You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: latest/ug/networking/aws-load-balancer-controller.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,11 @@ The controller watches for Kubernetes Ingress or Service resources. In response,
19
19
The controller provisions the following resources:
20
20
21
21
*Kubernetes `Ingress`*::
22
-
The LBC creates an link:elasticloadbalancing/latest/application/introduction.html[{aws} Application Load Balancer (ALB),type="documentation"] when you create a Kubernetes `Ingress`. https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.7/guide/ingress/annotations/[Review the annotations you can apply to an Ingress resource.]
22
+
The LBC creates an link:elasticloadbalancing/latest/application/introduction.html[{aws} Application Load Balancer (ALB),type="documentation"] when you create a Kubernetes `Ingress`. https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/ingress/annotations/[Review the annotations you can apply to an Ingress resource.]
23
23
24
24
25
25
*Kubernetes service of the `LoadBalancer` type*::
26
-
The LBC creates an link:elasticloadbalancing/latest/network/introduction.html[{aws} Network Load Balancer (NLB),type="documentation"]when you create a Kubernetes service of type `LoadBalancer`. https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.7/guide/service/annotations/[Review the annotations you can apply to a Service resource.]
26
+
The LBC creates an link:elasticloadbalancing/latest/network/introduction.html[{aws} Network Load Balancer (NLB),type="documentation"]when you create a Kubernetes service of type `LoadBalancer`. https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/service/annotations/[Review the annotations you can apply to a Service resource.]
27
27
+
28
28
In the past, the Kubernetes network load balancer was used for _instance_ targets, but the LBC was used for _IP_ targets. With the {aws} Load Balancer Controller version `2.3.0` or later, you can create NLBs using either target type. For more information about NLB target types, see link:elasticloadbalancing/latest/network/load-balancer-target-groups.html#target-type[Target type,type="documentation"] in the User Guide for Network Load Balancers.
29
29
@@ -62,7 +62,7 @@ Kubernetes includes a legacy cloud provider for {aws}. The legacy cloud provider
62
62
[IMPORTANT]
63
63
====
64
64
65
-
In versions 2.5 and newer, the {aws} Load Balancer Controller becomes the default controller for Kubernetes _service_ resources with the `type: LoadBalancer` and makes an {aws} Network Load Balancer (NLB) for each service. It does this by making a mutating webhook for services, which sets the `spec.loadBalancerClass` field to `service.k8s.aws/nlb` for new services of `type: LoadBalancer`. You can turn off this feature and revert to using the https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.7/guide/service/annotations/#legacy-cloud-provider[legacy Cloud Provider] as the default controller, by setting the helm chart value `enableServiceMutatorWebhook` to `false`. The cluster won't provision new Classic Load Balancers for your services unless you turn off this feature. Existing Classic Load Balancers will continue to work.
65
+
In versions 2.5 and newer, the {aws} Load Balancer Controller becomes the default controller for Kubernetes _service_ resources with the `type: LoadBalancer` and makes an {aws} Network Load Balancer (NLB) for each service. It does this by making a mutating webhook for services, which sets the `spec.loadBalancerClass` field to `service.k8s.aws/nlb` for new services of `type: LoadBalancer`. You can turn off this feature and revert to using the https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/service/annotations/#legacy-cloud-provider[legacy Cloud Provider] as the default controller, by setting the helm chart value `enableServiceMutatorWebhook` to `false`. The cluster won't provision new Classic Load Balancers for your services unless you turn off this feature. Existing Classic Load Balancers will continue to work.
Copy file name to clipboardExpand all lines: latest/ug/networking/lbc-helm.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,13 +43,13 @@ Before proceeding with the configuration steps on this page, consider the follow
43
43
44
44
[#lbc-helm-iam]
45
45
== Step 1: Create IAM Role using `eksctl`
46
-
The following steps refer to the {aws} Load Balancer Controller *v2.13.0* release version. For more information about all releases, see the https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/[{aws} Load Balancer Controller Release Page] on GitHub.
46
+
The following steps refer to the {aws} Load Balancer Controller *v2.13.3* release version. For more information about all releases, see the https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/[{aws} Load Balancer Controller Release Page] on GitHub.
47
47
48
48
. Download an IAM policy for the {aws} Load Balancer Controller that allows it to make calls to {aws} APIs on your behalf.
