Skip to content

Commit cc156e3

Browse files
authored
NGINXaaS for Azure: update CNI details on loadbalancer for kubernetes docs (#1337)
This makes it clearer to users what kind of CNI configuration is applied to an AKS cluster built through the installation of the AKS extension.
1 parent 507b748 commit cc156e3

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

content/nginxaas-azure/loadbalancer-kubernetes.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ The NLK controller can be installed in your Kubernetes cluster using either Helm
148148
Install the NLK controller using `helm install`. Be sure your kubectl context is pointed at the desired cluster.
149149

150150
```shell
151-
helm install nlk oci://registry-1.docker.io/nginxcharts/nginxaas-loadbalancer-kubernetes --version 1.2.3 \
151+
helm install nlk oci://registry-1.docker.io/nginxcharts/nginxaas-loadbalancer-kubernetes --version 1.2.4 \
152152
--set "nlk.dataplaneApiKey=${keyValue}" \
153153
--set "nlk.config.nginxHosts=${dataplaneAPIEndpoint}nplus" \
154154
--set "nlk.config.tls.mode=ca-tls"
@@ -180,7 +180,10 @@ az k8s-extension create \
180180

181181
##### Install the AKS Extension using the Azure portal
182182

183-
You can also install the NLK controller AKS extension by navigating to [F5 NGINXaaS Loadbalancer for Kubernetes](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/f5-networks.f5-nginx-for-azure-aks-extension) in the Azure Marketplace and following the installation steps.
183+
You can also install the NLK controller AKS extension by navigating to [F5 NGINXaaS Loadbalancer for Kubernetes](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/f5-networks.f5-nginx-for-azure-aks-extension) in the Azure Marketplace and following the installation steps.
184+
{{< call-out "note" >}}
185+
If you are creating a new AKS cluster as part of this installation, note that we will enable the [Azure CNI Node Subnet plugin](https://learn.microsoft.com/en-us/azure/aks/concepts-network-cni-overview). This causes Cluster IP addresses to be exposed within your VNET.
186+
{{< /call-out >}}
184187

185188
- Select **Get it now**.
186189
- Select **Continue** to proceed with the installation.
@@ -251,7 +254,7 @@ Expose a Kubernetes `Service` to route traffic to your workload. The `Service`
251254
- Add the annotation: `nginx.com/nginxaas: nginxaas` to mark the service to be monitored by NLK.
252255
- Choose one of the following `Service` types:
253256
- `NodePort`: To route external traffic into the cluster using a well defined port exposed on each AKS worker node.
254-
- `ClusterIP`: To route traffic to pods directly if you are running an Azure Container Networking Interface (CNI) that lets you expose the pods on the Azure VNET.
257+
- `ClusterIP`: To route traffic to pods directly if you are running an Azure Container Networking Interface (CNI) that lets you expose the pods on the Azure VNET. If you created a new AKS cluster through the AKS Extenstion installation, this is configured automatically.
255258
- `LoadBalancer`: To route traffic to the cluster's external load balancer. The load balancer routes traffic into the cluster as normal.
256259
- The port name must be formatted as `{{NGINX Context}}-{{NGINX upstream name}}`. For example:
257260
- If the upstream is in the `http` context and named `my-service` then the name is `http-my-service`

0 commit comments

Comments
 (0)