Skip to content

Commit 9787e38

Browse files
committed
revert #120733
1 parent f05de3c commit 9787e38

File tree

3 files changed

+10
-2
lines changed

3 files changed

+10
-2
lines changed

articles/application-gateway/ingress-controller-migration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 07/28/2023
8+
ms.date: 07/01/2024
99
ms.author: greglin
1010
---
1111

@@ -40,6 +40,9 @@ You can now enable the AGIC add-on in your AKS cluster to target your existing A
4040
```azurecli-interactive
4141
az aks enable-addons -n myCluster -g myResourceGroup -a ingress-appgw --appgw-id $appgwId
4242
```
43+
Alternatively, you can navigate to your AKS cluster in Portal using this [link](https://portal.azure.com/?feature.aksagic=true) and enable the AGIC add-on in the Networking tab of your cluster. Select your existing Application Gateway from the dropdown menu when you choose which Application Gateway the add-on should target.
44+
45+
![Application Gateway Ingress Controller Portal](./media/tutorial-ingress-controller-add-on-existing/portal-ingress-controller-add-on.png)
4346

4447
## Next Steps
4548
- [**Application Gateway Ingress Controller Troubleshooting**](ingress-controller-troubleshoot.md): Troubleshooting guide for AGIC
Loading

articles/application-gateway/tutorial-ingress-controller-add-on-existing.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: tutorial
8-
ms.date: 11/28/2023
8+
ms.date: 07/01/2024
99
ms.author: greglin
1010
ms.custom: template-tutorial, devx-track-azurecli
1111
---
@@ -78,10 +78,15 @@ If you'd like to continue using Azure CLI, you can continue to enable the AGIC a
7878
appgwId=$(az network application-gateway show --name myApplicationGateway --resource-group myResourceGroup -o tsv --query "id")
7979
az aks enable-addons --name myCluster --resource-group myResourceGroup --addon ingress-appgw --appgw-id $appgwId
8080
```
81+
## Enable the AGIC add-on in existing AKS cluster through Azure portal
82+
83+
If you'd like to use Azure portal to enable AGIC add-on, go to [(https://aka.ms/azure/portal/aks/agic)](https://aka.ms/azure/portal/aks/agic) and navigate to your AKS cluster through the portal link. From there, go to the Networking tab within your AKS cluster. You'll see an application gateway ingress controller section, which allows you to enable/disable the ingress controller add-on using the Azure portal. Select the box next to **Enable ingress controller**, and then select the application gateway you created, **myApplicationGateway** from the dropdown menu. Select **Save**.
8184

8285
> [!IMPORTANT]
8386
> When you use an application gateway in a different resource group than the AKS cluster resource group, the managed identity **_ingressapplicationgateway-{AKSNAME}_** that is created must have **Network Contributor** and **Reader** roles set in the application gateway resource group.
8487
88+
:::image type="content" source="./media/tutorial-ingress-controller-add-on-existing/portal-ingress-controller-add-on.png" alt-text="Screenshot showing how to enable application gateway ingress controller from the networking page of the Azure Kubernetes Service.":::
89+
8590
## Peer the two virtual networks together
8691

8792
Since you deployed the AKS cluster in its own virtual network and the Application gateway in another virtual network, you'll need to peer the two virtual networks together in order for traffic to flow from the Application gateway to the pods in the cluster. Peering the two virtual networks requires running the Azure CLI command two separate times, to ensure that the connection is bi-directional. The first command will create a peering connection from the Application gateway virtual network to the AKS virtual network; the second command will create a peering connection in the other direction.

0 commit comments

Comments
 (0)