-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: Add deployment for AWS NLB Proxy. #9565
docs: Add deployment for AWS NLB Proxy. #9565
Conversation
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @HenItzhaki. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
@HenItzhaki: Cannot trigger testing until a trusted user reviews the PR and leaves an In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@HenItzhaki thanks for the PR. It is likely that this will help users who terminate TLS on the LB instead of the controller. But there is no details in the description of the issue and that is not helpful to someone else looking at this. Please help out and create a issue where you describe what the current problem is, with data. Then you could add details in the description of this PR as to how this specific new deploy.yaml and kustomize file solve that problem. I think highlighting the diff from the "normal" cloud user yaml and comments on TLS termination on provider, specifics, would help a lot. |
seems duplicate of #9564 |
@longwuyuan should this be closed ? |
@HenItzhaki thanks for this contribution.
|
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: HenItzhaki, rikatz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold @longwuyuan can you provide some feedback here? Thanks! |
We'll probably need to revert this for several reasons:
So in the long run we should rather try to reduce the amount of static files. Also because cloud providers change from time to time. The load balancer type references in the service annotations e.g. has been replaced by the |
Also this PR is not adding the newly generated file to the docs, so people would only find it by browsing the source code. |
My hold was slower than tide, sorry :/ |
What this PR does / why we need it:
Types of changes
Which issue/s this PR fixes
How Has This Been Tested?
Checklist:
Does my pull request need a release note?
Any user-visible or operator-visible change qualifies for a release note. This could be a:
No release notes are required for changes to the following:
For more tips on writing good release notes, check out the Release Notes Handbook