Skip to content

Commit 8c2efd5

Browse files
Merge pull request #211539 from gjoshevski/patch-1
Provide a note to customers using AKS with Kubenet
2 parents 8398a5a + 117616a commit 8c2efd5

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/application-gateway/tutorial-ingress-controller-add-on-existing.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,11 @@ appGWVnetId=$(az network vnet show -n myVnet -g myResourceGroup -o tsv --query "
100100
az network vnet peering create -n AKStoAppGWVnetPeering -g $nodeResourceGroup --vnet-name $aksVnetName --remote-vnet $appGWVnetId --allow-vnet-access
101101
```
102102

103+
> [!NOTE]
104+
> In the "Deploy a new AKS cluster" step above we created AKS with Azure CNI, in case you have an existing AKS cluster using [Kubenet mode](../aks/configure-kubenet.md) you need to update the route table to help the packets destined for a POD IP reach the node which is hosting the pod.
105+
> A simple way to achieve this is by associating the same route table created by AKS to the Application Gateway's subnet.
106+
107+
103108
## Deploy a sample application using AGIC
104109

105110
You'll now deploy a sample application to the AKS cluster you created that will use the AGIC add-on for Ingress and connect the application gateway to the AKS cluster. First, you'll get credentials to the AKS cluster you deployed by running the `az aks get-credentials` command.

0 commit comments

Comments
 (0)