Migrating from Cloud Connector to
AKO

Cloud connector (CC) is not supported from
Avi Load Balancer Controller
version 20.1 onwards. To migrate the existing workload present in a Kubernetes cluster from
Avi Load Balancer Controller
running the OpenShift/Kubernetes cloud using cloud connector to
AKO
based
Avi Load Balancer Controller
, following two features are used:

Namespace-Driven Inclusion/Exclusion of OpenShift/Kubernetes Applications

For migration, the exclusion feature allows ingresses/routes from specific namespace(s) to be deleted (excluded) from the
Avi Load Balancer Controller
. For that, the namespace has to be labelled with the same key:value pair as that of exclude attribute and exclude value mentioned in cloud. This feature is supported in
Avi Load Balancer Controller
running the OpenShift/Kubernetes cloud using cloud connector.

The Namespace Sync feature

The namespace sync feature allows Kubernetes objects from specific namespace to be synced with an
AKO
based
Avi Load Balancer Controller
. For that, the namespace has to be labelled with same key:value pair as that labelKey and labelValue mentioned in values.yaml file.
For more information, see Namespace Sync in AKO.

Environments

This migration activity is currently supported for vCenter cloud with Kubernetes based workloads.

Workflow

This section explains the steps of migration

Pre-requisites

  • Setup a new Controller (compatible with AKO version 1.4.1 and above)
  • Setup a new vCenter cloud with write access
  • Setup an IPAM on vCenter cloud. It is recommended to configure IPAM on vCenter cloud with non-overlapping usable network to avoid IP address conflict or non-availability of IP address after migration
  • Setup a DNS Service on vCenter cloud
  • Replicate the
    Avi Load Balancer
    side objects, referred by Ingresses/Services as part of
    AVI_PROXY
    annotations, to the new Controller.
  • Ensure the
    AKO
    version is 1.4.1 and above.

Deploying
AKO
CRDs

For each
AVI_PROXY
annotation present in an ingress, create the corresponding AKO Http rule/Host rule/ AviInfrasetting rule. For more information, see Setting up Routing Rules using CRDs.
If any
AVI_PROXY
annotation is not supported by these CRDs, then the virtual service which is migrated to
AKO
based
Avi Load Balancer Controller
will not have same features as that as the
Avi Load Balancer Controller
running the OpenShift/Kubernetes cloud using cloud connector.
List of
AVI_PROXY
annotations supported by
AKO
CRDs will be published soon.

Deploying
AKO

With
AKO
, the SEs are deployed outside the Kubernetes cluster. So deploy
AKO
with static routing set to true or false depending upon the POD network reachability and with namespace sync feature enabled.
AKOSettings: . . # NamespaceSelector contains label key and value used for namespacemigration # Same label has to be present on namespace/s which needs migration/sync to AKO namespaceSelector: labelKey: "app" labelValue: "migrate" . .
As an example,
AKO
is deployed with app as a key and migrate as a value for namespace selector. So
AKO
will sync up all objects from namespace(s) which has this label and corresponding
Avi Load Balancer
objects will be created in the
Avi Load Balancer Controller
.

Excluding Namespace-Driven OpenShift/Kubernetes Applications

Set an exclude attribute and exclude value for Openshift/Kubernetes cloud either from the
Avi Load Balancer
UI or CLI.
The key and value should be same as mentioned in values.yaml of
AKO
.
  • Set up an exclude attribute and exclude value using the UI as shown below:
  • Set up an exclude attribute and exclude value using
    Avi Load Balancer
    shell:
    [admin:cc-controller-host-name]: > configure cloud Default-Cloud [admin:cc-controller-host-name]: cloud> oshiftk8s_configuration [admin:cc-controller-host-name]: cloud:oshiftk8s_configuration> ns_exclude_attributes [admin:cc-controller-host-name]: cloud:oshiftk8s_configuration:ns_exclude_attributes> attribute app [admin:cc-controller-host-name]: cloud:oshiftk8s_configuration:ns_exclude_attributes> value migrate [admin:cc-controller-host-name]: cloud:oshiftk8s_configuration:ns_exclude_attributes> save [admin:cc-controller-host-name]: cloud:oshiftk8s_configuration> save [admin:cc-controller-host-name]: cloud> save
In this example, the exclude attribute is set as app and the exclude value is set as migrate. This deletes virtual services of namespace(s), which has same label, from the
Avi Load Balancer Controller
running the OpenShift/Kubernetes cloud using cloud connector.

Setting Kubernetes Namespace Label

Label namespace(s) in a Kubernetes cluster with the same key:value pair.
apiVersion: v1 kind: Namespace metadata: . labels: app: migrate name: red . .
As shown in the example, the
red
namespace is labelled with
app: migrate
. This will result in deletion of virtual services of
red
namespace from the
Avi Load Balancer Controller
running the OpenShift/Kubernetes cloud using the cloud connector and creation of new virtual services for red namespace in
AKO
-based
Avi Load Balancer Controller
.
There will be traffic disruption during migration.

Internal Testing

The newly created objects in an
AKO
-based
Avi Load Balancer Controller
may get new VIPs. Hence, the internal traffic tests need to be performed for migrated applications.
After successful testing, migrate objects from other namespaces by labelling the namespace one by one.

Redirecting Client Traffic

After migrating all the L4-L7 applications to an
AKO
-based
Avi Load Balancer Controller
, the client traffic can be redirected to new VIPs by one of the following ways:
  • Change DNS server entry in corporate DNS server to point to new DNS service on the
    AKO
    -based
    Avi Load Balancer Controller
    .
  • Change IP address of DNS service running on
    AKO
    based
    Avi Load Balancer Controller
    with IP address of DNS service present on
    Avi Load Balancer Controller
    running the OpenShift/Kubernetes cloud using the cloud connector if IPAM from both clouds have overlapping subnets.

Cleaning Up of Cloud Connector (OpenShift Cloud)

After migrating all the Kubernetes objects, the old OpenShift/Kubernetes cloud can be deleted.