Remove mention of nginx-ingress default-backend from docs
* Default backend was removed in 170ef74eea
This commit is contained in:
parent
68377a61f8
commit
034a1a9d40
|
@ -6,7 +6,7 @@ Nginx Ingress controller pods accept and demultiplex HTTP, HTTPS, TCP, or UDP tr
|
||||||
|
|
||||||
On AWS, a network load balancer (NLB) distributes TCP traffic across two target groups (port 80 and 443) of worker nodes running an Ingress controller deployment. Security groups rules allow traffic to ports 80 and 443. Health checks ensure only workers with a healthy Ingress controller receive traffic.
|
On AWS, a network load balancer (NLB) distributes TCP traffic across two target groups (port 80 and 443) of worker nodes running an Ingress controller deployment. Security groups rules allow traffic to ports 80 and 443. Health checks ensure only workers with a healthy Ingress controller receive traffic.
|
||||||
|
|
||||||
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, default backend, and namespace.
|
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, and namespace.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl apply -R -f addons/nginx-ingress/aws
|
kubectl apply -R -f addons/nginx-ingress/aws
|
||||||
|
@ -39,7 +39,7 @@ resource "google_dns_record_set" "some-application" {
|
||||||
|
|
||||||
On Azure, a load balancer distributes traffic across a backend address pool of worker nodes running an Ingress controller deployment. Security group rules allow traffic to ports 80 and 443. Health probes ensure only workers with a healthy Ingress controller receive traffic.
|
On Azure, a load balancer distributes traffic across a backend address pool of worker nodes running an Ingress controller deployment. Security group rules allow traffic to ports 80 and 443. Health probes ensure only workers with a healthy Ingress controller receive traffic.
|
||||||
|
|
||||||
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, default backend, and namespace.
|
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, and namespace.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl apply -R -f addons/nginx-ingress/azure
|
kubectl apply -R -f addons/nginx-ingress/azure
|
||||||
|
@ -74,7 +74,7 @@ On bare-metal, routing traffic to Ingress controller pods can be done in number
|
||||||
|
|
||||||
### Equal-Cost Multi-Path
|
### Equal-Cost Multi-Path
|
||||||
|
|
||||||
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, and default backend. The service should use a fixed ClusterIP (e.g. 10.3.0.12) in the Kubernetes service IPv4 CIDR range.
|
Create the Ingress controller deployment, service, RBAC roles, and RBAC bindings. The service should use a fixed ClusterIP (e.g. 10.3.0.12) in the Kubernetes service IPv4 CIDR range.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl apply -R -f addons/nginx-ingress/bare-metal
|
kubectl apply -R -f addons/nginx-ingress/bare-metal
|
||||||
|
@ -103,7 +103,7 @@ resource "google_dns_record_set" "some-application" {
|
||||||
|
|
||||||
On Digital Ocean, DNS A and AAAA records (e.g. FQDN `nemo-workers.example.com`) resolve to each worker[^1] running an Ingress controller DaemonSet on host ports 80 and 443. Firewall rules allow IPv4 and IPv6 traffic to ports 80 and 443.
|
On Digital Ocean, DNS A and AAAA records (e.g. FQDN `nemo-workers.example.com`) resolve to each worker[^1] running an Ingress controller DaemonSet on host ports 80 and 443. Firewall rules allow IPv4 and IPv6 traffic to ports 80 and 443.
|
||||||
|
|
||||||
Create the Ingress controller daemonset, service, RBAC roles, RBAC bindings, default backend, and namespace.
|
Create the Ingress controller daemonset, service, RBAC roles, RBAC bindings, and namespace.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl apply -R -f addons/nginx-ingress/digital-ocean
|
kubectl apply -R -f addons/nginx-ingress/digital-ocean
|
||||||
|
@ -133,7 +133,7 @@ resource "google_dns_record_set" "some-application" {
|
||||||
|
|
||||||
On Google Cloud, a TCP Proxy load balancer distributes IPv4 and IPv6 TCP traffic across a backend service of worker nodes running an Ingress controller deployment. Firewall rules allow traffic to ports 80 and 443. Health check rules ensure only workers with a healthy Ingress controller receive traffic.
|
On Google Cloud, a TCP Proxy load balancer distributes IPv4 and IPv6 TCP traffic across a backend service of worker nodes running an Ingress controller deployment. Firewall rules allow traffic to ports 80 and 443. Health check rules ensure only workers with a healthy Ingress controller receive traffic.
|
||||||
|
|
||||||
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, default backend, and namespace.
|
Create the Ingress controller deployment, service, RBAC roles, RBAC bindings, and namespace.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl apply -R -f addons/nginx-ingress/google-cloud
|
kubectl apply -R -f addons/nginx-ingress/google-cloud
|
||||||
|
|
Loading…
Reference in New Issue