Internet Facing Clusters
- Updated2026-04-08
- 3 minute(s) read
Enter a short description of your concept here (optional).
An internet-facing cluster deployment makes the SystemLink Enterprise application accessible from the public internet while keeping the Kubernetes cluster infrastructure in private subnets. This architecture is suitable for organizations that need:
- Remote access to distributed teams
- Managing geographically dispersed test systems
What is an Internet-Facing Deployment?
In an internet-facing deployment, users access the SystemLink web application and API through the public internet via HTTPS. The term "internet-facing" refers to the application accessibility, not the cluster infrastructure itself. The Kubernetes cluster nodes, databases, and internal services remain in private subnets without direct internet exposure.
Architecture Overview
A typical internet-facing SystemLink deployment uses the following network architecture:
- Public subnets: Host load balancers (Application Gateway on Azure, Application Load Balancer on AWS) that accept HTTPS traffic from the internet
- Private subnets: Host Kubernetes cluster nodes, databases, and all SystemLink services with no direct internet access
- NAT Gateway: Provides outbound internet connectivity for cluster nodes to download updates, pull container images, and communicate with external services
- Ingress controller: Runs in the Kubernetes cluster and routes traffic from the load balancer to SystemLink services
Stages of a typical traffic flow:
- User connects to public DNS name (e.g., systemlink.example.com) via HTTPS
- DNS resolves to the public IP address of the load balancer in a public subnet
- Load balancer performs TLS termination and forwards traffic to the Kubernetes ingress controller in a private subnet
- Ingress controller routes requests to the appropriate SystemLink service pods in the private subnet
- Services respond back through the same path
For detailed subnet architecture and configuration, refer to AWS VPC or Azure VNet.
Security Requirements
NI recommends additional security measures for internet-facing deployments beyond those used in private deployments.
NI strongly recommends that all internet traffic to SystemLink use HTTPS with valid TLS certificates. NI recommends avoiding exposing HTTP endpoints to the public internet.
- Certificate acquisition: Use the managed certificates from your cloud provider (AWS Certificate Manager, Azure Key Vault Certificates), or obtain certificates from a trusted certificate authority
- TLS termination: NI recommends configuring TLS termination at the load balancer for simplified certificate management
NI recommends deploying a Web Application Firewall to protect against common web exploits and attacks. You can use cloud provider WAF services (AWS WAF, Azure Web Application Firewall) or third-party WAF solution.
DNS Configuration
Create DNS records in your public DNS zone for SystemLink endpoints. Refer to Layer 7 (Application) Ingress for web UI and API configuration, and Layer 4 (TCP) Ingress for Salt Master configuration. For OIDC redirect URI configuration, refer to Identity and Access Management.
Related Information
- Preparing to Host and Operate SystemLink Enterprise
Before installing SystemLink Enterprise, ensure that the following network, compute, storage, and security infrastructure is in place.
- Public and Private Subnets
Public and private subnets are fundamental networking constructs in cloud environments that enable network segmentation and security isolation. Understanding how to properly configure these subnets is essential for deploying SystemLink Enterprise securely in AWS or Azure.
- AWS VPC
A Virtual Private Cloud (VPC) is an isolated network environment within AWS.
- Azure VNet
An Azure Virtual Network (VNet) is an isolated network environment within Azure.
- Corporate Network Connected Clusters
A corporate network connected cluster deployment integrates SystemLink with your the private network infrastructure of your organization, ensuring secure access and secure integration with on-premises systems.
- Networks and TLS
Learn how to configure networking and Transport Layer Security (TLS) for SystemLink Enterprise.
- DNS and Network Security Considerations
SystemLink Enterprise is hosted in a Kubernetes cluster. SystemLink Enterprise connects to test systems to aggregate data for monitoring and analysis.
- Private Certificate Authorities
If you are using a private certificate authority (CA), you must configure SystemLink Enterprise to use the private CA to establish trust.
- Layer 7 (Application) Ingress
Layer 7 ingress provides application-level HTTPS load balancing and routing for web services. SystemLink Enterprise uses Layer 7 ingress to expose HTTP-based services through two separate ingress endpoints: one endpoint for the web UI and one endpoint for API access.
- Layer 7 Ingress in AWS
This section describes Layer 7 ingress configuration using the AWS Application Load Balancer (ALB) for SystemLink Enterprise deployed on Amazon EKS. The ALB provides HTTPS load balancing and routing for the SystemLink UI and API hosts.
- AWS Global Ingress Configuration
SystemLink Enterprise configures separate ingress resources for the UI endpoints and API endpoints. Configure the following annotations in your Helm configuration file.
- Layer 7 Ingress in Azure
This section describes Layer 7 ingress configuration using the Azure Application Gateway for SystemLink Enterprise deployed on Azure Kubernetes Service (AKS). The Application Gateway provides HTTPS load balancing and routing for the SystemLink UI and API hosts.
- Azure Global Ingress Configuration
SystemLink Enterprise configures separate ingress resources for the UI endpoints and API endpoints. Configure the following annotations in your Helm configuration file.
- Layer 7 Ingress in Traefik
SystemLink Enterprise supports Traefik Hub API Gateway as a Layer 7 ingress controller. Traefik Hub provides HTTPS load balancing and routing for the SystemLink UI and API hosts.
- Layer 4 (TCP) Ingress
Layer 4 ingress provides TCP-level load balancing for services that require direct TCP connections. SystemLink Enterprise uses Layer 4 ingress for the Salt Master service.
- Enabling Salt Communication in AWS
SystemLink Enterprise uses Salt to manage test systems. Salt communicates with test systems using a TCP-based protocol on ports 4505 and 4506. This section describes using the AWS Network Load Balancer (NLB) for Layer 4 (TCP) ingress with the Salt Master service.
- Enabling Salt Communication in Azure
SystemLink Enterprise uses Salt to manage test systems. Salt communicates with test systems using a TCP-based protocol on ports 4505 and 4506. This section describes using Azure Load Balancer for Layer 4 (TCP) ingress with the Salt Master service.