Kubernetes and DC / OS are a powerful combination to serve applications that create a great customer experience. After microservices-based container applications up and running, you'll need to expose them to the outside world. This blog post describes several different ways to do this and provide detailed instructions for applying the entry controller.
Ingress plentiful options
Kubernetes deal with East-West connectivity for internal services within the cluster Kubernetes to assign internal IP cluster are accessible to all services in the cluster. When it comes to the external, or the North-South, connectivity, there are a number of different methods we can use to achieve this. You can know more about ingress controllers for Kubernetes through https://kubevious.io/blog/post/comparing-top-ingress-controllers-for-kubernetes.
First, we can determine the type of NodePort Service. It exposes the service on a static port on each node's IP. Any traffic that is sent to a port on the node forwarded to the relevant services.
Image Source: Google
For platforms that support it, such as AWS or GCP, we can define load balancer services, which will configure external load balancer special for our services. While this works well on the cloud platform, it can also be very expensive, as we may end up with a lot of load balancing services.
An Ingress Controller can sit in front of many services in our cluster, routing traffic to them, and depends on the implementation, also can add functionality such as SSL termination, rewrites the road, or a name-based virtual host. From an architectural perspective, the entry controller generally integrated automation layer with backend proxy service and generally can operate in both layer 4 and layer 7.
There is a growing ecosystem of controlling the influx, some well-known harness load balancers and proxy, and some implementations of the cloud-new original. There controllers for most of the inclusion of familiar tools in this space, such as HAProxy and Nginx, along with new Kubernetes native implementation as Ambassador and Contour, which both utilize the proxy envoy.