You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-expose-service-over-http-https.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: greglin
15
15
These tutorials help illustrate the usage of [Kubernetes Ingress Resources](https://kubernetes.io/docs/concepts/services-networking/ingress/) to expose an example Kubernetes service through the [Azure Application Gateway](https://azure.microsoft.com/services/application-gateway/) over HTTP or HTTPS.
16
16
17
17
> [!TIP]
18
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
18
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-expose-websocket-server.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.author: greglin
14
14
As outlined in the Application Gateway v2 documentation - it [provides native support for the WebSocket and HTTP/2 protocols](features.md#websocket-and-http2-traffic). Note that for both Application Gateway and the Kubernetes Ingress - there is no user-configurable setting to selectively enable or disable WebSocket support.
15
15
16
16
> [!TIP]
17
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
17
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
18
18
19
19
The following Kubernetes deployment YAML shows the minimum configuration used to deploy a WebSocket server, which is the same as deploying a regular web server:
@@ -17,7 +17,7 @@ AGIC monitors the Kubernetes [Ingress](https://kubernetes.io/docs/concepts/servi
17
17
resources, and creates and applies Application Gateway config based on the status of the Kubernetes cluster.
18
18
19
19
> [!TIP]
20
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
20
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
21
21
22
22
## Outline
23
23
@@ -49,7 +49,9 @@ Gateway should that become necessary
49
49
## Install Helm
50
50
51
51
[Helm](../aks/kubernetes-helm.md) is a package manager for Kubernetes, used to install the `application-gateway-kubernetes-ingress` package.
52
-
Use [Cloud Shell](https://shell.azure.com/) to install Helm:
52
+
53
+
> [!NOTE]
54
+
> If you use [Cloud Shell](https://shell.azure.com/), you don't need to install Helm. Azure Cloud Shell comes with Helm version 3. Skip the first step and just add the AGIC Helm repository.
53
55
54
56
1. Install [Helm](../aks/kubernetes-helm.md) and run the following to add `application-gateway-kubernetes-ingress` helm package:
55
57
@@ -67,8 +69,7 @@ Use [Cloud Shell](https://shell.azure.com/) to install Helm:
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-install-new.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.custom: devx-track-linux
8
8
ms.topic: how-to
9
-
ms.date: 07/22/2023
9
+
ms.date: 07/28/2023
10
10
ms.author: greglin
11
11
---
12
12
@@ -16,7 +16,7 @@ The instructions below assume Application Gateway Ingress Controller (AGIC) will
16
16
installed in an environment with no pre-existing components.
17
17
18
18
> [!TIP]
19
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
19
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
20
20
21
21
## Required Command Line Tools
22
22
@@ -110,7 +110,7 @@ This step will add the following components to your subscription:
110
110
111
111
With the instructions in the previous section, we created and configured a new AKS cluster and an Application Gateway. We're now ready to deploy a sample app and an ingress controller to our new Kubernetes infrastructure.
112
112
113
-
### Setup Kubernetes Credentials
113
+
### Set up Kubernetes Credentials
114
114
For the following steps, we need setup [kubectl](https://kubectl.docs.kubernetes.io/) command,
115
115
which we'll use to connect to our new Kubernetes cluster. [Cloud Shell](https://shell.azure.com/) has `kubectl` already installed. We'll use `az` CLI to obtain credentials for Kubernetes.
116
116
@@ -148,8 +148,10 @@ To install Azure AD Pod Identity to your cluster:
148
148
```
149
149
150
150
### Install Helm
151
-
[Helm](../aks/kubernetes-helm.md) is a package manager for
152
-
Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress` package:
151
+
[Helm](../aks/kubernetes-helm.md) is a package manager for Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress` package.
152
+
153
+
> [!NOTE]
154
+
> If you use [Cloud Shell](https://shell.azure.com/), you don't need to install Helm. Azure Cloud Shell comes with Helm version 3. Skip the first step and just add the AGIC Helm repository.
153
155
154
156
1. Install [Helm](../aks/kubernetes-helm.md) and run the following to add `application-gateway-kubernetes-ingress` helm package:
155
157
@@ -167,7 +169,7 @@ Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress`
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-letsencrypt-certificate-application-gateway.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: greglin
15
15
This section configures your AKS to use [LetsEncrypt.org](https://letsencrypt.org/) and automatically obtain a TLS/SSL certificate for your domain. The certificate is installed on Application Gateway, which performs SSL/TLS termination for your AKS cluster. The setup described here uses the [cert-manager](https://github.com/jetstack/cert-manager) Kubernetes add-on, which automates the creation and management of certificates.
