Skip to content

n-y-kim/AKS-AGIC-tf-test

Repository files navigation

AKS-AGIC-tf-test

Architecture

  • Resource groups with virtual network and subnets(node, pod, agic)
  • Application Gateway Standard V2 with private ip only
  • AKS cluster using Azure CNI v2 with Managed Identity(System Assigned)
  • Application Gateway Ingress Controller(AGIC) with RBAC settings to access AKS cluster.

Terraform flow

  1. Create aks-rg-{index-number} resource group, virtual network and subents(node, pod, agic)
  2. Create application gateway.
  3. Create AKS cluster with AGIC id option.
  4. Add RBAC for AGIC to access AKS cluster.

Prerequisites

  • Follow this documentation to enable private ip only preview for Application Gateway Standard V2. This settings must be done before terraform apply.
  • Set resource_count in variables.tf to the number of resource groups you want to create. (default: 5)

After terraform apply

Deploy sample app and ingress

kubectl apply -f test-app.yaml

Since we only have private ip, access the application gateway from the AKS cluster's pod.

kubectl run test-pod --image=nginx
kubectl exec -it test-pod -- /bin/bash
curl -I http://<app-gateway-ip>

About

Attach AppGW with add-on terraform settings

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages