Skip to content

Commit 0fac4a6

Browse files
committed
[AKS] Final edits
1 parent 4ddcaf3 commit 0fac4a6

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/ingress.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure ingress with Azure Kubernetes Service (AKS) cluster
3-
description: Install and configure an NGINX ingress controller in an Azure Kubernetes Service (AKS) cluster.
3+
description: Learn how to install and configure an NGINX ingress controller that uses Let's Encrypt for automatic SSL certificate generation in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
author: iainfoulds
66
manager: jeconnoc
@@ -12,7 +12,7 @@ ms.author: iainfou
1212
ms.custom: mvc
1313
---
1414

15-
# HTTPS Ingress on Azure Kubernetes Service (AKS)
15+
# Deploy an HTTPS ingress controller on Azure Kubernetes Service (AKS)
1616

1717
An ingress controller is a piece of software that provides reverse proxy, configurable traffic routing, and TLS termination for Kubernetes services. Kubernetes ingress resources are used to configure the ingress rules and routes for individual Kubernetes services. Using an ingress controller and ingress rules, a single external address can be used to route traffic to multiple services in a Kubernetes cluster.
1818

@@ -125,7 +125,7 @@ clusterissuer.certmanager.k8s.io/letsencrypt-prod created
125125
126126
## Create a certificate object
127127
128-
Next, a certificate resource must be created. The certificate resource defines the desired X.509 certificate. For more information, see, [cert-manager certificates][cert-manager-certificates].
128+
Next, a certificate resource must be created. The certificate resource defines the desired X.509 certificate. For more information, see [cert-manager certificates][cert-manager-certificates].
129129
130130
Create the certificate resource, such as `certificates.yaml`, with the following example manifest. Update the *dnsNames* and *domains* to the DNS name you created in a previous step.
131131
@@ -185,7 +185,7 @@ Both applications are now running on your Kubernetes cluster, however they're co
185185

186186
In the following example, traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/` is routed to the service named `aks-helloworld`. Traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/hello-world-two` is routed to the `ingress-demo` service. Update the *hosts* and *host* to the DNS name you created in a previous step.
187187

188-
Create a file name `hello-world-ingress.yaml` and copy in the following example YAML:
188+
Create a file named `hello-world-ingress.yaml` and copy in the following example YAML:
189189

190190
```yaml
191191
apiVersion: extensions/v1beta1

0 commit comments

Comments
 (0)