Feature imagePublic-IP-for-Access-to-Kubernetes-Application-in-Jelastic-PaaS

Exploring CloudSigma PaaS: How to Access Kubernetes Application via Public IP

CloudSigma PaaS allows users to expose their applications using a public IP address. This address needs to be attached to a node from the Kubernetes cluster environment. There are two ways to achieve this in the CloudSigma PaaS environment:

  • One way is to attach the public IP to a dedicated load balancer.1-Public IP for Access to Kubernetes Application in Jelastic PaaS
  • Another way is to attach the public IP to a Worker node from Kubernetes.

In this tutorial, we will guide you on how to get Kubernetes application access using either of these approaches.

Setting a Dedicated Load Balancer for Kubernetes Application Access

First, we shall learn how to set up a dedicated load balancer for application access:

  1. Head over to the CloudSigma Marketplace to locate and install the Kubernetes cluster. Then, deploy your application. As an example, we will be deploying the Jakarta EE Cargo Tracker.
  2. Next to your Kubernetes cluster, find and click on Change Environment Topology. In the window that opens on your screen, add a Dedicated Load Balancer node. Then, attach a public IP address to it like this:

2-Public IP Jelastic PaaS

In our example, we have used the NGINX load balancer node. There are multiple other load balancers available including HAProxy, LS Web ADC, and Varnish. You can choose whichever one you prefer to use.

When you are done modifying the topology, the applied changes will look like this:

3-Public IP for Access to Kubernetes Application in Jelastic PaaS

4-Public IP for Access to Kubernetes Application in Jelastic PaaS

3. The next step is to create an A record for a custom domain. You will be using the same public IP address that you used in the previous steps. In this example, we will be using cargo-tracker.cloudsigma.website:

5-Public IP for Access to Kubernetes Application in Jelastic PaaS

4. Now we can attach our custom domain to the K8s cluster. To do this, we will send a request to issue a trusted Let’s Encrypt SSL certificate:

  • Hover over the Load Balancer and click on Add-Ons.
  • Find and Install Let’s Encrypt Free SSL:

6-Public IP for Access in Jelastic PaaS-02

  • In configuration, enter your custom domain name and then, click Install. In our case, the domain name is as follows:

7-Public IP for Access to Kubernetes Application in Jelastic PaaS-

Finally, we have now made our application that we can access using the custom domain https://cargo-tracker.cloudsigma.website. We have also encrypted the traffic on our application with a valid and trusted Let’s Encrypt SSL certificate.

Gaining Application Access Using the Kubernetes Worker Node Public IP Address

Next, we will be looking at the alternative approach you can take to make the application available outside the Kubernetes cluster. Essentially, we will learn how to attach a public IP address to a worker node in the Kubernetes cluster in order to make the app directly accessible:

8-Public IP for Access to Kubernetes Application in Jelastic PaaS

Let’s continue with the same example we showed you previously. We will be using the same cluster that we deployed our Cargo Tracker application on. Here’s how to proceed:

1. Click on Change Environment Topology. Add the public IP address to the worker node:

9.1-Public IP for Access in Jelastic PaaS

2. Next, create an A record for your custom domain and map it to the IP you just added. Make sure that you use a domain name that is different from the one used in the previous chapter. For example, we will use the following domain name: cargo-tracker-worker.cloudsigma.website:

9.2-Public IP for Access to Kubernetes Application in Jelastic PaaS

3. Hover over the Control Plane or Master node and click on Add-Ons. Locate and install Certificate Manager. This should install a cert-manager controller along with an NGINX ingress controller with LoadBalancer service type. The latter contains the IP address that is associated with your worker node. It will be serving the “nginx-cert” ingress class resources:

10-Public IP for Access to Kubernetes Application in Jelastic PaaS-01

4. In the given field, enter your preferred domain name and click on Apply:

11-Public IP for Access to Kubernetes Application in Jelastic PaaS

5. At the time of installation, the add-on also installs a test application called helloworld-cert. You can simply delete the resources it uses with these commands:

These commands should be entered and executed using SSH (SFTP) or the Web SSH Gate of the Control Plane or Master Node. Hover over the node and click on the Web SSH option beside it to access the gate.

The other option is for you to hover over the Control Plane or Master Node and clicking on Config. From here, go to the SFTP/SSH Gate and follow the given instructions.

6. In order to terminate application SSL traffic and handle routing to the cargo-tracker service, we need to create an ingress resource called cargo-tracker-worker. Let’s say we are using cargo-tracker-worker-ingress.yaml. You can use an editor such as vi to create a file and then paste the following code:

After that,  proceed as follows:

7. When you make this ingress, Certificate Manager will automatically issue a Let’s Encrypt SSL certificate for your new domain name. Give the system a minute or two before you check if your app is available on the new custom domain name, which is https://cargo-tracker-worker.cloudsigma.website in our case.

And voila! By following these steps, you have exposed your application using two different approaches. As a result, you will see two ingresses. For us, they are:

  • cargo-tracker

This ingress serves application traffic that comes through the public IP of your dedicated load balancer.

  • cargo-tracker-worker

This ingress is set to serve the application traffic that flows in directly from the IP that is attached to the K8s worker node.

This is how they will appear:

12-Public IP for Access in Jelastic PaaS

Based on which kind of implementation you go for, you will only need one ingress in production. CloudSigma PaaS gives its users access to a number of tools to perform load balancing as needed by their applications. Feel free to read and learn more about load balancing on the platform. We also have detailed guides about the basics of load balancing with the likes of NGINX and HAProxy among other available tools.

You can give CloudSigma’s PaaS a try with our 7-day free trial or contact us if you want us to provide you with more details and a platform demo. 

Try Free for 7 days


About Zhenya Mocheva

Zhenya is a Digital Marketing Expert at CloudSigma, focusing on brand strategy, social media marketing and digital marketing campaigns. She is passionate about the continuous innovation within the digital environment and the endless growth opportunities that inbound marketing brings.