You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-autoscale-pods.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.author: greglin
14
14
15
15
As incoming traffic increases, it becomes crucial to scale up your applications based on the demand.
16
16
17
-
This article explains how you can use the `AvgRequestCountPerHealthyHost` metric in Azure Application Gateway to scale up an application. The `AvgRequestCountPerHealthyHost` metric measures average requests sent to a specific combination of a back-end pool and a back-end HTTP setting.
17
+
This article explains how you can use the `AvgRequestCountPerHealthyHost` metric in Azure Application Gateway to scale up Azure Kubernetes Service (AKS) pods for an application. The `AvgRequestCountPerHealthyHost` metric measures average requests sent to a specific combination of a back-end pool and a back-end HTTP setting.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-expose-service-over-http-https.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,11 +23,11 @@ This article illustrates the usage of [Kubernetes ingress resources](https://kub
23
23
24
24
## Deploy the guestbook application
25
25
26
-
The guestbook application is a canonical Kubernetes application that consists of a Web UI front end, a back end, and a Redis database.
26
+
The `guestbook` application is a canonical Kubernetes application that consists of a Web UI front end, a back end, and a Redis database.
27
27
28
28
By default, `guestbook` exposes its application through a service with the name `frontend` on port `80`. Without a Kubernetes ingress resource, the service isn't accessible from outside the AKS cluster. You use the application, and set up ingress resources to access the application, through HTTP and HTTPS.
29
29
30
-
To deploy the guestbook application:
30
+
To deploy the `guestbook` application:
31
31
32
32
1. Download `guestbook-all-in-one.yaml` from [this GitHub page](https://raw.githubusercontent.com/kubernetes/examples/master/guestbook/all-in-one/guestbook-all-in-one.yaml).
33
33
1. Deploy `guestbook-all-in-one.yaml` into your AKS cluster by running this command:
@@ -38,7 +38,7 @@ To deploy the guestbook application:
38
38
39
39
## Expose services over HTTP
40
40
41
-
To expose the guestbook application, use the following ingress resource:
41
+
To expose the `guestbook` application, use the following ingress resource:
42
42
43
43
```yaml
44
44
apiVersion: networking.k8s.io/v1
@@ -74,7 +74,7 @@ Now the `guestbook` application should be available. You can check the availabil
74
74
75
75
### Without a specified host name
76
76
77
-
If you don't specify a host name, the guestbook service is available on all the host names that point to the Application Gateway instance.
77
+
If you don't specify a host name, the `guestbook` service is available on all the host names that point to the Application Gateway instance.
78
78
79
79
1. Before you deploy the ingress resource, create a Kubernetes secret to host the certificate and private key:
80
80
@@ -116,7 +116,7 @@ Now the `guestbook` application is available on both HTTP and HTTPS.
116
116
117
117
### With a specified host name
118
118
119
-
You can also specify the host name on the ingress resource in order to multiplex TLS configurations and services. When you specify a host name, the guestbook service is available only on the specified host.
119
+
You can also specify the host name on the ingress resource in order to multiplex TLS configurations and services. When you specify a host name, the `guestbook` service is available only on the specified host.
120
120
121
121
1. Define the following ingress resource. In the `secretName` section, replace `<guestbook-secret-name>` with the name of your secret. In the `hosts` and `host` sections, replace `<guestbook.contoso.com>` with your host name.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-install-existing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 9/17/2024
10
10
ms.author: greglin
11
11
---
12
12
13
-
# Install an Application Gateway Ingress Controller (AGIC) by using an existing Application Gateway instance
13
+
# Install AGIC by using an existing Application Gateway instance
14
14
15
15
The Application Gateway Ingress Controller (AGIC) is a pod within your Azure Kubernetes Service (AKS) cluster. AGIC monitors the Kubernetes [Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) resources. It creates and applies an Azure Application Gateway configuration based on the status of the Kubernetes cluster.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-install-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 9/17/2024
10
10
ms.author: greglin
11
11
---
12
12
13
-
# Install an Application Gateway Ingress Controller (AGIC) by using a new Application Gateway instance
13
+
# Install AGIC by using a new Application Gateway instance
14
14
15
15
The instructions in this article assume that you want to install an Application Gateway Ingress Controller (AGIC) in an environment that has no preexisting components.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-multiple-namespace-support.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,15 @@ ms.date: 08/01/2023
9
9
ms.author: greglin
10
10
---
11
11
12
-
# Enable multiple-namespace support in an AKS cluster by using the Application Gateway Kubernetes Ingress Controller
12
+
# Enable multiple-namespace support in an AKS cluster by using AGIC
13
13
14
14
[Kubernetes namespaces](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/) make it possible for a Kubernetes cluster to be partitioned and allocated to subgroups of a larger team. These subgroups can then deploy and manage infrastructure with finer controls of resources, security, and configuration. Kubernetes allows for one or more ingress resources to be defined independently within each namespace.
15
15
16
16
As of version 0.7, the [Application Gateway Kubernetes Ingress Controller](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/README.md) (AGIC) can ingest events from and observe multiple namespaces. If an Azure Kubernetes Service (AKS) administrator decides to use [Azure Application Gateway](https://azure.microsoft.com/services/application-gateway/) as an ingress, all namespaces use the same instance of Application Gateway. A single installation of AGIC monitors accessible namespaces and configures the Application Gateway instance that it's associated with.
17
17
18
18
Version 0.7 of AGIC continues to exclusively observe the `default` namespace, unless you explicitly change it to one or more different namespaces in the Helm configuration.
19
19
20
-
## Enable support for multiple namespaces
20
+
## Enable multiple-namespace support
21
21
22
22
1. Modify the [helm-config.yaml](#sample-helm-configuration-file) file in one of the following ways:
0 commit comments