** If you are a non-standard {aws} partition, such as a Government or China region, https://github.com/kubernetes-sigs/aws-load-balancer-controller/tree/main/docs/install[review the policies on GitHub] and download the appropriate policy for your region.
55
55
. Create an IAM policy using the policy downloaded in the previous step.
Copy file name to clipboardExpand all lines: latest/ug/networking/lbc-manifest.adoc
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Before proceeding with the configuration steps on this page, consider the follow
43
43
44
44
[#lbc-iam]
45
45
== Step 1: Configure IAM
46
-
The following steps refer to the {aws} Load Balancer Controller *v2.11.0* release version. For more information about all releases, see the https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/[{aws} Load Balancer Controller Release Page] on GitHub.
46
+
The following steps refer to the {aws} Load Balancer Controller *v2.13.3* release version. For more information about all releases, see the https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/[{aws} Load Balancer Controller Release Page] on GitHub.
47
47
48
48
. Download an IAM policy for the {aws} Load Balancer Controller that allows it to make calls to {aws} APIs on your behalf.
49
49
+
@@ -53,15 +53,15 @@ The following steps refer to the {aws} Load Balancer Controller *v2.11.0* releas
.. If you downloaded the `v2_11_0_full.yaml` file, run the following command to remove the `ServiceAccount` section in the manifest. If you don't remove this section, the required annotation that you made to the service account in a previous step is overwritten. Removing this section also preserves the service account that you created in a previous step if you delete the controller.
247
+
.. If you downloaded the `v2_13_3_full.yaml` file, run the following command to remove the `ServiceAccount` section in the manifest. If you don't remove this section, the required annotation that you made to the service account in a previous step is overwritten. Removing this section also preserves the service account that you created in a previous step if you delete the controller.
248
248
+
249
249
[source,shell,subs="verbatim,attributes"]
250
250
----
251
-
sed -i.bak -e '690,698d' ./v2_11_0_full.yaml
251
+
sed -i.bak -e '690,698d' ./v2_13_3_full.yaml
252
252
----
253
253
+
254
254
If you downloaded a different file version, then open the file in an editor and remove the following lines.
@@ -269,20 +269,20 @@ metadata:
269
269
+
270
270
[source,shell,subs="verbatim,attributes"]
271
271
----
272
-
sed -i.bak -e 's|your-cluster-name|my-cluster|' ./v2_11_0_full.yaml
272
+
sed -i.bak -e 's|your-cluster-name|my-cluster|' ./v2_13_3_full.yaml
273
273
----
274
274
.. If your nodes don't have access to the Amazon EKS Amazon ECR image repositories, then you need to pull the following image and push it to a repository that your nodes have access to. For more information on how to pull, tag, and push an image to your own repository, see <<copy-image-to-repository>>.
Add your registry's name to the manifest. The following command assumes that your private repository's name is the same as the source repository and adds your private registry's name to the file. Replace [.replaceable]`111122223333.dkr.ecr.region-code.amazonaws.com` with your registry. This line assumes that you named your private repository the same as the source repository. If not, change the `eks/aws-load-balancer-controller` text after your private registry name to your repository name.
282
282
+
283
283
[source,shell,subs="verbatim,attributes"]
284
284
----
285
-
sed -i.bak -e 's|public.ecr.aws/eks/aws-load-balancer-controller|111122223333.dkr.ecr.region-code.amazonaws.com/eks/aws-load-balancer-controller|' ./v2_11_0_full.yaml
285
+
sed -i.bak -e 's|public.ecr.aws/eks/aws-load-balancer-controller|111122223333.dkr.ecr.region-code.amazonaws.com/eks/aws-load-balancer-controller|' ./v2_13_3_full.yaml
286
286
----
287
287
.. (Required only for Fargate or Restricted IMDS)
288
288
+
@@ -306,19 +306,19 @@ spec:
306
306
+
307
307
[source,shell,subs="verbatim,attributes"]
308
308
----
309
-
kubectl apply -f v2_11_0_full.yaml
309
+
kubectl apply -f v2_13_3_full.yaml
310
310
----
311
311
. Download the `IngressClass` and `IngressClassParams` manifest to your cluster.
0 commit comments