7 min • read

Upgrade Emissary-ingress 1.14.X to Emissary-ingress 2.3.1 (YAML)

We're pleased to introduce Emissary-ingress 2.3.1! The 2.X family introduces a number of changes to allow Emissary-ingress to more gracefully handle larger installations (including multitenant or multiorganizational installations), reduce memory footprint, and improve performance. In keeping with SemVer, Emissary-ingress 2.X introduces some changes that aren't backward-compatible with 1.X. These changes are detailed in Major Changes in Emissary-ingress 2.X.

Migration Overview

The recommended strategy for migration is to run Emissary-ingress 1.14 and Emissary-ingress 2.3.1 side-by-side in the same cluster. This gives Emissary-ingress 2.3.1 and Emissary-ingress 1.14 access to all the same configuration resources, with some important caveats:

  1. Emissary-ingress 1.14 will not see any getambassador.io/v3alpha1 resources.

    This is intentional; it provides a way to apply configuration only to Emissary-ingress 2.3.1, while not interfering with the operation of your Emissary-ingress 1.14 installation.

  2. If needed, you can use labels to further isolate configurations.

    If you need to prevent your Emissary-ingress 2.3.1 installation from seeing a particular bit of Emissary-ingress 1.14 configuration, you can apply a Kubernetes label to the configuration resources that should be seen by your Emissary-ingress 2.3.1 installation, then set its AMBASSADOR_LABEL_SELECTOR environment variable to restrict its configuration to only the labelled resources.

    For example, you could apply a version-two: true label to all resources that should be visible to Emissary-ingress 2.3.1, then set AMBASSADOR_LABEL_SELECTOR=version-two=true in its Deployment.

  3. Be careful about label selectors on Kubernetes Services!

    If you have services in Emissary-ingress 1.14 that use selectors that will match Pods from Emissary-ingress 2.3.1, traffic will be erroneously split between Emissary-ingress 1.14 and Emissary-ingress 2.3.1. The labels used by Emissary-ingress 2.3.1 include:

    yaml
    app.kubernetes.io/name: emissary-ingress
    app.kubernetes.io/instance: emissary-ingress
    app.kubernetes.io/part-of: emissary-ingress
    app.kubernetes.io/managed-by: getambassador.io
    product: aes
    profile: main
  4. Be careful to only have one Emissary-ingress Agent running at a time.

    The Emissary-ingress Agent is responsible for communications between Emissary-ingress and Ambassador Cloud. If multiple versions of the Agent are running simultaneously, Ambassador Cloud could see conflicting information about your cluster.

    The migration YAML used below to install Emissary-ingress 2.3.1 will not install a duplicate agent. If you are building your own YAML, make sure not to include a duplicate agent.

You can also migrate by installing Emissary-ingress 2.3.1 in a separate cluster. This permits absolute certainty that your Emissary-ingress 1.14 configuration will not be affected by changes meant for Emissary-ingress 2.3.1, and it eliminates concerns about ACME, but it is more effort.

Side-by-Side Migration Steps

Migration is a seven-step process:

  1. Make sure that older configuration resources are not present.

    Emissary-ingress 2.X does not support getambassador.io/v0 or getambassador.io/v1 resources, and Kubernetes will not permit removing support for CRD versions that are still in use for stored resources. To verify that no resources older than getambassador.io/v2 are active, run

    shell
    kubectl get crds -o 'go-template={{range .items}}{{.metadata.name}}={{.status.storedVersions}}{{"\n"}}{{end}}' | fgrep getambassador.io

    If v1 is present in the output, do not begin migration. The old resources must be converted to getambassador.io/v2 and the storedVersion information in the cluster must be updated. If necessary, contact Ambassador Labs on Slack for more information.

  2. Install new CRDs.

    Before installing Emissary-ingress 2.3.1 itself, you must configure your Kubernetes cluster to support its new getambassador.io/v3alpha1 configuration resources. Note that getambassador.io/v2 resources are still supported, but you must install support for getambassador.io/v3alpha1 to run Emissary-ingress 2.3.1, even if you intend to continue using only getambassador.io/v2 resources for some time.

    shell
    kubectl apply -f https://app.getambassador.io/yaml/emissary/2.3.1/emissary-crds.yaml
    kubectl wait --timeout=90s --for=condition=available deployment emissary-apiext -n emissary-system
  3. Install Emissary-ingress 2.3.1.

