Skip to content

Commit 093fe5c

Browse files
authored
Merge pull request #108692 from TimShererWithAquent/us1679050x
Change SSL to TLS per 1679050
2 parents 71cd2e4 + 2bd6d3c commit 093fe5c

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/application-gateway/ingress-controller-annotations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For an Ingress resource to be observed by AGIC, it **must be annotated** with `k
2222
| Annotation Key | Value Type | Default Value | Allowed Values
2323
| -- | -- | -- | -- |
2424
| [appgw.ingress.kubernetes.io/backend-path-prefix](#backend-path-prefix) | `string` | `nil` | |
25-
| [appgw.ingress.kubernetes.io/ssl-redirect](#ssl-redirect) | `bool` | `false` | |
25+
| [appgw.ingress.kubernetes.io/ssl-redirect](#tls-redirect) | `bool` | `false` | |
2626
| [appgw.ingress.kubernetes.io/connection-draining](#connection-draining) | `bool` | `false` | |
2727
| [appgw.ingress.kubernetes.io/connection-draining-timeout](#connection-draining) | `int32` (seconds) | `30` | |
2828
| [appgw.ingress.kubernetes.io/cookie-based-affinity](#cookie-based-affinity) | `bool` | `false` | |
@@ -65,7 +65,7 @@ In the example above, we have defined an ingress resource named `go-server-ingre
6565
> [!NOTE]
6666
> In the above example we have only one rule defined. However, the annotations are applicable to the entire ingress resource, so if a user had defined multiple rules, the backend path prefix would be set up for each of the paths specified. Thus, if a user wants different rules with different path prefixes (even for the same service) they would need to define different ingress resources.
6767

68-
## SSL Redirect
68+
## TLS Redirect
6969

7070
Application Gateway [can be configured](https://docs.microsoft.com/azure/application-gateway/application-gateway-redirect-overview)
7171
to automatically redirect HTTP URLs to their HTTPS counterparts. When this

articles/application-gateway/ingress-controller-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ Using Application Gateway in addition to AGIC also helps protect your AKS cluste
2626
AGIC is configured via the Kubernetes [Ingress resource](https://kubernetes.io/docs/user-guide/ingress/), along with Service and Deployments/Pods. It provides a number of features, leveraging Azure’s native Application Gateway L7 load balancer. To name a few:
2727
- URL routing
2828
- Cookie-based affinity
29-
- SSL termination
30-
- End-to-end SSL
29+
- TLS termination
30+
- End-to-end TLS
3131
- Support for public, private, and hybrid web sites
3232
- Integrated web application firewall
3333

0 commit comments

Comments
 (0)