Skip to content

Commit 193fad2

Browse files
Merge pull request #313160 from jaewonparkalexander/agic-addon-1
update tutorial-ingress-controller-add-on-new.md
2 parents 42a5267 + 7828207 commit 193fad2

2 files changed

Lines changed: 21 additions & 0 deletions

File tree

110 KB
Loading

articles/application-gateway/tutorial-ingress-controller-add-on-new.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,27 @@ Deploying a new AKS cluster with the AGIC add-on enabled without specifying an e
5757
az aks create -n myCluster -g myResourceGroup --network-plugin azure --enable-managed-identity -a ingress-appgw --appgw-name myApplicationGateway --appgw-subnet-cidr "10.225.0.0/16" --generate-ssh-keys
5858
```
5959

60+
## Enable the add-on for the existing AKS cluster
61+
62+
You already have an existing AKS cluster and will enable the AGIC add-on. The add-on can be enabled either through the Azure portal or by using the Azure CLI.
63+
64+
# [Azure Portal](#tab/azure-portal)
65+
66+
In this page in the screenshot, you can create it simply by selecting the checkbox. If you want to specify a subnet prefix, select *Create new* and configure it manually.
67+
68+
:::image type="content" source="media/tutorial-ingress-controller-add-on-new/tutorial-ingress-controller-add-on-new.png" alt-text="Screenshot of enabling AGIC addon by Portal." lightbox="media/tutorial-ingress-controller-add-on-new/tutorial-ingress-controller-add-on-new.png":::
69+
70+
# [Azure CLI](#tab/azure-cli)
71+
72+
You can give the name of the application gateway as well as subnet CIDR by the command.
73+
appgw-subnet-cidr should be in the address prefixes in your virtual network. Please change *10.0.250.0/24* to your preferred application gateway subnet CIDR. This must always be within the address space range of your virtual network.
74+
75+
```azurecli
76+
$ az aks enable-addons --resource-group ${RG_NAME} --name ${CLUSTER_NAME} --addons ingress-appgw --appgw-subnet-cidr "10.0.250.0/24"
77+
```
78+
79+
In most cases, enabling the add-on automatically assigns the required permissions. However, depending on the environment, the permissions may not be granted automatically. In such cases, you should verify the permissions and assign them manually if necessary.
80+
6081
> [!NOTE]
6182
> Please ensure the identity used by AGIC has the proper permissions. A list of permissions needed by the identity can be found here: [Configure Infrastructure - Permissions](configuration-infrastructure.md#permissions). If a custom role is not defined with the required permissions, you may use the _Network Contributor_ role.
6283

0 commit comments

Comments
 (0)