You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. View the pod resources using the `kubectl get pods` command.
285
-
286
-
```bash-interactive
287
-
kubectl get pods -o custom-columns="NAME:.metadata.name,IPs:.status.podIPs[*].ip,NODE:.spec.nodeName,READY:.status.conditions[?(@.type=='Ready')].status"
288
-
```
289
-
290
-
The output shows the pods have both IPv4 and IPv6 addresses. The pods don't show IP addresses until they're ready.
1. Create an NGINX web server using the following YAML manifest.
302
-
303
-
```yml
304
-
apiVersion: apps/v1
305
-
kind: Deployment
306
-
metadata:
307
-
labels:
308
-
app: nginx
309
-
name: nginx
310
-
spec:
311
-
replicas: 3
312
-
selector:
313
-
matchLabels:
314
-
app: nginx
315
-
template:
316
-
metadata:
317
-
labels:
318
-
app: nginx
319
-
spec:
320
-
containers:
321
-
- image: nginx:latest
322
-
name: nginx
323
-
```
324
-
325
-
2. View the pod resources using the `kubectl get pods` command.
326
-
327
-
```bash-interactive
328
-
kubectl get pods -o custom-columns="NAME:.metadata.name,IPs:.status.podIPs[*].ip,NODE:.spec.nodeName,READY:.status.conditions[?(@.type=='Ready')].status"
329
-
```
330
-
331
-
The output shows the pods have both IPv4 and IPv6 addresses. The pods don't show IP addresses until they're ready.
The application routing addon is the recommended way for ingress in an AKS cluster. For more information about the application routing addon and an example of how to deploy an application with the addon, see [Managed NGINX ingress with the application routing add-on](app-routing.md).
341
277
342
278
## Expose the workload via a `LoadBalancer` type service
343
279
344
280
> [!IMPORTANT]
345
281
> There are currently **two limitations** pertaining to IPv6 services in AKS.
346
282
>
347
-
> 1. Azure Load Balancer sends health probes to IPv6 destinations from a link-local address. In Azure Linux node pools, this traffic can't be routed to a pod, so traffic flowing to IPv6 services deployed with `externalTrafficPolicy: Cluster` fail. IPv6 services must be deployed with `externalTrafficPolicy: Local`, which causes `kube-proxy` to respond to the probe on the node.
348
-
> 2. Prior to Kubernetes version 1.27, only the first IP address for a service will be provisioned to the load balancer, so a dual-stack service only receives a public IP for its first-listed IP family. To provide a dual-stack service for a single deployment, please create two services targeting the same selector, one for IPv4 and one for IPv6. This is no longer a limitation in kubernetes 1.27 or later.
283
+
> - Azure Load Balancer sends health probes to IPv6 destinations from a link-local address. In Azure Linux node pools, this traffic can't be routed to a pod, so traffic flowing to IPv6 services deployed with `externalTrafficPolicy: Cluster` fail. IPv6 services must be deployed with `externalTrafficPolicy: Local`, which causes `kube-proxy` to respond to the probe on the node.
284
+
> - Prior to Kubernetes version 1.27, only the first IP address for a service will be provisioned to the load balancer, so a dual-stack service only receives a public IP for its first-listed IP family. To provide a dual-stack service for a single deployment, please create two services targeting the same selector, one for IPv4 and one for IPv6. This is no longer a limitation in kubernetes 1.27 or later.
Copy file name to clipboardExpand all lines: articles/aks/concepts-network.md
+5-14Lines changed: 5 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -205,21 +205,15 @@ The *LoadBalancer* only works at layer 4. At layer 4, the Service is unaware of
205
205
206
206
### Create an Ingress resource
207
207
208
-
In AKS, you can create an [Ingress resource using NGINX][nginx-ingress], a similar tool, or the AKS HTTP application routing feature. When you enable HTTP application routing for an AKS cluster, the Azure platform creates the ingress controller and an *External-DNS* controller. As new Ingress resources are created in Kubernetes, the required DNS `A` records are created in a cluster-specific DNS zone.
208
+
The application routing addon is the recommended way to configure an Ingress controller in AKS. The application routing addon is a fully managed, ingress controller for Azure Kubernetes Service (AKS) that provides the following features:
209
209
210
-
For more information, see [Deploy HTTP application routing][aks-http-routing].
210
+
* Easy configuration of managed NGINX Ingress controllers based on Kubernetes NGINX Ingress controller.
211
211
212
-
### Application Gateway Ingress Controller (AGIC)
212
+
* Integration with Azure DNS for public and private zone management.
213
213
214
-
With the Application Gateway Ingress Controller (AGIC) add-on, you can use Azure's native Application Gateway level 7 load-balancer to expose cloud software to the Internet. AGIC runs as a pod within the AKS cluster. It consumes [Kubernetes Ingress Resources][k8s-ingress] and converts them to an Application Gateway configuration, which allows the gateway to load-balance traffic to the Kubernetes pods.
214
+
* SSL termination with certificates stored in Azure Key Vault.
215
215
216
-
To learn more about the AGIC add-on for AKS, see [What is Application Gateway Ingress Controller?][agic-overview].
217
-
218
-
### SSL/TLS termination
219
-
220
-
SSL/TLS termination is another common feature of Ingress. On large web applications accessed via HTTPS, the Ingress resource handles the TLS termination rather than within the application itself. To provide automatic TLS certification generation and configuration, you can configure the Ingress resource to use providers such as "Let's Encrypt."
221
-
222
-
For more information on configuring an NGINX ingress controller with Let's Encrypt, see [Ingress and TLS][aks-ingress-tls].
216
+
For more information about the application routing addon, see [Managed NGINX ingress with the application routing add-on](app-routing.md).
223
217
224
218
### Client source IP preservation
225
219
@@ -283,8 +277,6 @@ For more information on core Kubernetes and AKS concepts, see the following arti
0 commit comments