You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/developers/design.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Let's take a look at each component:
31
31
When any change is applied on the k8s cluster by the user, AGIC needs to listen to these changes in order to update the corresponding configuration on the Application Gateway.
32
32
We use the kubernetes informers for this purpose which is a standard for watching resources on the K8S API server.
33
33
34
-
When AGIC starts, it [sets up informers](../pkg/k8scontext/context.go) for watching following resources:
34
+
When AGIC starts, it [sets up informers](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/pkg/k8scontext/context.go) for watching following resources:
35
35
36
36
1.[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/): This is the top-level resource that AGIC monitors. It provides information about the layer-7 routing rules that need to be configured on the App Gateway.
37
37
1.[Service](https://kubernetes.io/docs/concepts/services-networking/service/): Service provides an abstraction over the pods to expose as a network service. AGIC uses the service as logical grouping of pods to extract the IP addresses through the endpoints object created automatically along with the Service.
@@ -44,9 +44,9 @@ When starting the informers, AGIC also provides event handlers for each for crea
44
44
45
45
### 2. Worker
46
46
47
-
[Worker](../../pkg/worker.go) is responsible for processing the events and performing updates.
47
+
[Worker](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/pkg/worker/) is responsible for processing the events and performing updates.
48
48
49
-
When Worker's `Run` function is called, it starts as a separate thread and waits on the `Work` channel. When an informers add an event to the channel, worker dequeues the event and checks whether the event is noise or is relevant. Events that are coming from unwatched namespaces and unreferenced pods/endpoints are skipped to reduce the churn. If the the last worker loop was run less than 1 second ago, it sleeps for the remainder and wakes up to space out the updates.
49
+
When Worker's `Run` function is called, it starts as a separate thread and waits on the `Work` channel. When an informers add an event to the channel, worker dequeues the event and checks whether the event is noise or is relevant. Events that are coming from unwatched namespaces and unreferenced pods/endpoints are skipped to reduce the churn. If the the last worker loop was run less than 1 second ago, it sleeps for the remainder and wakes up to space out the updates.
50
50
After this, worker starts draining the rest of the events and calling the `ProcessEvent` function to process the event.
51
51
52
52
`ProcessEvent` function does the following:
@@ -57,7 +57,7 @@ After this, worker starts draining the rest of the events and calling the `Proce
57
57
58
58
### 3. Application Gateway Config Builder
59
59
60
-
This [component](../../pkg/appgw/configbuilder.go) is responsible for using the information in the local kubernetes cache and generating the corresponding Application Gateway configuration as an output.
60
+
This [component](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/pkg/appgw/configbuilder.go) is responsible for using the information in the local kubernetes cache and generating the corresponding Application Gateway configuration as an output.
61
61
62
62
Worker invokes the `Build` on this component which then generates various gateways sub-resources starting from leaf sub-resources like `probes`, `http settings` up to the `request routing rules`.
Copy file name to clipboardExpand all lines: docs/features/appgw-ssl-certificate.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ This documents assumes you already have the following Azure tools and resources
9
9
-[AAD Pod Identity](https://github.com/Azure/aad-pod-identity) installed on your AKS cluster
10
10
-[Cloud Shell](https://shell.azure.com/) is the Azure shell environment, which has `az` CLI, `kubectl`, and `helm` installed. These tools are required for the commands below.
11
11
12
-
Please use [Greenfield Deployment](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/docs/setup/install-new.md) to install nonexistents.
12
+
Please use [Greenfield Deployment](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/docs/setup/install.md) to install nonexistents.
13
13
14
14
To use the new feature, make sure the AGIC version is at least at 1.2.0-rc3
Copy file name to clipboardExpand all lines: docs/setup/install.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,6 @@ You need to complete the following tasks prior to deploying AGIC on your cluster
22
22
23
23
2. Set an AKS cluster for your workload.
24
24
25
-
> AKS cluster should have the workload identity feature enabled. [Learn how](../../aks/workload-identity-deploy-cluster.md#update-an-existing-aks-cluster) to enable workload identity on an existing AKS cluster.
26
-
27
25
If using an existing cluster, ensure you enable Workload Identity support on your AKS cluster. Workload identities can be enabled via the following:
28
26
29
27
```bash
@@ -119,7 +117,7 @@ If using an existing Application Gateway, make sure the following:
0 commit comments