16
16
17
17
> [!TIP]
18
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
18
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
19
19
20
20
Use the following steps to install [cert-manager](https://docs.cert-manager.io) on your existing AKS cluster.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-migration.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: article
8
-
ms.date: 07/22/2023
8
+
ms.date: 07/28/2023
9
9
ms.author: greglin
10
10
---
11
11
@@ -14,15 +14,15 @@ ms.author: greglin
14
14
If you already have AGIC deployed through Helm but want to migrate to AGIC deployed as an AKS add-on, the following steps help to guide you through the migration process.
15
15
16
16
> [!TIP]
17
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
17
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
18
18
19
19
## Prerequisites
20
20
Before you start the migration process, there are a few things to check.
21
21
- Are you using any features with AGIC Helm that are [currently not supported with AGIC add-on](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on)?
22
22
- Are you using more than one AGIC Helm deployment per AKS cluster?
23
23
- Are you using multiple AGIC Helm deployments to target one Application Gateway?
24
24
25
-
If you answered yes to any of the questions above, AGIC add-on won't support your use case yet so it is be best to continue using AGIC Helm in the meantime. Otherwise, continue with the migration process below during off-business hours.
25
+
If you answered yes to any of the previous questions, AGIC add-on won't support your use case yet, so it's best to continue using AGIC Helm. Otherwise, use the following migration process during off-business hours.
26
26
27
27
## Find the Application Gateway resource ID that AGIC Helm is currently targeting
28
28
Navigate to the Application Gateway that your AGIC Helm deployment is targeting. Copy and save the resource ID of that Application Gateway. You need the resource ID in a later step. The resource ID can be found in Portal, under the Properties tab of your Application Gateway or through Azure CLI. The following example saves the Application Gateway resource ID to *appgwId* for a gateway named *myApplicationGateway* in the resource group *myResourceGroup*.
Through Azure CLI, delete your AGIC Helm deployment from your cluster. You'll need to delete the AGIC Helm deployment first before you can enable the AGIC AKS add-on. Please note that any changes that occur within your AKS cluster between the time of deleting your AGIC Helm deployment and the time you enable the AGIC add-on won't be reflected on your Application Gateway, and therefore this migration process should be done outside of business hours to minimize impact. Application Gateway continues to have the last configuration applied by AGIC so existing routing rules won't be affected.
35
+
Using Azure CLI, delete your AGIC Helm deployment from your cluster. You need to delete the AGIC Helm deployment first before you can enable the AGIC AKS add-on. Any changes that occur within your AKS cluster between the time of deleting your AGIC Helm deployment and the time you enable the AGIC add-on aren't reflected on your Application Gateway. Therefore, migration should be completed outside of business hours to minimize impact. Application Gateway continues to have the last configuration applied by AGIC so that existing routing rules aren't affected.
36
36
37
37
## Enable AGIC add-on using your existing Application Gateway
38
-
You can now enable the AGIC add-on in your AKS cluster to target your existing Application Gateway through Azure CLI or Portal. Run the following Azure CLI command to enable the AGIC add-on in your AKS cluster. The example enables the add-on in a cluster called *myCluster*, in a resource group called *myResourceGroup*, using the Application Gateway resource ID *appgwId* we saved above in the earlier step.
38
+
You can now enable the AGIC add-on in your AKS cluster to target your existing Application Gateway through Azure CLI or Portal. Run the following Azure CLI command to enable the AGIC add-on in your AKS cluster. The example enables the add-on in a cluster called *myCluster*, in a resource group called *myResourceGroup*, using the Application Gateway resource ID *appgwId* we saved in the earlier step.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: article
8
-
ms.date: 07/22/2023
8
+
ms.date: 07/28/2023
9
9
ms.author: greglin
10
10
---
11
11
@@ -15,12 +15,12 @@ The Application Gateway Ingress Controller (AGIC) is a Kubernetes application, w
15
15
The Ingress Controller runs in its own pod on the customer’s AKS. AGIC monitors a subset of Kubernetes Resources for changes. The state of the AKS cluster is translated to Application Gateway specific configuration and applied to the [Azure Resource Manager (ARM)](../azure-resource-manager/management/overview.md).
16
16
17
17
> [!TIP]
18
-
> Also see [What is Application Gateway for Containers?](for-containers/overview.md), currently in public preview.
