Skip to content

Commit 1057131

Browse files
authored
Merge pull request #114035 from mscatyao/caya-appgw-updates
AppGW Updates
2 parents 84c92e6 + ad59116 commit 1057131

File tree

2 files changed

+12
-8
lines changed

2 files changed

+12
-8
lines changed

articles/application-gateway/configuration-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -96,18 +96,18 @@ For this scenario, use NSGs on the Application Gateway subnet. Put the following
9696

9797
You can create a UDR to send 0.0.0.0/0 traffic directly to the Internet.
9898

99-
**Scenario 3**: UDR for Azure Kubernetes Service kubenet
99+
**Scenario 3**: UDR for Azure Kubernetes Service with kubenet
100100

101-
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you need to set up a route table to allow traffic sent to the pods to be routed to the correct node. This won't be necessary if you use Azure CNI.
101+
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you'll need a route table to allow traffic sent to the pods from Application Gateway to be routed to the correct node. This won't be necessary if you use Azure CNI.
102102

103-
To set up the route table to allow kubenet to work, use the following steps:
103+
To use the route table to allow kubenet to work, follow the steps below:
104104

105-
1. Create a Route Table resource in Azure.
106-
2. Once it's created, go to the **Routes** page.
107-
3. Add a new route:
105+
1. Go to the resource group created by AKS (the name of the resource group should begin with "MC_")
106+
2. Find the route table created by AKS in that resource group. The route table should be populated with the following information:
108107
- Address prefix should be the IP range of the pods you want to reach in AKS.
109-
- Next hop type should be **Virtual Appliance**.
110-
- Next hop address should be the IP address of the node hosting the pods within the IP range defined in the address prefix field.
108+
- Next hop type should be Virtual Appliance.
109+
- Next hop address should be the IP address of the node hosting the pods.
110+
3. Associate this route table to the Application Gateway subnet.
111111

112112
**v2 unsupported scenarios**
113113

articles/application-gateway/ssl-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,10 @@ Application Gateway supports TLS termination at the gateway, after which traffic
2424

2525
To configure TLS termination, a TLS/SSL certificate is required to be added to the listener to enable the application gateway to derive a symmetric key as per TLS/SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. The TLS/SSL certificate needs to be in Personal Information Exchange (PFX) format. This file format allows you to export the private key that is required by the application gateway to perform the encryption and decryption of traffic.
2626

27+
> [!IMPORTANT]
28+
> Please note that the certificate on the listener requires the entire certificate chain to be uploaded.
29+
30+
2731
> [!NOTE]
2832
>
2933
> Application gateway does not provide any capability to create a new certificate or send a certificate request to a certification authority.

0 commit comments

Comments
 (0)