Skip to content

Commit 64b42dd

Browse files
Apply suggestions from PR review
1 parent 77c3a4e commit 64b42dd

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

articles/application-gateway/ingress-controller-annotations.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ In the previous example, you've defined an ingress resource named `go-server-ing
8787

8888
## Backend Hostname
8989

90-
This annotations allows us to specify the host name that Application Gateway should use while talking to the Pods.
90+
This annotation allows us to specify the host name that Application Gateway should use while talking to the Pods.
9191

9292
### Usage
9393

@@ -126,7 +126,7 @@ Application Gateway [can be configured](./application-gateway-probe-overview.md)
126126
`health-probe-hostname`: This annotation allows a custom hostname on the health probe.<br>
127127
`health-probe-port`: This annotation configures a custom health probe port.<br>
128128
`health-probe-path`: This annotation defines a path for the health probe.<br>
129-
`health-probe-status-code`: This annotation allows for the health probe to accept different http status codes.<br>
129+
`health-probe-status-code`: This annotation allows the health probe to accept different HTTP status codes.<br>
130130
`health-probe-interval`: This annotation defines the interval that the health probe runs at.<br>
131131
`health-probe-timeout`: This annotation defines how long the health probe will wait for a response before failing the probe.<br>
132132
`health-probe-unhealthy-threshold`: This annotation defines how many health probes must fail for the backend to be marked as unhealthy.
@@ -354,9 +354,9 @@ spec:
354354

355355
## Override Frontend Port
356356

357-
The annotation allows to configure frontend listener to use different ports other than 80/443 for http/https.
357+
The annotation allows you to configure a frontend listener to use different ports other than 80/443 for http/https.
358358

359-
If the port is within the App Gw authorized range (1 - 64999), this listener will be created on this specific port. If an invalid port or no port is set in the annotation, the configuration will fallback on default 80 or 443.
359+
If the port is within the App Gw authorized range (1 - 64999), this listener will be created on this specific port. If an invalid port or no port is set in the annotation, the configuration will fall back on default 80 or 443.
360360

361361
### Usage
362362

@@ -516,7 +516,7 @@ spec:
516516

517517
## Application Gateway SSL Certificate
518518

519-
The SSL certificate [can be configured to Application Gateway](https://learn.microsoft.com/cli/azure/network/application-gateway/ssl-cert#az-network-application-gateway-ssl-cert-create) either from a local PFX certificate file or a reference to a Azure Key Vault unversioned secret Id. When the annotation is present with a certificate name and the certificate is pre-installed in Application Gateway, Kubernetes Ingress controller will create a routing rule with a HTTPS listener and apply the changes to your App Gateway. appgw-ssl-certificate annotation can also be used together with ssl-redirect annotation in case of SSL redirect.
519+
The SSL certificate [can be configured to Application Gateway](/cli/azure/network/application-gateway/ssl-cert#az-network-application-gateway-ssl-cert-create) either from a local PFX certificate file or a reference to an Azure Key Vault unversioned secret ID. When the annotation is present with a certificate name and the certificate is pre-installed in Application Gateway, Kubernetes Ingress controller will create a routing rule with a HTTPS listener and apply the changes to your App Gateway. appgw-ssl-certificate annotation can also be used together with ssl-redirect annotation in case of SSL redirect.
520520

521521
Please refer to appgw-ssl-certificate feature for more details.
522522

@@ -590,7 +590,7 @@ spec:
590590

591591
## Application Gateway Trusted Root Certificate
592592

593-
Users now can configure their own root certificates to Application Gateway to be trusted via AGIC. The annotaton appgw-trusted-root-certificate shall be used together with annotation backend-protocol to indicate end-to-end ssl encryption, multiple root certificates, separated by comma, if specified, e.g. "name-of-my-root-cert1,name-of-my-root-certificate2".
593+
Users now can configure their own root certificates to Application Gateway to be trusted via AGIC. The annotation appgw-trusted-root-certificate can be used together with annotation backend-protocol to indicate end-to-end ssl encryption, multiple root certificates, separated by comma, if specified, for example, "name-of-my-root-cert1,name-of-my-root-certificate2".
594594

595595
### Usage
596596

@@ -659,11 +659,13 @@ spec:
659659

660660
## Rewrite Rule Set Custom Resource
661661

662-
> **_NOTE:_** [Application Gateway for Containers](https://aka.ms/agc) has been released, which introduces numerous performance, resilience, and feature changes. Please consider leveraging Application Gateway for Containers for your next deployment.
662+
> [!Note]
663+
> [Application Gateway for Containers](https://aka.ms/agc) has been released, which introduces numerous performance, resilience, and feature changes. Please consider leveraging Application Gateway for Containers for your next deployment.
663664
> URL Rewrite rules for Application Gateway for Containers may be found [here for Gateway API](./for-containers/how-to-url-rewrite-gateway-api.md) and [here for Ingress API](for-containers/how-to-url-rewrite-ingress-api.md).
664665
> Header Rewrite rules for Application Gateway for Containers may be found [here for Gateway API](./for-containers/how-to-header-rewrite-gateway-api.md).
665666

666-
> Note: This feature is supported since 1.6.0-rc1. Please use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](#rewrite-rule-set) which allows using an existing rewrite rule set on Application Gateway.
667+
> [!Note]
668+
> This feature is supported since 1.6.0-rc1. Use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](#rewrite-rule-set), which allows using an existing rewrite rule set on Application Gateway.
667669

668670
Application Gateway allows you to rewrite selected content of requests and responses. With this feature, you can translate URLs, query string parameters as well as modify request and response headers. It also allows you to add conditions to ensure that the URL or the specified headers are rewritten only when certain conditions are met. These conditions are based on the request and response information. Rewrite Rule Set Custom Resource brings this feature to AGIC.
669671

@@ -710,7 +712,7 @@ spec:
710712

711713
## Rule Priority
712714

713-
This annotation allows for application gateway ingress controller to explicitly set the priority of the associated [Request Routing Rules.](./multiple-site-overview#request-routing-rules-evaluation-order)
715+
This annotation allows for application gateway ingress controller to explicitly set the priority of the associated [Request Routing Rules.](./multiple-site-overview.md#request-routing-rules-evaluation-order)
714716

715717
### Usage
716718

0 commit comments

Comments
 (0)