Skip to content

Commit 4ddcaf3

Browse files
committed
[AKS] Update H2s
1 parent 9d4c935 commit 4ddcaf3

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/aks/ingress.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ No ingress rules have been created yet. If you browse to the public IP address,
4848

4949
![Default NGINX backend](media/ingress/default-back-end.png)
5050

51-
## Configure DNS name
51+
## Configure a DNS name
5252

5353
For the HTTPS certificates to work correctly, configure an FQDN for the ingress controller IP address. Update the following script with the IP address of your ingress controller and a unique name that you would like to use for the FQDN:
5454

@@ -95,7 +95,7 @@ helm install stable/cert-manager \
9595

9696
For more information on cert-manager configuration, see the [cert-manager project][cert-manager].
9797

98-
## Create CA cluster issuer
98+
## Create a CA cluster issuer
9999

100100
Before certificates can be issued, cert-manager requires an [Issuer][cert-manager-issuer] or [ClusterIssuer][cert-manager-cluster-issuer] resource. These Kubernetes resources are identical in functionality, however `Issuer` works in a single namespace, and `ClusterIssuer` works across all namespaces. For more information, see the [cert-manager issuer][cert-manager-issuer] documentation.
101101

@@ -123,7 +123,7 @@ $ kubectl create -f cluster-issuer.yaml
123123
clusterissuer.certmanager.k8s.io/letsencrypt-prod created
124124
```
125125
126-
## Create certificate object
126+
## Create a certificate object
127127
128128
Next, a certificate resource must be created. The certificate resource defines the desired X.509 certificate. For more information, see, [cert-manager certificates][cert-manager-certificates].
129129
@@ -157,7 +157,7 @@ $ kubectl create -f certificates.yaml
157157
certificate.certmanager.k8s.io/tls-secret created
158158
```
159159

160-
## Run application
160+
## Run demo applications
161161

162162
An ingress controller and a certificate management solution have been configured. Now let's run two demo applications in your AKS cluster. In this example, Helm is used to deploy two instances of a simple 'Hello world' application.
163163

@@ -179,7 +179,7 @@ Now install a second instance of the demo application. For the second instance,
179179
helm install azure-samples/aks-helloworld --set title="AKS Ingress Demo" --set serviceName="ingress-demo"
180180
```
181181

182-
## Create ingress route
182+
## Create an ingress route
183183

184184
Both applications are now running on your Kubernetes cluster, however they're configured with a service of type `ClusterIP`. As such, the applications aren't accessible from the internet. To make them publicly available, create a Kubernetes ingress resource. The ingress resource configures the rules that route traffic to one of the two applications.
185185

0 commit comments

Comments
 (0)