Skip to content

Commit 4d5b42b

Browse files
Merge pull request #279433 from deveshdama/main
asm: minor updates to istio ingress gateway user doc
2 parents 56a49e8 + f1a9717 commit 4d5b42b

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

articles/aks/istio-deploy-ingress.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,10 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
4040
aks-istio-ingressgateway-external LoadBalancer 10.0.10.249 <EXTERNAL_IP> 15021:30705/TCP,80:32444/TCP,443:31728/TCP 4m21s
4141
```
4242

43+
> [!NOTE]
44+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45+
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
46+
4347
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
4448

4549
```bash

articles/aks/istio-plugin-ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The add-on requires Azure CLI version 2.57.0 or later installed. You can run `az
3535
az keyvault secret set --vault-name $AKV_NAME --name root-cert --file <path-to-folder/root-cert.pem>
3636
az keyvault secret set --vault-name $AKV_NAME --name ca-cert --file <path-to-folder/ca-cert.pem>
3737
az keyvault secret set --vault-name $AKV_NAME --name ca-key --file <path-to-folder/ca-key.pem>
38-
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path/cert-chain.pem>
38+
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path-to-folder/cert-chain.pem>
3939
```
4040

4141
1. Enable [Azure Key Vault provider for Secret Store CSI Driver for your cluster][akv-addon]:

0 commit comments

Comments
 (0)