You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/migrate-from-agic-to-agc.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,10 +82,10 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
82
82
83
83
Migration from Application Gateway Ingress Controller to Application Gateway for Containers is designed to be a four step process:
84
84
85
-
[Step 1](#step-1-install-alb-controller): Install Application Gateway for Containers' ALB Controller<br>
86
-
[Step 2](#step-2-translate-ingress): Translate AGIC Ingress to Application Gateway for Containers Ingress<br>
87
-
[Step 3](#step-3-perform-end-to-end-validation): Perform end-to-end testing against Application Gateway for Containers<br>
88
-
[Step 4](#step-4-direct-traffic-to-application-gateway-for-containers): Direct traffic from AGIC to Application Gateway for Containers
85
+
1)[Step 1](#step-1-install-alb-controller): Install Application Gateway for Containers' ALB Controller
86
+
2)[Step 2](#step-2-translate-ingress): Translate AGIC Ingress to Application Gateway for Containers Ingress
87
+
3)[Step 3](#step-3-perform-end-to-end-validation): Perform end-to-end testing against Application Gateway for Containers
88
+
4)[Step 4](#step-4-direct-traffic-to-application-gateway-for-containers): Direct traffic from AGIC to Application Gateway for Containers
89
89
90
90
Steps 2 through 4 will be repeated for each service you plan to migrate.
91
91
@@ -112,9 +112,10 @@ Check the Ingress and Gateway setup by using a host file or DNS record to test t
112
112
Once you've completed end-to-end testing, direct traffic to Application Gateway for Containers. Update public DNS records to point to the Application Gateway for Containers' frontend A record. In most cases, this would be in the form of a CNAME record or, if specifying an apex domain name, an alias record. Allow time for traffic to naturally flow to the Application Gateway for Containers frontend.
113
113
114
114
> [!TIP]
115
-
> 1) Prior to migration, identify the time to live (TTL) value of the DNS record currently serving traffic to the frontend of Application Gateway. Ensure the same amount of time and time configured in Application Gateway for connection draining to pass to ensure all clients have resolved the new DNS record to Application Gateway for Containers prior to retiring the Ingress / Gateway configuration to AGIC.
116
-
> 2) Consider migration during a time of low-peak traffic to validate
117
-
> 3) In the event migration does not behavior the way you anticipated, revert the DNS record to point back to the Application Gateway frontend and repeat the process.
115
+
>
116
+
> - Prior to migration, identify the time to live (TTL) value of the DNS record currently serving traffic to the frontend of Application Gateway. Ensure the same amount of time and time configured in Application Gateway for connection draining to pass to ensure all clients have resolved the new DNS record to Application Gateway for Containers prior to retiring the Ingress / Gateway configuration to AGIC.
117
+
> - Consider migration during a time of low-peak traffic to validate
118
+
> - In the event migration does not behavior the way you anticipated, revert the DNS record to point back to the Application Gateway frontend and repeat the process.
After the ingress controller is removed, you will need to delete the Application Gateway resource.
150
151
151
-
>![Note]
152
+
>[!Note]
152
153
>If the aks add-on was provisioned in the context of referencing a previously deployed Application Gateway in Azure, you will need to delete the Application Gateway resource manually.
153
154
154
155
## Annotations
@@ -253,14 +254,14 @@ Application Gateway for Containers allows customers to reference prebuild TLS po
253
254
254
255
To leverage this feature, you must leverage Gateway API. More details on TLS Policy are found [here](tls-policy.md).
255
256
256
-
>![Note]
257
+
>[!Note]
257
258
>The Predefined policy names and cipher suites are different from Application Gateway Ingress Controller. Please refer to the [predefined TLS policy table](tls-policy.md#predefined-tls-policy).
258
259
259
260
#### Frontend TLS Policy in Ingress API
260
261
261
262
Custom TLS policy isn't supported by Application Gateway for Containers today.
262
263
263
-
### Session Affinity
264
+
### Session affinity
264
265
265
266
AGIC annotation
266
267
@@ -349,9 +350,9 @@ Connection draining is enabled by default for all Application Gateway for Contai
349
350
350
351
Scenarios:
351
352
352
-
1) Scale-in: When autoscaling scales in, connections are drained for 5 minutes. After 5 minutes, connections are closed and clients must initiate a new connection.
353
-
2) Unhealthy health probe: When an unhealthy health probe is detected, connections persist until the client disconnects.
354
-
3) Pod is removed from backend: When a pod is removed in AKS, Application Gateway for Containers continues to persist open connections until the client disconnects.
353
+
- Scale-in: When autoscaling scales in, connections are drained for 5 minutes. After 5 minutes, connections are closed and clients must initiate a new connection.
354
+
- Unhealthy health probe: When an unhealthy health probe is detected, connections persist until the client disconnects.
355
+
- Pod is removed from backend: When a pod is removed in AKS, Application Gateway for Containers continues to persist open connections until the client disconnects.
0 commit comments