Skip to content

Commit 4420eae

Browse files
Change SSL to TLS.
1 parent 3c9030f commit 4420eae

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/application-gateway/ingress-controller-annotations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ In the example above, we have defined an ingress resource named `go-server-ingre
6565
> [!NOTE]
6666
> In the above example we have only one rule defined. However, the annotations are applicable to the entire ingress resource, so if a user had defined multiple rules, the backend path prefix would be set up for each of the paths specified. Thus, if a user wants different rules with different path prefixes (even for the same service) they would need to define different ingress resources.
6767

68-
## SSL Redirect
68+
## TLS Redirect
6969

7070
Application Gateway [can be configured](https://docs.microsoft.com/azure/application-gateway/application-gateway-redirect-overview)
7171
to automatically redirect HTTP URLs to their HTTPS counterparts. When this

articles/application-gateway/ingress-controller-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ Using Application Gateway in addition to AGIC also helps protect your AKS cluste
2626
AGIC is configured via the Kubernetes [Ingress resource](https://kubernetes.io/docs/user-guide/ingress/), along with Service and Deployments/Pods. It provides a number of features, leveraging Azure’s native Application Gateway L7 load balancer. To name a few:
2727
- URL routing
2828
- Cookie-based affinity
29-
- SSL termination
30-
- End-to-end SSL
29+
- TLS termination
30+
- End-to-end TLS
3131
- Support for public, private, and hybrid web sites
3232
- Integrated web application firewall
3333

0 commit comments

Comments
 (0)