Skip to content

Commit fd9a670

Browse files
committed
Review changes
1 parent 5564cb4 commit fd9a670

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

articles/application-gateway/for-containers/migrate-from-agic-to-agc.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -82,10 +82,10 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
8282

8383
Migration from Application Gateway Ingress Controller to Application Gateway for Containers is designed to be a four step process:
8484

85-
[Step 1](#step-1-install-alb-controller): Install Application Gateway for Containers' ALB Controller<br>
86-
[Step 2](#step-2-translate-ingress): Translate AGIC Ingress to Application Gateway for Containers Ingress<br>
87-
[Step 3](#step-3-perform-end-to-end-validation): Perform end-to-end testing against Application Gateway for Containers<br>
88-
[Step 4](#step-4-direct-traffic-to-application-gateway-for-containers): Direct traffic from AGIC to Application Gateway for Containers
85+
1) [Step 1](#step-1-install-alb-controller): Install Application Gateway for Containers' ALB Controller
86+
2) [Step 2](#step-2-translate-ingress): Translate AGIC Ingress to Application Gateway for Containers Ingress
87+
3) [Step 3](#step-3-perform-end-to-end-validation): Perform end-to-end testing against Application Gateway for Containers
88+
4) [Step 4](#step-4-direct-traffic-to-application-gateway-for-containers): Direct traffic from AGIC to Application Gateway for Containers
8989

9090
Steps 2 through 4 will be repeated for each service you plan to migrate.
9191

@@ -112,9 +112,10 @@ Check the Ingress and Gateway setup by using a host file or DNS record to test t
112112
Once you've completed end-to-end testing, direct traffic to Application Gateway for Containers. Update public DNS records to point to the Application Gateway for Containers' frontend A record. In most cases, this would be in the form of a CNAME record or, if specifying an apex domain name, an alias record. Allow time for traffic to naturally flow to the Application Gateway for Containers frontend.
113113

114114
> [!TIP]
115-
> 1) Prior to migration, identify the time to live (TTL) value of the DNS record currently serving traffic to the frontend of Application Gateway. Ensure the same amount of time and time configured in Application Gateway for connection draining to pass to ensure all clients have resolved the new DNS record to Application Gateway for Containers prior to retiring the Ingress / Gateway configuration to AGIC.
116-
> 2) Consider migration during a time of low-peak traffic to validate
117-
> 3) In the event migration does not behavior the way you anticipated, revert the DNS record to point back to the Application Gateway frontend and repeat the process.
115+
>
116+
> - Prior to migration, identify the time to live (TTL) value of the DNS record currently serving traffic to the frontend of Application Gateway. Ensure the same amount of time and time configured in Application Gateway for connection draining to pass to ensure all clients have resolved the new DNS record to Application Gateway for Containers prior to retiring the Ingress / Gateway configuration to AGIC.
117+
> - Consider migration during a time of low-peak traffic to validate
118+
> - In the event migration does not behavior the way you anticipated, revert the DNS record to point back to the Application Gateway frontend and repeat the process.
118119
119120
### Step 5: Deprecate Application Gateway Ingress Controller
120121

@@ -148,7 +149,7 @@ helm uninstall ingress-azure
148149

149150
After the ingress controller is removed, you will need to delete the Application Gateway resource.
150151

151-
>![Note]
152+
>[!Note]
152153
>If the aks add-on was provisioned in the context of referencing a previously deployed Application Gateway in Azure, you will need to delete the Application Gateway resource manually.
153154
154155
## Annotations
@@ -253,14 +254,14 @@ Application Gateway for Containers allows customers to reference prebuild TLS po
253254
254255
To leverage this feature, you must leverage Gateway API. More details on TLS Policy are found [here](tls-policy.md).
255256
256-
>![Note]
257+
>[!Note]
257258
>The Predefined policy names and cipher suites are different from Application Gateway Ingress Controller. Please refer to the [predefined TLS policy table](tls-policy.md#predefined-tls-policy).
258259
259260
#### Frontend TLS Policy in Ingress API
260261
261262
Custom TLS policy isn't supported by Application Gateway for Containers today.
262263
263-
### Session Affinity
264+
### Session affinity
264265
265266
AGIC annotation
266267
@@ -349,9 +350,9 @@ Connection draining is enabled by default for all Application Gateway for Contai
349350
350351
Scenarios:
351352
352-
1) Scale-in: When autoscaling scales in, connections are drained for 5 minutes. After 5 minutes, connections are closed and clients must initiate a new connection.
353-
2) Unhealthy health probe: When an unhealthy health probe is detected, connections persist until the client disconnects.
354-
3) Pod is removed from backend: When a pod is removed in AKS, Application Gateway for Containers continues to persist open connections until the client disconnects.
353+
- Scale-in: When autoscaling scales in, connections are drained for 5 minutes. After 5 minutes, connections are closed and clients must initiate a new connection.
354+
- Unhealthy health probe: When an unhealthy health probe is detected, connections persist until the client disconnects.
355+
- Pod is removed from backend: When a pod is removed in AKS, Application Gateway for Containers continues to persist open connections until the client disconnects.
355356
356357
### Request timeout
357358

0 commit comments

Comments
 (0)