    After installing the new CRDs, you need to install Emissary-ingress 2.3.1 itself in the same namespace as your existing Emissary-ingress 1.14 installation. It's important to use the same namespace so that the two installations can see the same secrets, etc.

    We publish two manifests for different namespaces. Use only the one that matches the namespace into which you installed Emissary-ingress 1.14:

    If you installed Emissary-ingress 1.14 into some other namespace, you'll need to download one of the files and edit it to match your namespace.

    If you need to set AMBASSADOR_LABEL_SELECTOR, you'll need to download your chosen file and and edit it to do so.

    Assuming that you're using the default namespace:

    shell
    kubectl apply -f https://app.getambassador.io/yaml/emissary/2.3.1/emissary-defaultns.yaml && \
    kubectl rollout status -n default deployment/edge-stack -w
  4. Install Listeners and Hosts as needed.

    An important difference between Emissary-ingress 1.14 and Emissary-ingress 2.3.1 is the new mandatory Listener CRD. Also, when running both installations side by side, you will need to make sure that a Host is present for the new Emissary-ingress 2.3.1 Service. For example:

    bash
    kubectl apply -f - <<EOF
    ---
    apiVersion: getambassador.io/v3alpha1
    kind: Listener
    metadata:
    name: ambassador-http-listener
    spec:
    port: 8080
    protocol: HTTPS
    securityModel: XFP
    hostBinding:
    namespace:
    from: ALL
    ---
    apiVersion: getambassador.io/v3alpha1
    kind: Listener
    metadata:
    name: ambassador-https-listener
    spec:
    port: 8443
    protocol: HTTPS
    securityModel: XFP
    hostBinding:
    namespace:
    from: ALL
    ---
    apiVersion: getambassador.io/v3alpha1
    kind: Host
    metadata:
    name: emissary-host
    spec:
    hostname: $EMISSARY_HOSTNAME
    tlsSecret:
    name: $EMISSARY_TLS_SECRET
    EOF

    This example requires that you know the hostname for the Emissary-ingress Service ($EMISSARY_HOSTNAME) and that you have created a TLS Secret for it in $EMISSARY_TLS_SECRET.

  5. Test!

    Your Emissary-ingress 2.3.1 installation can support the getambassador.io/v2 configuration resources used by Emissary-ingress 1.14, but you may need to make some changes to the configuration, as detailed in the documentation on configuring Emissary-ingress Communications and updating CRDs to getambassador.io/v3alpha1.

    If you find that you need to roll back, just reinstall your 1.14 CRDs and delete your installation of Emissary-ingress 2.3.1.

  6. When ready, switch over to Emissary-ingress 2.3.1.

    You can run Emissary-ingress 1.14 and Emissary-ingress 2.3.1 side-by-side as long as you care to. However, taking full advantage of Emissary-ingress 2.X's capabilities requires updating your configuration to use getambassador.io/v3alpha1 configuration resources, since some useful features in Emissary-ingress 2.3.1 are only available using getambassador.io/v3alpha1 resources.

    When you're ready to have Emissary-ingress 2.3.1 handle traffic on its own, switch your original Emissary-ingress 1.14 Service to point to Emissary-ingress 2.3.1. Use kubectl edit service ambassador and change the selectors to:

    shell
    app.kubernetes.io/instance: emissary-ingress
    app.kubernetes.io/name: emissary-ingress
    profile: main

    Repeat using kubectl edit service ambassador-admin for the ambassador-admin Service.

Congratulations! At this point, Emissary-ingress 2.3.1 is fully running and it's safe to remove the ambassador and ambassador-agent Deployments:

shell
kubectl delete deployment/ambassador deployment/ambassador-agent

Once Emissary-ingress 1.14 is no longer running, you may convert any remaining getambassador.io/v2 resources to getambassador.io/v3alpha1. You may also want to redirect DNS to the edge-stack Service and remove the ambassador Service.