Skip to content

Commit 3e2ad11

Browse files
authored
outline update (#56)
1 parent 4495658 commit 3e2ad11

File tree

3 files changed

+11
-13
lines changed

3 files changed

+11
-13
lines changed

labs/lab5/readme.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1189,17 +1189,15 @@ Submit your Nginx Configuration.
11891189
}
11901190
```
11911191
1192-
Submit your Nginx Configuration.
1193-
1194-
### Test Nginx for Azure to NIC Headless
1192+
Submit your Nginx Configuration.
11951193
11961194
1. Open Chrome to http://cafe.example.com/coffee, and hit refresh several times. Inspect the page with Dev Tools, you should see the updated Header value = `aks2_nic_headless`. Notice the `Ingress Controller IP` address is the same as your NIC Pod. Watch your Nginx Ingress Dashboard on AKS2, you will see traffic on all three coffee pods.
11971195
1198-
*Optional:* Fire up a loadtest with WRK again, modify your Upstream Selected Filter in Azure Monitor and add `aks2_nic_headless`. All the traffic should be going there.
1196+
*Optional:* Fire up a loadtest with WRK again, modify your Upstream Selected Filter in Azure Monitor and add `aks2_nic_headless`. All the traffic should be going there.
11991197
1200-
**Advanced Deep Dive Exercise:** If you `SCALE UP` the number of Nginx Ingress Pods, the Nginx Ingress Headless Service will represent all of the NIC Replicas. As the Nginx for Azure Resolver is set to re-query every 10 seconds, it should pick up this change in the Nginx Headless Endpoints list quickly. Using the A records from Kube-DNS, Nginx for Azure will update its `aks2_nic_headless` Upstream list, and load balance traffic to ALL the NIC Replicas. You can see the Upstreams List in Azure Monitoring.
1198+
**Advanced Deep Dive Exercise:** If you `SCALE UP` the number of Nginx Ingress Pods, the Nginx Ingress Headless Service will represent all of the NIC Replicas. As the Nginx for Azure Resolver is set to re-query every 10 seconds, it should pick up this change in the Nginx Headless Endpoints list quickly. Using the A records from Kube-DNS, Nginx for Azure will update its `aks2_nic_headless` Upstream list, and load balance traffic to ALL the NIC Replicas. You can see the Upstreams List in Azure Monitoring.
12011199
1202-
Give it a try:
1200+
Give it a try:
12031201
12041202
1. Scale UP the number of Nginx Ingress Controllers running to 3:
12051203
@@ -1249,17 +1247,17 @@ Give it a try:
12491247
Events: <none>
12501248
```
12511249
1252-
If you recall, 172.16.20.70 was your first Nginx Ingress Pod, now you have 2 more, 172.16.20.25 and 172.16.20.37. If you `kubectl describe pod` on each one, the NIC Pod IP Addresses will match the Headless Service list, that's how Kubernetes Services work.
1250+
If you recall, 172.16.20.70 was your first Nginx Ingress Pod, now you have 2 more, 172.16.20.25 and 172.16.20.37. If you `kubectl describe pod` on each one, the NIC Pod IP Addresses will match the Headless Service list, that's how Kubernetes Services work.
12531251

12541252
1. Test with Chrome. Open your browser to http://cafe.example.com/coffee, and Refresh several times. Watch the `Ingress Controller IP address`, it will change to the 3 NIC Pod IPs, 172.16.20.70, .25, and .37 in this example. Nginx for Azure is load balancing all three Ingress Controllers.
12551253

1256-
NOTE: The aks2_nic_headless Upstream is configured for `least_time last_byte`, so Nginx for Azure will choose the fastest NIC Pod. If you want to see it in Round-Robin mode, comment out the `least_time last_byte` directive.
1254+
NOTE: The aks2_nic_headless Upstream is configured for `least_time last_byte`, so Nginx for Azure will choose the fastest NIC Pod. If you want to see it in Round-Robin mode, comment out the `least_time last_byte` directive.
12571255

12581256
1. Scale your NICs back to just ONE Pod, and check again with Chrome. Now there is only one Nginx Ingress Controller IP being used, as when you started.
12591257

1260-
**NOTE:** It is considered a Best Practice, to run at least THREE Nginx Ingress Controllers for Production workloads, to provide High Availability and additional traffic processing power for your Applications' Pods and Services. Nginx for Azure can work with your Nginx Ingress Controllers nicely to achieve this requirement, as shown here.
1258+
**NOTE:** It is considered a Best Practice, to run at least THREE Nginx Ingress Controllers for Production workloads, to provide High Availability and additional traffic processing power for your Applications' Pods and Services. Nginx for Azure can work with your Nginx Ingress Controllers nicely to achieve this requirement, as shown here.
12611259
1262-
**Optional Exercise:** Install a DNS testing Pod in your Cluster, like busy-box or Ubuntu, and use `dig or nslookup` to query the A records from Kube-DNS.
1260+
**Optional Exercise:** Install a DNS testing Pod in your Cluster, like busy-box or Ubuntu, and use `dig or nslookup` to query the A records from Kube-DNS.
12631261
12641262
## Wrap Up
12651263

labs/lab8/readme.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Lab 8: NGINXaaS with Entra ID / Azure AD
1+
# Lab 8: Nginx for Azure with Entra ID / Azure AD
22

33
<br/>
44

labs/readme.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,8 @@ NGINXaaS for Azure | NGINX Plus | Kubernetes | Docker | Redis
7474
### Lab 7: Azure Key Vault / TLS Essentials
7575
- [Lab 7: Azure Key Vault / TLS Essentials](lab7/readme.md)
7676

77-
### Lab 8: Nginx Garage Demo
78-
- [Lab 8: Nginx Garage Demo](lab8/readme.md)
77+
### Lab 8: Nginx for Azure with Entra ID / Azure AD
78+
- [Lab 8: Nginx for Azure with Entra ID / Azure AD](lab8/readme.md)
7979

8080
### Lab 9: Nginx Caching / Rate Limits / Juiceshop
8181
- [Lab9: Nginx Caching / Rate Limits / Juiceshop](lab9/readme.md)

0 commit comments

Comments
 (0)