You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-annotations.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ In the previous example, you've defined an ingress resource named `go-server-ing
87
87
88
88
## Backend Hostname
89
89
90
-
This annotations allows us to specify the host name that Application Gateway should use while talking to the Pods.
90
+
This annotation allows us to specify the host name that Application Gateway should use while talking to the Pods.
91
91
92
92
### Usage
93
93
@@ -126,7 +126,7 @@ Application Gateway [can be configured](./application-gateway-probe-overview.md)
126
126
`health-probe-hostname`: This annotation allows a custom hostname on the health probe.<br>
127
127
`health-probe-port`: This annotation configures a custom health probe port.<br>
128
128
`health-probe-path`: This annotation defines a path for the health probe.<br>
129
-
`health-probe-status-code`: This annotation allows for the health probe to accept different http status codes.<br>
129
+
`health-probe-status-code`: This annotation allows the health probe to accept different HTTP status codes.<br>
130
130
`health-probe-interval`: This annotation defines the interval that the health probe runs at.<br>
131
131
`health-probe-timeout`: This annotation defines how long the health probe will wait for a response before failing the probe.<br>
132
132
`health-probe-unhealthy-threshold`: This annotation defines how many health probes must fail for the backend to be marked as unhealthy.
@@ -354,9 +354,9 @@ spec:
354
354
355
355
## Override Frontend Port
356
356
357
-
The annotation allows to configure frontend listener to use different ports other than 80/443 for http/https.
357
+
The annotation allows you to configure a frontend listener to use different ports other than 80/443 for http/https.
358
358
359
-
If the port is within the App Gw authorized range (1 - 64999), this listener will be created on this specific port. If an invalid port or no port is set in the annotation, the configuration will fallback on default 80 or 443.
359
+
If the port is within the App Gw authorized range (1 - 64999), this listener will be created on this specific port. If an invalid port or no port is set in the annotation, the configuration will fall back on default 80 or 443.
360
360
361
361
### Usage
362
362
@@ -516,7 +516,7 @@ spec:
516
516
517
517
## Application Gateway SSL Certificate
518
518
519
-
The SSL certificate [can be configured to Application Gateway](https://learn.microsoft.com/cli/azure/network/application-gateway/ssl-cert#az-network-application-gateway-ssl-cert-create) either from a local PFX certificate file or a reference to a Azure Key Vault unversioned secret Id. When the annotation is present with a certificate name and the certificate is pre-installed in Application Gateway, Kubernetes Ingress controller will create a routing rule with a HTTPS listener and apply the changes to your App Gateway. appgw-ssl-certificate annotation can also be used together with ssl-redirect annotation in case of SSL redirect.
519
+
The SSL certificate [can be configured to Application Gateway](/cli/azure/network/application-gateway/ssl-cert#az-network-application-gateway-ssl-cert-create) either from a local PFX certificate file or a reference to an Azure Key Vault unversioned secret ID. When the annotation is present with a certificate name and the certificate is pre-installed in Application Gateway, Kubernetes Ingress controller will create a routing rule with a HTTPS listener and apply the changes to your App Gateway. appgw-ssl-certificate annotation can also be used together with ssl-redirect annotation in case of SSL redirect.
520
520
521
521
Please refer to appgw-ssl-certificate feature for more details.
522
522
@@ -590,7 +590,7 @@ spec:
590
590
591
591
## Application Gateway Trusted Root Certificate
592
592
593
-
Users now can configure their own root certificates to Application Gateway to be trusted via AGIC. The annotaton appgw-trusted-root-certificate shall be used together with annotation backend-protocol to indicate end-to-end ssl encryption, multiple root certificates, separated by comma, if specified, e.g. "name-of-my-root-cert1,name-of-my-root-certificate2".
593
+
Users now can configure their own root certificates to Application Gateway to be trusted via AGIC. The annotation appgw-trusted-root-certificate can be used together with annotation backend-protocol to indicate end-to-end ssl encryption, multiple root certificates, separated by comma, if specified, for example, "name-of-my-root-cert1,name-of-my-root-certificate2".
594
594
595
595
### Usage
596
596
@@ -659,11 +659,13 @@ spec:
659
659
660
660
## Rewrite Rule Set Custom Resource
661
661
662
-
> **_NOTE:_** [Application Gateway for Containers](https://aka.ms/agc) has been released, which introduces numerous performance, resilience, and feature changes. Please consider leveraging Application Gateway for Containers for your next deployment.
662
+
> [!Note]
663
+
> [Application Gateway for Containers](https://aka.ms/agc) has been released, which introduces numerous performance, resilience, and feature changes. Please consider leveraging Application Gateway for Containers for your next deployment.
663
664
> URL Rewrite rules for Application Gateway for Containers may be found [here for Gateway API](./for-containers/how-to-url-rewrite-gateway-api.md) and [here for Ingress API](for-containers/how-to-url-rewrite-ingress-api.md).
664
665
> Header Rewrite rules for Application Gateway for Containers may be found [here for Gateway API](./for-containers/how-to-header-rewrite-gateway-api.md).
665
666
666
-
> Note: This feature is supported since 1.6.0-rc1. Please use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](#rewrite-rule-set) which allows using an existing rewrite rule set on Application Gateway.
667
+
> [!Note]
668
+
> This feature is supported since 1.6.0-rc1. Use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](#rewrite-rule-set), which allows using an existing rewrite rule set on Application Gateway.
667
669
668
670
Application Gateway allows you to rewrite selected content of requests and responses. With this feature, you can translate URLs, query string parameters as well as modify request and response headers. It also allows you to add conditions to ensure that the URL or the specified headers are rewritten only when certain conditions are met. These conditions are based on the request and response information. Rewrite Rule Set Custom Resource brings this feature to AGIC.
669
671
@@ -710,7 +712,7 @@ spec:
710
712
711
713
## Rule Priority
712
714
713
-
This annotation allows for application gateway ingress controller to explicitly set the priority of the associated [Request Routing Rules.](./multiple-site-overview#request-routing-rules-evaluation-order)
715
+
This annotation allows for application gateway ingress controller to explicitly set the priority of the associated [Request Routing Rules.](./multiple-site-overview.md#request-routing-rules-evaluation-order)
0 commit comments