You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/ingress.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure ingress with Azure Kubernetes Service (AKS) cluster
3
-
description: Install and configure an NGINX ingress controller in an Azure Kubernetes Service (AKS) cluster.
3
+
description: Learn how to install and configure an NGINX ingress controller that uses Let's Encrypt for automatic SSL certificate generation in an Azure Kubernetes Service (AKS) cluster.
4
4
services: container-service
5
5
author: iainfoulds
6
6
manager: jeconnoc
@@ -12,7 +12,7 @@ ms.author: iainfou
12
12
ms.custom: mvc
13
13
---
14
14
15
-
# HTTPS Ingress on Azure Kubernetes Service (AKS)
15
+
# Deploy an HTTPS ingress controller on Azure Kubernetes Service (AKS)
16
16
17
17
An ingress controller is a piece of software that provides reverse proxy, configurable traffic routing, and TLS termination for Kubernetes services. Kubernetes ingress resources are used to configure the ingress rules and routes for individual Kubernetes services. Using an ingress controller and ingress rules, a single external address can be used to route traffic to multiple services in a Kubernetes cluster.
18
18
@@ -125,7 +125,7 @@ clusterissuer.certmanager.k8s.io/letsencrypt-prod created
125
125
126
126
## Create a certificate object
127
127
128
-
Next, a certificate resource must be created. The certificate resource defines the desired X.509 certificate. For more information, see, [cert-manager certificates][cert-manager-certificates].
128
+
Next, a certificate resource must be created. The certificate resource defines the desired X.509 certificate. For more information, see [cert-manager certificates][cert-manager-certificates].
129
129
130
130
Create the certificate resource, such as `certificates.yaml`, with the following example manifest. Update the *dnsNames* and *domains* to the DNS name you created in a previous step.
131
131
@@ -185,7 +185,7 @@ Both applications are now running on your Kubernetes cluster, however they're co
185
185
186
186
In the following example, traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/` is routed to the service named `aks-helloworld`. Traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/hello-world-two` is routed to the `ingress-demo` service. Update the *hosts* and *host* to the DNS name you created in a previous step.
187
187
188
-
Create a file name`hello-world-ingress.yaml` and copy in the following example YAML:
188
+
Create a file named`hello-world-ingress.yaml` and copy in the following example YAML:
0 commit comments