You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,18 +96,18 @@ For this scenario, use NSGs on the Application Gateway subnet. Put the following
96
96
97
97
You can create a UDR to send 0.0.0.0/0 traffic directly to the Internet.
98
98
99
-
**Scenario 3**: UDR for Azure Kubernetes Service kubenet
99
+
**Scenario 3**: UDR for Azure Kubernetes Service with kubenet
100
100
101
-
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you need to set up a route table to allow traffic sent to the pods to be routed to the correct node. This won't be necessary if you use Azure CNI.
101
+
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you'll need a route table to allow traffic sent to the pods from Application Gateway to be routed to the correct node. This won't be necessary if you use Azure CNI.
102
102
103
-
To set up the route table to allow kubenet to work, use the following steps:
103
+
To use the route table to allow kubenet to work, follow the steps below:
104
104
105
-
1. Create a Route Table resource in Azure.
106
-
2. Once it's created, go to the **Routes** page.
107
-
3. Add a new route:
105
+
1. Go to the resource group created by AKS (the name of the resource group should begin with "MC_")
106
+
2. Find the route table created by AKS in that resource group. The route table should be populated with the following information:
108
107
- Address prefix should be the IP range of the pods you want to reach in AKS.
109
-
- Next hop type should be **Virtual Appliance**.
110
-
- Next hop address should be the IP address of the node hosting the pods within the IP range defined in the address prefix field.
108
+
- Next hop type should be Virtual Appliance.
109
+
- Next hop address should be the IP address of the node hosting the pods.
110
+
3. Associate this route table to the Application Gateway subnet.
Copy file name to clipboardExpand all lines: articles/application-gateway/ssl-overview.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,10 @@ Application Gateway supports TLS termination at the gateway, after which traffic
24
24
25
25
To configure TLS termination, a TLS/SSL certificate is required to be added to the listener to enable the application gateway to derive a symmetric key as per TLS/SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. The TLS/SSL certificate needs to be in Personal Information Exchange (PFX) format. This file format allows you to export the private key that is required by the application gateway to perform the encryption and decryption of traffic.
26
26
27
+
> [!IMPORTANT]
28
+
> Please note that the certificate on the listener requires the entire certificate chain to be uploaded.
29
+
30
+
27
31
> [!NOTE]
28
32
>
29
33
> Application gateway does not provide any capability to create a new certificate or send a certificate request to a certification authority.
0 commit comments