AWS EKS Kubernetes Fargate Ingress Controller ALB Certificate

Jan 1, 0001 Gethugothemes

Wow that title is a mouthful!

It took me a little time to figure out how to setup the certificate on EKS/Fargate in AWS. I was following this tutorial from the docs.

  • Be sure to click the “Fargate” part of the tuorial half-way down the page to curl in the 2048-ingress.yaml below.

After delegating my subdomain to AWS, I then setup a cert in ACM, and modified the 2048-ingress.yaml as follows:

apiVersion: extensions/v1beta1
kind: Ingress
  name: "2048-ingress"
  namespace: "2048-game"
  annotations: alb internet-facing ip
    # Substitue your arn info below arn:aws:acm:us-east-1:XXXXXXXX:certificate/XXXXXXXX '[{"HTTP": 80}, {"HTTPS":443}]' '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_301"}}'

    app: 2048-ingress
    - http:
          - path: /*
              serviceName: "service-2048"
              servicePort: 80

et voila:

et voila

Similar Posts

OpenBSD PF and OpenDNS

At home, I needed a way to prevent anything but OpenDNS from being used for DNS, and needed a rule that would do it in OpenBSD PF. Install and Configure First off, to setup an OpenDNS client on OpenBSD, install the ddclient package via pkg_add ddclient