Home > front end >  AKS AGIC: Readiness probe failed: Get "http://192.168.0.12:8123/health/ready": context dea
AKS AGIC: Readiness probe failed: Get "http://192.168.0.12:8123/health/ready": context dea

Time:01-24

I've followed the enter image description here

AKS Cluster:

enter image description here

AppGateway:

enter image description here

and I have installed the AGIC by running the following commands

az account set --subscription "Dev3-Tooling" 
az aks get-credentials --resource-group "rg-active-stag" --name "aks-cluster1"
kubectl apply -f https://raw.githubusercontent.com/Azure/aad-pod-identity/v1.8.6/deploy/infra/deployment.yaml --insecure-skip-tls-verify
helm repo add application-gateway-kubernetes-ingress https://appgwingress.blob.core.windows.net/ingress-azure-helm-package/
helm repo update
helm install ingress-azure  -f helm-config.yaml application-gateway-kubernetes-ingress/ingress-azure  --version 1.5.0

Azure Ingress Pod is in the unhealthy state

enter image description here

enter image description here

and I am getting the following error while trying to access the application deployed

enter image description here

CodePudding user response:

I have tried to repro same in my lab environment and got below results.

Step-1:

After provisioning kubernetes cluster and Application Gateway, connect to the cluster using the below command

$ az aks get-credentials -g <resourceGroupName> -n <cluster-name>

Step-2:

Install Azure AD Pod identity for token-based access control

Refer the below command, if your cluster is RBAC enabled.

kubectl create -f https://raw.githubusercontent.com/azure/aad-pod-identity/master/deploy/infra/deployment-rbac.yaml"

Refer the below command, if your cluster is RBAC disabled.

kubectl create -f https://raw.githubusercontent.com/azure/aad-pod-identity/master/deploy/infra/deployment.yaml

Step-3:

Add application gateway ingress controller to the helm repository.

`$helm repo add application-gateway-kubernetes-ingress https://appgwingress.blob.core.windows.net/ingress-azure-helm-package/

$helm repo update

Step-4

Now write helm configuration file and save it to helm-config.yaml as below.

verbosityLevel: 3  
appgw:  
subscriptionId: <subscriptionId>  
resourceGroup: <resourceGroupName>  
name: <applicationGatewayName>  
shared: false  
armAuth:  
type: aadPodIdentity  
identityResourceID: <identityResourceId>  
identityClientID: <identityClientId>  
rbac:  
enabled: false # true/false  
aksClusterConfiguration:  
apiServerAddress: <aks-api-server-address>  

Step-5:

Now, install AGIC using above file.

$helm install -f helm-config.yaml --generate-name application-gateway-kubernetes-ingress/ingress-azure

After performing the above steps, you can verify ingress service using the below command.

$ kubectl get ingress

enter image description here Access the IP address in above screenshot, you will be able to access the application.

  • Related