-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[solved] Deploy Che-multiuser behind Nginx proxy with https using only FQDN #14788
Comments
Side note, ingress nginx > 0.25.0 will fail to run on CPUs that don't support SSE4 instructions due to a dependency, See: kubernetes/ingress-nginx#4311 I was able to get mine to run on my Xeon E5310 by editing the deployed image version manually to 0.24.1 |
I also had to follow this workaround to get chectl to work with microk8s context #14455 (comment) |
My nginx logs indicate that I have a redirect loop in my config. I need some way of proxying back to my ingresses using a non-standard localhost or port. Listing the ingresses from my install, HOW TO CHANGE THESE IP ADDRESSES OR PORTS? |
/cc @sleshchenko |
SolutionThis single-host multiuser deployment on microk8s seems to be mostly working for Theia-based editor workspaces. Any recommendations on cleaning up this nginx config would be appreciated. Best practices for how to proxy headers is a bit of a crap-shoot. ### Here's the solution/strategy...
The trick was to edit the ingress controller deployment args to listen on a non-standard ip address and ports to prevent listening conflict with nginx already listening on port 80 and 443.
The ingresses in microk8s, with the following args still listen on port 80 and 443, but they are on a non-standard unique localhost IP address 127.0.0.2 ports :80 :443
Add the certbot generated wildcard certificates to kubernetes "che" namespace... I configured microk8s where it could be accessed with standard commands (in lieu of prefixed versions microk8s.kubectl ...) this seems to be required for chectl to find and use the Kubernetes API Launch Eclipse Che $ |
@Mbd06b |
I've been trying to install Eclipse Che on and off for about a year and a half now on a private Ubuntu(18-LTS) Server that I can access with a domain name using a Dynamic DNS record. Before I jump down this rabbit hole again. With the release of Eclipse Che 7, is it reasonable to:
Strategy 1. Deploy Che-multiuser behind a (non-ingress) Nginx proxy with https termination using a wildcard FQDN.
Strategy 2. Deploy Che-mulituser alongside a (non-ingress) Nginx with https termination occurring at the Che server on minikube.
Strategy 3. Deploy an accessible Che-single user with https and some other password protection/login strategy(non-VPN)??
Strategy 1 makes the most logical sense to me at this point, if anyone has a working sample Nginx config for this, and what arguments they are using, I'd appreciate you sharing it, before I light into this next release attempt.
Edit: Noticed that docker install is being deprecated from eclipse 7. I'm narrowing my focus to minikube. (Update: Minikube seems tailored for Windows/Mac users, I ultimately focused on Microk8s, because it doesn't require the VM overhead, and it's snap package is directly supported by Canonical, seemed to be a better choice for my target Ubuntu environment).
The purpose of this is to have a https/login (keycloak) secured private instance of Eclipse Che that will continuously run on a single server(node) that I can access anywhere and share with others. I develop heavily on local IDEs, but would like migrate more traditional developer workspaces/workflows to a self-hosted cloud, while increasing the overall utilization efficiency of my own running bare-metal server I use to DevOps those projects. The idea being purchasing PaaS or IaaS resources soley to run Che would theoretically be redundant and wasteful to this goal.
Relevant information
The text was updated successfully, but these errors were encountered: