You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-add-health-probes.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,17 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 06/10/2022
8
+
ms.date: 9/17/2024
9
9
ms.author: greglin
10
10
---
11
11
12
12
# Add Health Probes to your service
13
-
By default, Ingress controller will provision an HTTP GET probe for the exposed pods.
13
+
By default, Ingress controller provisions an HTTP GET probe for the exposed pods.
14
14
The probe properties can be customized by adding a [Readiness or Liveness Probe](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/) to your `deployment`/`pod` spec.
15
15
16
+
> [!TIP]
17
+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-annotations.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,17 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: conceptual
8
-
ms.date: 5/13/2024
8
+
ms.date: 9/17/2024
9
9
ms.author: greglin
10
10
---
11
11
12
12
# Annotations for Application Gateway Ingress Controller
13
13
14
14
You can annotate the Kubernetes ingress resource with arbitrary key/value pairs. Application Gateway Ingress Controller (AGIC) relies on annotations to program Azure Application Gateway features that aren't configurable via the ingress YAML. Ingress annotations are applied to all HTTP settings, backend pools, and listeners derived from an ingress resource.
15
15
16
+
> [!TIP]
17
+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
18
+
16
19
## List of supported annotations
17
20
18
21
For AGIC to observe an ingress resource, the resource *must be annotated* with `kubernetes.io/ingress.class: azure/application-gateway`.
@@ -284,7 +287,7 @@ spec:
284
287
285
288
## Request Timeout
286
289
287
-
Use the following annotation to specify the request timeout in seconds. After the timeout, Application Gateway fails a request if the response is not received.
290
+
Use the following annotation to specify the request timeout in seconds. After the timeout, Application Gateway fails a request if the response isn't received.
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-cookie-affinity.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,16 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 11/4/2019
8
+
ms.date: 9/17/2024
9
9
ms.author: greglin
10
10
---
11
11
12
12
# Enable Cookie based affinity with an Application Gateway
13
13
As outlined in the [Azure Application Gateway Documentation](./application-gateway-components.md#http-settings), Application Gateway supports cookie based affinity, which means it can direct subsequent traffic from a user session to the same server for processing.
14
14
15
+
> [!TIP]
16
+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-disable-addon.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,19 +5,22 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 06/10/2020
8
+
ms.date: 9/17/2024
9
9
ms.author: greglin
10
10
---
11
11
12
12
# Disable and re-enable AGIC add-on for your AKS cluster
13
-
Application Gateway Ingress Controller (AGIC) deployed as an AKS add-on allows you to enable and disable the add-on with one line in Azure CLI. The life cycle of the Application Gateway will differ when you disable the AGIC add-on, depending on if the Application Gateway was created by the AGIC add-on, or if it was deployed separately from the AGIC add-on. You can run the same command to re-enable the AGIC add-on if you ever disable it, or to enable the AGIC add-on using an existing AKS cluster and Application Gateway.
13
+
Application Gateway Ingress Controller (AGIC) deployed as an AKS add-on allows you to enable and disable the add-on with one line in Azure CLI. The life cycle of the Application Gateway differs when you disable the AGIC add-on, depending on if the Application Gateway was created by the AGIC add-on, or if it was deployed separately from the AGIC add-on. You can run the same command to re-enable the AGIC add-on if you ever disable it, or to enable the AGIC add-on using an existing AKS cluster and Application Gateway.
14
+
15
+
> [!TIP]
16
+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
14
17
15
18
## Disabling AGIC add-on with associated Application Gateway
16
-
If the AGIC add-on automatically deployed the Application Gateway for you when you first set everything up, then disabling the AGIC add-on will by default delete the Application Gateway based on a couple criteria. There are two criteria that the AGIC add-on looks for to determine if it should delete the associated Application Gateway when you disable it:
19
+
If the AGIC add-on automatically deployed the Application Gateway for you when you first set up everything, then disabling the AGIC add-on will by default delete the Application Gateway based on a couple criteria. There are two criteria that the AGIC add-on looks for to determine if it should delete the associated Application Gateway when you disable it:
17
20
- Is the Application Gateway that the AGIC add-on is associated with deployed in the MC_* node resource group?
18
21
- Does the Application Gateway that the AGIC add-on is associated with have the tag "created-by: ingress-appgw"? The tag is used by AGIC to determine if the Application Gateway was deployed by the add-on or not.
19
22
20
-
If both criteria are met, then the AGIC add-on will delete the Application Gateway it created when the add-on is disabled; however, it won't delete the public IP or the subnet in which the Application Gateway was deployed with/in. If the first criteria is not met, then it won't matter if the Application Gateway has the "created-by: ingress-appgw" tag - disabling the add-on won't delete the Application Gateway. Likewise, if the second criteria is not met, i.e. the Application Gateway lacks that tag, then disabling the add-on won't delete the Application Gateway in the MC_* node resource group.
23
+
If both criteria are met, then the AGIC add-on will delete the Application Gateway it created when the add-on is disabled; however, it won't delete the public IP or the subnet in which the Application Gateway was deployed with/in. If the first criteria isn't met, then it won't matter if the Application Gateway has the "created-by: ingress-appgw" tag - disabling the add-on won't delete the Application Gateway. Likewise, if the second criteria isn't met, that is. The Application Gateway lacks that tag, then disabling the add-on won't delete the Application Gateway in the MC_* node resource group.
21
24
22
25
> [!TIP]
23
26
> If you don't want the Application Gateway to be deleted when disabling the add-on, but it meets both criteria then remove the "created-by: ingress-appgw" tag to prevent the add-on from deleting your Application Gateway.
@@ -36,4 +39,4 @@ az aks enable-addons -n <AKS-cluster-name> -g <AKS-cluster-resource-group> -a in
36
39
```
37
40
38
41
## Next steps
39
-
For more details on how to enable the AGIC add-on using an existing Application Gateway and AKS cluster, see [AGIC add-on brownfield deployment](tutorial-ingress-controller-add-on-existing.md).
42
+
For more information on how to enable the AGIC add-on using an existing Application Gateway and AKS cluster, see [AGIC add-on brownfield deployment](tutorial-ingress-controller-add-on-existing.md).
@@ -51,23 +51,17 @@ Gateway should that become necessary
51
51
[Helm](/azure/aks/kubernetes-helm) is a package manager for Kubernetes, used to install the `application-gateway-kubernetes-ingress` package.
52
52
53
53
> [!NOTE]
54
-
> If you use [Cloud Shell](https://shell.azure.com/), you don't need to install Helm. Azure Cloud Shell comes with Helm version 3. Skip the first step and just add the AGIC Helm repository.
54
+
> If you use [Cloud Shell](https://shell.azure.com/), you don't need to install Helm. Azure Cloud Shell comes with Helm version 3.
55
55
56
-
1.Install [Helm](/azure/aks/kubernetes-helm) and run the following to add `application-gateway-kubernetes-ingress` helm package:
56
+
Install [Helm](/azure/aks/kubernetes-helm) and run the following:
In the first few steps, we install Helm's Tiller on your Kubernetes cluster. Use [Cloud Shell](https://shell.azure.com/) to install the AGIC Helm package:
203
+
In the first few steps, we installed Helm's Tiller on your Kubernetes cluster. Use [Cloud Shell](https://shell.azure.com/) to install the AGIC Helm package:
210
204
211
-
1. Add the `application-gateway-kubernetes-ingress` helm repo and perform a helm update
@@ -280,17 +273,18 @@ In the first few steps, we install Helm's Tiller on your Kubernetes cluster. Use
280
273
> [!NOTE]
281
274
> The `<identity-client-id>` is a property of the Microsoft Entra Workload ID you setup in the previous section. You can retrieve this information by running the following command: `az identity show -g <resourcegroup> -n <identity-name>`, where `<resourcegroup>` is the resource group hosting the infrastructure resources related to the AKS cluster, Application Gateway and managed identity.
282
275
283
-
1. Install Helm chart `application-gateway-kubernetes-ingress`with the `helm-config.yaml` configuration from the previous step
276
+
1. Install Helm chart with the `helm-config.yaml` configuration from the previous step
As a result, your AKS cluster has a new instance of `AzureIngressProhibitedTarget` called `prohibit-all-targets`:
@@ -418,8 +413,7 @@ Since Helm with `appgw.shared=true` and the default `prohibit-all-targets` block
418
413
419
414
Let's assume that we already have a working AKS cluster, Application Gateway, and configured AGIC in our cluster. We have an Ingress for
420
415
`prod.contoso.com` and are successfully serving traffic for it from the cluster. We want to add `staging.contoso.com` to our
421
-
existing Application Gateway, but need to host it on a [VM](https://azure.microsoft.com/services/virtual-machines/). We
422
-
are going to reuse the existing Application Gateway and manually configure a listener and backend pools for
416
+
existing Application Gateway, but need to host it on a [VM](https://azure.microsoft.com/services/virtual-machines/). We're going to reuse the existing Application Gateway and manually configure a listener and backend pools for
423
417
`staging.contoso.com`. But manually tweaking Application Gateway config (using
424
418
[portal](https://portal.azure.com), [ARM APIs](/rest/api/resources/) or
425
419
[Terraform](https://www.terraform.io/)) would conflict with AGIC's assumptions of full ownership. Shortly after we apply
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-install-new.md
+9-15Lines changed: 9 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,14 @@ author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.custom:
8
8
ms.topic: how-to
9
-
ms.date: 07/28/2023
9
+
ms.date: 9/17/2024
10
10
ms.author: greglin
11
11
---
12
12
13
13
# How to Install an Application Gateway Ingress Controller (AGIC) Using a New Application Gateway
14
14
15
15
The instructions below assume Application Gateway Ingress Controller (AGIC) will be
16
-
installed in an environment with no pre-existing components.
16
+
installed in an environment with no preexisting components.
17
17
18
18
> [!TIP]
19
19
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
@@ -39,7 +39,7 @@ choose to use another environment, ensure the following command-line tools are i
39
39
40
40
## Create an Identity
41
41
42
-
Follow the steps below to create a Microsoft Entra [service principal object](../active-directory/develop/app-objects-and-service-principals.md#service-principal-object). Record the `appId`, `password`, and `objectId` values - these values will be used in the following steps.
42
+
Follow the steps below to create a Microsoft Entra [service principal object](../active-directory/develop/app-objects-and-service-principals.md#service-principal-object). Record the `appId`, `password`, and `objectId` values - these values are used in the following steps.
43
43
44
44
1. Create AD service principal ([Read more about Azure RBAC](../role-based-access-control/overview.md)):
45
45
```azurecli
@@ -56,7 +56,7 @@ Follow the steps below to create a Microsoft Entra [service principal object](..
56
56
```
57
57
The output of this command is `objectId`, which will be used in the Azure Resource Manager template below
58
58
59
-
1. Create the parameter file that will be used in the Azure Resource Manager template deployment later.
59
+
1. Create the parameter file that is used in the Azure Resource Manager template deployment later.
60
60
```bash
61
61
cat <<EOF > parameters.json
62
62
{
@@ -70,7 +70,7 @@ Follow the steps below to create a Microsoft Entra [service principal object](..
70
70
To deploy an **Kubernetes RBAC** enabled cluster, set the `aksEnableRBAC` field to `true`
71
71
72
72
## Deploy Components
73
-
This step will add the following components to your subscription:
73
+
This step adds the following components to your subscription:
@@ -112,7 +112,7 @@ With the instructions in the previous section, we created and configured a new A
112
112
113
113
### Set up Kubernetes Credentials
114
114
For the following steps, we need setup [kubectl](https://kubectl.docs.kubernetes.io/) command,
115
-
which we'll use to connect to our new Kubernetes cluster. [Cloud Shell](https://shell.azure.com/) has `kubectl` already installed. We'll use `az` CLI to obtain credentials for Kubernetes.
115
+
which we use to connect to our new Kubernetes cluster. [Cloud Shell](https://shell.azure.com/) has `kubectl` already installed. We'll use `az` CLI to obtain credentials for Kubernetes.
116
116
117
117
Get credentials for your newly deployed AKS ([read more](/azure/aks/manage-azure-rbac#use-azure-rbac-for-kubernetes-authorization-with-kubectl)):
118
118
@@ -150,12 +150,12 @@ To install Microsoft Entra Pod Identity to your cluster:
150
150
```
151
151
152
152
### Install Helm
153
-
[Helm](/azure/aks/kubernetes-helm) is a package manager for Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress` package.
153
+
[Helm](/azure/aks/kubernetes-helm) is a package manager for Kubernetes. We use it to install the `application-gateway-kubernetes-ingress` package.
154
154
155
155
> [!NOTE]
156
156
> If you use [Cloud Shell](https://shell.azure.com/), you don't need to install Helm. Azure Cloud Shell comes with Helm version 3. Skip the first step and just add the AGIC Helm repository.
157
157
158
-
1. Install [Helm](/azure/aks/kubernetes-helm) and run the following to add `application-gateway-kubernetes-ingress` helm package:
158
+
1. Install [Helm](/azure/aks/kubernetes-helm) and run the following:
159
159
160
160
- *Kubernetes RBAC enabled* AKS cluster
161
161
@@ -171,12 +171,6 @@ To install Microsoft Entra Pod Identity to your cluster:
0 commit comments