1. Introduction
OpenShift provides two primary mechanisms to expose internal services to the outside world: Routes and Ingress.
While Kubernetes relies heavily on Ingress resources, OpenShift extends this model with its own Route abstraction, tightly integrated with its native HAProxy router, offering more flexibility and ease of use.
2. ๐ช What Are OpenShift Routes?
An OpenShift Route maps a service to a DNS hostname, enabling external traffic to reach internal pods.
๐ Key Components
-
Hostname → Public DNS name clients use
-
Service → Backend target to receive traffic
-
TLS Termination →
edge,passthrough, orreencrypt
๐ Example Route YAML
3. ๐ Ingress Controllers in OpenShift
OpenShift fully supports Kubernetes-style Ingress resources through the Ingress Operator.
โจ Benefits of Using Ingress
-
Declarative and standardized configuration
-
TLS configuration via annotations
-
Compatible with external tools like Nginx, Traefik, and Istio
Ingress is particularly useful when you want a multi-host or multi-path configuration similar to upstream Kubernetes.
4. ๐ง Best Practices
โ๏ธ Always configure TLS termination (edge or re-encrypt)
โ๏ธ Use edge termination + redirect to enforce HTTPS
โ๏ธ Regularly monitor route health:
โ๏ธ Prefer Routes for OpenShift-native deployments
โ๏ธ Use Ingress when integrating external ingress controllers or for advanced path-based routing
5. ๐งช Troubleshooting Tips
Check router logs
Verify DNS & Certificate
-
Ensure DNS resolves to the OpenShift ingress IP
-
Confirm certificate chain using:
Inspect traffic with curl
Useful for checking headers, TLS handshake, and redirects.
FAQs (0)
Sign in to ask a question. You can read FAQs without logging in.