Nginx Ingress Integrator

  • Canonical IS DevOps
Channel Revision Published Runs on
latest/stable 131 10 Dec 2024
Ubuntu 20.04
latest/stable 130 10 Dec 2024
Ubuntu 20.04
latest/stable 101 28 May 2024
Ubuntu 20.04
latest/edge 133 18 Dec 2024
Ubuntu 22.04 Ubuntu 20.04
latest/edge 132 18 Dec 2024
Ubuntu 22.04 Ubuntu 20.04
latest/edge 109 22 Jul 2024
Ubuntu 22.04 Ubuntu 20.04
latest/edge 44 16 Nov 2022
Ubuntu 22.04 Ubuntu 20.04
v2/edge 84 09 Jan 2024
Ubuntu 20.04
juju deploy nginx-ingress-integrator
Show information

Platform:

Ubuntu
22.04 20.04

Learn about configurations >

  • additional-hostnames | string

    Comma-separated list of additional hostnames for this ingress to listen on.

  • backend-protocol | string

    Indicates how NGINX should communicate with the backend service. Valid Values: HTTP, HTTPS, GRPC, GRPCS, AJP and FCGI.

  • enable-access-log | boolean

    Setting this to false disables access log for the ingress using nginx.ingress.kubernetes.io/enable-access-log. If this setting is not set anywhere (config or relation), it defaults to true.

  • ingress-class | string

    The ingress class to target for this ingress resource.

    If your cluster has multiple ingress controllers, this allows you to select the correct one, by setting the ingressClassName field on the ingress resource created by the charm.

    This value isn't available to be set via the relation as it's a property of the cluster's configuration.

    If this value is empty, the charm will use whichever ingress class has the "ingressclass.kubernetes.io/is-default-class" annotation set to "true".

    If multiple ingress classes are so configured, no selection will be made.

    For more details, see:

    • https://kubernetes.github.io/ingress-nginx/user-guide/multiple-ingress/

    • https://kubernetes.io/docs/concepts/services-networking/ingress/#default-ingress-class

  • limit-rps | int

    Number of requests accepted from a given IP each second. The burst limit is set to this limit multiplied by 5. When clients exceed this limit a 503 error will be returned. Setting this to 0 disables rate-limiting.

  • limit-whitelist | string

    If rate-limiting is set, client IP source ranges to be excluded. The value is a comma-separated list of CIDRs.

  • max-body-size | int

    Default: 20

    Max allowed body-size (for file uploads) in megabytes, set to 0 to disable limits.

  • owasp-modsecurity-crs | boolean

    Enable OWASP ModSecurity Core Rule Set (CRS). A set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts. See https://github.com/coreruleset/coreruleset for more details.

  • owasp-modsecurity-custom-rules | string

    New line ('\n') separated list of custom rules to be added to modsecurity-snippet annotation. Example: "SecAction id:900130,phase:1,nolog,pass,t:none,setvar:tx.crs_exclusions_wordpress=1\n".

  • path-routes | string

    Comma separated list of the routes under the hostname that you wish to map to the relation. Example: "/admin,/portal" will map example.test/admin and example.test/portal only.

  • proxy-connect-timeout | int

    Default: 60

    Timeout in seconds for connecting to the proxied server.

  • proxy-read-timeout | int

    Default: 60

    Timeout in seconds for reading a response from the proxied server.

  • proxy-send-timeout | int

    Default: 60

    Timeout in seconds for sending a response from the proxied server.

  • retry-errors | string

    Specifies in which cases a request should be retried against the next server. Comma-separated list, e.g. "error,timeout,http_502,http_503,http_504". See http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_next_upstream for more details. Unrecognised values will be ignored. The nginx default will be used if this config option is set to an empty value.

  • rewrite-enabled | boolean

    Whether requests should be written to the rewrite-target

  • rewrite-target | string

    The path to rewrite requests to. If not set, rewrite-target will be "/".

  • service-hostname | string

    The hostname of the service to create an ingress for.

  • service-name | string

    The name of the service to create an ingress for.

  • service-namespace | string

    The namespace of the service to create an ingress for. Will default to the namespace this charm is deployed into.

  • service-port | int

    The port of the service to create an ingress for.

  • tls-secret-name | string

    The name of the Kubernetes secret used to get the TLS certificate used for HTTPS. This settings overrides any tls-certificate relation defined. If left empty and no tls-certificates relation is defined, HTTPS will be disabled.

  • whitelist-source-range | string

    Allowed client IP source ranges. The value is a comma separated list of CIDRs.