You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/Ingress.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,9 @@ For Ingress we recommend using separate ports for encrypted and non-encrypted tr
44
44
#### Indexer Discovery is not supported
45
45
Indexer Discovery is not supported on a Kubernetes cluster. Instead, the Ingress controllers will be responsible to connect forwarders to peer nodes in Indexer clusters.
46
46
47
+
#### Sticky Sessions
48
+
When configuring the ingress configuration, it is important to ensure that the session is sticky to the Splunk specific instance. This is required for Splunk to work properly since otherwise, a blank page might be experienced when trying to access the Splunk instances. The examples below show how to configure this using Istio and Nginx Ingress controllers.
49
+
47
50
48
51
## Configuring Ingress Using Istio
49
52
@@ -451,6 +454,9 @@ Note that the Virtual Service no longer handles TLS since it has been terminated
451
454
452
455
##### Documentation tested on Istio v1.8 and Kubernetes v1.17
453
456
457
+
### Sticky Sessions
458
+
Follow [Istio Sticky Sessions Documentation](https://istio.io/latest/docs/reference/config/networking/destination-rule/#LoadBalancerSettings) to learn how to configure session stickiness for Istio.
459
+
454
460
## Note on Service Mesh and Istio
455
461
456
462
Istio is a popular choice for its Service Mesh capabilities. However, Service Mesh for Splunk instances are only supported on Istio v1.8 and above, along with Kubernetes v1.19 and above. At the time of this documentation, neither Amazon AWS nor Google Cloud have updated their stack to these versions.
@@ -667,6 +673,9 @@ spec:
667
673
668
674
##### Documentation tested on Ingress Nginx v1.19.4 and Kubernetes v1.17
669
675
676
+
### Sticky Sessions
677
+
Follow [Ingress Nginx Sticky Sessions Documentation](https://kubernetes.github.io/ingress-nginx/examples/affinity/cookie/) to learn how to configure session stickiness for the Ingress Nginx controller.
678
+
670
679
## Configuring Ingress Using NGINX Ingress Controller (Nginxinc)
671
680
672
681
The Nginx Ingress Controller is an open source version of the F5 product. Please review their documentation below for more details.
@@ -863,6 +872,10 @@ spec:
863
872
864
873
##### Documentation tested on Nginx Ingress Controller v1.9.0 and Kubernetes v1.18
865
874
875
+
### Sticky Sessions
876
+
Follow [Nginx Ingress Controller Sticky Sessions Documentation](https://github.com/nginx/kubernetes-ingress/tree/main/examples/ingress-resources/session-persistence) to learn how to configure session stickiness for Nginx Ingress Controller.
877
+
878
+
866
879
## Using Let's Encrypt to manage TLS certificates
867
880
868
881
If you are using [cert-manager](https://docs.cert-manager.io/en/latest/getting-started/) with [Let’s Encrypt](https://letsencrypt.org/) to manage your TLS certificates in Kubernetes, this example Ingress object can be used to enable secure (TLS) access to all Splunk components from outside of your Kubernetes cluster:
aws iam create-role --role-name ${rolename} --assume-role-policy-document file://aws-ebs-csi-driver-trust-policy.json --description "irsa role for ${TEST_CLUSTER_NAME}"
124
124
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy --role-name ${rolename}
0 commit comments