Skip to content

Commit ae1b998

Browse files
committed
articles-about-ingress-for-aks
1 parent dc25697 commit ae1b998

6 files changed

+11
-11
lines changed

articles/application-gateway/ingress-controller-autoscale-pods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: greglin
1414

1515
As incoming traffic increases, it becomes crucial to scale up your applications based on the demand.
1616

17-
This article explains how you can use the `AvgRequestCountPerHealthyHost` metric in Azure Application Gateway to scale up an application. The `AvgRequestCountPerHealthyHost` metric measures average requests sent to a specific combination of a back-end pool and a back-end HTTP setting.
17+
This article explains how you can use the `AvgRequestCountPerHealthyHost` metric in Azure Application Gateway to scale up Azure Kubernetes Service (AKS) pods for an application. The `AvgRequestCountPerHealthyHost` metric measures average requests sent to a specific combination of a back-end pool and a back-end HTTP setting.
1818

1919
Use the following two components:
2020

articles/application-gateway/ingress-controller-expose-service-over-http-https.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ This article illustrates the usage of [Kubernetes ingress resources](https://kub
2323

2424
## Deploy the guestbook application
2525

26-
The guestbook application is a canonical Kubernetes application that consists of a Web UI front end, a back end, and a Redis database.
26+
The `guestbook` application is a canonical Kubernetes application that consists of a Web UI front end, a back end, and a Redis database.
2727

2828
By default, `guestbook` exposes its application through a service with the name `frontend` on port `80`. Without a Kubernetes ingress resource, the service isn't accessible from outside the AKS cluster. You use the application, and set up ingress resources to access the application, through HTTP and HTTPS.
2929

30-
To deploy the guestbook application:
30+
To deploy the `guestbook` application:
3131

3232
1. Download `guestbook-all-in-one.yaml` from [this GitHub page](https://raw.githubusercontent.com/kubernetes/examples/master/guestbook/all-in-one/guestbook-all-in-one.yaml).
3333
1. Deploy `guestbook-all-in-one.yaml` into your AKS cluster by running this command:
@@ -38,7 +38,7 @@ To deploy the guestbook application:
3838

3939
## Expose services over HTTP
4040

41-
To expose the guestbook application, use the following ingress resource:
41+
To expose the `guestbook` application, use the following ingress resource:
4242

4343
```yaml
4444
apiVersion: networking.k8s.io/v1
@@ -74,7 +74,7 @@ Now the `guestbook` application should be available. You can check the availabil
7474

7575
### Without a specified host name
7676

77-
If you don't specify a host name, the guestbook service is available on all the host names that point to the Application Gateway instance.
77+
If you don't specify a host name, the `guestbook` service is available on all the host names that point to the Application Gateway instance.
7878

7979
1. Before you deploy the ingress resource, create a Kubernetes secret to host the certificate and private key:
8080

@@ -116,7 +116,7 @@ Now the `guestbook` application is available on both HTTP and HTTPS.
116116

117117
### With a specified host name
118118

119-
You can also specify the host name on the ingress resource in order to multiplex TLS configurations and services. When you specify a host name, the guestbook service is available only on the specified host.
119+
You can also specify the host name on the ingress resource in order to multiplex TLS configurations and services. When you specify a host name, the `guestbook` service is available only on the specified host.
120120

121121
1. Define the following ingress resource. In the `secretName` section, replace `<guestbook-secret-name>` with the name of your secret. In the `hosts` and `host` sections, replace `<guestbook.contoso.com>` with your host name.
122122

articles/application-gateway/ingress-controller-install-existing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 9/17/2024
1010
ms.author: greglin
1111
---
1212

13-
# Install an Application Gateway Ingress Controller (AGIC) by using an existing Application Gateway instance
13+
# Install AGIC by using an existing Application Gateway instance
1414

1515
The Application Gateway Ingress Controller (AGIC) is a pod within your Azure Kubernetes Service (AKS) cluster. AGIC monitors the Kubernetes [Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) resources. It creates and applies an Azure Application Gateway configuration based on the status of the Kubernetes cluster.
1616

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 9/17/2024
1010
ms.author: greglin
1111
---
1212

13-
# Install an Application Gateway Ingress Controller (AGIC) by using a new Application Gateway instance
13+
# Install AGIC by using a new Application Gateway instance
1414

1515
The instructions in this article assume that you want to install an Application Gateway Ingress Controller (AGIC) in an environment that has no preexisting components.
1616

articles/application-gateway/ingress-controller-multiple-namespace-support.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.date: 08/01/2023
99
ms.author: greglin
1010
---
1111

12-
# Enable multiple-namespace support in an AKS cluster by using the Application Gateway Kubernetes Ingress Controller
12+
# Enable multiple-namespace support in an AKS cluster by using AGIC
1313

1414
[Kubernetes namespaces](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/) make it possible for a Kubernetes cluster to be partitioned and allocated to subgroups of a larger team. These subgroups can then deploy and manage infrastructure with finer controls of resources, security, and configuration. Kubernetes allows for one or more ingress resources to be defined independently within each namespace.
1515

1616
As of version 0.7, the [Application Gateway Kubernetes Ingress Controller](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/README.md) (AGIC) can ingest events from and observe multiple namespaces. If an Azure Kubernetes Service (AKS) administrator decides to use [Azure Application Gateway](https://azure.microsoft.com/services/application-gateway/) as an ingress, all namespaces use the same instance of Application Gateway. A single installation of AGIC monitors accessible namespaces and configures the Application Gateway instance that it's associated with.
1717

1818
Version 0.7 of AGIC continues to exclusively observe the `default` namespace, unless you explicitly change it to one or more different namespaces in the Helm configuration.
1919

20-
## Enable support for multiple namespaces
20+
## Enable multiple-namespace support
2121

2222
1. Modify the [helm-config.yaml](#sample-helm-configuration-file) file in one of the following ways:
2323

articles/application-gateway/ingress-controller-update-ingress-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 07/23/2023
1010
ms.author: greglin
1111
---
1212

13-
# Upgrade the Application Gateway Ingress Controller by using Helm
13+
# Upgrade AGIC by using Helm
1414

1515
You can upgrade the Azure Application Gateway Ingress Controller (AGIC) for Kubernetes by using a Helm repository hosted on Azure Storage.
1616

0 commit comments

Comments
 (0)