Open galiacheng opened 2 years ago
Any update on this? Issue #717 is related to this one. My solution does not allow for AppGW v2 so I'm stuck with v1. It seems moving the SKU validation would be my best bet although I'm not sure if this would be much work. @mscatyao Can you perhaps point me in the right direction?
@galiacheng I just got the same problem, did you find any solutions?
Same problem here. Have a Standard_v2 application gateway with the EnableApplicationGatewayNetworkIsolation preview, and the controller is throwing
Error:Code="ErrorNoPublicIP" Message="Applcation Gateway doesn't have a public IP"
I'm curious if the AGIC was never updated to handle a fully private appgw?
https://github.com/Azure/application-gateway-kubernetes-ingress/issues/1423#issuecomment-1194455124
UPDATE - I discovered the AKS Addon was installing 1.5.3 while the private appgw was implemented in 1.7.0-RC. Upgrading kubernetes to 1.27.x brings AGIC Addon 1.7.x.
https://github.com/Azure/application-gateway-kubernetes-ingress/blob/master/CHANGELOG/CHANGELOG-1.7.md https://github.com/Azure/AKS/blob/master/CHANGELOG.md
Describe the bug AGIC 1.5.1 crashed when working with internal Application Gateway, error message:
To Reproduce Steps to reproduce the behavior:
Create internal Application Gateway: Follow Configure an application gateway with an internal load balancer (ILB) endpoint to provision Standard tier application gateway on subnet(10.3.0.0/28). The frontend IP is
10.3.0.6
.Enable AGIC 1.5.1 See helm configuration:
Verbosity level of the App Gateway Ingress Controller
verbosityLevel: 3
################################################################################
Specify which application gateway the ingress controller will manage
# appgw: subscriptionId: 260524c9-7a4d-4483-8d85-de54f9c40ae8 resourceGroup: haiche-aks-1-gateway-1 name: appgw1voa5jhws7maoc usePrivateIP: true
################################################################################
Specify which Kubernetes namespace the ingress controller will watch
Default value is "default"
Leaving this variable out or setting it to blank or empty string would
result in ingress controller observing all acessible namespaces.
# kubernetes: watchNamespace: sample-domain1-ns
################################################################################
Specify the authentication with Azure Resource Manager
#
Two authentication methods are available:
- Option 1: AAD-Pod-Identity (https://github.com/Azure/aad-pod-identity)
armAuth:
type: aadPodIdentity
identityResourceID:
identityClientID:
armAuth: type: servicePrincipal secretJSON:
################################################################################
Specify if the cluster is RBAC enabled or not
rbac:
Specifies whether RBAC resources should be created
create: true
goroutine 19 [chan receive]: k8s.io/klog/v2.(*loggingT).flushDaemon(0x0) /go/pkg/mod/k8s.io/klog/v2@v2.9.0/klog.go:1169 +0x6a created by k8s.io/klog/v2.init.0 /go/pkg/mod/k8s.io/klog/v2@v2.9.0/klog.go:420 +0xfb