900
will proxy toadmin
service, port9900
, on thesystem-prod
namespace. Clients should connect using the PROXY protocol v1 or v2. Upcoming connections should be encrypted, HAProxy will ssl-offload data using crt/key provided bysystem-prod/tcp-9900
secret.9990
and9999
will proxy to the sameadmin
service and9999
port and the upstream service will expect connections using the PROXY protocol v2. The HAProxy frontend, however, will only expect PROXY protocol v1 or v2 on it's port9999
.
Ingress resources has spec/tls[]/secretName
attribute to override the default X509 certificate.
As a default behavior the certificates are validated against the hostname in order to match the
SAN extension or CN (CN only up to v0.4
). Invalid certificates, ie certificates which doesn't
match the hostname are discarded and a warning is logged into the ingress controller logging.
Use --verify-hostname=false
argument to bypass this validation. If used, HAProxy will provide
the certificate declared in the secretName
ignoring if the certificate is or is not valid.
If argument --wait-before-shutdown
is defined, controller will wait defined time in seconds
before it starts shutting down components when SIGTERM was received. By default, it's 0, which means
the controller starts shutting down itself right after signal was sent.
By default the proxy will be configured using all namespaces from the Kubernetes cluster. Use
--watch-namespace
with the name of a namespace to watch and build the configuration of a
single namespace.
Contact us through the mailing list:
- Mailing list: [email protected] (no need to be subscribed)
- Subscribe: here or send an empty email to [email protected]
- Archive: https://groups.google.com/d/forum/haproxy-ingress
- Unsubscribe: here or send an empty email to [email protected]