-
Notifications
You must be signed in to change notification settings - Fork 566
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update network-topology-connectivity.md to reflect app gateway should not be used with ingress controller #1372
base: main
Are you sure you want to change the base?
Conversation
Added note that app gateway in front of ingress controller is not supported.
@Vallentyne : Thanks for your contribution! The author(s) have been notified to review your proposed change. |
Learn Build status updates of commit b32e54d: ✅ Validation status: passed
For more details, please refer to the build report. For any questions, please:
|
@@ -58,7 +58,7 @@ Use incoming (ingress) controllers to expose applications running in the Azure R | |||
- [Ingress controllers](https://docs.openshift.com/container-platform/latest/networking/ingress-operator.html) provide application-level routing with only a slight increase in complexity. | |||
- Azure Red Hat OpenShift creates a generic DNS entry that simplifies access to exposed applications in the cluster. An example DNS entry is `*.apps.<cluster-ID>.<region>.aroapp.io`. It's useful for a private cluster to route traffic for the application. | |||
- Azure Red Hat OpenShift offers a built-in [Ingress controller and routes](https://docs.openshift.com/container-platform/latest/networking/configuring_ingress_cluster_traffic/configuring-ingress-cluster-traffic-ingress-controller.html). | |||
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). | |||
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). **Note** that using Application Gateway with Azure Red Hat Openshift ingress controllers defined as backend settings is **NOT** supported due to service chaining. Follow the design guidance in this article. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). **Note** that using Application Gateway with Azure Red Hat Openshift ingress controllers defined as backend settings is **NOT** supported due to service chaining. Follow the design guidance in this article. | |
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). Using Azure Application Gateway with Azure Red Hat OpenShift ingress controllers defined in backend pools is not supported due to service chaining. Follow the design guidance in this article. |
@@ -58,7 +58,7 @@ Use incoming (ingress) controllers to expose applications running in the Azure R | |||
- [Ingress controllers](https://docs.openshift.com/container-platform/latest/networking/ingress-operator.html) provide application-level routing with only a slight increase in complexity. | |||
- Azure Red Hat OpenShift creates a generic DNS entry that simplifies access to exposed applications in the cluster. An example DNS entry is `*.apps.<cluster-ID>.<region>.aroapp.io`. It's useful for a private cluster to route traffic for the application. | |||
- Azure Red Hat OpenShift offers a built-in [Ingress controller and routes](https://docs.openshift.com/container-platform/latest/networking/configuring_ingress_cluster_traffic/configuring-ingress-cluster-traffic-ingress-controller.html). | |||
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). | |||
- You can use Azure Red Hat OpenShift ingress with [Azure Front Door](/azure/openshift/howto-secure-openshift-with-front-door). **Note** that using Application Gateway with Azure Red Hat Openshift ingress controllers defined as backend settings is **NOT** supported due to service chaining. Follow the design guidance in this article. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you have a link to include here that defines service chaining so a customer understands why that is a bad thing?
@Welasco - fyi, for review if needed. #label:"aq-pr-triaged" |
Added note that app gateway in front of ARO ingress controller is not supported.
Before selecting the "Create pull request" button:
Enter a meaningful title above^, using a prefix if necessary and keywords "New" or "Update" indicating the nature of changes.
Describe the summary, scope, and intent of this PR:
The usual design patterns for app presentation in Azure Landing Zones (namely application gateways in front of web workloads) are actually not supported and need stronger warnings in the documentation.
Insert links(s) to any related work item(s) or supporting detail:
AFTER YOUR PR HAS BEEN CREATED, expand this section for tips and additional instructions.
These are common guidelines for contributions across the repos managed by the Cloud Architecture Content Team (CACT). Some repositories may have additional specific requirements that are not listed here.
Guidance for all contributors
Additional guidance for private repos and internal contributors
@MicrosoftDocs/cloud-architecture-content-team-pr-reviewers
in your PR and someone will get back to you. After CACT review is complete, aCACT #sign-off
will be added.@MicrosoftDocs/cloud-architecture-content-team-pr-reviewers