.yaml
manifest included in the configuration.Two Ingresses must be created: one named producer-oneconnect
and another named apigateway
, both within the oneconnect
namespace.
In both cases, the Ingress should reference the apigateway
service.
The creation steps are the same for both Ingresses.
apigateway
and oneconnect
.A new Key Vault must be created, as Azure's policy for Ingress requires it as a mandatory component.
Click on the "Select a certificate" option and proceed to create the certificate using the default settings.
.pfx
format in order to import it and reference it within the Key Vault.You can now proceed to review the configuration and create the Ingress.
If the environment is not connected to the internet and the entire deployment is performed internally within Azure, a private entry point must be created for the user portal and optionally for the generated workspaces.
To do this:
Navigate to the "Services and Ingress" section.
Click on "Create", then select "Apply YAML".
Apply the internal-loadbalancer.yaml
manifest.
This will create a private entry point that will ensure connectivity within the internal environment in Azure.
apigateway
, which must be used as the connection endpoint for the frontend of the OneConnect user platform.After the load balancer is created, the IP address shown as "external" is actually the private IP that should be used to establish connections to the cloud services on port 9000.
For example, a valid REST login endpoint would be:
http://10.224.0.222:9000/auth/api/v1/auth/signin
Optional:
If you need to generate a private IP for a workspace and cannot use the cluster IP from the deployment, you can follow the same steps after the workspace has been created, using theinternallb-workspace.yaml
manifest.
Replace the placeholders marked as XXX with the name of the generated workspace.
Copy the value of the "oneconnect" label.