18
+
> Also see [What is Application Gateway for Containers?](for-containers/overview.md) currently in public preview.
19
19
20
20
## Benefits of Application Gateway Ingress Controller
21
-
AGIC helps eliminate the need to have another load balancer/public IP in front of the AKS cluster and avoids multiple hops in your datapath before requests reach the AKS cluster. Application Gateway talks to pods using their private IP directly and doesn't require NodePort or KubeProxy services. This also brings better performance to your deployments.
21
+
AGIC helps eliminate the need to have another load balancer/public IP address in front of the AKS cluster and avoids multiple hops in your datapath before requests reach the AKS cluster. Application Gateway talks to pods using their private IP address directly and doesn't require NodePort or KubeProxy services. This capability also brings better performance to your deployments.
22
22
23
-
Ingress Controller is supported exclusively by Standard_v2 and WAF_v2 SKUs, which also enables autoscaling benefits. Application Gateway can react in response to an increase or decrease in traffic load and scale accordingly, without consuming any resources from your AKS cluster.
23
+
Ingress Controller is supported exclusively by Standard_v2 and WAF_v2 SKUs, which also enable autoscaling benefits. Application Gateway can react in response to an increase or decrease in traffic load and scale accordingly, without consuming any resources from your AKS cluster.
24
24
25
25
Using Application Gateway in addition to AGIC also helps protect your AKS cluster by providing TLS policy and Web Application Firewall (WAF) functionality.
26
26
@@ -35,16 +35,16 @@ AGIC is configured via the Kubernetes [Ingress resource](https://kubernetes.io/d
35
35
- Integrated web application firewall
36
36
37
37
## Difference between Helm deployment and AKS Add-On
38
-
There are two ways to deploy AGIC for your AKS cluster. The first way is through Helm; the second is through AKS as an add-on. The primary benefit of deploying AGIC as an AKS add-on is that it's much simpler than deploying through Helm. For a new setup, you can deploy a new Application Gateway and a new AKS cluster with AGIC enabled as an add-on in one line in Azure CLI. The add-on is also a fully managed service, which provides added benefits such as automatic updates and increased support. Both ways of deploying AGIC (Helm and AKS add-on) are fully supported by Microsoft. Additionally, the add-on allows for better integration with AKS as a first class add-on.
38
+
There are two ways to deploy AGIC for your AKS cluster. The first way is through Helm; the second is through AKS as an add-on. The primary benefit of deploying AGIC as an AKS add-on is that it's simpler than deploying through Helm. For a new setup, you can deploy a new Application Gateway and a new AKS cluster with AGIC enabled as an add-on in one line in Azure CLI. The add-on is also a fully managed service, which provides added benefits such as automatic updates and increased support. Both ways of deploying AGIC (Helm and AKS add-on) are fully supported by Microsoft. Additionally, the add-on allows for better integration with AKS as a first class add-on.
39
39
40
-
The AGIC add-on is still deployed as a pod in the customer's AKS cluster, however, there are a few differences between the Helm deployment version and the add-on version of AGIC. Below is a list of differences between the two versions:
40
+
The AGIC add-on is still deployed as a pod in the customer's AKS cluster, however, there are a few differences between the Helm deployment version and the add-on version of AGIC. The following is a list of differences between the two versions:
41
41
- Helm deployment values can't be modified on the AKS add-on:
42
42
-`verbosityLevel` is set to 5 by default
43
-
-`usePrivateIp` is set to be false by default; this can be overwritten by the [use-private-ip annotation](ingress-controller-annotations.md#use-private-ip)
43
+
-`usePrivateIp` is set to be false by default; this setting can be overwritten by the [use-private-ip annotation](ingress-controller-annotations.md#use-private-ip)
44
44
-`shared` isn't supported on add-on
45
45
-`reconcilePeriodSeconds` isn't supported on add-on
46
46
-`armAuth.type` isn't supported on add-on
47
-
- AGIC deployed via Helm supports ProhibitedTargets, which means AGIC can configure the Application Gateway specifically for AKS clusters without affecting other existing backends. AGIC add-on doesn't currently support this.
47
+
- AGIC deployed via Helm supports ProhibitedTargets, which means AGIC can configure the Application Gateway specifically for AKS clusters without affecting other existing backends. AGIC add-on doesn't currently support this capability.
48
48
- Since AGIC add-on is a managed service, customers are automatically updated to the latest version of AGIC add-on, unlike AGIC deployed through Helm where the customer must manually update AGIC.
0 commit comments