Skip to content

Migrate from v1 to v2

This document contains the information necessary to migrate from an existing installation of AWSALBIngressController(v1) to the new AWSLoadBalancerController(v2).

Prerequisites

  • AWSALBIngressController >=v1.1.3

If you have AWSALBIngressController(<1.1.3) installed, you need to upgrade to version>=v1.1.3(e.g. v1.1.9) first.

Backwards compatibility

The AWSLoadBalancerController(v2.0.1) is backwards-compatible with AWSALBIngressController(>=v1.1.3).

It supports existing AWS resources provisioned by AWSALBIngressController(>=v1.1.3) for Ingress resources with below caveats:

  1. The AWS LoadBalancer resource created for your Ingress will be preserved. If migrating from <v1.1.3, a new AWS LoadBalancer resource will be created and the old AWS LoadBalancer will remain in the account. However, the old AWS LoadBalancer will not be used for the ingress resource.

  2. If security-groups annotation isn't used, the SecurityGroup rule on worker node's SecurityGroup that allow LoadBalancer traffic should be manually adjusted post migration.

    details

    when security-groups annotation isn't used:

    • a managed SecurityGroup will be created and attached to ALB. This SecurityGroup will be preserved.
    • an inbound rule will be added to your worker node securityGroups which allow traffic from the above managed SecurityGroup for ALB.
      • The AWSALBIngressController didn't add any description for that inbound rule.
      • The AWSLoadBalancerController will use elbv2.k8s.aws/targetGroupBinding=shared for that inbound rule
    • You'll need to manually add elbv2.k8s.aws/targetGroupBinding=shared description to that inbound rule so that AWSLoadBalancerController can delete such rule when you delete your Ingress.
      • The following shell pipeline can be used to update the rules automatically. Replace $REGION and $SG_ID with your own values. After running it change DryRun: true to DryRun: false to have it actually update your security group:
        aws --region $REGION ec2 update-security-group-rule-descriptions-ingress --cli-input-json "$(aws --region $REGION ec2 describe-security-groups --group-ids $SG_ID | jq '.SecurityGroups[0] | {DryRun: true, GroupId: .GroupId ,IpPermissions: (.IpPermissions | map(select(.FromPort==0 and .ToPort==65535) | .UserIdGroupPairs |= map(.Description="elbv2.k8s.aws/targetGroupBinding=shared"))) }' -M)"
        

    sample

    inbound rule on worker node securityGroups that allow traffic from the managed LB securityGroup before migration:

    Type Protocol Port range Source Description - optional
    All TCP TCP 0 - 65535 sg-008c920b1(managed LB SG) -

    inbound rule on worker node securityGroups that allow traffic from the managed LB securityGroup after migration:

    Type Protocol Port range Source Description - optional
    All TCP TCP 0 - 65535 sg-008c920b1(managed LB SG) elbv2.k8s.aws/targetGroupBinding=shared
  3. If you have used podReadinessGate feature, please refer PodReadinessGate for the guide about new readinessGate configuration.

    old pod readinessGate

    once configured properly, AWS Load Balancer Controller will automatically inject the new format of podReadinessGates into your pods, and remove old podReadinessGates if any.

    However, we still recommend you to remove the old podReadinessGates from your Deployments since it's not used.

Upgrade steps

  1. Determine existing installed AWSALBIngressController version.

    foo@bar:~$ kubectl describe deployment  -n kube-system  alb-ingress-controller | grep Image
        Image:      docker.io/amazon/aws-alb-ingress-controller:v1.1.9
    

  2. Uninstalling existing AWSALBIngressController(>=v1.1.3).

    Existing AWSALBIngressController needs to be uninstalled first before install new AWSLoadBalancerController.

    Existing Ingress resources do not need to be deleted.

  3. Install new AWSLoadBalancerController

    1. Install AWSLoadBalancerController(v2.4.1) by following the installation instructions
    2. Grant additional IAM policy needed for migration to the controller.
  4. Verify all Ingresses works as expected.